home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-08-15 | 102.5 KB | 2,729 lines |
- C:\WINWORD\CCITTREC.DOT_______________
-
-
-
-
-
- INTERNATIONAL TELECOMMUNICATION UNION
-
-
-
-
-
-
-
- CCITT G.783
-
- THE INTERNATIONAL
- TELEGRAPH AND TELEPHONE
- CONSULTATIVE COMMITTEE
-
-
-
-
-
-
-
-
-
-
-
- GENERAL ASPECTS OF DIGITAL
-
- TRANSMISSION SYSTEMS;
-
- TERMINAL EQUIPMENTS
-
-
-
-
-
- CHARACTERISTICS OF SYNCHRONOUS DIGITAL
- HIERARCHY (SDH)
- MULTIPLEXING EQUIPMENT FUNCTIONAL BLOCKS
-
-
-
-
-
-
-
-
-
-
-
- Recommendation G.783
-
-
-
-
-
-
-
- Geneva, 1990
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Printed in Switzerland
-
-
-
- FOREWORD
-
- The CCITT (the International Telegraph and Telephone Consultative
- Committee) is a permanent organ of the International Telecommuni-
- cation Union (ITU). CCITT is responsible for studying technical,
- operating and tariff questions and issuing Recommendations on them
- with a view to standardizing telecommunications on a worldwide
- basis.
-
- The Plenary Assembly of CCITT which meets every four years,
- establishes the topics for study and approves Recommendations pre-
- pared by its Study Groups. The approval of Recommendations by the
- members of CCITT between Plenary Assemblies is covered by the
- procedure laid down in CCITT Resolution No. 2 (Melbourne, 1988).
-
- Recommendation G.783 was prepared by Study Group XV and was
- approved under the Resolution No. 2 procedure on the 14 of December
- 1990.
-
-
-
-
-
- ___________________
-
-
-
-
-
- CCITT NOTE
-
- In this Recommendation, the expression ôAdministrationö is used for
- conciseness to indicate both a telecommunication Administration and
- a recognized private operating agency.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- πITU1990
-
- All rights reserved. No part of this publication may be reproduced or uti-
- lized in any form or by any means, electronic or mechanical, including pho-
- tocopying and microfilm, without permission in writing from the ITU.
-
- PAGE BLANCHE
-
- Recommendation G.783
-
- Recommendation G.783
-
- CHARACTERISTICS OF SYNCHRONOUS DIGITAL HIERARCHY
- (SDH)
- MULTIPLEXING EQUIPMENT FUNCTIONAL BLOCKS
-
- The CCITT,
-
- considering
-
- (a) that Recommendations G.707, G.708 and G.709 form a coherent
- set of specifications for the synchronous digital hierarchy (SDH) and the
- Network Node Interface (NNI);
-
- (b) that Recommendation G.781 gives the structure of Recommendations
- on multiplexing equipment for the SDH;
-
- (c) that Recommendation G.782 gives the types and general characteris-
- tics of SDH multiplexing equipment;
-
- (d) that Recommendation G.784 addresses management aspects of the
- SDH;
-
- (e) that Recommendation G.957 specifies characteristics of optical inter-
- faces for use within the SDH;
-
- (f) that Recommendation G.958 specifies digital line systems based on
- the SDH for use on optical fibre cables;
-
- (g) that Recommendation G.703 describes electrical interfaces for use
- within the SDH,
-
- recommends
-
- that SDH multiplexing equipments having the general characteristics
- described in Recommendation G.782 should support interfaces and func-
- tions as described in this Recommendation.
-
- 1 General
-
- This Recommendation defines the interfaces and functions to be sup-
- ported by the multiplexer types defined in Recommendation G.782. The
- description is generic and no particular physical partitioning of functions is
- implied. The input/output information flows associated with the functional
- blocks serve for defining the functions of the blocks and are considered to
- be conceptual, not physical.
-
- 1.1 Abbreviations
-
- AIS Alarm indication signal
-
- ALS Automatic laser shutdown
-
- APS Automatic protection switching
-
- AU Administrative unit
-
- AUG Administrative unit group
-
- BER Bit error ratio
-
- BIP Bit interleaved parity
-
- CM Connection matrix
-
- CMISE Common Management Information Service Element
-
- DCC Data communications channel
-
- EOW Engineering order-wire
-
- ES Errored second
-
- FAL Frame alignment loss
-
- FEBE Far end block error
-
- FERF Far end receive failure
-
- HPA Higher order path adaptation
-
- HPC Higher order path connection
-
- HPT Higher order path termination
-
- LOF Loss of frame
-
- LOM Loss of multiframe
-
- LOP Loss of pointer
-
- LOS Loss of signal
-
- LPA Lower order path adaptation
-
- LPC Lower order path connection
-
- LPT Lower order path termination
-
- MCF Message comunications function
-
- MRTIE Maximum relative time interval error
-
- MS Multiplex section
-
- MSOH Multiplex section overhead
-
- MSP Multiplex section protection
-
- MST Multiplex section termination
-
- MTG Multiplexer timing generator
-
- MTIE Maximum time interval error
-
- MTPI Multiplexer timing physical interface
-
- MTS Multiplexer timing source
-
- NDF New data flag
-
- NE Network element
-
- NEF Network element function
-
- NNI Network node interface
-
- NU National use
-
- OFS Out-of-frame second
-
- OHA Overhead access
-
- OOF Out of frame
-
- PDH Plesiochronous digital hierarchy
-
- PI Physical interface
-
- PJE Pointer justification event
-
- POH Path overhead
-
- RS Regenerator section
-
- RSOH Regenerator section overhead
-
- RST Regenerator section termination
-
- SA Section adaptation
-
- SD Signal degrade
-
- SDH Synchronous digital hierarchy
-
- SEMF Synchronous equipment management function
-
- SES Severely errored second
-
- SF Signal fail
-
- SPI SDH physical interface
-
- STM Synchronous transport module
-
- TMN Telecommunications management network
-
- TU Tributary unit
-
- VC Virtual container
-
- 1.2 Definitions
-
- Note û The following definitions are relevant in the context of SDH-
- related Recommendations.
-
- 1.2.1 Automatic laser shutdown (ALS)
-
- See Recommendation G.958.
-
- 1.2.2 automatic protection switching (APS)
-
- Autonomous switching of a signal between and including two MST
- functions, from a failed working channel to a protection channel and subse-
- quent restoration using control signals carried by the K-bytes in the MSOH.
-
- 1.2.3 Administrative unit (AU)
-
- See Recommendation G.708.
-
- 1.2.4 Administrative unit group (AUG)
-
- See Recommendation G.708.
-
- 1.2.5 Bit interleaved party (BIP)
-
- See Recommendation G.708.
-
- 1.2.6 connection matrix (CM)
-
- A connection matrix is a matrix of appropriate dimensions which
- describes the connection pattern for assigning VC-ns on one side of an LPC
- or HPC function to VC-n capacities on the other side and vice versa.
-
- 1.2.7 Common management information service element (CMISE)
-
- See ISO 9595.
-
- 1.2.8 Data communications channel (DCC)
-
- See Recommendation G.784.
-
- 1.2.9 desynchronizer
-
- The desynchronizer function smooths out the timing gaps resulting
- from decoded pointer adjustments and VC payload de-mapping in the time
- domain.
-
- 1.2.10 Frame alignment loss (FAL)
-
- See Recommendation G.706.
-
- 1.2.11 Far end block error (FEBE)
-
- See Recommendation G.709.
-
- 1.2.12 Far end receive failure (FERF)
-
- See Recommendation G.709.
-
- 1.2.13 higher order path adaptation (HPA)
-
- The HPA function adapts a lower order VC (VC-1/2/3) to a higher
- order VC (VC-3/4) by processing the TU pointer which indicates the phase
- of the VC-1/2/3 POH relative to the VC-3/4 POH and assembling/disassem-
- bling the complete VC-3/4.
-
- 1.2.14 higher order path connection (HPC)
-
- The HPC function provides for flexible assignment of higher order
- VCs (VC-3/4) within an STM-N signal.
-
- 1.2.15 higher order path termination (HPT)
-
- The HPT function terminates a higher order path by generating and
- adding the appropriate VC POH to the relevant container at the path source
- and removing the VC POH and reading it at the path sink.
-
- 1.2.16 loss of frame (LOF)
-
- An LOF state of an STM-N signal is considered to have occurred
- when an OOF state persists for a defined period of time.
-
- 1.2.17 loss of pointer (LOP)
-
- The LOP state is one resulting from a defined number of consecutive
- occurrences of certain conditions which are deemed to have caused the
- value of the pointer to be unknown.
-
- 1.2.18 loss of signal (LOS)
-
- The LOS state is considered to have occurred when the amplitude of
- the relevant signal has dropped below prescribed limits for a prescribed
- period.
-
- 1.2.19 lower order path adaptation (LPA)
-
- The LPA function adapts a PDH signal to an SDH network by map-
- ping/de-mapping the signal into/out of a synchronous container. If the signal
- is asynchronous, the mapping process will include bit level justification.
-
- 1.2.20 lower order path connection (LPC)
-
- The LPC function provides for flexible assignment of lower order
- VCs in a higher order VC.
-
- 1.2.21 lower order path termination (LPT)
-
- The LPT function terminates a lower order path by generating and
- adding the appropriate VC POH to the relevant container at the path source
- and removing the VC POH and reading it at the path sink.
-
- 1.2.22 multiplex section alarm indication signal (MS-AIS)
-
- MS-AIS is an STM-N signal that contains a valid RSOH and an all
- ONEs pattern for the remainder of the signal.
-
- 1.2.23 Multiplex section far end receive failure (MS-FERF)
-
- See Recommendation G.709.
-
- 1.2.24 multiplex section overhead (MSOH)
-
- The MSOH comprises rows 5 to 9 of the SOH of the STM-N signal.
-
- 1.2.25 multiplex section protection (MSP)
-
- The MSP function provides capability for switching a signal between
- and including two MST functions, from a ôworkingö to a ôprotectionö sec-
- tion.
-
- 1.2.26 multiplex section termination (MST)
-
- The MST function generates the MSOH in the process of forming an
- SDH frame signal and terminates the MSOH in the reverse direction.
-
- 1.2.27 multiplexer timing generator (MTG)
-
- The MTG function filters the timing reference signal from those
- selected in the MTS to ensure that the timing requirements at the T0 refer-
- ence point are met.
-
- 1.2.28 multiplexer timing physical interface (MTPI)
-
- The MTPI function provides the interface between an external syn-
- chronization signal and the multiplexer timing source.
-
- 1.2.29 multiplexer timing source (MTS)
-
- The MTS function provides timing reference to the relevant compo-
- nent parts of a multiplexing equipment and represents the SDH network ele-
- ment clock.
-
- 1.2.30 Network element function (NEF)
-
- See Recommendation G.784.
-
- 1.2.31 Network node interface (NNI)
-
- See Recommendation G.708.
-
- 1.2.32 out-of-frame second (OFS)
-
- An OFS is a second in which one or more out of frame events have
- occurred.
-
- 1.2.33 overhead access (OHA)
-
- The OHA function provides access to transmission overhead func-
- tions.
-
- 1.2.34 out of frame (OOF)
-
- The OOF state of an STM-N signal is one in which the position of the
- frame alignment bytes in the incoming bit stream is unknown.
-
- 1.2.35 pointer justification event (PJE)
-
- A PJE is an inversion of the I- or D-bits of the pointer, together with
- an increment or decrement of the pointer value to signify a frequency justifi-
- cation opportunity.
-
- 1.2.36 Path overhead (POH)
-
- See Recommendation G.708.
-
- 1.2.37 regenerator section (RS)
-
- A regenerator section is the part of a line system between two regen-
- erator section terminations.
-
- 1.2.38 regenerator section overhead (RSOH)
-
- The RSOH comprises rows 1 to 3 of the SOH of the STM-N signal.
-
- 1.2.39 regenerator section termination (RST)
-
- The RST function generates the RSOH in the process of forming an
- SDH frame signal and terminates the RSOH in the reverse direction.
