Professional Documents
Culture Documents
Fundamentals of SDH
Fundamentals of SDH
Fundamentals of SDH
Training manual
8AS 90200 0551 VH ZZA Ed. 01
Edition 2002
Page intentionally left blank
3 Section Overhead
3.1 Definition of Path and Section
3.2 Example of Path and section
3.3 STM-1 Section Overhead : SOH
3.4 STM-1 Regeneration Section Overhead : RSOH
3.5 STM-1 Multiplexing Section Overhead : MSOH
4 Pointer
4.1 AU-4 Pointer addressing area
4.2 Au- Pointer management
4.3 AU-4 Pointer settings
4.4 AU-4 Pointer and justification use
4.5 Pointer justifications depending on clock deviation
6 High-Rate Multiplexing
6.1 Byte interleaved Multiplexing
6.2 STM-N Section Overhead
6.3 Contiguous Concatenation
11 Network Synchronisation
11.1 Synchronisation Distribution
11.2 Clocks Types and Distribution in the Network
11.3 Synchronisation Diagram
11.4 Synchronous Equipment Timing
11.5 Synchronisation Signals : Quality and Priority
11.6 Linear Networks without SSM
11.7 Linear Network with SSM
12 Optical Interfaces
12.1 Classification of Optical Interfaces
12.2 Laser Safety
12.3 Automatic laser Shutdown : ALS
12.4 Laser Operation Actions
13 Appendices
Other comments
1.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
1.2
Switching Switching
system system
Access PDH / SDH Access
system system
exchange transport exchange
1.3
G.752
32.064 97.728 397.200
JAPAN *3 *4
G.752
*5
*3 *3
Interoperation
(G.802) G.757 G.755
1.4
1.5
Plesiochronous Plesiochronous
Signals Signals
SDH Network
ATM ATM
1.6
1.7
2.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
2.2
139.264 Mbit/s
44.736 Mbit/s
n=4
n=3
n = 11
1.544 Mbit/s C-n
n = 12
n=3
n=2
2.3
P
O VC-4 C-4 139.264 Mbit/s
H
P
O VC-3
H
P
O C-n P
H
O VC-2 C-2 6.312 Mbit/s
H
P
O VC-12 C-12 2.048 Mbit/s
H
P
VC-n O VC-11 C-11 1.544 Mbit/s
H
2.4
P
O VC-4 C-4 139.264 Mbit/s
H
P
TU-3 O VC-3
H
P
TU-2 O VC-2 C-2 6.312 Mbit/s
H
P
TU-12 O VC-12 C-12 2.048 Mbit/s
H
P
TU-11 O VC-11 C-11 1.544 Mbit/s
H
TU: Tributary Unit, it is made up of a low order VC-n (n=11,12, 2, 3) and a pointer
The pointer is an additional rate used to locate its VC-n within the TU: Pointers allow to transport virtual containers phase shifted
related to their TU, which facilitates data processing in the network element.
For high order container (VC-3, VC-4) see: Administrative Unit (AU)
TU-n = VC-n + PTR n = 11, 12, 2, 3
X3
X1 P
TUG-3 TU-3 O VC-3
H
X1 P
TUG-2 TU-2 O VC-2 C-2 6.312 Mbit/s
H
X3
P
TU-12 O VC-12 C-12 2.048 Mbit/s
H
X4
P
TU-11 O VC-11 C-11 1.544 Mbit/s
H
2.6
TUG: Tributary Unit Group, the TUG-2 / TUG-3 can consist of several types of capacity payloads with different sizes.
The TUG-2 is 4 X TU-11 or
3 X TU-12 or
1 X TU-2.
The TUG-3 is 7 X TUG-2 or
1 X TU-3.
The TUG is obtained through byte interleaved multiplexing.
For high order container (VC-3, VC-4) see: Administrative Unit Group (AUG)
TUG-k = m * TU-n n = 11, 12, 2, 3
X3
X1 P
X3 TUG-3 TU-3 O
H
VC-3
X7
P
C-3 44.736 Mbit/s
AU-3 O
H
VC-3 34.368 Mbit/s
X7
X1 P
TUG-2 TU-2 O
H
VC-2 C-2 6.312 Mbit/s
X3
P
TU-12 O
H
VC-12 C-12 2.048 Mbit/s
X4
P
TU-11 O
H
VC-11 C-11 1.544 Mbit/s
2.7
AU: Administrative Unit, it is made up of a high order VC-n (n = 3,4) and a pointer.
The AU-3 multiplexing structure is designed for compatibility with SONET frames.
Two types of virtual containers VC-n are used:
Lower order VC-n (n = 11,12, 2, 3)
This entity contains a single container n associated with the POH.
Higher order VC-n (n = 3, 4)
This entity contains either a single container n or a TUG (Tributary Unit Group) assembly (TUG-2 or TUG-3) associated
with the POH.
VC-3 can be: lower order TU-3 TUG-3 VC-4 AU-4 or
higher order AU-3
*N X1 P
STM-N AUG AU-4 O VC-4 C-4 139.264 Mbit/s
H
X3
X3 X1 P
TUG-3 TU-3 O
H
VC-3
X1 P X7 44.736 Mbit/s
STM-0 AU-3 O
H
VC-3 C-3 34.368 Mbit/s
X7
X1 P
High rate TUG-2 TU-2 O
H
VC-2 C-2 6.312 Mbit/s
multiplexing
X3
P
Low rate TU-12 O VC-12 C-12 2.048 Mbit/s
H
multiplexing
X4
P
TU-11 O VC-11 C-11 1.544 Mbit/s
Insertion of the SOH H
2.8
N = 1, 4, 16, 64
STM: Synchronous Transport Module
ITU-T: International Telecommunication Union – Telecommunication sector
SDH-SONET compatibility: see Appendix A2
*N X1 P
STM-N AUG AU-4 O VC-4 C-4 139.264 Mbit/s
H
X3
X1 P
TUG-3 TU-3 O VC-3
H
X7 44.736 Mbit/s
C-3 34.368 Mbit/s
X1 P
TUG-2 TU-2 O
H
VC-2
X3
P
TU-12 O VC-12 C-12 2.048 Mbit/s
H
P
O VC-11 C-11 1.544 Mbit/s
Insertion of the SOH H
2.9
N = 1, 4, 16, 64
ETSI: European Telecommunication Standard Institute.
It is a subset of ITU-T standard.
It focuses on European digital signals to simplify equipment.
