Professional Documents
Culture Documents
Hand Outs of SDH Basics (1) Introduction
Hand Outs of SDH Basics (1) Introduction
[1] Introduction:
Telecommunication is a process of transmitting or receiving information over a distance by
any electrical or electromagnetic medium. Telecommunication can be possible in 2 ways
1) Analog Communication
2) Digital Communication
In Analog communication, analog signals that vary continuously amplitude and frequency
are used in transmission media In an analog communication, it is difficult to remove noise
and wave distortions during the transmission. For this reason, analog signals cannot perform
high-quality data transmission.
In digital communication, digital signal is an electrical signal, which possesses two distinct
states, on/off or positive/negative. Noise and distortions have little effect, making high-
quality data transmission possible.
In digital communication prior to transmission, analog to digital conversion is needed and
Analog-to-Digital Conversion (ADC) is carried over 3 steps
a. Sampling:
The analog signal is sampled at regular intervals to create pulses, each representing the
amplitude of the signal at an instant in time. This process is called sampling. Sampling
frequency is given by Nyquist Theorem, which says that „ to recover the original analog
signal from the sampled signal, sampling rate should be 2*fmax, where fmax is maximum
frequency of the analog signal.
Voice frequency range: 300Hz to 3.4kHz rounded off to 0 to 4 kHz
Sampling occurs at Sampling frequency, 2 * 4 KHz = 8000 Samples/Sec.
Duration of the samples is 125Sec.
b. Quantization:
Quantization is process of assigning a discrete amplitude value that closely matches the
original sample is now used to present the value of the pulse.
c. Encoding
Encoding is to allot an 8bit binary code to each of the quantized samples and transmit the
binary code.
Voice channel occupies 8000 samples/sec.*8 bits/sample=64000=64kbps
Baseband frequency= 64kHz.
When communication is carried using only single Baseband signal on a line, its called as
Baseband communication. But due to high bandwidth requirement Broadband
communication need to be used. Broadband communication is the process of combining a
number of individual baseband signals into a common frequency band or into a common bit
stream for transmission. Broad communication uses Time Division Multiplexing (TDM) to
cater multiple voice frequencies. There are 3 kinds of transmission types
a. Asynchronous transmission
Asynchronous transmission is transmission of data in which time intervals between
transmitted characters may be of unequal length. Transition of signals do not occur at the
same nominal rate generally free running quartz oscillators derive the clock, there is no
timing pulses sent from transmitter to receiver.
Figure1
2.2 Limitations of PDH:
Because of Plesiochronous transmission & bit interleave TDM at higher levels, mainly
problem aroused that is
a. Problem of channel segregation:
Access to digital channels from hierarchical signals requires demultiplexing and subsequent
full multiplexing, which leads to the proliferation of equipment at those points where
segregation of channels is needed.
Because of this another problem aroused that‟s voice channels can‟t be Added/Dropped
when at higher hierarchy level and in turn send /receive voice channels. This is the problem
of cross-connection.
b. Homogeneity of equipment:
PDH when deployed with optical fiber, as multiplexing is carried out with electrical signals;
these electrical signals should be converted into optical signal for which Line Terminal
Equipment (LTE) is used. The terminal equipment in a link between exchanges (fiber,
coaxial, etc) must come from the same manufacturer. This limits flexibility when it comes to
reconfiguring and extending the network, since equipment from different manufacturers
cannot be interconnected.
c. Limited functionality:
Supervision and maintenance functions are limited with multiframe structure of E1 level The
PDH don‟t have capability to provide service automatically when there is connection failure.
d. Problem of interoperability:
In the process of successive PDH multiplexing of the 64 Kbps channels, interoperability is
lost between the interfaces used in the European, American and Japanese hierarchies, that is,
the transmission rates are different for the same multiplexing level. This creates a need for
equipment to convert between interfaces in internetworking situations.
Figure2
will be multiplied, which is nothing but column multiplexing and is as depicted in Figure3.