-
- 1.2.40 section adaptation (SA)
-
- The SA function processes the AU-3/4 pointer to indicate the phase of
- the VC-3/4 POH relative to the STM-N SOH and assembles/disassembles
- the complete STM-N frame.
-
- 1.2.41 signal degrade (SD)
-
- An SD condition is one in which a signal has been degraded beyond
- prescribed limits.
-
- 1.2.42 synchronous equipment management function (SEMF)
-
- The SEMF converts performance data and implementation specific
- hardware alarms into object-oriented messages for transmission over the
- DCC(s) and/or a Q-interface. It also converts object-oriented messages
- related to other management functions for passing across the Sn reference
- points.
-
- 1.2.43 SDH physical interface (SPI)
-
- The SPI function converts an internal logic level STM-N signal into
- an STM-N line interface signal.
-
- 1.2.44 Synchronous transport module (STM)
-
- See Recommendation G.708.
-
- 1.2.45 Telecommunications management network (TMN)
-
- See Recommendation M.30.
-
- 1.2.46 Tributary unit (TU)
-
- See Recommendation G.708.
-
- 1.2.47 Virtual container (VC)
-
- See Recommendation G.708.
-
- 2 Transport terminal functions
-
- The transport terminal functions comprise SDH physical interface
- (SPI), regenerator section termination (RST), multiplex section termination
- (MST), multiplex section protection (MSP) and section adaptation (SA)
- functions as illustrated in Figure2-l/G.783. The functional description of
- each of these functions is based on this figure.
-
- FIGURE 2-1/G.783
-
-
-
- 2.1 SDH Physical Interface function (SPI)
-
- The SPI function provides the interface between the physical trans-
- mission medium at reference point A and the RST function at reference
- pointB. The interface signal at A shall be one of those specified in
- RecommendationG.707. The physical characteristics of the interface sig-
- nals are specified in RecommendationG.957 for optical media and
- RecommendationG.703 for electrical media. The information flows associ-
- ated with the SPI function are described with reference to Figure2-2/G.783.
-
- FIGURE 2-2/G.783
-
-
-
- 2.1.1 Signal flow from B to A
-
- DATA at A is fully formatted STM-N data as specified in
- RecommendationsG.707, G.708 and G.709. DATA is presented together
- with associated TIMING at B by the RST function. The SPI function condi-
- tions the DATA for transmission over a particular medium and presents it at
- A.
-
- Parameters relating to the physical status of the interface such as
- transmit fail or transmit degraded (e.g. optical output level, laser bias cur-
- rent, other media-specific indicators) shall be reported at S1. For optical
- systems, these parameters are specified in RecommendationG.958. For
- other media, these parameters are for further study.
-
- 2.1.2 Signal flow from A to B
-
- The STM-N signal at A is a similarly formatted and conditioned sig-
- nal which is degraded within specific limits by transmission over the physi-
- cal medium. The SPI function regenerates this signal to form data and
- associated timing at B. The recovered timing is also made available at refer-
- ence point T1 to the multiplexer timing source for the purpose of synchro-
- nizing the multiplexer reference clock if selected.
-
- If the STM-N signal at A fails, then the receive LOS condition is gen-
- erated and passed to reference point S1 and to the RST function at B. The
- criteria for LOS are defined in RecommendationG.958.
-
- 2.2 Regenerator Section Termination function (RST)
-
- The RST function acts as a source and sink for the regenerator section
- overhead (RSOH). A regenerator section is a maintenance entity between
- and including two RST functions. The information flows associated with the
- RST function are described with reference to Figure2-3/G.783.
-
- Note 1 û In regenerators, the A1, A2 and C1 bytes may be relayed
- (i.e. passed transparently through the regenerator) instead of being termi-
- nated and generated as described below. Refer to RecommendationG.958.
-
- Note 2 û This Recommendation is intended for the general case of an
- inter-station interface. A reduced functionality requirement for an intra-sta-
- tion interface is for further study.
-
- FIGURE 2-3/G.783
-
-
-
- 2.2.1 Signal flow from C to B
-
- DATA at C is an STM-N signal as specified in Recommendations
- G.707, G.708 and G.709, timed from the T0 reference point and having a
- valid multiplex section overhead (MSOH). However, the RSOH bytes
- (i.e.bytesA1, A2, B1, C1, E1, F1, D1 to D3 and some bytes reserved for
- national use (NU) or for future international standardization) are indetermi-
- nate in this signal. Figure2-4/G.783 shows the assignment of bytes to
- RSOH and MSOH in the SOH of an STM-N frame. RSOH bytes are set in
- accordance with Recommendation G.708 as part of the RST function to give
- a fully formatted STM-N data and associated timing at B. After all RSOH
- bytes have been set, the RST function shall scramble the STM-N signal
- before it is presented to B. Scrambling is performed according to
- RecommendationG.709, which excludes the first row of the STM-N RSOH
- (9┤Nbytes, including the A1, A2, C1 and some bytes reserved for national
- use or future international standardization) from scrambling.
-
- FIGURE 2-4/G.783
-
-
-
- Frame alignment bytes A1 and A2 (3N of each) are generated and inserted
- in the first row of the RSOH.
-
- The STM identifier bytes are placed in their respective C1 byte positions in
- the first row of the RSOH. Each is assigned a unique number to identify the
- binary value of the multi-column, interleave depth co-ordinate,
- ôCö(RecommendationG.708 refers). The C1 byte shall be set to a binary
- number corresponding to its order of appearance in the byte-interleaved
- STM-N frame. The first to appear in the frame shall be designated
- number1 (00000001). The second shall be designated number2
- (00000010), and so on. If the signal at B is an STM-1 (i.e.N=1) then the
- use of the C1 byte is optional.
-
- The error monitoring byte B1 is allocated in the STM-N for a regenerator
- section bit error monitoring function. This function shall be a bit interleaved
- parity8 (BIP-8) code using even parity as defined in
- RecommendationG.708. The BIP-8 is computed over all bits of the previ-
- ous STM-N frame at B after scrambling. The result is placed in byte B1
- position of the RSOH before scrambling.
-
- The order-wire byte E1 derived from the OHA function at reference point
- U1 is placed in byte E1 position of the RSOH. This byte shall be terminated
- at each RST function. Optionally, it provides a 64kbit/s unrestricted chan-
- nel and is reserved for voice communication between network elements.
-
- The user channel byte F1 derived from the OHA function at reference point
- U1 is placed in byte F1 position of the RSOH. It is reserved for the network
- provider (for example, for network operations). This byte shall be termi-
- nated at each RST function; however, access to the F1 byte is optional at
- regenerators. User channel specifications are for further study. Special
- usage, such as the identification of a failed section in a simple backup mode
- while the operations support system is not deployed or not working, is for
- further study. An example of such usage is given in AppendixI.
-
- The three Data communications channel bytes derived from the Message
- Communications function at reference point N are placed in bytes D1-D3
- positions of the RSOH. These bytes are allocated for data communication
- and shall be used as one 192kbit/s message-oriented channel for alarms,
- maintenance, control, monitor, administration, and other communication
- needs between RST functions. This channel is available for internally gen-
- erated, externally generated, and manufacturer specific messages. The pro-
- tocol stack used shall be as specified in RecommendationG.784.
-
- Certain RSOH bytes are presently reserved for national use or for future
- international standardization, as defined in RecommendationG.708. One or
- more of these bytes may be derived from the OHA function at reference
- point U1. The unused bytes in the first row of the STM-N signal, which are
- not scrambled for transmission, shall be set to 10101010 when not used for
- a particular purpose. No pattern is specified for the other unused bytes when
- not used for a particular purpose.
-
- If a logical all-ONEs DATA signal is received from an MST function (or an
- RST function in the case of a regenerator) at reference pointC, a multiplex
- section alarm indication signal (MS-AIS) data signal shall be applied at ref-
- erence pointB.
-
- 2.2.2 Signal flow from B to C
-
- Fully formatted and regenerated STM-N data and associated timing is
- received at B from the SPI function. The RST function recovers frame
- alignment and identifies the frame start positions in the data at C. The STM-
- N signal is first descrambled (except for the first row of the RSOH) and then
- the RSOH bytes are recovered before presenting the framed STM-N data
- and timing at C.
-
- Frame alignment is found by searching for the A1 and A2 bytes con-
- tained in the STM-N signal. The framing pattern searched for may be a sub-
- set of the A1 and A2bytes contained in the STM-N signal. The frame signal
- is continuously checked with the presumed frame start position for align-
- ment. If in the in-frame state, the maximum out-of-frame (OOF) detection
- time shall be 625╡s for a random unframed signal. The algorithm used to
- check the alignment shall be such that, under normal operation, a 10-3
- (Poisson type) error ratio will not cause a false OOF more than once per six
- minutes. If in the OOF state, the maximum frame alignment time shall be
- 250╡s for an error-free signal with no emulated framing patterns. The algo-
- rithm used to recover from OOF shall be such that the probability for false
- frame recovery with a random unframed signal is no more than 10-5 per
- 250╡s time interval.
-
- If the OOF state persists for [TBD] milliseconds, a loss of frame
- (LOF) state shall be declared. To provide for the case of intermittent OOFs,
- the integrating timer shall not be reset to zero until an in-frame condition
- persists continuously for [TBD] milliseconds. Once in a LOF state, this state
- shall be left when the in-frame state persists continuously for [TBD] milli-
- seconds.
-
- Note û Time intervals [TBD] are for further study. Values in the range
- 0 to 3 ms have been proposed.
-
- OOF events shall be reported at reference point S2 for performance
- monitoring filtering in the SEMF. A LOF condition shall be reported at ref-
- erence pointS2 for alarm filtering in the SEMF.
-
- The STM identifier C1 bytes are present in the RSOH within the
- STM-N signal; however, processing of the C1bytes is not required.
-
- The error monitoring byte B1 is recovered from the RSOH after
- descrambling and compared with the computed BIP-8 over all bits of the
- previous STM-N frame at B before descrambling. Any errors are reported at
- reference pointS2 as the number of errors within the B1byte per frame. The
- B1byte shall be monitored and recomputed at every RST function.
-
- The order-wire byte E1 is recovered from the RSOH and passed to the
- OHA function at reference point U1.
-
- The user channel byte F1 is recovered from the RSOH and passed to
- the OHA function at reference pointU1.
-
- The Data communications channel bytes D1-D3 are recovered from
- the RSOH and passed to the message communications function at reference
- pointN.
-
- One or more of the bytes for national use or future international stan-
- dardization may be recovered from the STM-N and may be passed to the
- OHA function at reference pointU1. The RST function shall be capable of
- ignoring these bytes.
-
- If loss of signal (LOS) or loss of frame (LOF) is detected, then a logi-
- cal all ONEs signal shall be applied at the data signal output at reference
- point C towards the MST function within a certain time interval which is for
- further study. Upon termination of the above failure conditions, the logical
- all ONEs signal shall be removed within a certain time interval which is for
- further study.
-
- 2.3 Multiplex section termination function (MST)
-
- The MST function acts as a source and sink for the multiplex section
- overhead (MSOH). A multiplex section is a maintenance entity between and
- including two MST functions. The information flows associated with the
- MST function are described with reference to Figure2-5/G.783.
-
- Note û This Recommendation is intended for the general case of an
- inter-station interface. A reduced functionality requirement for an intra-sta-
- tion interface is
-
- FIGURE 2-5/G.783
-
-
-
- 2.3.1 Signal flow from D to C
-
- Data at reference point D is an STM-N signal as specified in Recom-
- mendations G.707 and G.708, timed from the T0 reference point, having a
- payload constructed as in RecommendationG.709, but with indeterminate
- MSOH bytes (i.e.bytesB2, K1, K2, D4 to D12, Z1, Z2, E2, and bytes
- reserved for national use or future international standardization) and inde-
- terminate RSOH bytes. Figure2-4/G.783 shows the assignment of bytes to
- MSOH in the SOH of an STM-N frame. The MSOH bytes are set in accor-
- dance with RecommendationG.708 as part of the MST function. The result-
- ing STM-N data and associated timing are presented at C.