ETSI-standard will be handled in the following chapters
In the SDH signal (or data) processing takes place in three levels:
mapping of digital signal to container C-n
multiplexing of low order containers to high order containers via TUGs and finally via AU (AUG) into the STM-1 base
frame.
multiplexing of base frame, i. e. STM-1 frames at 155.520 Mbit/s with each other to create a high-rate frame:
STM-4 at 622.080 Mbit/s
STM-16 at 2488.320 Mbit/s
STM-64 at 9953.280 Mbit/s
1 270
RSOH
AU-4 pointer
9 rows P
(bytes) O C-4
H
MSOH
2430
2.10
In the SDH signal (or data) processing takes place in three levels:
mapping of digital signal to container C-n
multiplexing of low order containers to high order containers via TUGs and finally via AU (AUG) into the STM-1 base
frame
multiplexing of base frame, i. e. STM-1 frames at 155.520 Mbit/s with each other to create a high-rate frame:
STM-4 at 622.080 Mbit/s
STM-16 at 2488.320 Mbit/s
STM-64 at 9953.280 Mbit/s
2.12
3.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
3.2
SOH SOH
POH POH
C VC Regenerator Regenerator VC C
plesiochronous Signal
plesiochronous Signal
STM-N STM-N STM-N STM-N
C VC VC C
Path
3.3
C Container
VC Virtual Containe
POH Path Overhead
SOH Section Overhead
The PATH connects the two points where the POH is generated / analyzed.
Section 2
STM-16
1 Pa
on
cti NE-B NE-C S T th SDH Network
Se -1 M 2
M -1
ST
Path 1
NE-A NE-D
STM-4
STM-4
NE-E NE-F
STM-4
3.4
NE Network Element
Overheads carrying specific info of every path or section, from one end to the other
(e.g. Path 1 between NE-A and NE-E)
* * * * * * * * *
A1 A1 A1 A2 A2 A2 J0
B1 D D E1 D F1 RSOH
D1 D D D2 D D3
AU-4 pointer
9 rows
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9 MSOH
S1 Z1 Z1 Z2 Z2 M1 E2
3.5
All unmarked bytes are reserved for future international normalization (medium dependence, additional national use and other
purposes).
* * * * * * * * *
A1 A1 A1 A2 A2 A2 J0
B1 D D E1 D F1 RSOH: Regenerator
Section
D1 D D D2 D D3
OverHead
3.6
A1, A2 The Frame Alignment Word is used to recognize the beginning of an STM-N frame.
A1: 1111 0110 = F6 (HEX)
A2: 0010 1000 = 28 (HEX)
J0 Path Trace. It is used to give a path through an SDH Network a ‘Name’. This message (Name) enables the
receiver to check the continuity of its connection with the desired transmitter.
B1 Bit Error Monitoring. The B1 Byte contains the result of the parity check of the previous STM frame, before
scrambling of the actual STM frame. This check is carried out with a Bit Interleaved Parity check (BIP-8).
E1 Engineering Orderwire (EOW). It can be used to transmit speech signals beyond a Regenerator Section for
operating and maintenance purposes.
F1 User Channel. It is used to transmit data and speech for service and maintenance.
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9 MSOH: Multiplex
Section
D10 D11 D12
OverHead
S1 Z1 Z1 Z2 Z2 M1 E2
3.7
B2 : Bit Error Monitoring. The B2 Bytes contains the result of the parity check of the previous STM frame, except the RSOH,
before scrambling of the actual STM frame. This check is carried out with a Bit Interleaved Parity check (BIP24).
K1, K2 Automatic Protection Switching (APS). In case of a failure, the STM frames can be routed new with the help of the K1, K2
Bytes through the SDH Network.
Assigned to the multiplexing section protection (MSP) protocol.
K2 (Bit6,7,8) MS_RDI: Multiplex Section Remote Defect Indication (former MS_FERF: Multiplex Section Far End Receive
Failure).
D4 to D12 Data Communication Channel at 576 kbit/s (DCCM). (See also D1-D3 in RSOH)
3.8
4.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
4.2
AU-4 Pointer
VC-4
Au-4 Pointer
4.3
received transmitted
STM-1 STM-1
VC-4 VC-4 VC-4 VC-4
4.4
The rate of a transmitted VC-4 is consistent with the rate of the received VC-4.
Pointers allow to transport virtual containers phase shifted related to their TU respectively AU, which facilitates data processing in
the network element.
Pointer movement
4.5
4.6
Negative justification:
If the frame rate of container VC-n is too fast compared to that of the AUG, the alignment of container VC-n must be periodically
advanced in time and the pointer‘s value reduced by one unit.
Positive justification:
If the frame rate of container VC-n is too slow compared to that of the AUG, the alignment of container VC-n must be periodically
delayed in time and the pointer‘s value increased by one unit.
1 9 10 270
1
4 H1 H1 H1 H2 H2 H2 H3 H3 H3 0 0 0 1 1 1 2 2 2 86 86 86
* * ** **
5 87
9
522
782
4.7
The value of the pointer remains constant for at least 3 consecutive frames (G.707).
The maximum justification therefore takes place in 1 out of every 4 frames.
justification events /
Number of pointer
second
2000
200
Forbidden area
20
6.48 Hz
2
0,2
0,02
Difference of incoming
3.10-9 3.10-8 3.10-7 3.10-6 3.10-5 3.10-4 clock to equipment
1 ppm clock
≈300 ppm
4.8
A 1-ppm clock difference causes a pointer action frequency of 6.48 Hz, one action every 1235 frames.
4.9
5.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
POH
J1
B3
C2
G1 C-4 or C-3
F2 VC-4 , VC-3 POH
H4
F3
K3
N1
5.3
(HEX-values)
00: path not equipped
01: path equipped, payload not specific
02: TUG payload structure (TUG-2/ TUG-3)
03: TU alignment, locked TU mode
04: asynchronous mapping of signals at 34 / 45 Mbit/s in a C-3 container
12: asynchronous mapping of signals at 140 Mbit/s in a C-4 container
13: ATM mapping
14: MAN mapping (DQDB)
15: FDDI mapping (100 Mbit/s, Fiber Distributed Data Int)
FE: tests signal, 0.181 specific mapping
FF: VC-AIS signal
F2
REI RDI reserved spare
H4 1 2 3 4 5 6 7 8
F3
F2, F3 Path user channels: assigned to the user's communication requirements.