The STM-n frames are transmitted in left-right and top-bottom manner, i.e. 1st row is
transmitted starting from 1x1 byte and continue upto 1x270 byte, then 2nd row transmitted in
same manner, 3rd row,4th row,…….7th row.
Multiplexing hierarchy forms these entities using the mapping elements, which is explained
in section 3.2.
3.2 SDH multiplexing hierarchy:
SDH multiplexing hierarchy uses mapping elements and perform the mapping, multiplexing
and framing to form STM frame.
3.2.1 Mapping Elements:
Mapping elements basically the packaging units that have got their sizes fixed beforehand
depending upon the traffic path they follow in multiplexing hierarchy. There are 5 mapping
elements
a. Container-n:
Container is basic mapping (packaging) unit for the PDH tributary signals. For every PDH
traffic, container is provided for mapping and unused capacity of container can‟t be filled by
any other traffic. Only one PDH traffic can be mapped into every container and then
remaining bytes will be stuffed.
C11=DS1, C12=E1, C2=DS2, C3=E3&DS3 and C4=E4
b. Virtual Container-n
Virtual Container is the information structure used to support path (explained in Section
Hierarchy) connections in the SDH. Adding POH byte(s) to container forms VC. For every
container there is VC.
VC11=C11, VC12=C12, VC2=C2, VC3=C3 & VC4=C4
c. Tributary Unit/Administrative Unit:
Tributary Unit is an information structure, which provides adaptation between two layers
and is formed by adding pointer(s) to VC:
When pointer is added to lower order VC-n it forms TU.
When pointer is added to higher order VC-n it forms AU.
POINTER is an indicator whose value defines the frame offset of a VC with respect to the
frame reference of the payload.
Figure 4
Three TU-12‟s TU-12 #1, #2 and #3 are byte interleaved multiplexed to form TUG-2,
Figure5
Figure6 Figure7
STM-N STM-N
T1 E1 E3
Figure8 Figure9
3.4 Overheads & Pointers:
Several types of overhead have been identified for application in the SDH. They are SOH
and POH byte. SOH & POH bytes perform maintenance operation for their respective
sections like regenerator section, multiplex section and path (higher order & lower order),
which are explained under the heading of Section Hierarchy.
3.4.1 Section Overhead bytes (SOH):
SOH information is added to the information payload to create an STM-N. The SOH
information is further classified as
a. Regenerator section overhead (RSOH):
The Regenerator Section Overhead contains only the information required for the elements
located at both ends of a regenerator section. The section can be between two regenerators
or regenerator & ADM etc. The RSOH is found in the first three rows of STM-N frame as
depicted in Figure10. Byte level description is explained in Table2.
Figure10
b. Multiplex section overhead (MSOH):
The MSOH contains the information required between the multiplex section termination
equipment at each end of the Multiplex section (that is, between consecutive network
elements excluding the regenerators). The Multiplex Section Overhead is found in Rows 5 to
9 of STM-N frame as depicted in Figure10. Byte level description is in explained in Table3.
3.4.2 Virtual Container Path-Overhead (POH):
Virtual container POH provides for integrity of communication between the point of
assembly of a virtual container and its point of disassembly. Two categories of virtual
container POH have been identified:
a. Higher order virtual container POH (VC-4/VC-3 POH):
VC-3 POH is added to either an assembly of TUG-2s or a C-3 to form a VC-3. VC-4 POH
is added to either an assembly of TUG-3s or a C-4 to form a VC-4 as depicted in Figure10.
RSOH Description
A1=F6H Indicate the beginning of the STM-N frame; The frame alignment word of an STM-
N frame (N=1, 4, 16, 64) is composed of 3XN A1 bytes followed by 3XN A2
A2=28H
bytes.
J0: RS Regenerator Section (RS) Trace byte is used to transmit repetitively a section access
trace point identifier so that a section receiver can verify its continued connection to the
intended transmitter. J0 byte transmitted as 16-byte code sent in 16 consecutive
frames.
B1: BIP-8 This is a parity code (even parity), used to check for transmission errors over a RS.
Its value is calculated over all bits of the nth STM-1 frame and then placed in the B1
byte of (n+1)th STM-1 frame.