-
- The error monitoring byte B2 is allocated in the STM-N for a multi-
- plex section bit error monitoring function. This function shall be a bit inter-
- leaved parity (BIP-24N) code using even parity as defined in
- RecommendationG.708. The BIP-24N is computed over all bits (except
- those in the RSOH bytes) of the previous STM-N frame and placed in the
- 3┤N respective B2 byte positions of the current STM-N frame.
-
- The automatic protection switching bytes derived from the multiplex
- section protection (MSP) function at reference pointD are placed in the K1
- and K2 byte positions. Bits 6 to 8 of the K2 byte are reserved for future use
- for drop and insert and nested protection switching. Note that codes111 and
- 110 will not be assigned to bits6, 7, and 8 of K2 for protection switching
- since they are used for MS-AIS detection and MS-FERF indication.
-
- The nine data communications channel bytes issued by the message
- communications function are placed consecutively in the D4 to D12 byte
- positions. This should be considered as a single message based channel for
- alarms, maintenance, control, monitoring, administration, and other com-
- munication needs. It is available for internally generated, externally gener-
- ated, and manufacturer specific messages. The protocol stack used shall be
- in accordance with the specifications given in RecommendationG.784.
- Regenerators are not required to access this DCC. The nine DCC bytes may
- alternatively be issued by the overhead access function via the U2 reference
- point to provide a transparent data channel by using an appropriate OHA
- interface.
-
- The N┤6 spare bytes issued by the OHA function at reference point
- U2 are placed in the (3┤N) Z1 and (3┤N) Z2 byte positions. These bytes
- are reserved for future use and currently have no defined value.
-
- The order-wire byte is issued by the OHA function at reference point
- U2 and is placed in the E2 byte position. It provides an optional 64kbit/s
- unrestricted channel and is reserved for voice communications between ter-
- minal locations.
-
- Certain MSOH bytes are presently reserved for national use or for
- future international standardization, as defined in RecommendationG.708.
- One or more of these bytes may be derived from the OHA function at refer-
- ence pointU2. No patterns are specified for these bytes when they are not
- used.
-
- If a logical all ONEs data signal is received at reference point D, an
- AU path alarm indication signal (AU PATH AIS) shall be applied at the data
- signal output at reference pointC.
-
- If the signal fail (SF) defect at reference point D (see º 2.3.2) is
- detected, then MS-FERF shall be applied within 250╡s at the data signal
- output at reference pointC. MS-FERF is defined as an STM-N signal with
- the code110 in bit positions6, 7 and 8 of byteK2.
-
- 2.3.2 Signal Flow from C to D
-
- The framed STM-N data signal whose RSOH bytes have already been
- recovered in the RST function is received at reference pointC from the RST
- function together with the associated timing. The MST function recovers the
- MSOH bytes. Then the STM-N data and associated timing are presented at
- reference pointD.
-
- The 3N error monitoring B2 bytes are recovered from the MSOH. A
- BIP-24N code is computed for the STM-Nframe. The computed BIP-24N
- value for the current frame is compared with the recovered B2bytes from
- the following frame and errors are reported at reference pointS3 as number
- of errors within the B2bytes per frame for performance monitoring filtering
- in the synchronous equipment management function.
-
- The BIP-24N errors are also processed within the MST function to
- detect excessive BER and signal degrade (SD) defects.
-
- An Excessive BER defect should be detected if the equivalent BER
- exceeds a threshold of 10-3. An SD defect should be detected if the equiva-
- lent BER exceeds a preset threshold in the range of 10-5 to 10-9. Maximum
- detection time requirements for the BER calculation are listed in Table2-1/
- G.783. The SD defect should be applied at reference point D. Excessive
- BER and SD defects should be reported at reference point S3 for alarm fil-
- tering in the synchronous equipment management function.
-
- Note û The figures above and in Table 2-1/G.783 are based on a Pois-
- son distribution of errors. Studies have shown that error distributions in
- practice tend to be bursty. Derivation of BER values from BIP measure-
- ments depends on the error distribution; the relevant studies are in the prov-
- ince of Study GroupXVIII.
-
-
-
- Automatic protection switching bytes K1 and K2 are recovered from
- the MSOH at C and are passed to the MSP function at reference pointD.
-
- The multiplex section data communications channel bytes D4 to D12
- are recovered from the MSOH and are passed to the message communica-
- tions function at reference pointP. Alternatively, they may be passed to the
- overhead access function via reference pointU2.
-
- The N┤6 Spare bytes Z1 and Z2 may be recovered from the STM-N
- signal and may be passed to the OHA function at reference pointU2. These
- bytes are reserved for future use and currently have no defined value.
-
- The order-wire byte E2 is recovered from the MSOH and is passed to
- the OHA function at reference pointU2.
-
- One or more of the bytes reserved for national use or for future inter-
- national standardization may be recovered from the STM-N signal and may
- be passed to the OHA function at reference pointU2. The MST function
- shall be capable of ignoring these bytes.
-
- An MS-AIS defect shall be detected by the MST function when the
- pattern 111 is observed in bits 6, 7 and 8 of byteK2 in at least three consec-
- utive frames. Removal of the MS-AIS defect shall take place when any pat-
- tern other than the code111 in bits 6, 7 and 8 of byteK2 is received in at
- least three consecutive frames.
-
- An incoming MS-FERF defect shall be detected by the MST function
- when the pattern 110 is observed in bits6, 7 and 8 of byteK2 in at least
- three consecutive frames. Removal of MS-FERF defect shall take place
- when any pattern other than 110 in bits6, 7 and 8 of byteK2 is received in
- at least three consecutive frames.
-
- The MS-AIS and MS-FERF defects shall be reported at reference
- point S3 for alarm filtering in the synchronous equipment management
- function.
-
- If MS-AIS or Excessive BER is detected, then a logical all ONEs
- DATA signal and a signal fail condition shall be applied at reference
- pointD. It should be possible to disable the insertion of FERF at reference
- pointC and AIS at reference pointD on detection of excessive BER defect
- by a configuration command from the SEMF.
-
- 2.4 Multiplex section protection function (MSP)
-
- The MSP function provides protection for the STM-N signal against
- channel-associated failures within a multiplex section, i.e.the RST, SPI
- functions and the physical medium from one MST function where section
- overhead is inserted to the other MST function where that overhead is termi-
- nated.
-
- The MSP functions at both ends operate the same way, by monitoring
- STM-N signals for failures, evaluating the system status taking into consid-
- eration the priorities of failure conditions and of external and remote switch
- requests, and switching the appropriate channel to the protection section.
- The two MSP functions communicate with each other via a bit-oriented pro-
- tocol defined for the MSP bytes (K1 and K2 bytes in the MSOH of the pro-
- tection section). This protocol is described in ºA.1 of AnnexA, for the
- various protection switching architectures and modes defined in
- RecommendationG.782.
-
- The signal flow associated with the MSP function is described with
- reference to Figure 2-6/G.783. The MSP function receives control parame-
- ters and external switch requests at the S14 reference point from the syn-
- chronous equipment management function and outputs status indicators at
- S14 to the synchronous equipment management function, as a result of
- switch commands described in ºA.2 of AnnexA.
-
- FIGURE 2-6/G.783
-
-
-
- 2.4.1 Signal flow from E to D
-
- Data at reference point E is an STM-N signal, timed from the T0 ref-
- erence point, with indeterminate MSOH and RSOH bytes.
-
- For 1 + 1 architecture, the signal received at E from the SA function is
- bridged permanently at D to both working and protection MST functions.
-
- For 1 : n architecture, the signal received at E from each working SA
- is passed at D to its corresponding MST. The signal from an extra traffic SA
- (if provisioned) is connected to the protection MST. When a bridge is
- needed to protect a working channel, the signal at E from that working SA is
- bridged at D to the protection MST and the extra traffic channel is termi-
- nated.
-
- The K1 and K2 bytes generated according to the rules in º 1 of Annex
- A are presented at D to the protection MST.
-
- 2.4.2 Signal flow from D to E
-
- Framed STM-N signals (data) whose RSOH and MSOH bytes have
- already been recovered are presented at the reference pointD along with
- incoming timing references. The failure conditions SF and SD are also
- received at the reference pointD from all MST functions.
-
- Also, the recovered K1 and K2 bytes from the protection MST func-
- tion are presented at the reference pointD.
-
- Under normal conditions, MSP passes the data and timing from the
- working MST functions to their corresponding working SA functions at the
- reference pointE. The data and timing from the protection section is passed
- to the extra traffic SA, if provisioned in a 1:n MSP architecture, or else it is
- terminated.
-
- If a switch is to be performed, then the data and timing received from
- the protection MST at reference pointD is switched to the appropriate
- working channel SA function at E, and the signal received from the working
- MST at D is terminated.
-
- 2.4.3 Switch initiation criteria
-
- Automatic protection switching is based on the failure conditions of
- the working and protection sections. These conditions, signal fail (SF) and
- signal degrade (SD), are provided by the MST functions at reference
- pointD. Detection of these conditions is described in º2.3.
-
- The protection switch can also be initiated by switch commands
- received via the synchronous equipment management function.
-
- 2.4.4 Switching time
-
- Protection switching shall be completed within 50 ms of detection of
- an SF or SD condition that initiates a switch.
-
- 2.4.5 Switch restoral
-
- In the revertive mode of operation, the working channel shall be
- restored, i.e. the signal on the protection section shall be switched back to
- the working section, when the working section has recovered from failure.
- Restoral allows other failed working channels or an extra traffic channel to
- use the protection section.
-
- To prevent frequent operation of the protection switch due to an inter-
- mittent failure (e.g. BER fluctuating around the SD threshold), a failed sec-
- tion must become fault-free (i.e.BER less than a restoral threshold). After
- the failed section meets this criterion, a fixed period of time shall elapse
- before it is used again by a working channel. This period, called wait-to-
- restore (WTR) period should be of the order of 5-12minutes and should be
- capable of being set. An SF or SD condition shall override the WTR.
-
- 2.5 Section adaptation function (SA)
-
- This function provides adaptation of higher order paths into adminis-
- trative units (AUs), assembly and disassembly of AU groups, byte inter-
- leaved multiplexing and demultiplexing, and pointer generation,
- interpretation and processing. The signal flow associated with the SA func-
- tion is described with reference to Figure2-7/G.783.
-
- FIGURE 2-7/G.783
-
-
-
- 2.5.1 Signal flow from F to E
-
- The higher order paths at reference point F are mapped into AUs
- which are incorporated into AU groups. N such AUGs are byte interleaved
- to form an STM-N payload at the reference point E. The byte interleaving
- process shall be as specified in RecommendationG.709. The frame offset
- information is used by the PG function to generate pointers according to
- pointer generation rules in RecommendationG.709. STM-N data at E is
- synchronized to timing from the T0 reference point. If an all ONEs data sig-
- nal is applied at reference pointF (i.e.invalid frame offset due to loss of AU
- pointer), an AU path AIS shall be applied at reference pointE.
-
- 2.5.2 Signal flow from E to F
-
- STM-N payloads received at reference point E are disinterleaved and
- the VC-3/4s recovered using the AU pointers. The latter process must allow
- for the case of continuously variable frame offset which occurs when the
- received STM-N signal has been derived from a source which is plesiochro-
- nous with the local clock reference.
-
- The PP function provides accommodation for wander and plesiochro-
- nous offset in the received signal with respect to the multiplexer timing ref-
- erence. This function may be null in some applications where the timing
- reference is derived from the incoming STM-N signal, i.e.loop timing.
-
- The PP function can be modelled as a data buffer which is being writ-
- ten with data, timed from the received VC clock, and read by a VC clock
- derived from reference pointT0. When the write clock rate exceeds the read
- clock rate the buffer gradually fills and vice-versa. Upper and lower buffer
- occupancy thresholds determine when pointer adjustment should take place.