K3
N1 H4 Multiframe Indicator: used to designate a specific use of the VC-4's capacity:
VC-2, VC-12, VC-11
5.4
1 blocks 20
rows
9
180
blocks
5.5
Breakdown of C-4 into 180 blocks of 13 bytes ((9 * 20) * 13 = 2340 bytes payload)
W 96 D X 96 D Y 96 D Y 96 D Y 96 D
X 96 D Y 96 D Y 96 D Y 96 D X 96 D
Y 96 D Y 96 D Y 96 D X 96 D Y 96 D
Y 96 D Y 96 D X 96 D Y 96 D Z 96 D
W Y D Data bit
DDDDDDDD RRRRRRRR
R Fixed stuff bit
O Overhead bit
X CRRRRROO Z DDDDDDSR S Justification opportunity bit
C Justification control bit
5.6
The overhead bits (O) are reserved for future communication requirements
Majority vote for protection against decision errors (data or justification bit).
1 86 1 86 1 86
stuffing
1 P
2 PTR PTR PTR
O A B C
3 H
A B C A C A B C
...
9 VC-4
1 2 3 4 5 6 261
5.7
The TU-3 pointer is similar to the AU-4 pointer and serves the same purpose.
Bytes H1 H2 H3 of the TU-3 pointers are the bytes of rows 1, 2 and 3 of columns 4, 5 and 6 of the VC-4.
VC-3#A
VC-3#B
VC-3#C
Stuffing
RSOH F3
K3
AU-4 pointer N1
J1 H1 H1 H1 595 595 595
B3 H2 H2 H2 680 680 680
MSOH 764 764 764 C2 H3 H3 H3 0 0 0 1 82 83 83 83
84 84 84 G1 85 85 85 86
F2
A B C A B C A B C A C A B C
261 columns of bytes
5.8
5.9
V5: BIP-2 even parity of order 2 of the previous VC-2 / VC-12 / VC-11
REI LP_REI: Lower Path Remote Error Indication
Set to 1 and returned to the source of the path if the BIP-2 parity detects one or
more errors
RFI Remote Failure Indication in the path (optional)
A failure is a fault which lasts longer than the maximum duration of the
transmission systems protection mechanisms.
RRRRRRRR
J2
C1 C2 O O O O R R
32 bytes
140 RRRRRRRR
bytes N2
C1 C2 O O O O R R
32 bytes
RRRRRRRR
K4
C1 C2 R R R R R S1
S2 D D D D D D D D data bit
R fixed stuff bit
31 bytes O overhead bit
S justification opportunity bit
RRRRRRRR C justification control bit
5.10
The 2 Mbit/s signal is placed in a C-12 without taking ist composition into consideration: No link between the 2 Mbit/s frame and
the C-12.
Justification process upon mapping within the C-12 to enable a +/- 50 ppm synchronization tolerance.
VC-12s (35 bytes in 125 µs) of 4 consecutive STM-1 frames (4 x 125 µs = 500 µs) are combined to a multiframe (140 bytes in
500 µs) to reduce overhead / useful signal ratio.
35 bytes
125 µs
XXXXXX01 V2
J2
35 bytes
250 µs
XXXXXX10 V3 N2
35 bytes
375 µs K4
XXXXXX11 V4
35 bytes
140 bytes
500 µs
capacity of 4 container VC-12:
multiframe (bytes/500 µs)
5.11
H4: multiframe indicator - used for location within the 500 µs multiframe (see VC-4 POH)
Stuffing
5.12
TUG-2 # 1 1 1 2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 7 7
VC-12 # 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3
x7
TUG-3 # 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
TUG-3 # 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 7
TUG-3 # 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 7 3
TUG-2 # 1 23 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 3
VC-12 # 1 11 1 1 1 1 2 2 22 2 2 2 3 3 3 3 3 3 3
x3
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 70 72 256 258 260 Number of VC-4
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 ... 69 71 73 ... 257 259 container column x
000000000111111111122222 66660 556666 Time period number
V 123456789012345678901234 01231 890123
C
4
P 123123123123123123123123 3 1 2 31 123123 K
O
H
111222333444555666777111 ... 6 7 7 7 1 ... 6 6 6 7 7 7 L address
111111111111111111111222 33331 333333 M
5.13
Header Payload
5 48
J1
B3
C2
G1
F2
H4
F3
K3
N1
5.14
The cell train is mapped in the containers in accordance with the byte structure
5.15
6.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
6.2
270 x N
9xN 261 x N
RSOH
AU-PTR
125 µs
9 PAYLOAD periodicity
MSOH
6.3
N = 1, 4, 16, 64
PTR Nx9
AU-4 3
VC-4 VC-4#1
#1
(byte interleaving)
AU-4
MULTIPLEXING
VC-4 VC-4#2 Nx9 N x 261
#2
RSOH
STM-N
PTR
AU-4 MSOH
VC-4 VC-4
#3 #3
Addition of the STM-N MSOH
PTR
AU-4
VC-4 VC-4#N 5
#N
Nx9
6.4
RSOH
B1 E1 F1
D1 D2 D3
N * AU-4 pointers
9 rows
B2 B2 B2 K1 K2
B2 B2 B2
D4 D5 D6
MSOH
D7 D8 D9
D D D
10 11 12
S1 E2
M1
position (9, 4, 3) row, block, byte
Bytes reserved for national use. max (9, 9,16)
NOTE: All unmarked bytes are reserved for future international normalization
(medium dependent, additional national use and other purposes).
6.5
N = 1, 4, 16, 64
Exception:
- A1, A2 to keep accuracy of frame detection
- B2 to keep accuracy of block check for the increased block size
9 x 4 = 36 261 x 4 = 1044
RSOH
STM-4
4 * AU-PTR
9
J1
MSOH
Payload VC-4-4c
stuffing
VC-4 POH N1
6.6
Contiguous Concatenation is a procedure associating several virtual containers, which allows their combined capacity to be used
as a single container.
Contiguous Concatenation is defined for TU-2 and AU-4 (SONET: also for AU-3)
This technique has the advantage of optimizing the frame filling relative to the mapping of a higher rate container.
