Professional Documents
Culture Documents
Chapter02.SDH Overview CPE Protection Schemes
Chapter02.SDH Overview CPE Protection Schemes
Chapter02.SDH Overview CPE Protection Schemes
CHAPTER 2
SDH OVERVIEW, CPE & PROTECTION
SCHEMES
Date Of Creation: 01-04-2011
1.0 Introduction:
SDH (Synchronous Digital Hierarchy) It is a standard for telecommunications transport
formulated by the International Telecommunication Union (ITU). SDH was first
introduced into the telecommunications network in 1992 and has been deployed at rapid
rates since then. It’s deployed at all levels of the network infrastructure, including the
access network and the long-distance trunk network. It’s based on overlaying a
synchronous multiplexed signal onto a light stream transmitted over fiber-optic cable.
SDH is also defined for use on radio relay links, satellite links, and at electrical interfaces
between equipment.
The increased configuration flexibility and bandwidth availability of SDH provides
significant advantages over the older telecommunications system. These advantages
include:
In brief, SDH defines synchronous transport modules (STMs) for the fiber-optic based
transmission hierarchy.
3.0 Background:
Before SDH, the first generations of fiber-optic systems in the public telephone network
used proprietary architectures, equipment line codes, multiplexing formats, and
maintenance procedures. The users of this equipment wanted standards so they could mix
and match equipment from different suppliers. The resulting international standard is
known as Synchronous Digital Hierarchy (SDH).
The second major advantage of SDH is the fact that it’s synchronous. In plesiochronous
systems the timing may vary from equipment to equipment because they are
synchronized from different network clocks. In order to multiplex this type of signal, a
process known as bit stuffing is used. Bit stuffing adds extra bits to bring all input signals
up to some common bit-rate, thereby requiring multi-stage multiplexing and
demultiplexing. Because SDH is synchronous, it allows single- stage multiplexing and
demultiplexing. This single stage multiplexing eliminates hardware complexity, thus
decreasing the cost of equipment while improving signal quality. In plesiochronous
networks, an entire signal had to be demultiplexed in order to access a particular channel;
then the non-accessed channels had to be re-multiplexed back together in order to be sent
further along the network to their proper destination. In SDH format, only those channels
that are required at a particular point are demultiplexed, thereby eliminating the need for
back to-back multiplexing. In other words, SDH makes individual channels “visible” and
they can easily be added and dropped.
accommodating the existing digital hierarchy signals. In addition, SDH supports the
transport of signals based on the 1.5 Mbit/s hierarchy.
The frame structure of STM-N is made up of three parts: section overhead, including
Regenerator Section Overhead (RSOH) and Multiplex Section Overhead (MSOH),
Information Payload (Payload) and Administrative Unit Pointer (AU-PTR).
bytes transmitted as part of the payload in a network and these bytes are mainly used for
the monitor, management and control of the path performance.
STM-N
TM
140Mbit/s
34Mbit/s
STM-M
2Mbit/s
STM-N STM-N
ADM
140Mbit/s
34Mbit/s
STM-M
2Mbit/s
ADM has two line ports and one tributary port. The two line ports are connected with
optical cables on their respective sides (two trans-receiving optical fibers on each side).
For the sake of description, we specify them as the West (W) line port and East (E) line
port. The function of ADM is to multiplex low-speed tributary signals to lines (line
singles) in cross-connection mode or de-multiplex low-speed tributary signals from the
line signals received from line ports. In addition, cross-connection of the STM-N signals
on Eastward/ westward line sides can be implemented. ADM is the most important NE in
an SDH network and can be equivalent to other NEs, i.e., it can perform the functions of
other NEs. For example, ADM may be equivalent to two TMs.
7.3 Regenerator
There are two kinds of regenerators in an optical transmission network. One is the pure
optical regenerator, mainly used to amplify optical power so as to extend the optical
transmission distance. The other is an electric regenerator used for pulse regeneration
shaping and it can achieve the goal of accumulating no line noise and ensuring complete
waveforms of transmission signals by means of Optical/electric (O/E) conversion,
sampling of electric signals, regeneration, reshaping, Electric/optical and other
processing. Described here is the latter one, which has only two line ports, as shown in
Fig. 4
An REG in real sense only needs to process RSOH in the STM-N frame and needs no
cross-connection function. However, ADM and TM need to process both RSOH and
MSOH because they are to insert low-speed tributary signals into STM-N. In addition,
both ADM and TM have the cross-connection function.