- The buffer is required to reduce the frequency of pointer adjustments in a
- network. When the data in the buffer rises above the upper threshold for a
- particular VC, the associated frame offset is decremented by one byte for a
- VC-3 or three bytes for a VC-4, and the corresponding number of bytes are
- read from the buffer. When the data in the buffer falls below the lower
- threshold for a particular VC, the associated frame offset is incremented by
- one byte for a VC-3 or three bytes for a VC-4 and the corresponding number
- of read opportunities are cancelled. The pointer hysteresis threshold spacing
- allocation is specified in º7.1.4.1.
-
- The mechanism of pointer processing is illustrated as a flow chart in
- Figure 2-8/G.783.
-
- The algorithm for pointer detection is defined in Annex B/G.783. Two
- failure conditions can be detected by the pointer interpreter:
-
- û loss of pointer (LOP),
-
- û AU Path AIS.
-
- If either or both of these failure conditions are detected then a logical
- all ONEs signal shall be applied at reference pointF. These defects shall be
- reported at reference point S4 for alarm filtering at the synchronous equip-
- ment management function. Pointer justification events (PJE) are also
- reported at reference pointS4 for performance monitoring filtering. PJEs
- need only be reported for one selected AU-3/4 out of an STM-N signal.
-
- It should be noted that a mismatch between provisioned and received
- AU type will result in a LOP failure condition.
-
- 3 Higher order path functions
-
- Higher order paths have been defined according to two types of vir-
- tual container (VC-3 and VC-4). These VCs can be created in two ways:
-
- i) by direct mappings in AUs (direct mappings are defined for 3rd and
- 4th level signals and the locked mode level1 mappings are also
- direct);
-
- ii) by mapping of lower level signals into TUs which are then mapped
- into AUs.
-
- These possibilities are illustrated in Figure 2-1/G.783.
-
- 3.1 Higher order Path Connection function (HPC-n)
-
- HPC-n is the function which assigns assembled higher order VCs of
- level n (n = 3 or 4) to available VC-n capacity on a multiplex section. The
- inclusion of the HPC-n function constitutes a significant functional differ-
- ence among multiplexer types illustrated in Figures3-1/G.782 to 3-7/G.782.
-
- Figure 3-1/G.783 illustrates reference points associated with the
- HPC-n. VC-ns coming from reference pointG are assigned to available VC-
- n capacity at reference point F. Conversely, the VC-ns coming from refer-
- ence pointF are assigned to available VC-n capacity at reference pointG.
- The signal format at reference pointsG and F are thus similar, differing only
- in the logical sequence of VC-ns.
-
- FIGURE 2-8/G.783
-
-
-
- FIGURE 3-1/G.783
-
-
-
- The assignment of VC-ns at reference point G to VC-n capacities at refer-
- ence point F and vice versa is defined as the connection pattern which can
- be described by a two column connection matrix CM (Vi, Vj), where Vi
- identifies the i-thVC channel at reference point F and Vj identifies the j-
- thVC channel at reference pointG. For some connection patterns Vj is fur-
- ther identified by parameters k and l indicating the k-thport in l tributary
- ports. The multiplexer types are described below in terms of the CM.
-
- At reference point S5 the following primitives are possible:
-
- û Set matrix, which causes a particular port assignment to be made
- according to the connection matrix (CM) (from SEMF to HPC-n).
-
- û Request CM report (from SEMF to HPC-n).
-
- û Report CM (to SEMF from HPC-n).
-
- A clock signal is provided to HPC-n at reference point T0 from
- theMTS.
-
- Depending on the multiplexer type, there may be a degree of flexibil-
- ity in the connection pattern which can be exercised when HPC-n is config-
- ured. Thus, various multiplexers will have various constraints in the
- parameters i, j, k, l of the connection matrix described above. Multiplexer
- typesI, II, and IV assume HPC-n is null. Multiplexer typesIIa and III
- assume a configurable connection pattern. The functions of the HPC-n are
- described below in terms of signal flow and multiplexer types.
-
- 3.1.1 Signal flow from G to F
-
- HPC-n assigns assembled higher order VC-ns coming from reference
- pointG to available VC-n capacity at reference pointF. This assignment is
- based on the connection pattern (fixed or configurable) established.
-
- 3.1.2 Signal flow from F to G
-
- This is similar to the one described in º 3.1.1 above.
-
- 3.1.3 HPC-n for multiplexer types IIIa and IIIb
-
- This multiplexer performs an add and drop function as illustrated in
- Figures 3-5/G.782, 3-6/G.782 and 3-2/G.783.
-
- FIGURE 3-2/G.783
-
-
-
- Signals at FW and FE reference points support a VC-n capacity equivalent
- to the STM-N aggregate signal of the multiplexer. The add/drop ports GW1-
- GWn and GE1-GEm generally support lower VC-n capacity.
-
- In the general case of a type IIIa/b add/drop multiplexer a cross-connect
- function will be performed where any of the Vi channels at FW and FE can
- be dropped to any of the Vj channels at GW1-GWn or GE1-GEm.
-
- A specific example of a type IIIa/b multiplexer is one where, in the connec-
- tion matrix CM (Vi, Vj), Vi identifies one of the VC-n channels at FW and
- FE and Vj identifies one of the VC-n channels at GW1-GWn and
- GE1-GEm. This implies that Vi at FW is dropped to Vj at GW1-GWn and
- Vi at FE is dropped to Vj at GE1-GEm. All the Vi channels at FW which are
- not dropped are passed through to the corresponding Vi channels at FE. The
- number of rows in CM (Vi, Vj) is the same as the number of VC-n channels
- dropped.
-
- 3.1.4 HPC-n for multiplexer types Ia and IIa
-
- These multiplexers perform a consolidation function as illustrated in
- Figures 3-2/G.782, 3-4/G.782 and 3-3/G.783.
-
- FIGURE 3-3/G.783
-
-
-
- The signal at reference point F supports a VC-n capacity equivalent to the
- STM-M aggregate signal of the multiplexer. The multiplexer portsG1 to Gl
- each support a VC-n equivalent to STM-N where M>N. The total capacity
- at G1 to Gl shall not exceed the capacity at F.
-
- In the connection matrix CM (Vi, Vjk) for this multiplexer, Vi identifies one
- of the VC-n channels at F and Vjk identifies the j-thVC-n channel at Gk
- (k=1, - - - l). This requires that a particular VC-n channel Vjk at G is con-
- nected to a particular channel Vi at F.
-
- 3.1.5 HPC-n for multiplexer types I, II, and IV
-
- These multiplexers perform a terminal multiplexer function as illus-
- trated in Figures 3-1/G.782, 3-3/G.782, 3-7/G.782 and 3-4/G.783.
-
- The signal at reference point F supports a VC-n capacity equivalent to
- the STM-M or STM-N at the aggregate port of the multiplexer. The total
- capacity at G is the same as that at F.
-
- The HPC-n is a null function where Vi = Vj for all values of i and j;
- i.e. a fixed connection pattern exists between the assembled VCs at G and F.
-
- FIGURE 3-4/G/783
-
-
-
- 3.2 Higher order path termination function (HPT-n)
-
- This function acts as a source and sink for the higher order path over-
- head (VC-n POH, n = 3,4). A higher order path is a maintenance entity
- defined between two higher order path terminations. The information flows
- associated with the HPT-n function are described with reference to
- Figures2-1/G.783 and3-5/G.783.
-
- FIGURE 3-5/G/783
-
-
-
- The timing signal is provided from the MTS at the T0 reference point.
-
- 3.2.1 Signal flow from G to H
-
- Data at G is a VC-n (n = 3,4), having a payload as described in Rec-
- ommendations G.708 and G.709, with complete VC-3/4 POH (bytesJ1, B3,
- C2, G1, F2, H4, Z3, Z4, Z5). These POH bytes are recovered as part of the
- HPT-n function and the VC-n is forwarded to reference pointH.
-
- Bytes J1, G1 and C2 are recovered from the VC-n POH at G and the
- corresponding information on path trace, path status and signal label are
- passed via reference pointS6 to the synchronous equipment management
- function.
-
- The G1 byte is illustrated in Recommendation G.709. FEBE informa-
- tion is decoded from bits 1 to 4 of the G1 byte and reported as path termina-
- tion error report at S6. The path FERF information in bit 5 of the G1byte is
- recovered and reported as remote alarm indication at S6.
-
- In the case of payloads requiring multiframe alignment, a multiframe
- indicator is derived from the H4 byte. The received H4 value is compared to
- the next expected value in the multiframe sequence. The H4 value is
- assumed to be in phase when it is coincident with the expected value. If sev-
- eral H4 values are received consecutively not as expected but correctly in
- sequence with a different part of the multiframe sequence, then subsequent
- H4 values shall be expected to follow this new alignment. If several H4 val-
- ues are received consecutively not correctly in sequence with any part of the
- multiframe sequence then a loss of multiframe (LOM) event shall be
- reported at S6. When several H4 values have been received consecutively
- correctly in sequence with part of the multiframe sequence, then the event
- shall be ceased and subsequent H4 values shall be expected to follow the
- new alignment.
-
- Note û The meaning of ôseveralö is that the number should be low
- enough to avoid excessive delay in re-framing but high enough to avoid re-
- framing due to errors; a value in the range 2 to 10 is suggested.
-
- The error monitoring byte B3 is recovered from the VC-n frame. BIP-
- 8 is computed for the VC-n frame. The computed BIP-8 value for the cur-
- rent frame is compared with the recovered B3byte from the following
- frame and errors are reported at reference point S6 as number of errors
- within the B3byte per frame for performance monitoring filtering in the
- synchronous equipment management function.
-
- One byte per frame is allocated for user communication purposes. It is
- derived from the F2 byte and passed via reference pointU3 to the overhead
- access function.
-
- The three bytes Z3, Z4 and Z5 are reserved for future use. Currently
- they have no defined value at G.
-
- 3.2.2 Signal flow from H to G
-
- Data at H is a VC-n (n = 3,4), having a payload as described in Rec-
- ommendations G.708 and G.709, but with indeterminate VC-3/4 POH
- (bytesJ1, B3, C2, G1, F2, H4, Z3, Z4, Z5). These POH bytes are set as part
- of the HPT-n function and the complete VC-n is forwarded to G.
-
- Path trace, path status and signal label information, derived from ref-
- erence point S6 are placed in J1, G1 and C2 byte positions respectively.
-
- If the path termination error report indicates an errored block, then the
- FEBE (bits 1 to 4 of the G1 byte) are encoded according to Figure4-2/
- G.709. If AU path AIS at G is reported, then a path FERF indication should
- be sent in bit5 of the G1byte.
-
- Bit interleaved parity (BIP-8) is computed over all bits of the previous
- VC-n and placed in B3 byte position.
-
- A multiframe indicator is generated as described in Recommendation
- G.709 and placed in the H4 byte position.
-
- One byte per frame is allocated for user communication purposes. It is
- derived from reference point U3 and placed in the F2byte position.
-
- The three bytes Z3, Z4 and Z5 are reserved for future use. Currently
- they have no defined value at G.
-
- 3.3 Higher order path adaptation function (HPA-m/n)
-
- HPA-m/n (m =1, 2 or 3; n = 3 or 4) defines the TU pointer processing.
- It may be divided into three functions:
-
- û pointer generation;
-
- û pointer interpretation;
-
- û frequency justification.
-
- The format for TU pointers, their roles for processing, and mappings
- of VCs are described in RecommendationG.709.
-
- Figure 3-6/G.783 illustrates the HPA-m/n function.
-
- FIGURE 3-6/G.783
-
-
-
- 3.3.1 Signal flow from J to H
-
- The HPA-m/n function assembles VCs of lower order m (m = 11, 12,
- 2, 3) as TU-m into VCs of higher order n (n = 3 or 4).
-
- The frame offset in bytes between a lower order VC and higher order
- VC is indicated by a TU pointer which is assigned to that particular lower
- orderVC. The method of pointer generation is described in
- RecommendationG.709.