STM-4 / STM-16 is used to transport a VC-4-Xc signal (SONET: STM-1 for VC-3-3c)
Application:
for bit streams which can not be contained in a VC-4
typical: ATM signals with a bandwidth of 600 Mbit/s
Procedure:
the first AU-pointer indicates the J1-byte (POH VC-4), the other 3 pointers indicate Concatenation Indication (CI): three
columns with stuffing bytes
H1*+H2**: 1001SS11 11111111 Concatenation Indication (CI):
6.7
7.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
7.2
ATM-Equipment
ATM VP
PDH Equipment
2 Mbit/s
SDH-Network
-4
PDH Equipment
M
ST
ST
M-
ST
6
4
-1
M
M
-1
ST
6
STM-1 34 Mbit/s
-4 ST
M
M
ST
ST
6
-4
-1
M
M
-1
1
ST
M-
ST 6
140 Mbit/s 45 Mbit/s
STM-4
ATM VP
PDH Equipment
PDH Equipment
ATM Equipment
7.3
An SDH network can be seen as a set of different network layers (path layers, section layers, physical layers) and can also be
divided into different sub-networks.
Path
layer network
Section
layer network
Physical
layer network
7.4
7.5
Partitioning concept
In general a sub-network is constructed by representing the physical implementation as links and sub-networks, starting from the
matrix that is the smallest (indivisible) sub-network. A set of sub-networks and links may be abstracted as a higher (containing)
sub-network. The way in which the contained sub-networks are interconnected by links describes the topology of the containing
sub-network. The ports at the boundary of the containing sub-network and the interconnection capability must fully represent, but
not extend, the connectivity supported by the contained sub-networks and links. Therefore a higher level sub-network may be
partitioned to show the level of detail required.
Thus in general, any sub-network may be partitioned into a number of smaller (contained) sub-networks interconnected by links.
Regenerator section
7.6
The transport network can be decomposed into a number of independent layer networks with a client/server relationship between
adjacent layer networks.
A layer network describes the generation, transport and termination of a particular characteristic information.
Client/server relationship
Any two adjacent network layers are associated in a client/server relationship.
Each transport network layer provides transport to the layer above and uses transport from the layer below.
The layer providing transport is termed a server.
The layer using transport is termed a client.
LO PATH / TRAIL
NE NE NE NE
7.7
Client/server relationship between adjacent layers is one where a link connection in the client layer is supported by a trail in the
server layer network.
Client
link connection
Server
trail
Example: MS trail supports HO Link Connection
HO trail supports LO Link Connection
Link Connection: represents a pair of adaptation functions and a trail in the server layer.
A complete example of Layering is given in appendix C1
A Trail defines a section inside an SDH network between two basic functions where any kind of overhead information
(POH+SOH) is generated or analyzed. The trail definition exists for
several transmission layers:
RS Trail (RS layer) / MS Trail (MS layer)
VC-4 Trail (HO path layer)
VC-3 / VC-12 Trail (LO path layer)
A Path is a specific kind of trail inside an SDH network between two basic functions that generate and analyze the Path
Overhead (POH) of a Virtual Container. The path definition exists for the
following transmission layers:
VC-4 path (HO path layer)
VC-3 / VC-12 path (LO path layer)
AP AP
trail
7.8
Every trail is terminated by an AP: Access Point The information at the AP is called AI:
Adapted Information, the payload and some parts of the path/section overhead.
Two CTPs are combined to a CP: Connection Point, if they are connected in the same layer
If the information in a CTP is given to/got from a termination function, the related reference is called a TCP: Termination
Connection Point
ITU-T definition:
A bi-directional TCP consists of a pair of collocated unidirectional TCPs.
A unidirectional TCP is the binding of an output of a trail termination source to an input of a unidirectional connection or the output
of a unidirectional connection to the input of a trail termination sink.
NE 1 NE 2
LOPA source LOPA sink
LOP trail LOP layer
LOP AP LOP AP
LOPT source LOPT sink
LOP LC
LOP TCP LOP TCP
7.9
LC : Link Connection
: Adaptation
: Termination
7.10
8.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
8.2
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.3
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.4
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.5
LPA
Sm/Pq
LTCA
Sm SmD/Sm
Sms LPT
LSUT Low
Order
SmD Path
LTCT
Layer
Sms Smm Sm
LPC
LPOM
LTCM SmDm
MSA MSn/Sn
MSP MSnP
Multiplex
Section
MSnPC
Layer
MSn/MSnP
MSn
MST
RSn/MSn Regenerator
RST RSn Section
Layer
OSn/RSn or ESn/RSn
Eq/Pqs or Eq/Pqx Physical
OSn or ESn Layer
SPI
PPI Eq
8.6
8.7
9.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
9.2
SDH-Network
PDH PDH
140Mbit/s 2 Mbit/s
ADM ADM ADM
MSN MSN Regenerator MSN
DXC DXC DXC
9.3
Communication alarms can be subdivided in primary and secondary alarms and alarms which have to be send in reversed
direction.
RSOH 1
1
1 1 1 1 MS - AIS
1 1 1
1
RSOH 1
1
1 1 1 1
AU - AIS
MSOH 1
1
RSOH 1
P 1
AU-Pointer 1
O TU – AIS
H 1
MSOH
1
9.4
AIS: Alarm Indication Signal, means the signal is adapted to all ONES
It is generated to replace the normal SDH signal when it contains a defect condition
1 ... 8
1 1 0 K2-Byte
K2
MS-RDI
1 ... 8
G1
1 G1-Byte
HP-RDI
V5
1 ... 8
1 V5-Byte
LP-RDI
9.5
RDI: Remote Defect Indication, signal which is returned to the transmitting NE upon detecting a LOS, LOF or AIS
Sm
Sm
Sn/Sm
Sn
Sn
MSn/Sn
MSn
OSr/ESr RSn
LOS
Detection
A1/A2 LOF
RS-TIM Generation
J0 MS-AIS
RS-BIP
B1
MS-AIS
K2
MS-BIP
B2 AU-AIS
MS-REI
M1
MS-RDI
K2
AU-AIS
AU-LOP
HP-UNEQ
C2
HP-TIM
J1
HP-BIP
B3 TU-AIS
HP-REI
G1
HP-RDI
G1
TU-AIS
TU-LOP
TU-LOM TU-AIS
H4
TU-PLM
C2
LP-UNEQ
V5
LP-TIM
J2
LP-BIP TU-AIS
V5
LP-REI
V5
LP-RDI
V5 PDH-AIS
LP-PLM
V5
© Alcatel University - 8AS 90200 0551 VH ZZA Ed.01 Page 9.6
Explanation of Alarm and Error Codes
SDH-Network
PDH PDH
140Mbit/s 2 Mbit/s
ADM ADM ADM
MSN MSN Regenerator MSN
DXC DXC DXC
Trail / Path
9.8
RS1 / MS1
RS1 / MS1
OS1 / RS1
OS1 / RS1
OS1
OS1
RS1
RS1
MS-AIS
LOS
RSOH 1
LOF MS-AIS 1
1 1 1 1
RS-TIM
RS-BIP(PM) 1 1 1
1
Detection
Generation
9.9
The regenerator is the only NE which can cause the MS-AIS alarm because the RSOH is built completely new.
