You are on page 1of 88

Internal Use Only

Basic Principles of SDH


Pre-sales Comm. And Tech. Support, OTPD Pang Lipeng

<ZTE corporation copyright reserved,No spreading abroad>

Outline
Overview to SDH

Internal Use Only

Rate and frame structure


Multiplexing structure and

procedures
SDH network protection

SDH network synchronization


<ZTE corporation copyright reserved,No spreading abroad>

Add/drop 2Mbit/s signals Internal Use Only


in PDH and SDH systems O / E
E / O Demultiplexing Multiplexing Demultiplexing

Multiplexing

2Mbit/selectrical signals
155Mb/s
Optical interface

2Mbit/selectrical signals
<ZTE corporation copyright reserved,No spreading abroad>

Demultiplexing

Multiplexing

ADM

155Mb/s
Optical interface

SDH feature
-- plentiful overhead bytes

Internal Use Only

1. SDH system is an intelligent equipment with powerful self-healing function. SDH NMS and dynamic configuration with intelligent check contribute to easy self-healing of SDH network. When a fault occurs to the equipment or system, the services can be recovered rapidly, greatly improving network reliability and lowering maintenance cost. 2. SDH system has good network management function. The overhead bytes (1/10 of the total capacity) in the SDH frame may meet the present requirements in the alarm, performance supervision, network configuration, switching and orderwire, and can be extended further to satisfy the future requirements in the supervision and NM. SDH advantages: Synchronous multiplexing, standard optical interface and powerful NM.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

SDH shortcomings: 1. The frequency band utilization rate of SDH is lower than that of PDH. 2. The pointer adjustment makes the equipment and interfaces more complex. 3. The software control function easily causes major faults.

<ZTE corporation copyright reserved,No spreading abroad>

Outline
Overview to SDH

Internal Use Only

Rate and frame structure


Multiplexing structure and

procedures
SDH network protection

SDH network synchronization


<ZTE corporation copyright reserved,No spreading abroad>

SDH rates

Internal Use Only

Name

SDH level

SONET level
OC-3/STS3(1440CH) OC-12/STS-12(8046CH)

Standard rate 155.520Mbit/s 622.080Mbit/s

155M STM-1(1920CH) 622M STM-4 2.5G 10G STM-16 STM-64

OC-48/STS-48(32356CH) 2488.320Mbit/s OC-192/STS-192 9953.280Mbit/s 39813.120Mbit/s

40G STM--256

OC-576

STM- Synchronous transfer mode


<ZTE corporation copyright reserved,No spreading abroad>

STM-1 frame structure


8000 frames/s

Internal Use Only

capacity = 9 270 bytes

SOH 9 rows
AU-PTR

SOH
section overhead

PAYLOAD with POH

9 columns

270 columns (byte)


<ZTE corporation copyright reserved,No spreading abroad>

Frame structure
STM-N frame structure
9270N bytes 125s
1

Internal Use Only

SOH
3

4
5

AU pointer

SDH payload with POH

Transmission direction

SOH
Frame period, 9 frame frequency block and rate

9N

261 N

<ZTE corporation copyright reserved,No spreading abroad>

Byte interleave synchronous Internal Use Only multiplexing


Byte interleaver multiplexer
t

STM-1 Signal A STM-1 Signal B STM-1 Signal C

STM-4 signal (4STM-1)

STM-1 Signal D

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

1.

Information payloads --They contain various information blocks and some POH bytes used for channel performance supervision, management and control. Section overheads--They are the additional bytes ensuring the normal and flexible transmission of information payload. They provides the frame synchronization and network OAP bytes. SOH consists of RSOH and MSOH. RSOH terminates in the regenerator, and MSOH transparently goes through the regenerator and is assembled/dissembled in AUG. AU-PTR --It indicates the accurate position of the first byte of information payload in STM-N frame, and employs the pointer adjustment technique to resolve the clock deviation of network node so that the information payload can be detached properly at the receiving end of SDH system.

2.