M DXC N
channel channel
DXC can implement cross-connection of the input M-channel STM-N signals to the
output N-channel STM-N signals. The core of DXC is a cross-connect matrix and the
powerful DXC can implement the low priority cross-connection of high-speed signals in
a cross-connect matrix.
has a high reliability, but a complex structure and high costs. Therefore, it is applicable to
a backbone network with heavy traffic.
(b) Star
TM DXC/ADM TM
topology
TM TM TM
(c) Tree
topology DXC/ADM ADM ADM TM
TM TM
TM
ADM
(d) Ring
topology
ADM ADM
ADM
(e) Mesh
topology DXC/ADM DXC/ADM
DXC/ADM DXC/ADM
involves no repairing and replacement of a specific faulty component or part for the
reestablishment of communication.
1. Linear Protection
There are three different protection schemes in Linear Protection
a. 1+1 protection scheme ( 1+1 configuration )
The simplest from of Protection is known as 1+1 APS. Here, each working line is
protected by one protection line. The same signal is transmitted on both lines. If a failure
or degradation occur, the network elements switch the connection over to the Protection
line at the receive end
W
c. 1: N Protection scheme
A 1: N configuration represents a more cost- effective solution than the other two
mechanisms describe above. N working channels are protected by one protection
channel. If there are no defects in the network, this protection channel can be used to
transport low-priority traffic
SDH is normally configured as ring architecture. This is done to create loop diversity for
uninterrupted service protection purposes in case of link or equipment failures. The SDH
ring are commonly called self-healing ring, since the traffic flowing along a certain path
can automatically be switched to an alternate or standby path following failure or
degradation or link failure.
There can be either two or four fibers running between the nodes on a ring.
The operating signals can travel either clockwise only (unidirectional ring) or in
both directions around the ring (bi-directional ring)
Protection switching can be performed either via a line- switching or a path-
switching scheme.
Upon link failure or degradation, line switching moves all single channels of an entire
STM-N channel to a protection fiber. Conversely, path switching can move individual
payload channels within an STM-N channel to another path.
The following two ring architectures have become popular for SDH network
Two fiber unidirectional, self healing ring (USHR)
They are also referred to as unidirectional or bi-directional self_ healing ring (USHR or
BSHR) respectively.
Primary path
1
Node 1 Node 2
8
Protection path
4 5 7 2
Node 4 Node 3
6
3
Figure (a)
traffic. In case traffic is switched over alternate path, the traffic returned on normal path
after restoration. But it protect the traffic positively. It offers cost effective solution for
low level of capacity network.
1p
Node 1 Node 2
8p
4p 5p 7p 2p
6p
Node 4 Node 3
3p
For MS shared protection rings, the working channels carry service to be protected while
the protection channels are reserved for protection of this service. Working traffic is
transported bi-directionally over spans: an incoming tributary travels in one direction the
working channels while its associated outgoing tributary travels in the opposite direction
but over the same spans.
advantage over unidirectional ring, except whenever the tributaries are all destined for
only one node on the ring, in which case they are equivalent).
One advantage of MS shared protection ring is that service can be routed on the ring in
either one of the two different directions, the long way around the ring or the short way.
Although the short way will usually be preferred, occasionally routing service over the
long way permits some load balancing capabilities.
When the protection channels are not being used to restore the working channels, they
can be used to carry extra traffic. In the event of a protection switch, the working traffic
on the working channels will access the protection channels causing any extra traffic to
be removed form the protection channels.
During a ring switch, working channels transmitted toward the failed span are switched at
one switching node to the protection channels transmitted in the opposite direction (away
from the failure). This bridged traffic travels the long way around the ring on the
protection channels to the other switching node where the protection channels are
switched back onto the working channels. In the other direction, the working channels are
bridged and switched in the same manner
During a ring switch, the fails span is effectively “replaced” with the protection channels
between the switching nodes, traveling the ling way around the ring. Since the protection
channels along each (except the failed span) are used for recovery, the protection capacity
is effectively shared by all spans.
The pair of tributaries (incoming and outgoing) only uses capacity along the spans
between the nodes where the pair is added and dropped. Thus, the sum of the tributaries
that traverse a span cannot exceed the maximum capacity of that particular span. The
switching protocol shall be able to accommodate up to 16 nodes on a ring excluding
regenerators
5. ________is used to indicate the accurate position of the first byte of information
payload in the STM-N frame. (a. AU pointer, b.RSOH, c.MSOH, d.Payload.)
6. The NE used at the end of the link is _______.(a.TM, b.ADM, c.DXC, d.REG)
10. The frame structure of STM-N is made up of three parts: section overhead,
including Regenerator Section Overhead (RSOH) and Multiplex Section
Overhead (MSOH), Information Payload (Payload) and Administrative Unit
Pointer (AU-PTR). (T/F).