In a multiplexer also the MSOH is rebuilt and the output then is an AU-AIS.
RS1 / MS1
RS1 / MS1
OS1 / RS1
OS1 / RS1
MS1 / S4
MS1 / S4
MS1
MS1
OS1
OS1
RS1
RS1
S4
LOS
LOF MS-AIS
AU-AIS
RS-TIM
RSOH 1
RS-BIP(PM) 1
AU-AIS 1 1 1 1
MS-AIS
MSOH 1
1
MS-BIP (PM)
MS-REI (PM)
MS-RDI
Detection
Generation
9.10
MS1 / S4
S4 / S12
MS1
S4
S4 S12
AU-AIS
AU-AIS TU-AIS
AU-LOP
HP-UNEQ TU-AIS
HP-TIM TU-AIS
HP-BIP (PM)
HP-REI (PM) 1
RSOH
HP-RDI P 1
AU-Pointer 1
O
H 1
MSOH
1
Detection
Generation
9.11
2Mbit/s
NE A NE B NE C
LO-passthrough HO-passthrough
Reg. F Reg. E
LOS
NE D
9.12
Assumptions:
Bi-directional 2Mbit/s-Path between NE C and NE D via NE B, A, F, E
Path fault: Unidirectional interruption (C → D) in section A-F
Alarms in direction C → D :
NE F: detection: LOS
generation: MS-AIS
NE E: -
NE D: detection: MS-AIS, AU-AIS, TU-AIS, generation: PDH-AIS
Alarms in direction D → C :
NE D: generation: MS-RDI, HP-RDI, LP-RDI
NE E: -
NE F: -
NE A: detection: MS-RDI, HP-RDI
NE B: -
NE C: detection: LP-RDI
2Mbit/s
LOS
NE A NE B NE C
LO-passthrough HO-passthrough
Reg. F Reg. E
NE D
9.13
Assumptions
Unidirectional 2Mbit/s-Path between NE C and NE D via NE B, A, F, E
Reference fault: Loss of input signal
Alarms in direction C → D :
NE C: detection: LOS
NE D: generation: PDH-AIS
max. number of
Error checksum Block size
block errors per second
9.14
Alarms = Defects
Each block is monitored by calculating a checksum e.g. Bit Interleaved Parity (BIP).
These block errors can be monitored on several layers inside each NE:
Yes
Defects ?
No
No
Anomalies ?
Yes
Yes
% EB >= 30 ?
No
Extracted End
from G 826
9.15
Severely Errored Second (SES) A second containing at least 30% of errored blocks
or at least one defect.
Background Block Errors (BBE) Errored block (EB) occurring outside a severely
errored second (SES).
x t in sec
ES := ES - 10 ES := ES + x
SES := SES - 10 SES := SES
UAS := UAS + 10 UAS := UAS - 10
Inhibition of counters:
SES
ES / SES / (BBE)
ES which is not a SES
Non errored second
9.16
Unavailable Time (UAT) A period of unavailable time (UAT) begins at the onset of 10 consecutive SES events.
These 10 seconds are considered to be part of unavailable
time. A new period of
available time begins at the onset of 10 consecutive non-SES events.
Unavailable Second (UAS) An unavailable second (UAS) is a second which is part of the Unavailable
Time (UAT).
NE A NE B
9.17
Near End counters are incremented if in the received STM-N frame anomalies (bit errors) or defects (alarms) have been
detected.
Far End counters are incremented if the transmitted STM-N frame was erroneous: anomalies (bit errors) or defects (alarms).
The Network Element which is transmitting an errored signal, is informed about the bit errors by receiving Remote Error
Indications (REI)
MS-REI: M1-Byte inside MSOH contains the number of erroneous blocks detected in B2
The transmitting Network Element is informed about the alarms by receiving Remote Defect Indications (RDI)
VCn-Path
Path Path
Source Sink
Domain 1 Domain 2
[total biterrors] Inter Domain
Link
9.18
In transmission networks it is normal that signals are transported over multiple domains managed by different network operators
The signal is entering the network at the Path Source (SDH POH is added) and leaves the network at the Path Sink (SDH POH is
terminated)
Statistic models assume that within each domain and inter-domain link equally distributed bit errors are inserted into the signal
Problem:
It is not possible to check the performance of domain1 and domain 2 or the link between the two domains
Usage of the Performance Monitoring counters on path basis would indicate only the overall bit errors without any hint
where and how many bit errors are introduced
Solution:
Tandem Connection Monitoring is the solution for this problem
The TCM standards were approved by the ITU-T in 2000 (G.783), in 1996 (G.707)
VCn-Path
TC 1 TC 12 TC 2
Path Path
Source Sink
Domain 1 Domain 2
Inter Domain
Link
so sk so sk so sk
[total biterrors]
so: source
sk: sink
9.19
The complete VCn path is virtually split into fragments, where an independent monitor considers only effects on this fragment.
Tandem Connection (TC) monitors the performance (bit errors and alarms) on a configurable fragment of the path.
TCs are independent from each other. Each operator can decide where and when to use a TC.
Full PM is supported
In the example above the operator created three Tandem Connections for supervising the performance of the signal in a specific
domain
TC1 counts only bit errors that have been added in Domain1.
TC12 counts only bit errors that have been added on the Inter Domain Link
TC2 counts only bit errors that have been added in Domain2.
The function TC12 sk (sink) is created before matrix, therefore this TC is called “TC Before Matrix”, “Ingressing TC”or
“TCT RX” .
This TC supervises a domain external signal arriving at the domain ingress (e.g. a inter domain link)
The functions TC1 sk and TC2 sk are created behind matrix, therefore they are called “TC After Matrix”, “Egressing TC”
or “TCT TX”.
This type of TCs allow to supervise a domain internal signal shortly before the domain egress.