3.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only SDH network segment model

MS
Tributary signals
RS

MS
RS RS

Tributary signals

SDH TM

SDH DXC
REG REG

SDH TM

VC multiplexing

PATH

VC demultiplexing

Path, MS and RS
<ZTE corporation copyright reserved,No spreading abroad>

SOH bytes
STM-1 SOH bytes
9 columns
A1 B1 D1 A1 B2 A1 A2 E1 D2 A2 A2 J0 F1 D3 K2 D6 D9 * *

Internal Use Only

RSOH

9 rows
B2 D4 D7 D10 S1

AU PRT B2 K1 D5 D8

MSOH

D11

D12
M1 E2

<ZTE corporation copyright reserved,No spreading abroad>

Description for SOH byte Internal Use Only

framing bytes: A1, A2 bytes identifies the initial location of the

frame. The byte code pattern are defined as A1: 11110110F6H A2: 0010100028H (transparent transmission)
RS

trace byte: J0

It repeatedly transmits the section AP identity to assure the receiver of the connection with the receiver assigned. The section AP identity adopts the format in section 3 of ITU-T G.831, that is, use a 16-byte frame to transmit the section AP identity. byte number 8bit value 1 1 C1 C2 C3 C4 C5 C6 C7 2 0 X X X X X X X 3 0 X X X X X X X . 16 0 X X X X X X X
<ZTE corporation copyright reserved,No spreading abroad>

note: the first byte is the initial location identity of the frame. C1-C7 is the calculation result of CRC-7 in the previous frame. The other 15 bytes transmit the section AP identity.

Internal Use Only

Data Communication Channel (DCC): D1D12 SOH DCC is the transmission link of SDH management network (SMN). D1~D3 byte transmits OAM information between RS terminals. D4~D12 byte transmits OAM information between MS terminals. One purpose of SDH network management control is to implement the fast distributed control. The best route table calculated by NMS can be delivered quickly to NE via DCC at any time. DCC is the SDH physical channel and has the protocol stack Qecc.

Orderwire channel: E1 and E2 E1 and E2 offers the orderwire voice channel. E1 is used for the RS orderwire and E2 for the orderwire between terminals.
User channel: F1 It is for the network provider. It is used for the special maintenance of system operator, e.g., providing temporary 64kb/s data/voice channel.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

B1: BIP-8 B1 supervises the MS bit error in BIP-8 method. After all the bytes scrambled in the previous frame of STM-N make the BIP-8 check, the result is in the B1 byte before unscrambled in the present frame. The bit error supervision is one of SDH characteristics. It can automatically supervise the MS bit error in a simple way. But this mode can not check out the even number of bit errors in one supervise code group. (This case seldom occurs, but a certain error exists.
B2: BIP-N24 It makes the online of supervision of the MS bit error in the BIP-N24 method. The BIP-N24 value of all bytes in the previous STM-N frame is in B2 before scrambled in the present frame. The first three lines of SOH is not for check.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only APS channel: K1 and K2b1-b5 The two bytes are used for APS instruction. (K1 indicates the switching type and channel No., and K2 indicates the channel No. switched to the protection channel.) MS-RDI byte: K2 (b6-b8) MS-RDI sends back an instruction signal to the transmitting end, indicating that the receiving end finds an incoming fault or is receiving MS-AIS. After unscrambled, K2 (b6-b8) forms 110, that is, MS-RDI. Synchronization state: S1b5-b8 S1 (b5-b8) transmits the synchronization state information, that is, the synchronization state of the upstream station is transmitted to the downstream station via S1 (b5-b8). S1 (b5-b8) b5-b8) Clock level 0000 Unknown quality 0010 G.811 reference clock 0100 G.812 exchange slave clock 1000 G.812 local slave clock 1011 SETS 1111 Not for clock synchronization
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only


MS-REI:

M1 M1 is used for MS-REI. It sends the quantity of the bit errors checked out by B2. related to transmission media: One-fiber unidirection, one-fiber bidirection, etc. Backup bytes -Free byte (for future use in the international standard) (Note: The bytes with * will not be scrambled.
Bytes STM-N(N>1)

SOH It is formed in the byte interleaving mode. The SOH in the first STM-1 is remained, but the SOH in other N-1 STM-1 is remained only with byte A1, A2 and B2.
<ZTE corporation copyright reserved,No spreading abroad>

STM-4 SOH bytes


36 byte

Internal Use Only

9 rows

AU PRT

<ZTE corporation copyright reserved,No spreading abroad>

15

STM-16 SOH bytes


144 bytes A1 A1 A1 B1 D1 B2 B2 B2 A1 A2 A2 A2 E1 D2 K1 D5 D8 D11 AU PRT B2 D4 D7 D10 S1 FEC
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

A1

J0/C1 Z0/C1 Z0/C1

F1 D3 K2 D6 D9 D12 E2 M1

R S O H M S O H

9 rows

STM-64 SOH bytes


576 bytes A1 A1 A1 B1 D1 B2 A1 A2 A2 A2 E1 D2 K1 D5 D8 D11 AU PRT K2 D6 D9 D12 E2 M1 A1

Internal Use Only

J0/C1 Z0/C1 Z0/C1

F1 D3

R S O H M S O H

9 rows B2 B2 B2
D4 D7 D10 S1

FEC
<ZTE corporation copyright reserved,No spreading abroad>

FEC (Forward Error Correction) Internal Use Only


Some bytes in SOH of STM-16 ~ STM-256 are used for FEC. FEC means that the signals are coded in a certain format before transmission, then they are decoded with a specific algorithm at the receiver in order to find out the bit errors and correct them.