-
- 3.3.2 Signal flow from H to J
-
- The HPA-m/4 function disassembles VC-4 into VCs of lower order m
- (m=11,12,2, 3). HPA-m/3 disassembles VC-3 into VCs of lower order m
- (m=11,12, 2). The TU pointer of each lower order VC is decoded to pro-
- vide information about the frame offset in bytes between the higher order
- VC and the individual lower order VCs. The method of pointer interpreta-
- tion is described in RecommendationG.709. This process must allow for
- continuous pointer adjustments when the clock frequency of the node where
- the TU was assembled is different from the local clock reference. The fre-
- quency difference between these clocks affects the required size of the data
- buffer whose function is described below.
-
- The PP function can be modelled as a data buffer which is being writ-
- ten with data, timed from the received VC clock, and read by a VC clock
- derived from reference point T0. When the write clock rate exceeds the read
- clock rate the buffer gradually fills and vice versa. Upper and lower buffer
- occupancy thresholds determine when pointer adjustment should take place.
- The buffer is required to reduce the frequency of pointer adjustments in a
- network. When the data in the buffer rises above the upper threshold for a
- particular VC, the associated frame offset is decremented by one byte and
- an extra byte is read from the buffer. When the data in the buffer falls below
- the lower threshold for a particular VC, the associated frame offset is incre-
- mented by one byte and one read opportunity is cancelled. The threshold
- spacing is for further study.
-
- The algorithm for pointer detection is defined in Annex B. Two fail-
- ure conditions can be detected by the pointer interpreter:
-
- û loss of pointer (LOP),
-
- û TU path AIS.
-
- If either or both of these failure conditions are detected then a logical
- all ONEs signal shall be applied at reference pointJ. These defects shall be
- reported at reference pointS7 for alarm filtering at the synchronous equip-
- ment management function. Pointer justification events (PJE) shall be
- reported at reference point S7 for performance monitoring filtering. PJEs
- need only be reported for one selected TU-1/2/3 out of an STM-N signal
- and only if PJEs are not reported at the AU level.
-
- It should be noted that a mismatch between provisioned and received
- TU type will result in a Loss of Pointer (LOP) defect. LOP is reported to the
- Synchronous Equipment Management function through the S7 reference
- point. Pointer hysteresis threshold spacing allocation is specified in
- º7.1.4.2.
-
- 4 Lower order path functions
-
- Recommendations G.708 and G.709 define five basic path capacities
- corresponding to RecommendationG.702 digital hierarchy levels and
- denoted by indices11, 12, 2, 3 and 4. In addition, the concatenation function
- which is defined for level 2 makes possible the creation of 21 new path
- capacities. User signals are adapted to form containers which are then allo-
- cated to higher order paths. The functions involved in path creation and
- assignment are described in this section.
-
- Note û A VC-3 path can be a lower order or a higher order path,
- depending on its application. When VC-1s or VC-2s are multiplexed into a
- VC-3, the VC-3 constitutes a higher order path; when a VC-3 is multiplexed
- into a VC-4, it constitutes a lower order path.
-
- 4.1 Lower order path connection function (LPC-m)
-
- LPC-m is the function which assigns VCs of level m (m = 1, 2 or 3) to
- available VC-m capacity in higher order paths. There is no LPC-m function
- in multiplexer typesII, IIa and IV and the LPC-m function in typeI multi-
- plexer is null. The LPC-m function in multiplexer typeIII is defined to
- allow add/drop operations between tributaries and one or both aggregate
- ports in support of bus and ring network topologies.
-
- Figure 4-1/G.783 illustrates reference points associated with the LPC-
- m. VC-ms coming from reference pointK are assigned to available VC-m
- capacity at reference pointJ and vice versa. The signal format at reference
- pointsK and J are thus similar, differing only in the logical sequence ofVC-
- ms.
-
- FIGURE 4-1/G.783
-
-
-
- The assignment of VC-ms at reference point K to VC-m capacities at refer-
- ence point J and vice-versa is defined as the connection pattern which can
- be described by a two column connection matrix CM (Vi, Vj), where Vi
- identifies the i-thVC channel at reference pointJ and Vj identifies the j-
- thVC channel at reference pointK. The multiplexer types are described
- below in terms of the CM.
-
- At reference point S8 the following primitives are possible:
-
- û Set matrix, which causes a particular port assignment to be made
- according to the connection matrix (CM) (from SEMF to LPC-m)
-
- û Request CM report (from SEMF to LPC-m)
-
- û Report CM (to SEMF from LPC-m).
-
- A clock signal is provided to LPC-m at reference point T0 from
- theMTS.
-
- Depending on the multiplexer type, there may be a degree of flexibil-
- ity in the connection pattern which can be exercised when LPC-m is config-
- ured. Thus, various multiplexers will have various constraints in the
- parametersi, j of the connection matrix described above.
-
- 4.1.1 Signal flow from K to J
-
- LPC-m assigns assembled VC-ms coming from reference point K to
- available VC-m capacity at reference pointJ. This assignment is based on
- the connection pattern (fixed or configurable) established.
-
- 4.1.2 Signal flow from J to K
-
- This is similar to the one described in º 4.1.1.
-
- 4.1.3 Connection matrix for multiplexer type III
-
- The connection matrix is illustrated in Figure 4-2/G.783. The signals
- at reference points J West and J East each support a VC-m capacity equiva-
- lent to the higher order paths which have to be accessed. The signal at refer-
- ence pointK supports a similar or lower capacity. The connection function
- allows VC-ns to be dropped from and inserted into JEast and JWest to and
- from reference pointK without rearranging the through traffic. The connec-
- tion pattern can be described by the matrix (Vj, Vij) where Vj identifies the
- j-thVC-n channel at K and the Vij represents the j-thchannel at reference
- point J West if i =1, the j-th channel at reference point J East if i=2 and the
- j-th channel at JEast and/or JWest if i=3; i.e. in the direction from K to
- JEast/JWest, transmission is on both channels while in the direction from J
- East/JWest to K, the JEast or JWest channel is selected.
-
- Note û The mode of operation selected when i = 3 enables type III
- multiplexers to operate in a ring configuration with path layer protection
- provided by the alternative route and without intervention from higher layer
- functions.
-
- FIGURE 4-2/G.783
-
-
-
- 4.2 Lower order path termination function (LPT-m)
-
- The LPT-m function creates a VC-m (m = 1, 2, or 3) by generating and add-
- ing POH to a container C-m. In the other direction of transmission it termi-
- nates and processes the POH to determine the status of the defined path
- attributes. The POH formats are defined in RecommendationsG.708
- andG.709. The information flows associated with the LPT function are
- described in Figure4-3/G.783.
-
- FIGURE 4-3/G.783
-
-
-
- Referring to Figure 2-1/G.783, Data at L takes the form of a container C-m
- (m = 1,2,3) which is synchronized to the timing reference T0.
-
- Synchronously adapted information in the form of synchronous containers
- (data) and the associated container frame offset information (frame offset)
- are received at reference point L. POH is added to form data which together
- with the frame offset is passed to reference pointK.
-
- 4.2.1 Path OH at levels 1 and 2
-
- The VC-1/VC-2 POH is carried in the V5 byte as defined in Recom-
- mendation G.709.
-
- 4.2.1.1 Signal flow from K to L
-
- If TU Path AIS is received at K then path AIS condition shall be
- reported at S9 (TU path AIS detection is described in º3.3) and the all
- ONEs data signal shall be presented at data (L). Additionally, a path FERF
- indication shall be sent in bit 8 of V5 in the data in the reverse direction.
-
- Bits 5, 6 and 7 of V5 at K shall be detected and reported as signal
- label at S9.
-
- The error monitoring bits 1 and 2 of V5 at K shall be recovered. BIP-
- 2 is computed for the VC-n frame. The computed BIP-2 value for the cur-
- rent frame is compared with the recovered bits1 and2 from the following
- frame and the number of errors (0, 1 or 2) in the block shall be reported as
- path termination error report at S9. (Excessive error ratio detection is for
- further study.)
-
- FEBE in bit 3 shall be recovered and reported at S9.
-
- The path FERF information in bit 8 shall be recovered and reported as
- remote alarm indication atS9.
-
- Bit 4 is unused. The receiver must be capable of ignoring the value of
- this bit.
-
- 4.2.1.2 Signal flow from L to K
-
- The signal label presented at S9 shall be inserted in bits 5, 6 and 7 in
- the V5 byte.
-
- BIP-2 shall be calculated on data at L on the previous frame or multi-
- frame and the result transmitted in bits 1 and 2 of the V5byte.
-
- If the path termination error report indicates an errored block then
- FEBE bit (3) shall be set to 1 in the next frame.
-
- 4.2.2 Path overhead at level 3
-
- The VC-m path overhead (for m = 3) is the same as the path overhead
- for VC-n (n = 3) and is described inº3.2.
-
- 4.3 Lower order path adaptation functions (LPA-m/n)
-
- LPA operates at the access port to a synchronous network or subnet-
- work and adapts user data for transport in the synchronous domain. For
- asynchronous user data, lower order path adaptation involves bit justifica-
- tion. The LPA-n function directly maps G.703 signals into a higher order
- container (n=3 or 4). The LPA-m function maps G.703 signals into lower
- order containers which may subsequently be mapped into higher order con-
- tainers (m=11, 12, 2, 3). The information flows associated with the LPA
- function are shown in Figure4-4/G.783.
-
- (Note û Primary rate signals can be mapped directly into higher order
- paths using the locked mode mappings:)
-
- FIGURE 4-4/G.783
-
-
-
- LPA functions are defined for each of the levels in the existing plesiochro-
- nous hierarchies. Each LPA function defines the manner in which a user sig-
- nal can be mapped into one of a range of synchronous containers C of
- appropriate size. The container sizes have been chosen for ease of mapping
- various combinations of sizes into high order containers; see Table4-2/
- G.783. Detailed specifications for mapping user data into containers are
- given in RecommendationG.709.
-
- The LPA type is reported on request to the SEMF through the S10 reference
- point.
-
-
-
- 4.3.1 Direction M to L or H
-
- DATA at M is the user information stream delivered by the PI func-
- tion. Timing of the data is also delivered as timing at M by the PI function.
- Data is adapted according to one of the LPA functions referred to above.
- This involves synchronization and mapping of the information stream into a
- container as described in RecommendationG.709.
-
- The container is passed to the reference point L (or H in the case of
- direct mapping) as data together with frame offset which represents the off-
- set of the container frame with respect to reference pointT0. In byte syn-
- chronous mappings, the frame offset is obtained from the associated framer.
- In other mappings, a convenient fixed offset can be generated internally.
-
- Mapping of overhead and maintenance information from byte syn-
- chronously mapped G.703 signals is for further study.
-
- Frame alignment loss (FAL) is reported to the synchronous equipment
- management function through the S10 reference point (byte sync mapping
- only). The strategy for FAL detection/indication is described in
- RecommendationG.706.
-
- 4.3.2 Direction L or H to M
-
- The information stream data at L (or H in the case of direct mapping)
- is presented as a container together with frame offset. The user information
- stream is recovered from the container together with the associated clock
- suitable for tributary line timing and passed to the reference pointM as data
- (M) and timing (M). This involves de-mapping and desynchronizing as
- described in RecommendationG.709.
-
- Note û Other signals may be required from L to generate overhead
- and maintenance information for byte-synchronously mapped G.703 sig-
- nals. This is for further study.
-
- When path AIS is reported through S10, the LPA function shall gener-
- ate AIS in accordance with the relevant G.700-Series Recommendations.
-
- 4.4 Physical interface (PI) function
-
- This function provides the interface between the multiplexer and the
- physical medium carrying a tributary signal which may have any of the
- physical characteristics of those described in RecommendationG.703 and
- in some cases the signal structure in RecommendationG.704. The informa-
- tion flows for the PI function are described with reference to Figure4-5/
- G.783.
-
- FIGURE 4-5/G.783
-
-
-
- 4.4.1 Signal flow from M to tributary interface
-
- The functions performed by the PI are encoding and adaptation to the
- physical medium.
-
- The PI function takes data and timing at M to form the transmit tribu-
- tary signal. The PI passes the data and timing information to the tributary
- interface transparently.