J1
B3
C2
G1
F2 Payload
H4
N1 used for TCs F3
K3
N1
1 2 3 4 5 6 7 8
9.20
Existing path is not affected by the TC, which is transparent for the path layer
For a working TC it´s necessary that the start and end point exchanges management information in a bidirectional way. Therefore
TC uses a part of the already existing Path Overhead (POH)
For the VC4 or the VC3 path the N1 byte is used (see figure above), for the VC12 path the N2 byte of the VC12 multiframe is
used
Every modification of the N1 byte has to be compensated so that no BIP failure occurs because of this modification
N1byte:
Bit 1 - 4 contains number of errors in the signal before the TC starts (range=0-8) calculated via 8
bits of BIP8 (B3 byte)
Bit 5: Remote Error Indication (REI) is used to indicate block errors to the TC-source, necessary for Far End
PM
Bit 6: Outgoing Error Indication (OEI) necessary for counting of outgoing Far End PM data
Bit 7 - 8 contains several information in a multi frame (consisting of 76 frames)
FAS Frame Alignment Signal
TC-TI Tandem Connection - Trail Identification
TC-RDI Tandem Connection- Remote Defect Indication
ODI Outgoing Defect Indication
BBE = 6
BBE = 2 N1 = 2
N1:=2 NE_BBE := 6 - 2 =4
SPI SPI
Path RST RST
MST MST
MSA MSA
N1=0 N1=0
NE 1 NE x
Domain 1
9.21
Example:
In NE 1 and NE x of Domain 1 a “TC after Matrix” is configured, to find out how many bit errors happened inside Domain 1 on the
VC-4 path
TC Source of NE 1 calculates arriving bit errors (BBE = 2) and inserts the number into Bit1-4 of the N1 byte
TC Sink of NE x calculates the current bit errors: 2+4=6 of the signal (using BIP). These are called “outgoing bit errors”
because they’re in the outgoing signal of the TC Sink
TC Sink of NE x calculates the bit errors on TC segment: (bit errors detected) - (N1 value);
NE_BBE: 6 - 2 =4
As for the path we have signaling information to do Far End PM on bidirectional TCs:
NE_BBE sent in backward direction as REI (Remote Error Indication)
Alarms on the TC Segment sent in backward direction as RDI (Remote Defect Indication)
Outside an TC the N1 byte is set to 0 to indicate that no TC is created on this path segment
TC SPI SPI
RST RST
MST MST
MSA MSA
Path
9.22
Additional to the Tandem Connection Termination (Source and Sink function) a Monitor function can be used for:
TCM before Matrix (TCm RX) to supervise for example the TC of a inter domain link
TCM after Matrix (TCm TX) to supervise for example the TC of a domain
Creation of TC terminations without failures. The following creation rules have to be fulfilled:
NO “Nesting” allowed
NO “Overlapping” allowed
“Cascading” is allowed
9.23
10.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
10.2
W
W
W 2 W W
W
2
P P P P
10.3
Equipment 1
Equipment 2
10.4
The 1+1 EPS protection type means that one working equipment is protected by one redundant equivalent.
The EPS mechanism ensures that transmission is continued and the faulty equipment can be exchanged should equipment
failure occur.
Equipment 1
Line 1
Equipment 2
Line 2
Equipment N
Line N
Equipment P
10.5
The 1:N EPS protection type means that N working pieces of equipment are protected by just 1 protecting equivalent.
During normal operation without equipment failure the protecting equipment is inactive.
Protection Protection
Item to be protected
architecture mechanism
SNCP/I
Section
10.6
The protection mechanisms are defined by ETSI and ITU-T at section or path level.
Sub Network
selection broadcast
VC-n VC-n
broadcast selection
Sub Network
10.7
SNCP: Sub Network Connection Protection is performed on the path (VC-n) level
Signal is broadcasted on the working and protecting path, and selected upon reception.
2 operating modes:
revertive: traffic is switched back to the working channel when the fault has
disappeared, once the wait-to-restore time (5 to 12 minutes)
has elapsed.
non revertive: no switch back.
Sub Network
Sub Network
10.8
SNCP-I: SNCP-N:
LOS LOS
LOF LOF
LOP LOP
AU-/TU-AIS AU-/TU-AIS
HP-/LP-UNEQ
HP-/LP-E-BER
HP-/LP-DEG
HP-/LP-TIM
B3-/BIP-2-SD
Working
T RX 1+1 protection
X Protecting
10.9
Switching criteria:
MS-AIS
LOS
LOF
broadcast selection
TX Line A RX
Multiplex section
RX Line B TX
selection broadcast
10.10
TX RX
TX RX
High priority line
RX RX TX TX
Multiplex section
TX RX
TX RX
extra traffic Low priority line extra traffic
RX RX TX TX
10.11
When the protected/working line operates normally, the protecting line may be used for “extra traffic”: low priority line
Node D Node C
Section overhead
Normal traffic channels
Detailed view of the ring Protection channels
Section overhead
Normal traffic channels
STM-16 fiber:
Protection channels
Normal channel: AU4 #1-8
Protection channel: AU4 #9-16
10.12
Protection called MS-SPRING: Multiplex Section Shared Protection in a Ring it enables a larger flow of traffic to be processed
than with other resources
Shared Protection: protection architecture in which m protection entities are shared between n traffic
entities (m:n).
Protection entities may be used to transport additional traffic.
The ring protection switching protocol is performed by the K1 and K2 bytes in the protection channels MSOH.
Two types of ring with MS-SPRING: 2-fiber ring and 4-fiber ring for STM-16 fiber
Failure
1 2 3
6 5 4
10.13
BRIDGE: sends the traffic of the working channel additionally to the opposite port via the protecting channel (broadcast
function)
SWITCH: uses for receiving traffic the protecting channels of the opposite port (selection function)
Node D Node C
10.14
The normal and the protection channels are materialized on different fibers.
Four-fiber rings enable ring switching for protection purposes, as well as span switching, but not both simultaneously.
4f-MS-SPRING supports:
span switching
ring switching
A fault condition present only on the working link determines a SPAN PROTECTION:
High Priority traffic is restored by switching to the protection channels of the same span.
A fault condition present on both working and protection links determines a RING PROTECTION:
The High Priority traffic travelling the failed span is restored by switching to the protection channels travelling in the opposite
direction (away from the failure).
1 2 3
6 5 4
10.15
SPAN switching: the protection channels of the affected span are used to carry the working channels. The corresponding low
priority connections (protection channel) crossing the span are preempted (AU-AIS insertion on LP paths).