ITU-I G.975, issued in 1996, employs FEC as a part of the cable communication standards. The new draft, passed in April, 2000, is added with FEC as an option in the 10Gbit/s system.

<ZTE corporation copyright reserved,No spreading abroad>

Outline
Overview to SDH

Internal Use Only

Rate and frame structure


Multiplexing structure and

procedures
SDH network protection

SDH network synchronization


<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Multiplexing structure and procedures


N
STM-N AUG

1
AU-4 VC-4

C-4

140Mb/s

3
AU-3 VC-3 TUG-3

TU-3

VC-3 C-3 VC-2 VC-12 VC-11 C-2 C-12 C-11

45Mb/s 34Mb/s
6.3Mb/s 2Mb/s 1.5Mb/s

1 TUG-2 TU-2 3
TU-12

4 4
TU-11

C VC TU
AU

TUG AUG STM

Mapping Positioning Multiplexing

Multiplexing structure in G.707


<ZTE corporation copyright reserved,No spreading abroad>

Mapping structure in China Internal Use Only

Pointer processing
Positioning Multiplexing

Mapping
2: VC-2-mc STM-1 capacity: 1. 1140M signal 2. 334M 4Mb/s34Mb/sSDH 3.2 VC-2VC-2

signals

3. 632M signals

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Pointer processing Positioning Multiplexing Mapping

<ZTE corporation copyright reserved,No spreading abroad>

New multiplexing structure in G.707

Byte interleaving multiplexing and byte block multiplexing


Byte interleaving multiplexing: (4AUG-1 are multiplexed into 1AUG-4)

Internal Use Only

Byte block multiplexing: When AUG-N (N4), AUG-16 is

Byte block interleaving multiplexing:

<ZTE corporation copyright reserved,No spreading abroad>

Multiplexing unit
1. Container (C)
C contains service signals at various rates.

Internal Use Only

G.707 specifies five standard containers for PDH rate series: C-11, C-12, C-2, C-3 and C4.
PDH series indicate the payload by H-n, which is divided into different levels.

C-n

<ZTE corporation copyright reserved,No spreading abroad>

2. VC

Internal Use Only

VC supports the connection at the SDH path layer. VC, composed of payload (C output) and POH, is the information terminal of SDH path.

VC-n=C-n+VC-n POH
LOVC: VC-1 and VC-2 VC-3 (VC-3 - TU-3 - TUG-3- VC-4) HOVC: VC-4 VC-3 (in AU-3)

VC-n POH C-n

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Service signal/PDH signal, C and VC

POH

=
Adjustment bit

VC

Service/ PDH signal

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

VC parameters
VC
Frame period and multiframe (s) Frame frequency and multiframe frequency (Hz)

VC-4

VC-3

VC-2

VC-12

VC-11

125
8000 2619 2349 150.336

125
8000 859 765 48.960

500
2000

500
2000

500
2000

Structure Capacity (byte number) Rate (Mbit/s)

4(129-1) 4(49-1) 4(39-1) 428 6.848 140 2.240 104 1.664

<ZTE corporation copyright reserved,No spreading abroad>

3. TU and TUG

Internal Use Only

TU adapts the low-order path signals into the high-order path layer (e.g., VC-4).

Four TUs are available, i.e., TU-n (n=11, 12, 2 and 3).
TU-n consists of a LOVC-n and a TU-n PTR. TU-n =VC-n+TU-n PTR TU-n PTR points the shift between VC-n payload start point and HOVC frame start point. TUG is composed of one or several TUs at the fixed location of HOVC payload.