-
- 4.4.2 Signal flow from tributary interface to M
-
- The PI function extracts timing from the received tributary signal and
- regenerates the data. After decoding, it passes the data and timing informa-
- tion to reference pointM. The timing may also be provided at reference
- point T2 for possible use as a reference in the MTS.
-
- In the event of loss of signal (LOS) at the tributary input, AIS in the
- form of all ONEs is transmitted on data at M accompanied by a suitable ref-
- erence timing signal. LOS is reported at reference pointS11.
-
- 5 Synchronous equipment management function
-
- The synchronous equipment management function (SEMF) provides
- the means through which the synchronous network element function (NEF)
- is managed by an internal or external manager. If a network element (NE)
- contains an internal manager, this manager will be part of the SEMF.
-
- The SEMF interacts with the other functional blocks by exchanging
- information across the Sn reference points. The SEMF contains a number of
- filters that provide a data reduction mechanism on the information received
- across the Sn reference points. The filter outputs are available to the agent
- via managed objects which represent this information. The managed objects
- also present other management information to and from the agent.
-
- Managed objects provide event processing and storage and represent
- the information in a uniform manner. The agent converts this information to
- CMISE (Common Management Information Service Element) messages
- and responds to CMISE messages from the manager performing the appro-
- priate operations on the managed objects.
-
- This information to and from the agent is passed across the V refer-
- ence point to the message communications function (MCF).
-
- The event processing and storage provided by the managed objects is
- described in Recommendation G.784 including the filtering and threshold-
- ing of performance and failure information.
-
- In the subsequent sections on the SEMF only the information flowing
- across the Sn reference points and the three filters shown in Figure5-1/
- G.783 is described.
-
- FIGURE 5-1/G/783
-
-
-
- 5.1 Information flow across the Sn reference points
-
- The information flows described in this section are functional. The
- existence of these information flows in the equipment will depend on the
- options selected at the external interfaces to the equipment, in particular, the
- options selected by the TMN.
-
- The information that arises from anomalies and defects detected in the
- functional blocks is summarized in Tables5-1/G.783 to 5-11/G.783. For
- ease of reference these tables also show the consequent actions that are
- described in the sections on the individual functional blocks.
-
- Table 5-12/G.783 summarizes the configuration and provisioning
- information that is passed across the S reference points. The information
- listed under ôSetö in this table refers to configuration and provisioning data
- that is passed from the SEMF to the other functional blocks. The informa-
- tion listed under ôGetö refers to status reports made in response to a request
- from the SEMF for such information.
-
- As an example we may consider the higher order path trace. The
- higher order path termination may be provisioned for the HO path trace that
- it should expect by a Set_Rx_HO_path_trace_ID command received from
- the manager. If the HO path trace that is received does not match the
- expected HO path trace this will give rise to a report of a mismatch of the
- HO path trace across the S6 reference point. Having received this mismatch
- indication, the relevant managed object may then decide to request a report
- of the HO path trace ID that has been received by a Get_Rx_HO_ path_tra-
- ce_ID.
-
- 5.2 Filter functions
-
- Note û Fixed one second filter processing of the information is con-
- sidered satisfactory for the purpose of network surveillance and fault identi-
- fication and sectionalization. This does not preclude the additional use of
- other filter processing techniques for detailed performance or fault charac-
- terization where it is demonstrated that these provide significant additional
- information on the nature of errored events. If an alternative filter technique
- is used, it should be in addition to the fixed one second filter.
-
- The filtering functions provide a data reduction mechanism on the
- anomalies and defects presented at the S reference points. Three types of fil-
- ters can be distinguished:
-
- 5.2.1 One second filters
-
- The one second filters perform a simple integration of reported anom-
- alies by counting during a one second interval. At the end of each one sec-
- ond interval the contents of the counters may be obtained by the relevant
- managed objects. The following counter outputs will be provided:
-
- û regenerator section (B1) errors,
-
- û regenerator section out of frame (OOF) events,
-
- û multiplex section (B2) errors,
-
- û HO path (B3) errors,
-
- û path errors (B3/V5),
-
- û HO path far end block errors (G1),
-
- û path far end block errors (G1/V5),
-
- û AU justification events (for further study),
-
- û TU justification events (for further study).
-
- 5.2.2 Defect filter
-
- The defect filter will provide a persistency check on the defects that
- are reported across the S reference points. Since all of the defects will
- appear at the input of this filter it may provide correlation to reduce the
- amount of information offered as failure indications to the agent. The fol-
- lowing failure indications will be provided:
-
- û loss of signal,
-
- û loss of frame,
-
- û loss of AU pointer,
-
- û loss of TU pointer,
-
- û multiplex section AIS,
-
- û HO path AIS,
-
- û path AIS,
-
- û far-end receive failure,
-
- û HO path FERF,
-
- û path FERF, etc. (as listed in Tables 5-1/G.783 to 5-11/G.783 in the
- ôanomalies and defectsö column).
-
- In addition to the transmission failures listed above, equipment fail-
- ures are also reported at the output of the defect filter for further processing
- by the agent.
-
- 5.2.3 ES, SES filter
-
- The ES, SES filter processes the information available from the one
- second and the defect filter to derive errored seconds and severely errored
- seconds that are reported to the agent.
-
- ES and SES information will be made available for all the parameters
- listed in º 5.2.1 above, except justification events. In addition, information
- will be provided on out of frame (OOF) seconds; an OOF second is defined
- as a second in which one or more out of frame events have occurred.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6 Timing functions
-
- 6.1 Multiplexer timing source function
-
- This function provides timing reference to the following functional
- blocks: LPA, LPT, LPC, HPA, HPT, HPC, SA, MSP, MST, and RST. The
- multiplexer timing source (MTS) function represents the SDH network ele-
- ment clock. The MTS function includes an internal oscillator function and
- multiplexer timing generator (MTG) function. The information flows asso-
- ciated with the MTS function are described with reference to Figure6-1/
- G.783.
-
- The synchronization source may be selected from any of the reference
- points T1, T2, T3 or the internal oscillator. When the MTS is synchronized
- to a signal carrying a network frequency reference standard the short-term
- stability requirements at the T reference points are specified in Figure6-2/
- G.783.
-
- FIGURE 6-1/G.783
-
-
-
- FIGURE 6-2/G/783
-
-
-
- The MTG function filters the selected timing reference to ensure that the
- timing requirements at the T reference points are met. Additionally the
- MTG filtering function must filter the step change in frequency caused by a
- change in reference source so that the rate of change of frequency at the T
- reference points does not exceed x Hz/s; the value of x is for further study.
- This applies to the following three cases:
-
- û change from one reference source to another;
-
- û change from reference source to the internal oscillator;
-
- û change from the internal oscillator to a reference source.
-
- In practice, the last change will be the worst case.
-
- The long- and short-term stability of the internal oscillator function is
- for further study.
-
- Note 1 û The maximum rate of change of frequency must be tracked
- by the desynchronizer at the SDH/PDH boundary. This will put an upper
- bound on the rate for practical desynchronizer designs.
-
- Note 2 û Desynchronizers must be designed to allow for maximum
- frequency offset of the internal oscillator. This may set an upper bound on
- its stability for some desynchronizer designs.
-
- The overall quality requirements of the MTS are in the province
- ofStudy GroupXVIII.
-
- 6.2 Multiplexer timing physical interface (MTPI) function
-
- This function provides the interface between the external synchroni-
- zation signal and the multiplexer timing source and shall have, at the syn-
- chronization interface port, the physical characteristics of one of the G.703
- synchronization interfaces. (See Figure6-3/G.783.)
-
- FIGURE 6-3/G.783
-
-
-
- 6.2.1 Signal flow from MTS to synchronization interface
-
- This signal flow only exists if the MTS can provide external synchro-
- nization.
-
- The functions performed by the MTPI are encoding and adaptation to
- the physical medium.
-
- The MTPI function takes timing from the MTS to form the transmit
- synchronization signal. The MTPI passes the timing information to the syn-
- chronization interface transparently.
-
- 6.2.2 Signal flow from synchronization interface to MTS
-
- The MTPI function extracts timing from the received synchronization
- signal. After decoding, it passes timing information to the MTS.
-
- 7 Specification of jitter and wander
-
- SDH jitter and wander is specified at both STM-N and G.703 inter-
- faces. The SDH multiplex equipment's jitter and wander characteristics at
- such interfaces may be categorized in terms of whether:
-
- û its jitter and wander performance is governed exclusively by the
- input timing extraction circuitry;
-
- û tributary bit justification is performed in addition to input timing
- extraction;
-
- û phase smoothing of pointer justifications is performed as well as
- tributary bit justification and input timing extraction.
-
- In addition, the wander encoded in both the AU and TU pointer
- adjustments is specified. (This determines the statistics of occurrence of
- pointer adjustments.)
-
- 7.1 STM-N interfaces
-
- 7.1.1 Input jitter and wander accommodation
-
- Jitter present on the STM-N signal must be accommodated by the
- SPI. The detailed parameters and limits are given in
- RecommendationG.958.
-
- The STM-N signal may be used to synchronize the multiplexer timing
- source (MTS), which must be able to accommodate the maximum absolute
- jitter and wander present on the STM-N signal. This will be primarily
- affected by wander, and can be specified in terms of maximum time interval
- error (MTIE), together with its first and second derivatives with respect to
- time. The detailed parameters and limits are for further study.
-
- 7.1.2 Output jitter and wander generation
-
- The output jitter and wander must meet the short-term stability
- requirements given in Figure 6-2/G.783.
-
- When the multiplexer timing source is used, the output jitter and wan-
- der depends on the inherent properties of the multiplexer timing generator
- as well as the properties of the synchronization input.
-
- When the equipment is loop-timed, the output jitter and wander
- depends on the incoming jitter and wander as filtered by the jitter and wan-
- der transfer characteristics described in º7.1.3.
-
- Further requirements for wander can be specified in terms of MTIE,
- together with its first and second derivatives with respect to time. The spec-
- ification of output jitter depends on the demarcation between jitter and wan-
- der. The output jitter should be less than or equal to 0.01UI rms as
- measured in a 12kHz high pass filter. A second output jitter requirement as
- measured in a lower frequency high pass filter is for further study. The mea-
- surement technique needs to be specified.
-
- 7.1.3 Jitter and wander transfer
-
- The jitter and wander transfer is dependent on whether the equipment
- is synchronized and the manner in which it is synchronized.
-
- When the equipment is not synchronized, the jitter and wander trans-
- fer characteristics have no meaning as the output jitter and wander is deter-
- mined solely by the internal oscillator.
-
- When the equipment is synchronized, the jitter and wander transfer
- characteristics are determined by the filtering characteristics of the multi-
- plexer timing generator (MTG). These filtering characteristics may vary
- depending on whether the equipment is loop timed or uses a multiplexer
- timing source. Figure7-1/G.783 provides a block diagram of timing func-
- tions for multiplex equipment using loop timing.
-
- The jitter transfer characteristics (specifically, the ratio of the output
- jitter to the applied input jitter as a function of frequency) can be tested
- using sinusoidal input jitter. It should be noted that this may not adequately
- test some non-linear timing generator implementations. The introduction of
- some new tests based on broad-band jitter may help to characterize such
- implementations.
-
- Detailed specifications are for further study.
-
- FIGURE 7-1/G.783
-
-
-
- 7.1.4 Transfer of wander encoded in AU and TU pointer adjustments
-
- The transfer of wander encoded in the AU and TU pointer adjust-
- ments is controlled by the AU and TU pointer processors, respectively.
- Wander is affected by the difference between the incoming phase and the fill
- within the pointer processor buffer. The larger the buffer spacing, the less
- likely that incoming pointer adjustments will result in outgoing pointer
- adjustments.
-
- 7.1.4.1 AU pointer processor buffer threshold spacing
-
- The MTIE of the higher order VC with respect to the clock generating
- the STM-N frame is quantized and encoded in the AU pointer. When a
- higher-order VC is transferred from an STM-N to another STM-N derived
- from a different clock, the AU pointer must be processed. The pointer is
- first decoded to derive the frame phase and a clock to write to the AU
- pointer processor buffer. The read clock from the buffer is derived from the
- multiplexer timing source. The buffer fill is monitored and when upper or
- lower thresholds are crossed, the frame phase is adjusted.