E1 This byte is used as a local orderwire channel for voice communication in RS.
F1 This byte is reserved for user purposes (e.g., to provide temporary data/voice
channel connections for special maintenance purposes).
D1-D3– RS Data Communication Channel bytes form a 192 Kbps message channel
DCCR providing a message-based channel for Operations, Administration and
Maintenance (OAM) between pieces of section terminating equipment.
MSOH Description
B2: BIP-24 Error monitoring over MS & computed over STM frame excluding RSOH
bytes.3XN B2 bytes in STM-N (N=1,4,16,64).
K1 & K2 Automatic Protection Switching (APS channel) K1 & K2 (b1-b5) bytes are
allocated for APS signalling for the protection of the multiplex section. K2 (b6-
b8) for communicating Alarm Indication Signal (AIS) and Remote Defect
Indication (RDI).
D4 -D12 MS Data Communications Channel bytes form a 576 kbps message channel from
DCCM a central location for OAM information (control, maintenance, remote
provisioning, monitoring, administration and other communication needs).
S1 Bits 5 to 8 of byte S1 are allocated for synchronization status messages.
M1 The M1 byte is used for a MS layer remote error indication (MS-REI). Bits 2 to 8
of the M1 byte are used to carry the error count of the interleaved bit blocks that
the MS BIP-24xN has detected.
E2 Local orderwire channel for voice communication in MS, E2 is sent in 4
consecutive frames to initiate the communication which includes segment no.(00-
99) & orderwire no.(000-249).
Table3
VC-3/VC-4 POH bytes are also termed as Higher Order POH (HOPOH) as HOPOH is
added to the higher order VC‟s only. Bytes are explained in Table4.
b. Lower order virtual container POH (VC-2/VC-1 POH):
The bytes V5, J2, N2 and K4 are allocated to the VC-2, VC-12 and VC-11 POH. The V5
byte is the
first byte of the multiframe and its position is indicated by the TU-2, TU-12 or TU-11
pointer. These bytes are explained as in Table5. The LOPOH bytes
LOPOH Description
V5 i) 2 bits allocated for error performance monitoring where BIP-2 scheme is used
which includes POH bytes, but excludes V1, V2, V3, and V4.
ii) 1bit as REI that has 2 valid BIP violations.
iii) 3bits for signal label, 000=Unequipped, 001=equipped-non-specific, all other
values are used by new equipment to indicate specific mapping.
iv) 1bit as LP-RDI as acknowledgement for TU-AIS.
J2 Lower order path trace.
N2 N2 byte is allocated to provide a tandem connection monitoring (TCM) function
that works similar to N1, along with V5.
K4 1bit for as extended signal label which works along with signal label of V5 and
2bits as APS signalling for protection at lower order path level.
Table5
3.4.3 Pointers:
SDH provides payload pointers to permit differences in the phase and frequency of the
virtual containers (VC-N) with respect to the STM-N frame. Lower-order pointers are also
provided to permit phase differences between VC-1/VC-2 and the higher-order VC-3/VC-
4. On a frame-by-frame basis, the payload pointer indicates the offset between the VC
Figure11
3xAU-3 (due to multiplexing 3xAU-3 to map into AUG-1). 3xH3 bytes (AU-4)/1xH3 byte
each in 3AU-3/3TU-3/1xV3byte(TU-2/TU-1) is used for buffering of payloads in negative
pointer justification & equivalent number of bytes after H3/V3 byte are used for stuffing in
positive justification. There are different pointer values for different pointer that is explained
in Table6.