When the working channel operates normally, the protecting channel may be used for “extra traffic”: low priority line / traffic
Failure
VC-n
A B C
VC-n
D
F E
Failure
VC-n
A B C
VC-n
D
F E
DXC
any NE
10.16
DXC supports together with SDH Network Manager a restorable network providing:
Path restoration on VC-n level
MSP and SNCP
SNCP protection and restoration combined
All the VC-n connections of the network are configured and supervised by the SDH Network Manager. With its knowledge about
the routes and bearers of the network as well as of the current interconnections it can recalculate alternative routings for possible
network failures.
In case of a failure, reported from one (or several) DXC, the SDH Network Manager analyses the location of the failure and
initiates the relevant restoration scenario:
Working circuit path: ABCD
Failure on section: BC
NMS decides optimum routing: e.g. AFECD
The recalculated cross connection commands are sent to the relevant DXC which immediately performs them.
10.17
11.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
11.2
PRC
11.3
The synchronization networks architecture must accept faults (path cutoffs, equipment failures) providing auxiliary paths and
spare clock systems.
A synchronization plan must be set up to ensure that synchronous NEs in a network really run synchronously. This plan indicates
the way each NE is synchronized.
Strictly forbidden are synchronization loops: i.e. an NE receives a sync signal it has generated, via a sequence of slave clocks.
Master-Slave synchronization:
The PRC provides synchronization to the first node hierarchical level
These nodes provide synchronization to the next hierarchical level
Stability and precision level defined for each level, 4 levels maximum
The PRC is doubled (tripled in some countries) on different sites (for safety), one acting as the master and the others as slaves.
Degradation of the PRC due to the justification during multiplexing of a higher-order signal (jitter).
1 60
1 10
PRC SEC SEC SSU SEC SEC SEC SSU SEC SEC SEC SEC
1 20
11.4
The PRC provides the best clock accuracy, which decreases via the SSU up to the SEC
The SSUs are located at strategic nodes: they are designed to filter the accumulated jitter and wander and have good stability in
holdover mode.
Holdover Mode: If the NE looses its reference clock, it enters the Holdover Mode to provide
synchronization at the last average of the phase locked frequency
Free running Mode: The NE operates at the frequency of its own generator/oscillator without any
timing reference
PRC PRC
PRC level
SSU SSU
SSU SSU
SSU
SSU level SSU
SSU SSU
SEC level
NE
MSP
NE containing SSU
11.5
The lines of the SSU level represent the synchronization links carried by the STM-N signals.
Squelch
Selector Selector
T4
A C
reference Squelch
inputs T1
T2 Selector
SETG T0
T3 B
Oscillator
11.6
Depending on specific NE more reference inputs (T1, T2, T3) are possible.
T0 SDH equipment internal clock
synchronization
T1 2 MHz signal derived from an STM-N port (SDH)
source,
T2 2 MHz signal derived from a 2 Mbit/s port (PDH)
T3 2 MHz signal of external clock reference inputs
(coming from: separate clock network / SSU / PRC)
T4 Sync output of an SDH equipment, clock signal send to another NE
NE A
S1:SEC T1A NE B
S1:PRC T1 *
S1:PRC Quality Priority S1:Don‘t use
S1:PRC T1B T1A S1-Byte 1 (highest)
*
S1:Don‘t use T1B S1-Byte 2 * T2 SEC
S1:PRC T1C
T1C S1-Byte 3
S1:PRC T2 SSU 4
S1:PRC T1
PDH: 2 Mbit/s T2 T3 PRC 5 S1:PRC NE C
internal SEC 0 (lowest)
T3 T1 *
2 MHz signal,
external clock (PRC) SEC
SEC
11.7
Selection criteria:
SSM indicates quality level (QL) of each T1 reference.
priority table: each reference input is given a certain priority (by operator)
If the SSM (Synchronization Status Message) is not managed, only the priority table is taken into account and the transmitted
qualities have QL6: not to be used for synchronization.
Quality Levels:
S1-byte Clock
QL2: 0000 --- Quality unknown (invalid)
QL1: 0010 PRC STM-N signals with a G.811 source
QL3: 0100 SSU-Transit STM-N signals with a G.812T source
QL4: 1000 SSU-Local STM-N signals with a G.812L source
QL5: 1011 SEC STM-N signals with a G.813 source
QL6: 1111 --- Not to be used for synchronization
W E W E W E
Without faults
W E W E W E
Correct
W E W E W E
Incorrect
Sync loop
11.8
Incorrect NE configuration:
T1 from W, priority 1
T1 from E, priority 2 : Sync-loops in case of failure
1 1 1 1 1
E E E E E
PRC 1111 SEC SEC SEC SSU
W 2 W 2 W 2 W 2 W 2
E E E E E
PRC 1111 SEC 1111 SEC 1111 SEC 1111 1111 SSU
W W W W W
3 3 3 3 3
E E E E E
PRC 1111 PRC 1111 SEC 1111 SEC SSU 1111 SSU
W 4 W 4 W 4 W 4 W 4
11.9
T1 from E 2 S1-Byte
T1 from E 2 S1-Byte
4 T1 from W 1 S1-Byte
11.10
12.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
12.2
Inter-station
Intra-
Application Joint
station Short-haul Long-haul
Engineering
Rated source
1310 1310 1550 1310 1550 1550
wavelength (nm)
12.3
If these categories are inadequate, Inter-station Joint Engineering (JE) shall be used: distances of approximately 90 km with
1550 nm
The distances are used for classification and NOT specification purposes.
Hazard level limits for single mode fibers with 11 µm mode field diameter
Wavelength Hazard Level 1 Hazard Level 3A
1310 nm 8.85 mW (+9.5 dBm) 24 mW (+13.8 dBm)
1550 nm 10 mW (+10 dBm) 50 mW (+17 dBm)
12.4
They might be different from laser classifications complying with IEC 60825-1:
The reason is that hazard levels are assigned under consideration of reasonable events whereas laser classification is made
under consideration of one single fault.
The optical transmitters and amplifiers used in the system emit optical power in the invisible infra-red spectrum range. Under
normal operating conditions, the optical power is transferred in the fibers and is not accessible. The hazard levels of optical
transmitters and optical amplifiers in the system are classified according to IEC 60825-1, without optical fibers connected to the
output and taking one single component failure into account.
X dBm = 10 x/10 mW
0 dBm = 1 mW
NE 1 NE 2
Port A LOS 1 Port B
Cutoff
Laser1
A.L.S. A.L.S.
command command
Laser2
LOS 2
12.5
A cut-off which triggers a Loss of Signal (LOS) causes the laser in the opposite direction to be turned off automatically.