-
- The allocation in the pointer processor buffer for pointer hysteresis
- threshold spacing should be at least 12bytes for AU-4 and at least 4bytes
- for AU-3 (corresponding to maximum relative time interval error (MRTIE)
- of 640ns between reference point T0 and the incoming STM-N line signal).
-
- 7.1.4.2 TU pointer processor buffer threshold spacing
-
- The MTIE of the lower-order VC with respect to the clock generating
- the higher-order VC is quantized and encoded in the TU pointer. When a
- lower-order VC is transferred from one higher-order VC into another
- higher-order VC derived from a different clock, the TU pointer must be pro-
- cessed. The pointer is first decoded to derive the frame phase and a clock to
- write to the TU pointer processor buffer. The read clock from the buffer is
- derived from the multiplexer timing source. The buffer fill is monitored and
- when upper or lower thresholds are crossed, the frame phase is adjusted.
-
- The allocation in the pointer processor buffer for pointer hysteresis
- threshold spacing should be at least 4bytes for TU-3s and at least 2bytes
- for TU-1s and TU-2s.
-
- 7.2 G.703 interfaces
-
- 7.2.1 Input jitter and wander tolerance
-
- Input jitter and wander tolerance for 2048 kbit/s hierarchy based sig-
- nals are specified in RecommendationG.823. Input jitter and wander toler-
- ance of 1544kbit/s hierarchy based signals are specified in
- RecommendationsG.824, G.743, and G.752.
-
- Note û It may be necessary to specify transmit and receive separately
- for multi-vendor systems.
-
- 7.2.2 Jitter and wander transfer
-
- As a minimum requirement, the jitter transfer specifications in the
- corresponding plesiochronous multiplex equipment Recommendations must
- be met.
-
- Note 1 û Multiplexer jitter and wander transfer may be difficult to
- specify for multi-vendor systems. Demultiplexer jitter and wander transfer
- may be more amenable to specification.
-
- Note 2 û The above-mentioned specifications are not sufficient to
- assure that SDH multiplexers provide adequate overall jitter and wander
- attenuation. Specifically, attenuation of the jitter and wander arising from
- decoded pointer adjustments places more stringent requirements on the
- SDH demultiplexer transfer characteristic.
-
- 7.2.3 Jitter and wander generation
-
- 7.2.3.1 Jitter and wander from tributary mapping
-
- Specifications for jitter arising from mapping G.703 tributaries into
- containers, described in RecommendationG.709, should be specified in
- terms of peak-to-peak amplitude over a given frequency band over a given
- measurement interval. Detailed specifications are for further study.
-
- Note 1 û Tributary mapping jitter is measured in the absence of
- pointer adjustments.
-
- The output wander should be specified in terms of MTIE together
- with its first and second derivatives with respect to time. The need for and
- details of this specification are for further study.
-
- 7.2.3.2 Jitter and wander from pointer adjustments
-
- The jitter and wander arising from decoded pointer adjustments must
- be sufficiently attenuated to ensure that existing plesiochronous network
- performance is not degraded. Detailed specifications are for further study.
-
- 7.2.3.3 Combined jitter and wander from tributary mapping and pointer
- adjustments
-
- The combined jitter arising from tributary mapping and pointer
- adjustments should be specified in terms of peak-to-peak amplitude over a
- given frequency band, under application of representative specified pointer
- adjustment test sequences, for a given measurement interval. This interval is
- dependent on the test sequence duration and number of repetitions. A key
- feature that must be considered in the specification of the effects of pointer
- adjustments on G.703 interfaces is the demarcation between jitter and wan-
- der. Thus a critical feature is the high-pass filter characteristics. The limits
- for each G.703 tributary interface and the corresponding filter characteris-
- tics are given in Table7-1/G.783. Detailed specifications of the pointer
- adjustment test sequences are for further study.
-
- Two tests for wander may be necessary; one with a single pole HPF
- and another with a double pole HPF in order to differentiate between the
- first and second derivatives of MTIE. Detailed specifications are for further
- study.
-
- 8 Overhead access function
-
- In SDH multiplex equipment, it may be required to provide access in
- an integrated manner to transmission overhead functions. This subject is for
- further study in CCITT. The present Recommendation defines the U refer-
- ence points across which information may be exchanged with the other
- functional blocks.
-
- A particular overhead access function which will be required is the
- engineering order-wire function (EOW) which is used to provide voice con-
- tact between regenerator and line terminal locations for maintenance per-
- sonnel. This subject is for further study.
-
-
-
-
-
- ANNEX A
-
- (to Recommendation G.783)
-
- Multiplex section protection (MSP) protocol,
- commands and operation
-
- A.1 MSP Protocol
-
- The MSP functions, at the ends of a multiplex section, make requests
- for and give acknowledgements of switch action by using the MSP bytes
- (K1 and K2 bytes in the MSOH of the protection section). The bit assign-
- ments for these bytes and the bit-oriented protocol are defined as follows.
-
- A.1.1 K1 byte
-
- The K1 byte indicates a request of a channel for switch action.
-
- Bits 1-4 indicate the type of request, as listed in Table A-1/G.783. A
- request can be:
-
- 1) a condition (SF and SD) associated with a section. A condition has
- high or low priority. The priority is set for each corresponding
- channel;
-
- 2) a state (wait-to-restore, do not revert, no request, reverse request) of
- the MSP function; or
-
- 3) an external request (lockout of protection, forced or manual switch,
- and exercise).
-
- Bits 5-8 indicate the number of the channel for which the request is
- issued, as shown in Table A-2/G.783.
-
- A.1.2 K1 byte generation rules
-
- Local SF and SD conditions, WTR or do not revert state and the
- external request are evaluated by a priority logic, based on the descending
- order of request priorities in TableA-1/G.783. If local conditions (SF or SD)
- of the same level are detected on different sections at the same time, the
- condition with the lowest channel number takes priority. Of these evaluated
- requests, the one of the highest priority replaces the current local request,
- only if it is of higher priority.
-
- A.1.2.1 In bidirectional operation
-
- The priorities of the local request and the remote request on the
- received K1 byte are compared according to the descending order of priori-
- ties in TableA-1/G.783. Note that a received reverse request is not consid-
- ered in the comparison.
-
- The sent K1 shall indicate:
-
- a) a Reverse Request if
-
- i) the remote request is of higher priority, or if
-
- ii) the requests are of the same level and the sent K1 byte already
- indicates Reverse Request, or if
-
- iii) the requests are of the same level and the sent K1 byte does not
- indicate Reverse Request and the remote request indicates a
- lower channel number;
-
- b) the local request in all other cases.
-
-
-
-
-
- A.1.2.2 In unidirectional operation
-
- The sent K1 byte shall always indicate the local request. Therefore,
- reverse request is never indicated.
-
- A.1.3 Revertive/non-revertive modes
-
- In revertive mode of operation, when the protection is no longer
- requested, i.e. the failed section is no longer in SD or SF condition (and
- assuming no other requesting channels), a local Wait-to-restore state shall
- be activated. Since this state becomes the highest in priority, it is indicated
- on the sent K1 byte, and maintains the switch on that channel. This state
- shall normally time out and become a no requestûnull channel (or no
- requestûchannel15, if applicable). The wait-to-restore timer deactivates
- earlier if the sent K1 byte no longer indicates ôwait-to-restoreö, i.e.when
- any request of higher priority pre-empts this state.
-
- In non-revertive mode of operation, applicable only to 1 + 1 architec-
- ture, when the failed working section is no longer in SD or SF condition, the
- selection of that channel from protection is maintained by activating a do
- not revert state or a wait-to-restore state rather than a no request state.
-
- Both wait-to-restore and do not revert requests in the sent K1 byte are
- normally acknowledged by a reverse request in the received K1 byte. How-
- ever, no request is acknowledged by another no request received.
-
- A.1.4 K2 byte
-
- Bits 1-5 indicate the status of the bridge in the MSP switch (see Fig-
- ures A-1/G.783 and A-2/G.783). Bits 6 to 8 are reserved for future use to
- implement drop and insert (nested) switching. Note that codes 111 and 110
- will not be assigned for such use, since they are used for MS-AIS detection
- and MS-FERF indication.
-
- FIGURE A-1/G.783
-
-
-
- FIGURE A-2/G.783
-
-
-
- Bits 1-4 indicate a channel number, as shown in Table A-3/G.783. Bit 5
- indicates the type of the MSP architecture: set1 indicates 1:n architecture
- and set0 indicates 1+1 architecture.
-
-
-
- A.1.5 K2 byte generation rules
-
- The sent K2 byte shall indicate in bits 1 to 4, for all architectures and
- operation modes:
-
- a) null channel (0) if the received K1 byte indicates either null channel
- or the number of a locked-out working channel;
-
- b) the number of the channel which is bridged, in all other cases.
-
- The sent K2 byte shall indicate in bit 5:
-
- a) 0 if 1 + 1 architecture;
-
- b) 1 if 1 : n architecture.
-
- Bit 5 of the sent and received K2 bytes may be compared; if a mis-
- match persists for Y ms, a mismatch is indicated at reference point S14. A
- provisional value for Y is 50ms.
-
- A.1.6 Control of the bridge
-
- In 1 : n architecture, the channel number indicated on the received K1
- byte controls the bridge. If, at the bridge end, the protection section is in SF
- condition, the bridge is:
-
- a) frozen (current bridge maintained), if the operation is unidirec-
- tional;
-
- b) released, if the operation is bidirectional.
-
- In 1 + 1 architecture, the working channel 1 is permanently bridged to
- protection.
-
- A.1.7 Control of the selector
-
- In 1 + 1 architecture in unidirectional operation, the selector is con-
- trolled by the highest priority local request. If the protection section is in SF
- condition, the selector is released.
-
- In 1 + 1 architecture in bidirectional operation, and in 1 : n architec-
- ture, the selector is controlled by comparing the channel numbers indicated
- on received K2 and sent K1 bytes. If there is a match, then the indicated
- channel is selected from the protection section. If there is a mismatch, the
- selector is released. Note that a match on 0000 also releases the selector. If
- the mismatch persists for Yms, a mismatch is indicated at reference point
- S14. If the protection section is in SF condition, the selector is released and
- the mismatch indication is disabled.
-
- A.1.8 Transmission and acceptance of MSP bytes
-
- Byte K1 and bits 1 to 5 of byte K2 shall be transmitted on the protec-
- tion section. Although they may also be transmitted identically on working
- sections, receivers should not assume so, and should have the capability to
- ignore this information on the working sections.
-
- MSP bytes shall be accepted as valid only when identical bytes are
- received in three consecutive frames.
-
- A detected failure of the received K1 or K2 is considered as equiva-
- lent to an SF condition on the protection section.
-
- A.2 MSP commands
-
- The MSP function receives MSP control parameters and switch
- requests from the synchronous equipment management function at the S14
- reference point. A switch command issues an appropriate external request at
- the MSP function. Only one switch request can be issued at S14. A control
- command sets or modifies MSP parameters or requests the MSP status.
-
- A.2.1 Switch commands
-
- Switch commands are listed below in the descending order of priority
- and the functionality of each is described.
-
- 1) Clear: Clears all switch commands listed below.
-
- 2) Lockout of protection: Denies all working channels (and the extra
- traffic channel, if applicable) access to the protection section by
- issuing a lockout of protection request.
-
- 3) Forced switch #: Switches working channel # to the protection sec-
- tion, unless an equal or higher priority switch command is in effect
- or SF condition exists on the protection section, by issuing a forced
- switch request for that channel.
-
- Note û For 1 + 1 non-revertive systems, forced switch û no work-
- ing channel transfers the working channel from protection to the
- working section, unless an equal or higher priority request is in
- effect. Since forced switch has higher priority than SF or SD on the
- working section, this command will be carried out regardless of
- the condition of the working section.