Figure 12(LO)
After the pointer value assignment, the hierarchy should be able to process the data even in
case of clock difference between the nodes, which can be because of jitter & wander and in
all cases the hierarchy does the justification. For performing the justification First byte of the
payload should be allocated from 4th row, immediately after H3 bytes and they can float
anywhere in frame there after. Pointer justification occurs when the sending SDH NE‟s
timing is different than the receiving SDH NE‟s timing. There are 2 types of justification
possible depending upon the clock frequency.
a. Positive Pointer Justification (PPJ):
If the frame rate of the VC-n is too slow with respect to that of the AUG-N, then the
alignment of the VC-n must periodically slip back in time as depicted in Figure12 [a], where
there are 2 nodes (NE1 & NE2) in network, VC-n data rate of NE1 is 782bytes/sec &
AUG-n data rate of NE2 is 783bytes/sec(reference clock recovered) with respective number
of pointers. Because of the difference in clock rate, when NE1 sends only 782bytes, which
will fill the NE2 buffer with leaving 1byte empty (1 pointer no information is present) and
the pointer is pointing to the 1st position, this is where positive pointer justification is used.
Pointer value is showing the false pointer value where as actual data starts from 2 nd position,
so for that stuffing byte is added at 1st position (doesn‟t contribute for payload) & pointer
incremented from position 1(dotted arrow) to 2(where actual data starts). This is Positive
Pointer Justification (PPJ). PPJ operation is carried out in 4 consecutive frames as depicted
in Figure12 [b].
Frame-n Start of VC-n, where clock is recovered from incoming bits & set as reference.
Frame (n+1) Pointer initialization, payload slipped back because clock difference.
Frame (n+2) Pointer value I bits inverted to have 5bit majority voting at receiver &
stuffing bytes added after 3H3 bytes.
Frame (n+3) Pointer value incremented by 1.
NE2
VC-n AUG-n
Figure12 [a]
Figure12 [b]
1q1
1 49
2 50
51
3
52
4
| |
| 782
| 783 783
0
| 1
782 |
783 48
784 49
VC-n(NE1) AUG-n(NE2)
Figure13 [a]
Figure13 [b]
Figure14
b. Multiplex Section: MS is a part (section) of the optical fiber network, within which
MSOH part of STM frame is NOT processed.
c. Higher order Path: HP is a part (section) of the optical fiber network, within which
higher order VC part of SDH frame is NOT processed (it may be processed only for
interpreting HOPOH).
d. Lower order Path: LP is a part (section) of the optical fiber network, within which lower
order VC part of SDH frame is NOT processed (it may be processed only for interpreting
LOPOH).
RS & MS are defined in network only on the basis of the type of the equipment used in the
in it, but for defining the HP & LP it depends upon the traffic provisioning (type of the
cross connect) in the NE‟s. While provisioning in NE following points has to be
remembered
i. After receiving the STM frame at NE, while disassembling it; NE follows the sequence of
RSOHMSOHAU-4/AU-3 PointerVC-4/VC-3 POHTU-n pointerVC-n
POH.n-11, 12,2,3.
ii. For Tejas nodes, even if one is making a VC4 level pass-through (an operation with HP
without processing it), he/she is processing MS & therefore terminating the MS.
iii. One can change any HPOH field (e.g., J1 transmitted trace) only when one is processing
HP (e.g., VC12 level pass through cross-connect (PTXC) exists on AU4 mapping), but not
when HP is not disturbed (e.g., VC4 level PTXC on AU4 mapping).
iv. For Tejas nodes, for AU4 mapping, one can make VC4 and VC12/VC11 level and not
VC3 level pass-through for E1/DS1 traffic.
v. If in a STM-1 node, multiple (say, 18) E1/DS1 traffic has to be passed-through with some
other traffic added/dropped from that node, one has to make multiple (18) VC12 level
PTXC.
Figure15
Amongst the NEs, A, B, F and C (port 1) is of STM1 capacity and C (port 2&3), G, E and F
is of STM4 capacity all are following AU4 mapping technique.
For any traffic terminating NEs must be provisioned with ADXC of respective VC, for
example: E1VC12, E3VC3.
Now the PTXC provision in intermediate NEs is part of effective traffic planning so that
maximum traffic can be catered with existing capacity.