<ZTE corporation copyright reserved,No spreading abroad>

4. AU and AUG
AU adapts the HO path signals into MS layer. AU-3 and AU-4 are available.

Internal Use Only

AU-n (n=3, 4) comprises a HOVC-n and a AU-n PTR. For example:


AU-n =VC-n+AU-n PTR

AU-n PTR points the shift between VC-n payload start point and MS start point.
AUG is composed of one or several AUs at the fixed location of STM-N payload. One AU is composed of one AU-4 or three AU-3 in the byte interleaving multiplexing mode.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

TU and AU parameters
TU and AU
Frame period and multiframe (s) Frame frequency and multiframe frequency (Hz)

AU-4 125 8000

AU-3 125 8000

TU-3 125 8000

TU-2 500 2000

TU-12 TU-11 500 2000 500 2000

Structure Capacity (byte number) rateMbit/s

2619+9 819+3 859+3 4(129) 4(49) 4(39) 2358 786 768 432 6.912 144 2.304 108 1.728

150.912 50.304 49.152

<ZTE corporation copyright reserved,No spreading abroad>

Multiplexing step 1
-mapping

Internal Use Only

Mapping synchronizes tributary signals with the corresponding VC so that VC can send, multiplex and cross signals independently. (Only STM-1 has the mapping function.) 1. Mapping mode The mapping can be divided into asynchronous mapping and synchronous mapping by the synchronization state between mapped signals and SDH network. Asynchronous mapping --The pointer adjusts the payload to adapt the signals into SDH frame, independent of signal features and network synchronization. The pointer adjusts the frequency or phase difference to synchronize the signals without slide buffer. As a common mapping mode, it is necessary in the long transition from PDH to SDH.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Synchronous mapping --The mapped signals must be strictly synchronous with SDH network. 125us (the duration of one frame) slide buffer is required to reduce the slide loss in the synchronization. The slide buffer causes 150us delay to the multiplexer, but 10us delay to the demultiplexer. Synchronous mapping are categorized as bit synchronous mapping and byte synchronous mapping.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Comparison between asynchronous mapping and synchronous mapping


Mapping n o d e Asynchronous mapping

Synchronous mapping
Bit synchronous It is independent of signal features, but it requires the network synchronization and 125us slide buffer. The delay caused is more than 125us (multiplexer). N64kb/s signals can not be accessed directly because the de-framing is required. The interface is comparatively simple.

Byte synchronous mapping


2Mb/s signals should be framed according to G.704. It requires the network synchronization and 125us slide buffer. The delay caused is more than 125us (multiplexer). N64kb/s signals can be accessed directly because the de-framing is not required. The interface is the most complex.

It is a common mode, independent of signal features, network synchronization and characteristics slide buffer. The minimum delay caused is 10us. The primary group mapping can not access directly N64kb/s signals because the deframing is required. The interface is simple.

<ZTE corporation copyright reserved,No spreading abroad>

C-4 is mapped into VC-4


J1 B3 C2 G1 HP-POH 9 rows1 column F2 H4 F3 K3

Internal Use Only

VC-4 PAYLOAD

N1
260 columns (byte)

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

1. Add VC-4 POH

2. HPOH
J1: Path trace byte It repeatedly sends the HP access point identifier whose content is decided by the transmitter and receiver, thus the transmitter may confirm the connection with the specified receiver. J1 location is pointed by the related pointer. B3: Path BIP-8 code It comes from the interleaving parity calculation of all VC-4 bits before scrambling.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

F2 and F3: Path user byte They offers the orderwire communication between path units.

H4: TU indication byte


It indicates the payload multiframe type and payload location. K3 (b1-b4): APS path byte It sends HP APS signals. K3 (b5-b8): For future use (backup)

N1: Network operator byte


It monitors the HP serial connection.
<ZTE corporation copyright reserved,No spreading abroad>

Multiplexing step 2
-Positioning

Internal Use Only

Positioning refers to a process to take the frame deviation information into TU or AU, that is, TU PTR (AU PTR) attached to VC indicates and determined the LOVC frame start point in the TU payload ( the HOVC frame start point in the AU payload. SDH pointer function:
When the network works synchronously, the pointer aligns the phases of synchronous signals. When the network dismatches, the pointer aligns the frequencies and phases. When the network is out of synchronization or works asynchronously, the pointer traces and aligns the frequencies. The pointer can also accept the frequency jitter and wander in the network.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

VC-4/VC-3 positioning in AU-4/TU-3


AU-4=VC-4+AU-4 PTR TU-3=VC-3+TU-3 PTR AU-4 PTR=H1YYH21*1*H3H3H3

Y=1001SS11SS --bit without specific value


1*=11111111

TU-3 PTR=H1H2H3

<ZTE corporation copyright reserved,No spreading abroad>

Multiplexing step 3
-synchronous multiplexing

Internal Use Only

Multiplexing refers to the adaption of several LP signals (TU-12) into HP signals (VC4) or several HP signals (AU-4) into STM-N frame, that is, adapt TU into VC or AU into STM-N in the byte interleaving mode. For example: TU12(3) TUG2(7) TUG3(3) VC4
For example: AU-4(1) AUG(N) STM-N As VC tributaries are synchronous due to TU and AU pointers, the process is called the synchronous multiplexing. Multiplexing mode: Byte interleaving mode.