-
- 4) Manual switch #: Switches working channel # to the protection sec-
- tion, unless a failure condition exists on other sections (including
- the protection section) or an equal or higher priority switch com-
- mand is in effect, by issuing a manual switch request for that chan-
- nel.
-
- Note û For 1 + 1 non-revertive systems, manual switch û no work-
- ing channel transfers the working channel back from protection to
- the working section, unless an equal or higher priority request is in
- effect. Since manual switch has lower priority than SF or SD on a
- working section, this command will be carried out only if the
- working section is not in SF or SD condition.
-
- 5) Exercise #: Issues an exercise request for that channel and checks
- responses on MSP bytes, unless the protection channel is in use.
- The switch is not actually completed, i.e.the selector is released by
- an exercise request on either the sent or the received and acknowl-
- edged K1 byte. The exercise functionality may not exist in all MSP
- functions.
-
- Note that a functionality and a suitable command for freezing the current
- status of the MSP function is for further study.
-
- A.3 Switch operation
-
- A.3.1 1 : n bidirectional switching
-
- Table A-4/G.783 illustrates protection switching action between two
- multiplexer sites, denoted by A and C, of a 1:n bidirectional protection
- switching system, shown in Figure2-6/G.782.
-
- When the protection section is not in use, null channel is indicated on
- both sent K1 and K2 bytes. Any working channel may be bridged to the pro-
- tection section at the head end. The tail end must not assume or require any
- specific channel. In the example in TableA-4/G.783, working channel
- (WCh) 3 is bridged at site C, and WCh 4 is bridged at siteA.
-
- When a fail condition is detected or a switch command is received at
- the tail end of a multiplex section, the protection logic compares the priority
- of this new condition with the request priority of the channel (if any) on the
- protection. The comparison includes the priority of any bridge order; i.e. of
- a request on received K1 byte. If the new request is of higher priority, then
- the K1 byte is loaded with the request and the number of the channel
- requesting use of the protection section. In the example, SD is detected at C
- on working section 2, and this condition is sent on byte K1 as a bridge order
- at A.
-
- At the head end, when this new K1 byte has been verified (after being
- received identically for three successive frames) and evaluated (by the pri-
- ority logic), byte K1 is set with a reverse request as a confirmation of the
- channel to use the protection and order a bridge at the tail end for that chan-
- nel. This initiates a bidirectional switch. Note that a reverse request is
- returned for exerciser and all other requests of higher priority. This clearly
- identifies which end originated the switch request. If the head end had also
- originated an identical request (not yet confirmed by a reverse request) for
- the same channel, then both ends would continue transmitting the identical
- K1 byte and perform the requested switch action.
-
- Also, at the head end, the indicated channel is bridged to protection.
- When the channel is bridged, byte K2 is set to indicate the number of the
- channel on protection.
-
-
-
- At the tail end, when the channel number on received byte K2
- matches the number of the channel requesting the switch, that channel is
- selected from protection. This completes the switch to protection for one
- direction. The tail end also performs the bridge as ordered by byte K1 and
- indicates the bridged channel on byte K2.
-
- The head end completes the bidirectional switch by selecting the
- channel from protection when it receives a matching K2 byte.
-
- If the switch is not completed because the requested/bridged channels
- did not match within 50 ms, the selectors would remain released and the
- ôfailure of the protocolö would be indicated. This may occur when one end
- is provisioned as unidirectional and the other as bidirectional. A mismatch
- may also occur when a locked-out channel at one end is not locked out at the
- other. Note that a mismatch may also occur when a 1+1 architecture con-
- nects to a 1:1 architecture (which is not in a provisioned for 1+1 state), due
- to a mismatch of bit 5 on K2 bytes. This may be used to provision the 1:1
- architecture to operate as 1+1.
-
- The example further illustrates a priority switch, when an SF condi-
- tion on working section 1 pre-empts the WCh 2 switch. Note that selectors
- are temporarily released before selecting WCh 1, due to temporary channel
- number mismatch on sent K1 and received K2 bytes. Further in the exam-
- ple, switching back WCh 2 after failed section 1 is repaired is illustrated.
-
- When the switch is no longer required, e.g. the failed working section
- has recovered from failure and Wait-to-restore has expired, the tail end indi-
- cates ôNo Requestö for Null Channel on byte K1 (00000000). This releases
- the selector due to channel number mismatch.
-
- The head end then releases the bridge and replies with the same indi-
- cation on byte K1 and Null channel indication on byte K2. The selector at
- the head end is also released due to mismatch.
-
- Receiving Null channel on K1 byte causes the tail end to release the
- bridge. Since the K2 bytes now indicate Null Channel which matches the
- Null Channel on the K1 bytes, the selectors remain released without any
- mismatch indicated, and restoration is completed.
-
- A.3.2 1:n unidirectional switching
-
- All actions are as described in º A.3.1 except that the unidirectional
- switch is completed when the tail end selects from protection the channel
- for which it issued a request. This difference in operation is obtained by not
- considering remote requests in the priority logic and therefore not issuing
- reverse requests.
-
- A.3.3 1 + 1 unidirectional switching
-
- For 1 + 1 unidirectional switching, the channel selection is based on
- the local conditions and requests. Therefore each end operates indepen-
- dently of the other end, and bytes K1 and K2 are not needed to coordinate
- switch action. However, byte K1 is still used to inform the other end of the
- local action, and bit 5 of byte K2 is set to zero.
-
- A.3.4 1 + 1 bidirectional switching
-
- The operation of 1 + 1 bidirectional switching can be optimized for a
- network in which 1 : n protection switching is widely used and which is
- therefore based on compatibility with a 1:n arrangement; alternatively it
- can be optimized for a network in which predominantly 1+1 bidirectional
- switching is used. This leads to two possible switching operations described
- below.
-
- A.3.4.1 1 + 1 bidirectional switching compatible with 1 : n bidirectional
- switching
-
- Bytes K1 and K2 are exchanged as described in º A.3.1 to complete a
- switch. Since the bridge is permanent, i.e.working channel number1 is
- always bridged, WCh1 is indicated on byteK2, unless received K1 indi-
- cates null channel (0). Switching is completed when both ends select the
- channel, and may take less time because K2 indication does not depend on a
- bridging action.
-
- For revertive switching, the restoration takes place as described in º
- A.3.1. For non-revertive switching, TableA-5/G.783 illustrates the opera-
- tion of a 1+1 bidirectional protection switching system, shown in
- Figure2-5/G.782.
-
- For non-revertive operation, assuming the working channel is on pro-
- tection, when the working section is repaired, or a switch command is
- released, the tail end maintains the selection and indicates do not revert for
- WCh1. The head end also maintains the selection and continues indicating
- reverse request. The do not revert is removed when pre-empted by a failure
- condition or an external request.
-
- A.3.4.2 1 + 1 bidirectional switching optimized for a network using predom-
- inantly 1 + 1 bidirectional switching
-
- Bytes K1 and K2 are exchanged to complete a switch. Since the
- bridge is permanent, the traffic is always bridged to the working and protec-
- tion channel. Byte K2 indicates the number of the channel which is carrying
- the traffic, i.e.the working channel. Therefore the channel number on
- byteK2 will be changed after switching is completed. Note that for this
- mode of operation, the use of channel numbers may differ from the descrip-
- tion in ºA.1. Switching is completed when both the receive end switches
- select the channel and receive no request.
-
- For non-revertive switching, Table A-6/G.783 illustrates the operation
- of a 1 + 1 bidirectional protection switching system, using channel
- numbers1 and2.
-
-
-
-
-
-
-
- ANNEX B
-
- (to Recommendation G.783)
-
- Algorithm for pointer detection
-
- B.1 Pointer interpretation
-
- The pointer processing algorithm can be modelled by a finite state
- machine. Within the pointer interpretation algorithm three states are defined
- (as shown in FigureB-1/G.783):
-
- û NORM_state
- û AIS_state
- û LOP_state
-
- The transitions between the states will be consecutive events (indica-
- tions), e.g. three consecutive AIS indications to go from NORM_state to the
- AIS_state. The kind and number of consecutive indications activating a
- transition is chosen such that the behaviour is stable and low BER sensitive.
-
- The only transition on a single event is the one from the AIS_state to
- the NORMAL_state after receiving an NDF enabled with a valid pointer
- value.
-
- It should be noted that, since the algorithm only contains transitions
- based on consecutive indications, this implies that non-consecutively
- received invalid indications do not activate the transitions to the LOP_state.
-
- The following events (indications) are defined:
-
- û Norm_point: normal NDF + ss + offset value in range;
-
- û NDF_enable: NDF enabled + ss + offset value in range;
-
- û AIS_ind: 11111111 11111111;
-
- û Incr_ind: Normal NDF + ss + majority of I bits inverted + no major-
- ity of D bits inverted+previous NDF_enable, incr_ind or
- decr_ind more than 3times ago;
-
- û Decr_ind: Normal NDF + ss + majority of D bits inverted + no
- majority of I bits inverted+previous NDF_enable, incr_ind
- or decr_ind more than 3times ago;
-
- û Inv_point: Any other + norm_point with offset value not equal to
- active offset.
-
- Note û Active offset is defined as the accepted current phase of the VC in
- the NORM_state and is undefined in the other states.
-
- The transitions indicated in the state diagram are defined as follows:
-
- û Inc_ind/dec_ind: Offset adjustment (increment or decrement indica-
- tion);
-
- û 3 ┤ norm_point: Three consecutive equal norm_point indications;
-
- û NDF_enable: Single NDF_enable indication;
-
- û 3 ┤ AIS_ind: Three consecutive AIS indications;
-
- û N ┤ inv_point: N consecutive inv_point (8úNú10);
-
- û N ┤ NDF_enable: N consecutive NDF_enable (8úNú10).
-
- Note û The transitions from NORM to NORM do not represent
- changes of state but imply offset
- changes.
-
- B.2 Concatenated payloads
-
- In case a TU-2 is concatenated to a previous TU-2 the algorithm to
- verify the presence of the Concatenation Indicator can be described conve-
- niently in the same way as for a normal pointer. This is shown by the state
- diagram of FigureB-2/G.783. Again, three states have been described:
-
- û CONC_state;
- û LOPC_state;
- û AISC_state.
-
- The following events (indications) are defined:
-
- û Conc_ind: NDF enabled + ôdd 11111 11111ö;
-
- û AIS_ind: 11111111 11111111;
-
- û Inv_point: Any other.
-
- Note û dd bits are unspecified in G.709 and are therefore don't care
- for the algorithm.
-
- The transitions indicated in the state diagram are defined as follows:
-
- û 3 ┤ AIS_ind: Three consecutive AIS indications;
-
- û N ┤ inv_point: N consecutive inv_point (8úNú10);
-
- û 3 ┤ conc_ind: Three consecutive conc_ind.
-
- A failure in one or more of the TUs of a concatenated payload should
- be reported across the S reference point as a single failure. Two types of fail-
- ures can be reported:
-
- û Loss of pointer,
-
- û Path AIS.
-
- A Loss of pointer failure is defined as a transition of the pointer inter-
- preter from the NORM_state to the LOP_state or the AIS_state, or a transi-
- tion from the CONC_state to the LOPC_state or AISC_state in any
- concatenated TU. In case both the pointer interpreter is in the AIS_state and
- the concatenation indicators of all concatenated TUs are in the AISC_state,
- a path AIS failure will be reported. These failures will be reported across the
- Sreference point for alarm filtering at the SEMF.
-
- FIGURE B-1/G.783
-
-
-
- FIGURE B-2/G.783
-
-
-
- APPENDIX I
-
- (to Recommendation G.783)
-
- Example of F1 byte usage
-
- Note û The following is not part of the Recommendation and is provided for
- information only.
-
- The F1 byte can be used to identify a failed section in a chain of regenerator
- sections. When a regenerator detects a failure in its section, it inserts the
- regenerator number and the status of its failure into the F1 byte. FigureI-1/
- G.783 illustrates the procedure.
-
- FIGURE I-1/G.783
-
-
-