At B:
There are 3 traffic 21E1 from port 1 to 3,21E1 & 1E3 from port 2 to 3.STM1 capacity NE
means each port of the NE can receive or deliver traffic of STM1 capacity.
a. For 21E1 from 1-3, according to point iv both VC4/VC12 PTXC is possible but
according to point v only VC-12 PTXC has to be provisioned as port3 capacity is STM1 and
if VC4 PTXC is provided then no other traffic can be either delivered or received.
b. Similarly for traffic from 2-3, 21E1 & 1E3; VC12 & VC3 PTXC is provisioned
respectively and all traffic must be in STM#1 as NE is of STM1 capacity.
At C:
From port 1-3 there 2 traffic of 42E1 capacity & 1-2 1E3 traffic, here port1-STM1 & port
2&3-STM4 capacity.
a. If VC4 PTXC is provisioned from 1-3 then all traffic including E3 will go to port3, which
is not expected so VC12 PTXC from 1-3 carried within STM#2 for 42E1 traffic and VC3
PTXC from 1-2 within STM#4.
b. Port 2&3 can cater traffic in any of the STM number (1-4), in port 3 42E1 traffic is
catered within STM#2 in which can cater still 21E1 traffic.
Similarly at E VC12 PTXC is provisioned from 1-2 within STM#2.After all traffic are
provisioned in all NEs, HP & LP can be indicated for each traffic as depicted in Figure15.
Figure16
1+1 MSP is port level protection scheme where traffic catered in one port called as Working
port (3-1 or 4-1) as depicted will be protected by Protecting port (3-2 or 4-2). Each port will
be having Tx. & Rx fiber which will be connected to its adjacent port to Rx. & Tx.
respectively, which will be either Working Path (WP) if its for working port & Protecting
Figure17
On single fiber cut if both direction of traffic is switched over from WP to PP then it will be
called as Bi-directional switching. User can configure both switching types.
1+1 MSP can also be configured by user as Revertive or Non-Revertive protection, when
provisioned as Revertive protection, after WP is repaired back, switching takes place PP to
WP and traffic will be selected from WP but after Wait-To-Restore (WTR variable from 5-
12min which is user configurable) time is elapsed which ensures proper splicing in WP.
If Non-Revertive protection is provisioned then traffic will not be switched back from PP to
WP even if the WP is repaired completely, until user forcefully switches the traffic using
external commands.
5.2Ring protection scheme:
Ring network is made up of ADM and any traffic added can reach to its destination in 2
ways, which can be useful in APS. There are 2 types of protection switching schemes.
a. Sub Network Connection Protection (SNCP):
Sub Network Connection Protection (SNCP) or Unidirectional Path Switched Ring
(UPSR)(in SONET terminology) is dedicated protection scheme, which gives path level
protection for each traffic and traffic will be flowing in both WP & PP simultaneously. The
SNCP has to be provisioned at terminating nodes, for each traffic individually Destination
Work (DW), Destination Protect (DP) and Source Work (SW), Source Protect (SP) has to be
specified as depicted in Figure18.Consider communication is needed between A & D and the
HP or LP will be as shown from A to D in 2 ways, one is selected as Working HP/LP (WP)
(for this traffic) and another one selected as Protecting HP/LP (PP) (for this traffic).
Whenever the WP is on the toss its PP will protect the traffic and corresponding switching
occurs at far end. PP is dedicated to WP for individual traffic, like this 63 E1 can be
protected in STM-1 node, each having different WP and PP.
Figure18
SNCP has to be provisioned only in terminating nodes and PTXC has to be provisioned in
intermediate nodes. SNCP is necessarily follows Unidirectional switching only as the
protection directly provided for the traffic separately and if traffic flowing from 3-1 to 4-1 is
affected then traffic will be received from 5-2 in PP. Traffic is still received in A from 3-1
through WP only. If both direction traffic is affected in WP then both direction traffic will
switch over to PP. SNCP also can have both Revertive & Non-Revertive protection.