Timing:
1. cut-off
2. LOS 1 (detected in NE2)
3. ALS (command sent to Laser2 in NE2)
4. LOS 2 (detected in NE1)
5. ALS (command sent to Laser1 in NE1)
Start
Section in
normal operation
ALS in service Automatic Manual Manual restart
Restart restart for testing
Yes
12.6
12.7
13.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
ID IDentifier
INC INCrement
IP Internet Protocol
ISO International Standards Organization
ITU-T International Telecommunication Union - Telecommunication sector
JE Joint Engineering
LASER Light Amplification by Stimulated Emission of Radiation
LC Link Connection
LED Light Emitting Diode
LO Lower Order
LOF Loss Of Frame
LOM Loss Of Multiframe
LOP Loss Of Pointer
LOP Low Order Path
LOPA Low Order Path Adaptation
LOPT Low Order Path Termination
LOS Loss Of Signal
LOVC Lower Order Virtual Container
LP Lower order Path
LPA Lower order0551
© Alcatel University - 8AS 90200 Path VH
Adaptation
ZZA Ed.01 Page 13.3
List of abbreviations
LPC Lower order Path Connection
LPOM Lower order Path Overhead Monitor
LPP Lower order Path Protection
LPT Lower order Path Termination
LSUT Lower order path Supervisory Unequipped Termination
LTCA Lower order path Tandem Connection Adaptation
LTCT Lower order path Tandem Connection Termination
LTCM Lower order path Tandem Connection Monitor
LUG Lower order Unequipped Generator
NA Not Applicable
NC Network Connection
NDF New Data Flag
NE Network Element
NPI Null Pointer Indication
NRZ Non Return to Zero (optical signal, G.783)
NSAP Network Service Access Point
NU National Use
CT CT CT CT CT ECT
13.7
SDH SONET
4 x 9 bytes
STS-12 622.08 Mbit/s
STM-4
resp.
STS-12
3 x 3 bytes
9 bytes
Same frame structure STS-3
155.52 Mbit/s
STM-1
synchronous
Plesiochronous origin
Plesiochronous origin signals
(European standard) signals
(US standard)
13.8
Low-or medium-rate systems using radio or satellite technologies in the SDH hierarchy have not been designed to use STM-1
signals:
They operate with a 51.840 Mbit/s binary rate: STM-0
STS-9 466.560
A1 A1 A1 A2 A2 A2 J0 X X A1 A2 C1 A1 A1 A1 A2 A2 A2 C1 C1 C1
B1 D D E1 D F1 X X RSOH B1 E1 F1 B1 B1 B1 E1 E1 E1 F1 F1 F1 SOH
D1 D D D2 D D3 D1 D2 D3 D1 D1 D1 D2 D2 D2 D3 D3 D3
AU-4 Pointer H1 H2 H3 H1 H1 H1 H2 H2 H2 H3 H3 H3 Pointer
9 rows
B2 B2 B2 K1 K2 B2 K1 K2 B2 B2 B2 K1 K1 K1 K2 K2 K2
D4 D5 D6 D4 D5 D6 D4 D4 D4 D5 D5 D5 D6 D6 D6
D7 D8 D9 MSOH D7 D8 D9 D7 D7 D7 D8 D8 D8 D9 D9 D9 Line
OH
D10 D11 D12 D10 D11 D12 D10 D10 D10 D11 D11 D11 D12 D12 D12
S1 Z1 Z1 Z2 Z2 M1 E2 X X Z1 Z2 E2 Z1 Z1 Z1 Z2 Z2 Z2 E2 E2 E2
#1
#2 STS-1
#3
Section overhead : byte assignment
13.9
1 90
1 A1 A2 C1 STM-0 Frame
B1 E1 F1
D1 D2 D3
VC-3
H1 H2 H3 J1
B3
B2 K1 K2
D4 D5 D6 C2
fixed stuff
fixed stuff
G1
D7 D8 D9
D10 D11 D12 F2
9 S1 M1 E2 H4
F3
K3
N1
29 30 31 58 59 60
VC-3 POH
13.10
6 5 4
No fault 1 2 3
Switch to holdover mode
Path fault
Correct 6 5 4
1 2 3
Sync loop
Incorrect 6 5 4
1 2 3
Switch to holdover mode
Reference fault
6 5 4
Correct
holdover
1 2 3
Sync loop
6 5 4
Incorrect
13.11
Correct / No fault
NE1 configuration: T3 (from PRC), priority 1
no second reference
NE other configuration: T1 from W, priority 1
no second reference
Incorrect
NE1 configuration: T3 (from PRC), priority 1
T1 from E, priority 2
NE other configuration: T1 from W, priority 1
T1 from E, priority 2: sync loops in case of line failure
or PRC failure
No SSU available
1 PRC 2 PRC 3
PRC SEC SEC
holdover
PRC 6 "1111" 5 "1111" 4
phase 3 PRC
"1111" "1111"
1 PRC 2 PRC 3
"1111" SEC SEC
holdover
phase 4 PRC 6 PRC 5 "1111" 4
PRC
"1111" "1111"
1 PRC 2 PRC 3
13.12
No SSU available
1 T3 (PCR) 1 PCR
T1 from E 2 S1-Byte
13.13
AP Access Point LOP Lower-order path e.g. VC-12 HOP Higher-order path e.g. VC-4
CP Connection Point LOPA Lower-order path adaptation HOPA Higher-order path adaptation
TCP Termination Connection Point LOPT Lower-order path termination HOPT Higher-order path termination
IOST Intra-Office section termination LOPSN Lower-order path sub-network HOPSN Higher-order path sub-network
IOSA Intra-Office section adaptation SA STM-N section adaptation
ST STM-N section termination
Application of the functional architecture of the case of PDH supported on SDH
13.14
TSF TSF
SmD/Sm SmD/Sm TSD TSD
SmD_AP SmDm Sm Sm Smm Sms Sms
SmD SmD TSF Sm_RI Sm_RI
SD
Sm_RI
Sm
TSF TSF
SnD/Sn SnD/Sn TSD TSD
SnD_AP SnDm Sn Sn Snm Sns SnS
SnD SnD TSF Sn_RI Sn_RI
Sn_RI SD
Sn
MSn MSn
MSn_RI
MSn
RSn RSn
RSn
OSn ESl
OSn_CP ESl_CP