<ZTE corporation copyright reserved,No spreading abroad>

Byte interleave synchronous Internal Use Only multiplexing


t

Byte interleave multiplexer

STM-1 signal A STM-1 signal B STM-1 signal C

STM-4 signal (4STM-1)

STM-1 signal D

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

For example: Multiplex NAUG into STM-N


1 1 9

AUG

261 1 9

AUG

261
1 9

AUG

261

#1

#2

#N

123N 123N 123N

123N

N 9

N 261

STM-N
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (1)

2048kbit/s frame TS0 TS1 TS2

TS15 TS16 TS17 TS18

TS31

C-12 frame C-12 multiframe TU-12 frame VC-12 frame V1V5 R 1 V2J2 R 1 V3N2 R 1 V4K4 R 1

32 R

32 R

32 R

32 R

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (2)

3TU-121TUG-2
TU-12 a
1 2 3 4 1

TU-12 b
2 3 4 1

TU-12 c
2 3 4

a b

a b

12

TUG-2 information structure


<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (3)

Multiplex 7TUG-2 into 1 TUG-3 in the byte interleaving mode


1 2 1 2 1 2 1 2 1 2 3 1 2 1 2 1 2 1 2 1 2 1 2 1 2

Insert bytes

TUG-21

TUG-22

TUG-27

1 2

1 2 3 4 5 6 7 3 4 5 6 7

1 2 3 4 5 6

1 2 3 4 5 6 7 7

84
<ZTE corporation copyright reserved,No spreading abroad>

86

TUG-3 information structure

Internal Use Only Multiplex 2Mbit/s into STM-1 (4)

Multiplex 3TUG-3 into C4 in the byte interleaving mode

C4 structure
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (5) J1

B3
C2 G1 HPOH 9 rows1 column F2 H4 F3 K3 N1

Map C-4 intoVC-4


VC-4 PAYLOAD

260 columns (byte) In order to supervise the 140Mb/s path signals, it is required in the multiplexing to add a column of VC4 POH before C4 frame. Then the signals is in the VC4 structure.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (6) Add AU-PTR to VC-4 to make VC-4 become AU-4. J1 B3 C2 H1 Y Y H2 1 1 H3 H3 H3 G1 F2 H4 F3 AU-4 PTR consists of 9 K3 bytes from column 1~9 N1

VC-4 PAYLOAD

at row 4 of AU-4 frame.

261 columns (byte)

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only Multiplex 2Mbit/s into STM-1 (7)

RSOH 9 rows MSOH


P O H

STM-1 PAYLOAD

AU-PTR

VC-4 PAYLOAD

9 rows1 column 261 column Add RSOH and MSOH to form STM-1.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Mapping and multiplexing diagram Use Only

multiplexing multiplexing LD POH VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s code speed adjustment

AU PTR

N
STM-N AUG-4

1
AU-4

N multiplexing HD POH 7 multiplexing

TU PTR

<ZTE corporation copyright reserved,No spreading abroad>

STM-1 rate adjustment

Internal Use Only

49.536Mbit/s 150.912Mbit/s

150.336Mbit/s

2.304Mbit/s

2.176Mbit/s

N
STM-N AUG-4

1
AU-4 VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s

155.520Mbit/s 6.912Mbit/s

2.240Mbit/s

2.048Mbit/s

<ZTE corporation copyright reserved,No spreading abroad>

Layer
STM-N

standard

Internal Use Only

STM-1

AU-4

VC-4

TUG-3,2

TU-12

VC-12

C-12

Service

Telephone and database Mapping

Multiplexing Positioning <ZTE corporation copyright reserved,No spreading abroad>

Outline
Overview to SDH

Internal Use Only

Rate and frame structure


Multiplexing structure and

procedures
SDH network protection

SDH network synchronization


<ZTE corporation copyright reserved,No spreading abroad>

SDH network topology


Link

Internal Use Only

Ring

Star
Mesh

Tree

<ZTE corporation copyright reserved,No spreading abroad>

SDH network protection and self-healing

Internal Use Only

Self-sealing: When a fault occurs to the network, the service transmission can recover automatically in such a short time that a user can not find it.