Tandem SNCP is another application of SNCP where single fiber cut in N rings can be
protected simultaneously for which can be simulated using 4-way XC. SNCP protection
can‟t be provisioned in the presence of MSP or MSSP protection.
b. Multiplex Section Shared Protection (MS-SP):
MS-SP ring is also called as Bi-directional Line Switched Ring (BLSR) in SONET terms,
which is ring network application of 1:1 protection switching scheme There are types of
rings
i. MS-SP 2F ring:
MS-SP-2Fiber ring will be having 2 fibers with bandwidth divided for the working traffic &
protecting traffic, for example in STM-N ring having 6 nodes as depicted in Figure19,
communication needs to be carried out between NE A & D. In MS-SP ring within every
port each fiber is divided as working traffic & protecting traffic of N/2 capacity each (i.e. in
each fiber AU4 1-8 will be working traffic & AU4 9-16 will be protecting traffic). Working
traffic of one direction say from A to B in AU4 1-8 is protected by protecting traffic in
opposite direction from B to A in AU4 9-16.
The protection process is explained with example as depicted in Figure 20, if Multiplex
Section between B & C is affected then all other Multiplex Sections in ring will share their
bandwidth to protect the traffic because of which it‟s named as MS-Shared Protection.
When the traffic between B & C is affected the traffic will reach from A to B in
AU4#1(working traffic) then at B, RING SWITCHING takes place where traffic will be
switched from AU4#1 to AU4#9(protecting traffic) and will go back from B to A. The
traffic will reach the node C in AU4#9 only then traffic will be switched back to AU4#1 as
the MS between B & C was on the toss so traffic got protected by other MS. After traffic
reached the C another ring switch takes place where traffic will be switch back to
AU4#1(working traffic) then will reach the destination D in AU4#1only.Similarly the
opposite direction traffic also will be protected in Ring switching.
As name suggests this follows only Bi-directional switching and MS-SP 2F can‟t be Non-
Revertive at all, as main advantage of Non-Revertive protection is to avoid the fiber ageing
when it is heavily loaded, keeping another path idle. Only disadvantage of the MS-SP 2F is
that maximum bandwidth utilization is STM-N/2 capacity, which was overcome by MS-SP
4F. Tejas products do not support MS-SP 4F for now.
Figure 19 Figure 20
There can be maximum of 16 NE‟s (0-15) in a ring because every NE is given Node ID for
which 4 bits reserved in K1& K2 byte. Provisioning needs to be done at every NE giving
East/West chassis-slot-port, ring ID, node ID and ring map.
ii. MS-SP 4F ring:
MS-SP 4F ring require four fibers for each span of the ring. As illustrated in Figure21,
working and protection traffic are carried over different fibers: two NE‟s transmitting in
opposite directions carry the working traffic while two NE‟s, also transmitting in opposite
directions, carry the protection traffic. This permits the bi-directional transport of working
traffic.
Figure 21
MS-SP 4F rings support RING SWITCHING as a protection switch, as well as SPAN
SWITCHING, though not concurrently. Multiple span switches can coexist on the ring
since only the protection channels along one span are used for each span switch. Certain
multiple failures can be fully protected using span switching. MS-SP 4F can support only Bi-
directional switching and it supports both Revertive & Non-Revertive protection.
5.3 External Commands:
[6] Synchronization:
Synchronization is required to enable service providers to transport bits of information
within and across network without losing any bits, which can be due to mis-timing (phase
Figure 22
Wander is long-term variation of the digital signals from its ideal position and its frequency
is <10Hz.Jitter & wander is as depicted in Figure 22.
Synchronization is attained in the SDH using Master-Slave clock technique along with Phase
Locked Loop (PLL), which is performed by Synchronous Status Message (SSM) state
machine.
6.1 SSM state machine:
SSM state machine present in every NE will synchronize all NE in network, which is as
depicted in Figure 23.