Network selfhealing

<ZTE corporation copyright reserved,No spreading abroad>

SDH network protections


MS 11 protection

Internal Use Only

Link network

MS 11 protection MS 1n protection n<=14

2-fiber unidirectional path protection ring

Ring network

2-fiber unidirectional MS protection ring


2-fiber bidirectional MS protection ring 4-fiber bidirectional MS protection ring

Dual-Node interconnection (DNI)


<ZTE corporation copyright reserved,No spreading abroad>

SDH ring protections


Ring protection categorization:
By fiber quantity: 2-fiber and 4-fiber

Internal Use Only

By service direction: Unidirectional and bidirectional

By protection object level: Path protection and MS protection


Common ring protection: 2-fiber unidirectional path protection ring 2-fiber unidirectional MS protection ring 2-fiber bidirectional MS protection ring 4-fiber bidirectional MS protection ring
<ZTE corporation copyright reserved,No spreading abroad>

Several definitions

Internal Use Only

There are two kinds of SDH protection switching ring: MS protection switching ring and path protection switching ring. What are the most commonly used are 2-fiber unidirectional path protection ring, 2-fiber unidirectional MS protection ring, 2-fiber bidirectional MS protection ring and 4-fiber bidirectional MS protection ring. Before the principles of these rings is described in detail, several definitions should be explained: MS protection switching, path switching, unidirectional ring and bidirectional ring. What are MS and path? Simply speaking, MS refers to the section between two multiplexers (or the equipment with multiplexing functions), and the multiplexed low-rate signals are called the path. An extra channel is required to protection signals in the transmission. For the MS switching ring, the protection are based on MS, the switching depends on the MS signal quality between a pair of nodes, and all MS services are switched to another channel in the switching. However, for the path switching ring, the protection is based on path, and the switching depends on the quality of one channel.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Unidirectional ring and bidirectional ring

Unidirectional ring

Bidirectional ring

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

2-fiber unidirectional path protection ring

D C P W

D C P W

a ) in normal case

b ) in abnormal case

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Working principles of 2-fiber ring


Two fibers respectively form internal ring and external ring. One fiber is used to transmit service signals and the other to protect them. The two rings are unidirectional and transmit services in different directions. The tributary signals from node A to node C are transmitted simultaneously in two fibers and reach C in different direction at one time. C receives the signals of one fiber with better signal quality. If the connection from A to C breaks off, the signals in W fiber will be lost, the switch will be switched from W fiber to P fiber and receives the signals in P fiber. Thus the signals from A to C go on transmission.
<ZTE corporation copyright reserved,No spreading abroad>

Working principles of 2-fiber ring

Internal Use Only

A ring has 4 fibers: Two service fibers (one for receiving and the other for transmitting), and two protection fibers (one for receiving and the other for transmitting). Each fiber has a changeover switch. The signals transmit from A to C via W1 fiber clockwise, and the signals transmit from C to A via W2 fiber anticlockwise. This is a bidirectional ring and the two protection fibers are idle. When the connection from A to C breaks off, the changeover switches at B and C connect W1 to P1 and W2 to P2, ensuring the continuity of the ring. In a 4-fiber ring, the transmission directions of W1 and P2 are the same, and so are those of W2 and P1. W1 and P2 can be integrated into one fiber W1/P2, and W2 and P1 into one fiber W2/P1. A half of W1/P2 timeslots transmit services, and the other half are idle in the normal case and protect W2/P1 services in the faulty case. A half of W2/P1 timeslots transmit services, and the other half are idle in the normal case and protect W1/P2 services in the faulty case. Thus a 4-fiber ring is simplified into a 2-fiber ring. One half of W1/P2 timeslots transmit signals from A to C clockwise and the other half is idle. When the connection between A and C breaks off, the changeover switches at B and C connect the two fiber together. With the timeslot switching technique, the signals are switched from the service timeslot of one fiber to the idle protection timeslot of the other fiber.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

4-fiber bidirectional MS shared protection ring

a) In the normal case

b) Switching in the faulty case

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

2-fiber bidirectional MS shared protection ring

a) In the normal case


<ZTE corporation copyright reserved,No spreading abroad>

b) Switching in the faulty case

Internal Use Only

Features and applications of self-healing rings


Advantage: The protection can be implemented easily. No APS protocol is required and the switching is the fastest (<30ms) Shortcoming: The timeslots between nodes can not be used repeatedly, so the ring transmission capacity is small. And extra services can not be transmitted.

Ring transmission capacity: STM-N


Note: The unidirectional path protection ring found a wide application. It is applied to the centralized services.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

4-fiber bidirectional MS protection ring


Advantage: The timeslots between nodes can be used repeatedly, so the ring transmission capacity is large. And extra services can not be transmitted via the standby fibers P1 and P2. Shortcoming: The switching is slow because APS protocol and cross connection are required. And the equipment should meet some high requirements. Ring transmission capacity: kSTM-N (k is the node quantity in the ring) Note: ADM equipment in a 4-fiber ring should meet some requirements, e.g., system capacity, cross capacity and software function. It is applied to the distributed services.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

2-fiber bidirectional MS protection ring


Advantage: The timeslots between nodes can be used repeatedly, so the ring transmission capacity is large. And extra services can not be transmitted via the standby fibers P1 and P2. Shortcoming: The switching is slow because APS protocol and cross connection are required. And the equipment should meet some high requirements. Ring transmission capacity: k/2STM-N (k is the node quantity in the ring) Note: The bidirectional MS protection ring found a wide application. It is applied to the distributed services.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Characteristics and applications of 3 protection rings

item

Unidirectional path ring

2-fiber MS ring

4-fiber MS ring

node
Line rate ring transmission capacity APS protocal swiching time node cost system complexity applications

k
STM-N STM-N no 30ms low simple Access network and relay net work (centralized service)

k
STM-N k/2STM-N yes 50-200ms medium complex Relay network and toll network (distributed service)

k
STM-N kSTM-N yes 50-200ms high complex Relay network and toll network (distributed service)

<ZTE corporation copyright reserved,No spreading abroad>

DNI protection
A

Internal Use Only

B(primary)

D(secondary)

DNI, based on ITUT G.842, is very practical to the services across rings.

C(primary) E(secondary)

The services from A to F are transmitted in two ways: ABCF or ABDECF.

<ZTE corporation copyright reserved,No spreading abroad>

Outline
Overview to SDH

Internal Use Only

Rate and frame structure


Multiplexing structure and

procedures
SDH network protection

SDH network synchronization


<ZTE corporation copyright reserved,No spreading abroad>

Synchronization

Internal Use Only

The synchronization is the nervous system of SDH network. The asynchronization between NEs in one network leads to the unaligned timeslots and no proper connection between transmitter and receiver. The asynchronization between networks leads to the broken network communication and service disconnection.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

4-level clocks in ITU-T recommendation


Reference master clock In compliance with G.811. Transit exchange clock In compliance with G.812 (transit clock at the intermediate exchange) End exchange clock In compliance with G.812 (local exchange clock) SDH NE clock In compliance with G.813 (clock embedded in SDH NE)

<ZTE corporation copyright reserved,No spreading abroad>

Clock type

Internal Use Only

1. Caesium atom clock: It has the high long-term frequency stability and precision. The long-term frequency deviation is better than 1*10E-11, but the short-term stability is not good. 2. Quartz crystal oscillator: It has cheap clock source and high reliability, but low long-term frequency stability.
3. Rubidium atom clock: Its stability, precision and cost is between the above clocks. The adjustable frequency range is larger than caesium atom clock, the long-term stability is lower by about one magnitude, but it has excellent short-term stability, low cost and 10-year service life.
<ZTE corporation copyright reserved,No spreading abroad>

Synchronization mode

Internal Use Only

1. Full-synchronization mode: The overall network is synchronous with the unique PRC. Its synchronization is highly precise but difficult. In the implementation the hierarchical control scheme is usually adopted, that is, the hierarchical master/slave synchronization mode.
2. Pseudo-synchronization mode: The overall network is divided into several sub-networks, and the master clocks of the sub-networks comply with G.811. The slave clock is synchronous with the master clock in the sub-network. The clocks of the sub-networks are independent of each other, but the differences are so small that they are approximately synchronous.

<ZTE corporation copyright reserved,No spreading abroad>

Synchronization mode

Internal Use Only

3. Quasi-synchronization mode: After the external timing reference is lost, the node clock holds on. The network synchronization quality is not good. 4. Asynchronization mode: The node clocks are different from each other in the synchronization, and the service can not go on normally, so the alarm signals are sent.

SDH network adopts the hierarchical master/slave synchronization mode at present.

<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Three working modes of slave clock in Only master/slave synchronization mode
Normal working mode Upper-level clock tracing and locking mode The clock reference, traced and locked by the slave site, comes from the upperlevel site. It may be the master clock in the network, the clock from the clock source embedded in the upper-level NE, or the GPS clock at the local area. Comparing with the other two working modes of the slave clock, this mode is the most precise. Hold-on mode After all timing references are lost, the slave clock is in the hold-on mode. The slave site clock source uses the last frequency information, stored before the timing reference signal is lost, as the timing reference. That is to say, the slave clock has the memory function. The function can offer the timing signal complying with the original timing reference, ensuring that the slave clock frequency has a small deviation from reference clock frequency in a long time. This mode is less precise than the normal working mode. The equipment employs the memorized synchronization information, stored before 24 hours, to keep the synchronization state. The precision is required to be 0.37ppm.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Free-run mode free-oscillation mode When the slave clock loses all external timing references and timing reference memory, or works in the hold-on mode for a very long time, the oscillator in the slave clock will work in the free-oscillation mode. This mode is the worst precise. After the memorized synchronization information, stored in the equipment, has been used for 24 hours, the synchronization signals generated by the internal oscillator are used as synchronization signal. The precision is required to 4.6ppm.

<ZTE corporation copyright reserved,No spreading abroad>

Synchronization network of China Telecom

Internal Use Only

The digital synchronization network of China Telecom integrates the hierarchical master/slave synchronization and pseudosynchronization, that is, the distributed timing mode. 1. PRC complying with G.811 in Beijing hierarchically controls the clocks until the lowest-level slave clock, which adopts the hierarchical master/slave synchronization mode.

2. This nation is divided into several synchronization areas. Each area has one LPR rubidium atom clock. LPR can receive PRC signals or GPS signals. There are small differences in LPR between synchronous areas, but the differences are so small that they are approximately synchronous. So it is called the pseudo-synchronization mode.
As shown in the figure, the slave clock is in Wuhan. When a fault occurs to the master clock (Beijing), the slave clock will replace the master clock.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

PRC
Master clock (Beijing) Slave clock (Wuhan)

GPS
Regional reference clock 1 Provincial exchange

GPS LPR
Regional reference clock 2 provincial exchange


synchronization area 1
<ZTE corporation copyright reserved,No spreading abroad>


synchronization area 2

Internal SDH synchronization network Use Only

-synchronization reference link


G.811 note: K=10; N=20;

No.1 transit exchange No.2 transit exchange

G.812

NE clock quantity < 60

} NG.813 SDH equipment clock


G.812

} NG.813 SDH equipment clock


G.812

No.K transit exchange

} NG.813 SDH equipment clock

<ZTE corporation copyright reserved,No spreading abroad>

Synchronization scheme
General principle

Internal Use Only

Reduce the timing reference transmission length. The controlled clock obtains the timing from higherlevel clock. The node clock quantity in a synchronization reference link is not more than 60. Configure more than one external timing references. Prevent the timing loop make full use of S1 byte. Timing information transmission Obtain the timing from STM-N.
<ZTE corporation copyright reserved,No spreading abroad>

SSM and S1 byte


SSM

Internal Use Only

SSM (Synchronization Status Message) directly reflects the synchronous timing signal level in the synchronous timing transfer link. The messages can be used to judge the quality level of the synchronous timing signal received so as to control the operation state of the local node clock, e.g., continue tracing the signal, switch the input reference signal or change to the hold-on state.

<ZTE corporation copyright reserved,No spreading abroad>

How to use S1 byte

Internal Use Only

ITU-T G.707 specifies SSM coding mode of STM-N interface, which is shown with MS overhead byte S1 b5~b8.
S I b5~b8 Clock level 0000 Unknown quality 0010 G.811 reference clock 0100 G.812 transit exchange slave clock 1000 G.812 local exchange slave clock 1011 SETS 1111 Not for clock synchronization Note: other utilizations are reserved.

<ZTE corporation copyright reserved,No spreading abroad>

Timing protection switching Internal Use Only and recovery


The equipment has more than 2 external synchronization signal input interfaces. A) Timing protection switching function When the high-level external synchronization source fails, the equipment can automatically switch to the low-level external synchronization source.

B) Recovery function
When the high-level external synchronization source return to normal, the equipment can obtain the timing signals from the high-level external synchronization source.
<ZTE corporation copyright reserved,No spreading abroad>

Internal Use Only

Thank you!

<ZTE corporation copyright reserved,No spreading abroad>

You might also like