Figure 23
SSM state machine nominates the clocks through 3 interfaces
i. Optical interface (STM ports),
ii. Electrical interface (E1/DS1 interface)
iii. BITS (clock/data) (external reference signal)
Figure 24
a. SETG (Synchronous Equipment Timing Generation) status:
The SETG status is the indicator of what state the SSM module is in. It has the following
states:
i. Free Running: When the offset register value is completely ignored, PLL becomes an
open loop system. The output frequency cannot be tracked to the nominated clock or no
external clock is nominated or in holdover mode for more than 24 hours.
ii. Holdover: The offset register value is fixed to the last value when both inputs were
available or the Timing reference on all nominated clocks failed or PPM offset on
selected clock is high (> +/- 17 PPM).
iii. Lock: The offset register value in PLL changes dynamically to track the output
frequency to the input frequency and thus, derives timing from the nominated clock
source. The node also shows which timing source it is deriving its reference from by
indicating a “*” against the Timing reference which is current reference clock.
b. Alarms:
SM provides following Alarms to indicates the current status of SSM
i. Timing reference failed:
This alarm is raised whenever nominated clock source has LOS, LOF or AIS or if the
Primary or the Secondary clock PPM offset is higher than +/- 17 PPM.
ii. System clock in holdover mode:
This alarm is raised in the following scenarios.
a. Current selected clock received signal fail and no other nominated clock is available for
timing reference.
b. Current selected clock PPM offset crosses +/-17PPM
iii. Timing generation entry free run:
This alarm will be generated when
a. No clock is nominated for timing reference.
b. Internal clock is selected as reference clock.
Figure 25
STM frame 2430 bytes are arranged in vertical manner as shown and EVEN PARITY is
followed to calculate the B1 byte, according to which in every column it will see that even
number of 1‟s are present. B1 byte is calculated over nth STM frame & that B1 byte will be
placed in (n+1)th STM frame because if placed in nth frame itself then it is difficult to debug
the error which may occur in B1 byte of nth frame only. Then nth frame will be transmitted
which when received will be again subjected to Even parity check over STM frame and it
will be stored as B1‟.Then (n+1)th frame is received and B1 byte is retrieved from that which
will be compared with B1‟ by B1(XOR)B1‟.If they match then probably no errors have
occurred(its probable because even parity can find only odd number of errors occurred in
case of even number of errors it will not trace the error) and if 1 bit doesn‟t match then in
that column 1 or more errors occurred. In B1 if 8bits don‟t match then it can be concluded
that 8BIP bits are in error. Similarly all BIP monitoring bytes are calculated over their
respective blocks.
7.3 Performance Monitoring Parameters:
BIP monitoring bytes only will give information regarding errors occurred in the section and
will report the alarms like SD (1 bit error in 105 – 109bits) & SF (1 bit error in 103 – 105 bits),
but PM parameters will give the conclusion drawn over period of 15min or 24Htrs.
Figure 26
e. Unavailable Second (UAS):
UAS is PM parameters which indicates more severe condition compared to SES, where
there is burst of SES events. UAS count start incrementing by 10 its previous count, at the
occurrence of contiguous 10th SES event and period of unavailable time begins, where
these 10 consecutive SES started their burst of 10 event as depicted in Figure 27.
Figure 27
There are 33 seconds under consideration, in which 10 SES event started at 6th sec, previous
to that SES count was 1 & ES count was 3,so when UAS set to 10(at 15th sec), the count was
ES=13 & SES=11,which will be decremented by 10,as UAS started counting and period of
unavailable time started at the beginning of 10 SES event from 6th Sec.
Resetting Logic of UAS:
UAS count decrements by 10 at the onset of 10th consecutive non-SES and period of
available time begins where 10 non-SES event started.
In Period of Unavailable time ES, SES, UAS counts will counted as shown in Table 8.
Time interval(sec) 0 1 2 3 4 5 6 7 8 9 10 11 12 13
SES count 1 2 3 4 5 6 7 8 9 9
Figure 29
At NE B: a-b & c-b trunk will be Near End (NE) and b-c & b-a trunk will be Far End (FE).
Similarly in all NE there will be 2 trunks and for each trunk PM will be done as shown
below.
For Near End Performance Monitoring Events refer Figure 30(a).
Figure 30(a)
Figure 30(b)
For calculating FES, FSES & FBBE Near end Defect Second (NDS) should be absent
because if NDS is present then it will give the information for PM of NE and which will be
propagated to FE trunk also. So PM processing on the FE trunk NDS must be absent.
References: