sdh alarms

141
www.mapyourtech.com 1 SDH/SONET ALARMS & PERFORMANCE MONITORING

Upload: derrick-senyo

Post on 08-Nov-2015

117 views

Category:

Documents


15 download

DESCRIPTION

SdH alarms for Networks

TRANSCRIPT

PowerPoint Presentation

www.mapyourtech.com1SDH/SONET ALARMS & PERFORMANCE MONITORINGStandardsAlarms Introductions and ExamplesPerformance Monitoring ParametersFAQswww.mapyourtech.com2ContentsBell Communications Research (Bellcore, BCR)prepares equipment standards for North American community

ANSI Committee T1 prepares telecommunications standards (rates and formats) creator of SONETANSI (American National Standards Institute) accreditedsponsored by ATIS (Alliance for Telecommunications Industry Solutions)ITU-T G.826,G.783

www.mapyourtech.com3StandardsSONET Overview v.1.0October 2000Learn and Share!3The original SONET standard was developed by ANSI Committee T1 and published in 1988 as a North American standard.Prior to publishing, T1 presented SONET to international standards body ITU, then called CCITT, and proposed that it become an international standard. This resulted in some modifications and additions to the original proposal in order to make it more suitable for the international market. The result was the Synchronous Digital Hierarchy (SDH) set of standards, of which SONET can be considered a complete subset.Bellcore prepares equipment specs for North American application.ETSI prepares telecommunications standards for the European community. Most of the modifications and additions made to the original SONET proposal were proposed by ETSI and the member companies.www.mapyourtech.com4Alarms Introductions and Examples

www.mapyourtech.com5Alarm Overview

V1V2V5RSMSHPAUTULPPPISDH FrameA1A1A1A2A2A2J0B1E1F1D1D2D3H1H1H1H2H2H2H3H3H3B2B2B2K1K2D4D5D6D7D8D9D10D11D12S1Z1Z1Z2Z2M1E2RSOHMSOHAUPointerJ1B3C2G1F2H4F3K3N1VC-4 POHwww.mapyourtech.com6The SDH FrameVC-11VC-12VC-2V5V5V52534106N2N2N22534106K4K4K42534106Lower order VC-n POHNumber of bytes of data separating fields.A1, A2RS-LOFProvides a frame alignment pattern [A1 =11110110, A2 = 00101000]. The frame alignment word of an STM-n frame is 3 X n A1 bytes followed by 3 X n A2 bytes.J0RS-TIMRegenerator section trace. [16 byte frame including CRC7 (1st byte.) Supports continuity testing between transmitting and receiving device on each regenerator section.Z0Spare. Reserved for future international standardisation.B1RS-EXC RS-DEGProvides regenerator section monitoring. The regenerator section BIP-8 provides end-to-end error performance monitoring across an individual regenerator section and is calculated over all bits of the previous STM-n frame after scrambling. Computed value is placed in B1 byte before scramblingE1Provides local orderwire channel for voice communications between regenerators, hubs and remote terminal locations.F1Allocated to users purpose [e.g. temporary data/voice channel connection for special maintenance applications]D1-D3COMMS192 kb/s message based data communications channel providing administration, monitor, alarm and maintenance functions between regenerator section termination equipmentwww.mapyourtech.com7RSOH [Regenerator Section Overhead]SDH FrameB1 Is not supported in OM4000 NEs due to redundancy and this NE is primarily used as an ADMB2MS-EXC MS-DEGProvides multiplex section error monitoring. The BIP-n X 24, of an STM-n frame, provides end-to-end error performance monitoring across an individual multiplex section and is calculated over all bits of the previous STM-n frame except for the first three rows of SOH. Computed value is placed in B2 byte before scrambling.K1, K2MS-AIS MS-RDITwo bytes allocated for APS signalling for multiplex section protection. K2 [b6-b8] contains MS-RDI and MS-AIS status information.D4-D12COMMSProvides 576 kb/s data communication channel between multiplex section termination equipment. Used to carry network administration and maintenance information.S1Synchronisation status messages. S1 [b5-b8] indicates which of the four levels of synchronisation is being used at the transmit end of a multiplex section.M1MS-REIMultiplex section remote error indication [MS-REI]. Conveys the number of B2 errors detected by downstream equipment.E2Provides express orderwire channel for voice communications between multiplex section terminating equipmentH1-H3AU-AIS TU-AIS [TU-3] AU-LOP TU-LOP [TU-3]AU pointer bytes are associated with, but not part of, the MSOH. The pointer contained in H1 and H2 points to the location where the VC-n begins. The last ten bits [b7-b16] of H1, H2 carry the pointer value [0 to 782]. The H3 bytes are pointer action bytes and carry live information from a VC4, during the STM-n frame in which negative pointer adjustment occurswww.mapyourtech.com8MSOH [Multiplex Section Overhead]SDH FrameMSP Protocol Bytes K1 [b1-4] type of request [b5-8] channel number K2 [b1-4] channel bridging [b5] protection architecture www.mapyourtech.com9HO-POH [Higher order path Overhead]J1HP-TIM [VC-4] LP-TIM [VC-3]The first byte in the virtual container. Its location is indicated by the AU pointer [H1,H2 bytes]. Provides a higher order trail trace identifier [64-byte free format string or 16-byte frame including CRC7. Supports end-to-end monitoring of a higher order path.B3HP-EXC HP-DEG LP-EXC+DEG [VC-3]Provides higher order path error monitoring. The BIP-8 is calculated over all bits of previous VC-n. Computed value is placed in B3 byte before scrambling.C2HP-AIS LP-AIS [VC-3] HP-UNEQ+PLM LP-UNEQ+PLM [VC-3]High order signal label. Indicates composition or the maintenance status of the associated container.G1HP-REI + RDI LP-REI + RDI [VC-3]Higher order path status. Send status and performance monitoring information from receiving path terminating equipment to originating equipment. Allows status and performance of two-way path to be monitored at either end. G1 REI [b1-b4] RDI [b5]F2Higher order path user channel. Allocated for network operator communications between path terminations.H4HP-LOMPosition indicator. Multiframe phase indication for TU structured payloads. H4 [b7-b8]F3Higher order path user channel. Allocated for network operator communications between path terminationsK3Higher order path automatic protection switching [b1-b4]. The rest of the bits [b5-b8] are allocated for future use.N1Higher order tandem connection monitoring. There are two possible implementations described in Annex C and Annex D of ITU-T G.707. In Annex C, the N1 byte provides a tandem connection incoming error count [IEC] and the remaining four bits provide an end-to-end data linkSDH FrameV5[VC-12] LP-AIS [b5-b7] LP-REI [b3] LP-RDI [b8] LP-EXC [b1-b2] LP-UNEQ [b5-b7] LP-PLM [b5-b7]Provides BIP-2 error checking, signal label and path status information. J2LP-TIM [VC-12]Lower order trail trace identifier [16 byte frame including CRC7]. Supports end-to-end monitoring of a lower order pathN2Lower order tandem connection monitoring. Contains BIP-2 error checking, AIS, tandem connection REI [TC-REI], outgoing error indication [OEI] and a 76-byte multiframe containing a tandem connection access point identifier [TC-APid].K4Lower order path automatic protection switching [b1-b4] and enhanced remote defect indication [b5-b7].www.mapyourtech.com10LO-POH [Lower order path Overhead]SDH FrameAnomalies, defects and alarmswww.mapyourtech.com11AlarmA human observable indication that draws attention to a failure usually giving an indication of the severity of the failThe report to the user of a defectAnomalyThe smallest discrepancy which can be observed between the actual and desired characteristics of an item. The occurrence of a single anomaly does not constitute an interruption in the ability to perform a required function. Anomalies are used as the input for the Performance Monitoring [PM] process and for the detection of defects A single occurrence of, or commencement of a pre-defined conditionDefectThe density of anomalies has reached a level where the ability to perform a required function has been interrupted. Defects are used as input for PM, the control of consequent actions, and the determination of faults cause The persistent or repeated occurrence of an anomaly for a pre-defined duration or number of repetitionsDefect namingwww.mapyourtech.com12The origin of defect naming can be confusing.The following points should help when dealing with the nomenclatureDefects derived from path overheads begin: LP, HP, LPOM or HPOM.Defects derived from section overheads begin: RS or MS.Defects related to conditions affecting a whole VC and its pointer begin: AU or TU. AU is used for VC-4s. TU is used for TU-3s, TU-2s and TU-12s. Defect types beginning TU are not distinguishable.When distinguishing LP and LPOM remember that LPs will be present when traffic is terminated and LPOMs when traffic is un-terminated.

A defect type (e.g. LP-EXC) has two parts:Part 1 is a "function pointPart 2 is an "alarm category".

Example: LP-EXC. This defect is detected at the LP function point - the "low order path termination" function point. The category of the defect is "EXC" - EXCessive bit errors.

Excessive bit errors in a VC-3 will give an LP-EXC defect, as will excessive bit errors in a VC-12. The two defects share their type but they have distinct instances. When the corresponding alarm is reported to the user the type and instance will be reported.

Defect Correlationwww.mapyourtech.com13If a defect is subject to correlationit will NOT be raised if another alarm is present.Aim of defect correlationThe aim of correlation is to present to the operator only the alarm closest to the source cause of a set of related defects. This reduces the amount of fault analysis required of the operator and the traffic on communication channels.Example:If EXC is present it will hide the presentation of TIM, PLM, UNEQ etc.More specifically EXC will mask TIM, PLM and UNEQ alarms.

A masks BHP-EXCHP-TIMHP-PLMHP-UNEQABCard FailCard FaultWrong CardUnexpected CardAlarm raised on the card/slot instanceAB = A masks Bwww.mapyourtech.com14Plug In Unit Defect CorrelationPlug In Unit [PIU] related defectsFor a given instance of PIU in a slotAll defects present within that PIU will be masked

PPI LOSAB = A masks BPPI UNEXP SGNLPPI EXCPPI DEGPPI AISINT LP IP BUFFERINT HP IP BUFFERPPI LOFPPI LOMwww.mapyourtech.com15PDH Traffic Defect CorrelationAU AISAU LOPMS DEGMS EXCMS AISRS TIMQECC COMMS FAILRS LOFES CMIRS LOSRS UNEXPECTED SIGNALMS RDIMS RDIHPOM EXCHPOM TIMHPOM PLMHPOM UNEQ= A masks BAB= A masks B, dependent on AIS consequent action configuration of AABwww.mapyourtech.com16SDH traffic DEFECT correlation HP EXCINT HP OP BUFFHP DEGHP LOMTU LOPHP TIMHP PLMHP UNEQHP RDIHP REIPPI LOFTU AISINT TU LOPINT TU AISLP EXCLPOM EXCLPOM TIMLPOM PLMLPOM UNEQLP TIMLP PLMLP UNEQLP RDILP REILP DEGINT LP OP BUFFER= "A masks B if B's TU type is TU-12" ABwww.mapyourtech.com17What is a path?www.mapyourtech.com18A path is an end to end circuitThe ends of a LO path are where traffic is brought into SDH or removed from SDHPaths carry VCsLO VCs are generated where traffic is brought into SDHand terminated where it is removedHO VCs areGenerated / terminated where traffic is brought into SDH or when LO VCs are brought into / removed from a HO VC

Low Order PathMultiplexerRegeneratorHigh Order PathCarrying a 2 Meg circuit in a STM framewww.mapyourtech.com192M example whereHigh order paths areencased in STM frames when they pass between nodesLow order paths arethreaded through high order paths2M PDHLO pathHO pathMSRSMultiplexorRegeneratorSTM-1 tributary with a LO connection2M tribSONET Layerswww.mapyourtech.com20DS1DS3DS1STS PathLineSectionPhotonicVT PathDS3SectionSectionSectionSectionLineLineLineSTS PathSTS PathVT PathPathTerminatingEquipment(PTE)SectionTerminatingEquipment(STE)LineTerminatingEquipment(LTE)PathTerminatingEquipment(PTE)PathTerminatingEquipment(PTE)STS PathLineSectionPhotonicSectionPhotonicSTS PathLineSectionPhotonicVT PathLineSectionPhotonicSONET Overview v.1.0October 2000Learn and Share!20The functionality at a given layer works with the corresponding functionality (at the same layer) in another network element. The span between the two network elements is named after the layer that connects them.Only the photonic layer involves a physical connection; all the others are logical connections which depend on the photonic layer for physical interconnection.A section exists between any two network elements that are physically connected by fiber.A line may span one or more sections and connects two network elements that provide the line layer functionality such as multiplexing and protection switching.An STS path may span one or more lines and connects two network elements that are providing the entry and exit points for an STS payload such as a DS3.A VT path may span one or more STS paths and connects two network elements that are providing the entry and exit points for a sub-STS-1 payload such as a DS1.All SONET network elements have section and photonic layer functionality, however not all have the higher layers. A network element is classified by the highest layer supported on the interface. Thus a network element with path layer functionality is referred to as Path Terminating Equipment, either VT PTE or STS PTE. Similarly, a network element with line layer functionality but no higher, is Line Terminating Equipment. Finally, a network element with section layer functionality but no higher is Section Terminating Equipment. There are four sections Regenerator Section (RS), Multiplex Section (MS), Higher Order Path Section (HP), and Lower Order Path Section (LP)

RS is a part (section) of the optical fibre network, within which RSOH part of SDH frame is NOT opened

MS is a part (section) of the optical fibre network, within which MSOH part of SDH frame is NOT opened

HP is a part (section) of the optical fibre network, within which higher order VC part of SDH frame is NOT opened (it may be opened only for interpreting HOPOH)

LP is a part (section) of the optical fibre network, within which lower order VC part of SDH frame is NOT opened (it may be opened only for interpreting LOPOH)

SDH Section Hierarchywww.mapyourtech.com21

SDHInterfacecross-connect unitSDHInterfacePDH interfaceHigh order part Downlink signal flow

Downlink signal flow & High order partwww.mapyourtech.com22

SDHInterfacecross-connect unitSDHInterfacePDH interfaceLow order part Uplink signal flow & Low order partUplink signal flow

www.mapyourtech.com23www.mapyourtech.com24AIS (Alarm Indication Signal) Two Common AlarmsInserts the all 1s signal into the Low level circuits, Indicating that the signal is unavailable. Common AIS alarms include MS_AIS, AU_AIS, TU_AIS and E1_AIS.Indicates the alarm transferred back to the home station from the opposite station after the opposite station has detected alarms of LOS (loss of signal), AIS and TIM (trace identifier mismatch). Common RDI alarms include MS_RDI, HP_RDI and LP_RDI.RDI (Remote Defect Indication)

Alarms & Performance of High Order Partwww.mapyourtech.com25ABCDEFGSTM-NCross-connect UnitSPIRSTMSTMSPMSAHPTUplink signal FlowDownlink signal FlowSDH Interface to Cross-connect Unit

Alarms & Performance of High Order Partwww.mapyourtech.com26Diagram of Alarm Generation

Frame synchronizer& RS overhead processor(RST)MS overhead processor(MST)Pointer processor& HP overhead processor(MSA, HPT)LOSLOFB1 ErrA1,A2B1AISMS_AISB2 ErrK2B2MS_REIM1MS_RDIK21AISAU_AISAU_LOPH1,H2H4B3 ErrJ1HP_SLMC21HP_LOMHP_TIMHP_UNEQHP_REIHP_RDIH1,H2C2B3G1G11XCSSTM-NOptical SignalDownlink signal flowAlarm report or returnSignal transfer point (Insert down all "1"s signal)Alarm termination point (Report to SCC unit)Alarms & Performance of High Order Partwww.mapyourtech.com27Optical receivingOptical/electrical conversion (O/E)O/E module checks Optical signal (If no light in the input signal, optical power excessively low or high or the code type mismatch, R_LOS alarm will be reported)A1, A2 and J0 bytes detectingSearch the framing bytes (R_OOF, R_LOF)Extract the line synchronous timing sourceJ0 byte (J0_MM)ScrambleB1 byte detecting BIP-8 computing to check bit error (B1_SD, B1_EXC, SES, RSUAT)Process F1, D1 - D3 and E1 bytes Downlink Signal FlowFrame synchronizer and RS overhead processor

Alarms & Performance of High Order Partwww.mapyourtech.com28Downlink Signal FlowMS overhead processorK1 and K2 bytes detectingSF and SD detection Process D4D12, S1 and E2 bytesMSP protection functionMS_AIS, MS_RDIB2 byte detectingBIP-8 computing to check bit error (B2_SD and B2_OVER)M1 bytes (MS_REI)

Alarms & Performance of High Order Partwww.mapyourtech.com29Downlink Signal FlowPointer processor and HP overhead processorH1 and H2 bytes detectingFrequency and phase alignmentLocate each VC-4 and send it to High order path overhead processorGenerate AU_AIS, AU_LOPJ1, C2, B3 and G1 bytes detectingJ1 Bytes (HP_TIM)C2 Bytes (HP_UNEQ, HP_SLM)B3 bit error detecting (B3_SD, B3_OVER, SES, HVCUAT)H4 Bytes (For VC12 signal, HP_LOM)G1 Bytes (HP_RDI, HP_REI)F3, K3, N1 Bytes (Reserved)

Alarms & Performance of High Order Partwww.mapyourtech.com30Uplink Signal FlowPointer processor and HP overhead processor

Generates N High order path overhead bytesJ1, C2, B3, G1, F2, F3 and N1 BytesReturn alarm to the remote endHP_RDI (G1)HP_REI (G1) AU-4 pointers generatingPointer processor generates N AU-4 pointersAlarms & Performance of High Order Partwww.mapyourtech.com31Uplink Signal FlowMS overhead processor

Set multiplex section overhead (MSOH) BytesK1, K2, D4-D12, S1, M1, E2 and B2 BytesReturn alarm to the remote endMS_RDI (K2)MS_REI (M1)Alarms & Performance of High Order Partwww.mapyourtech.com32Uplink Signal FlowFrame synchronizer and RS overhead processor

Set regenerator section overhead (RSOH) BytesA1, A2, J0, E1, F1, D1-D3 and B1 BytesFrame synchronizer and scrambler scrambles STM-N electrical signalsE/OAlarms & Performance of Low Order Partwww.mapyourtech.com33PDH Interface to Cross-connect Unit

GHIJKPDH InterfaceCross-connect UnitHPALPTLPAPPIUplink signal FlowDownlink signal FlowAlarms & Performance of Low Order Partwww.mapyourtech.com34Diagram of Alarm GenerationPDH Physical InterfaceLow Order Path AdaptationHigh Order Path Adaptation& Low Order Path TerminationE1 InterfaceE1 Interface

(PPI)(LPA)(HPA, LPT)LP_TFIFOAll 1LP_SLMLP_UNEQV1,V2H4BIP 2J2TU_AISV5HP_LOMLP_TIMTU_LOPLP_REILP_RDIV5V5XCSV5V1,V2LP_RFIFOE1_AISAll 1T_ALOSE1_AISXCSDownlink signal flowAlarm report or returnSignal transfer point (Insert down all "1"s signal)Alarm termination point (Report to SCC unit)Alarms & Performance of Low Order Partwww.mapyourtech.com35

Downlink Signal FlowHigh Order Path Adaptation& Low Order Path Termination

V1, V2 and V3 bytes detectingDemap the VC-4 into VC-12sPointers of all VC-12s are decodedTU_AIS, TU_LOPV5 Bytes detectingLP_RDI( b8), LP_UNEQ, LP_SLM( b5-b7), LP_REI( b3)BIP-2 computing to check bit error( b1-b2)H4 Bytes detectingHP_LOMJ2 Bytes detectingLP_TIMAlarms & Performance of Low Order Partwww.mapyourtech.com36

Downlink Signal FlowLow Order Path Adaptation& PDH Physical Interface

Low Order Path AdaptationRecover data stream and the related clock reference signalsDetect LP_RFIFO alarmPDH Physical InterfaceForming a 2048 kbit/s signalAlarms & Performance of Low Order Partwww.mapyourtech.com37

Uplink Signal FlowLow Order Path Adaptation& PDH Physical Interface

Low Order Path AdaptationData adaptationDetect LP_TFIFO alarmPDH Physical InterfaceClock extraction and dada regenerationDetect and terminate the T_ALOS alarmDetect E1_AIS alarmAlarms & Performance of Low Order Partwww.mapyourtech.com38

Uplink Signal FlowHigh Order Path Adaptation& Low Order Path

Low Order Path TerminationInsert POH in the C-12 (C-12 to VC-12)V5 byte (Insert "signal label" in the b5-b7, calculate BIP-2, set the result to the b1 and b2) High Order Path AdaptationAdapt VC-12 into TU-12Map TU-12 into High order VC-4Suppression Correlation between SDH Alarmswww.mapyourtech.com39R_LOSR_LOFR_OOFAU_AISAU_LOPB1_SDB2_SDHP_TIMHP_SLMHP_LOMHP_UNEQB3_EXECB3_SDTU_AISTU_LOPBIP_EXECLP_UNEQLP_TIMLP_SLMBIP_SDMS_RDIHP_RDILP_RDIABA suppress BJ0_MMMS_AISB1_EXECB2_EXECA1, A2 BytesRSOH, MSOH (Except A1,A2)Suppression Relationshipwww.mapyourtech.com40More on AlarmsAlarm Understanding Rules

Rule 1

Rule 2FC 1Alarm reportedAlarm reportedFC 1ADM 1ADM 2ex. aADM 1ADM 2ex. bAlarms reported are alarms receivedAlarms are reported on SDH Objectswww.mapyourtech.com41Alarm Understanding Rules (contd.)

Rule 3

ADM 1ADM 2ex. 3a. No Object => No Alarms reported

FC on TU12 (1-1-1)NO TU12 (1-1-1)3b. Object Mismatch => No Alarms reported

FC on TU12 (1-1-1) TU11 (1-1-1)ADM 1ADM 2ex. Note:These two examples are not possible for AU object

WHY?See slide 9NO Alarm reported for FC on TU12 (1-1-1)NO Alarm reported for FC on TU12 (1-1-1)www.mapyourtech.com42Alarm Understanding Rules (contd.)

Rule 4

4a. No PT XC => No Alarms pass-through

FC on AU4 (1) NO VC4 PT (1)Alarm reported for FC on AU4 (1)FC on TU12 (1-1-1)ADM 1ADM 2ADM 3ex. aADM 1ADM 2ADM 3ex. bNO Alarm pass-through NO VC12 PT (1-1-1)NO Alarm pass-throughNO Alarm reported for FC on TU12 (1-1-1)www.mapyourtech.com43Alarm Understanding Rules (contd.)

4b. Bigger PT XC => No Alarms reported & Alarm pass-through

FC on TU12 (1-1-1)Alarm pass-through for FC on TU12 (1-1-1)NO Alarm reportedfor FC on TU3 (1) VC4 ADM 1ADM 2ADM 3ex. aSTM-1 links4c. Smaller PT XC => No Alarms reported (always ??) & Alarm pass-through but on smaller objectFC on TU3 (1) VC12 (1-1-1)NO Alarm reportedfor FC on TU12 (1-1-1)ADM 1ADM 2ADM 3ex. bSTM-1 linksAlarm pass-through for FC on TU12 (1-1-1)What if Same size PT XC ?www.mapyourtech.com44Guide Lines Alarms reported are alarms received Object---- No Object ---- Object Mismatch Privilege of the NE Upstream / Downstream

www.mapyourtech.com45 RS Alarms

RS alarms are those, which can be reported even by a pure Regenerator

(who has privilege of opening (interpreting & rewriting) only RSOH)

LOS (Loss of Signal)based on whole RSOH

LOF (Loss of Frame)based on A1, A2 bytes

TIM (Trace Identifier Mismatch)based on J0 byte

SF (Signal Fail)based on B1 byte

SD (Signal Degrade)based on B1 byteD3D2D1F1E1B1J0A2A1RSOH bytesNote: The order in which the alarms are written is important, as we will see later while discussing Alarm maskingwww.mapyourtech.com46Description of Alarms

LOS

Received power is less than Laser receiver sensitivity (All bits interpreted as 0)

ADM 1ADM 2ex. TxRxRxTxLOSTx off / misconnectivityRx off / misconnectivityFiber CutReceived power is less than Laser receiver sensitivity(Low power transmitted, Span is longer than specified, Fiber gets deformed etc. etc.)LOF

Anything other than F6 28 (Hex) in any (?) of the A1 A2 bytes (within a STM frame)

-- for consecutive 5 frames (625 s) OOF (Out of Frame) clearing 2 frames -- for consecutive 24 frames (3 ms) LOF clearing 24 frames

Note: Prolonged LOS => LOF, but not always LOF => LOS (this fact will be used as one of the Alarm Masking logic later)LOS clears when 2 consecutive framing patterns are received & no new LOS condition is detectedwww.mapyourtech.com47Description of Alarms (contd.)

TIM (J0)

Received J0 trace (1/16 byte(s)) != Expected J0 trace (1/16 byte(s))

Note: For both SF & SD, alarm clearing threshold is 1 decade lower than generation threshold, e.g., Gen. Thr. is 1 in 1000 or higher => Clg. Thr. is 1 in 10000 or lowerSF (B1/B2/B3/V5)

Equivalent BER exceeds alarm generation threshold ( 1 in 10 / 1 in 10 / 1 in 10 )

34559SD (B1/B2/B3/V5)

Equivalent BER exceeds alarm generation threshold ( 1 in 10 to 1 in 10 )

P1P2ABCRx trace = C to BRx trace = A to BTx trace = A to BExp trace = A to BTx trace = C to BExp trace = C to Bwww.mapyourtech.com48 MS Alarms

MS alarms are those, which can be reported by a Add-Drop Multiplexer, irrespective of cross-connect configuration (who has privilege of opening (interpreting & rewriting) RSOH, MSOH, AU pointers plus opening HOPOH(s) / TU Pointers / LOPOH(s) depending upon cross-connect configuration)

AIS (Alarm Indication Signal) reported based on K2 byte -- bits 6,7,8

SF (Signal Fail)based on B2 bytes

SD (Signal Degrade)based on B2 bytes

RDI (Remote Defect Indication)based on K2 byte -- bits 6,7,8

MSOH bytesK2K1B2D6D5D4D9D8D7E2M1S1D12D11D10Note 1: The order in which the alarms are written is important, we will see later while discussing Alarm maskingNote 2: MS-AIS is also called Line-AIS or AIS on STM port MS-RDI is also called Line-RDI or RDI on STM portwww.mapyourtech.com49Description of Alarms (contd.)

Example of generation of AIS, RDIADMAny traffic affecting RS Alarm or MS-AIS (Rx)MS-AIS (Gen)MS-RDIAny traffic affecting HP Alarm or AU-AIS (Rx)AU-AIS (Gen)HP-RDIAny traffic affecting LP Alarm or TU-AIS (Rx)TU-AIS (Gen)LP-RDIExample of reception of TU-AIS, LP-RDIADM 1ADM 2ADM 3E1E1VC12VC12VC12TU-AIS (Rx)LP-RDI (Rx)Any traffic affecting RS/HP/LP Alarmwww.mapyourtech.com50 HP / LP Alarms

HP / LP alarms are those, which can be reported by a Add-Drop Multiplexer, having HO / HO & LO object (LO object => LO cross-connect)

(who has privilege of opening (interpreting & rewriting) RSOH, MSOH, AU Pointers plus at least interpreting HOPOH(s) / opening (interpreting & rewriting) RSOH, MSOH, AU Pointers, HOPOH(s), TU Pointers plus at least interpreting LOPOH(s) depending upon cross-connect configuration)

HP-AIS reported based on H1, H2 bytes

HP-LOP (Loss of Pointer) based on H1, H2 bytes

HP-UNEQ (unequipped) based on C2 byte

HP-TIM based on J1 byte

HP-SF based on B3 byte

HP-SD based on B3 byte

HP-RDI based on G1 byte -- bit 5

Note 1: Same as beforeNote 2: HP-Alarm is also called AU-Alarm or Alarm on AU

LP-Alarm is also called TU-Alarm or Alarm on TUK3F3H4F2G1C2B3J1N1HOPOHbytesH1, H2, H3 AU Pointer byteswww.mapyourtech.com51 HP / LP Alarms (contd.)

LP-AIS reported based on V1, V2 bytes

LP-LOP based on V1, V2 bytes

LOM (Loss of Multiframe) based on H4 byte bits 7,8

HP-PLM / SLM (Payload / Signal Label Mismatch)based on C2 byte

LP-UNEQ based on V5 byte bits 5,6,7

LP-TIM based on J2 byte

LP-SF based on V5 byte bits 1,2

LP-SD based on V5 byte bits 1,2

LP-RDI based on V5 byte -- bit 8

LP-PLM / SLM based on V5 byte bits 5,6,7Note 1: Same as beforeNote 2: Whole of this slide assumes TU2/TU12/TU11 for LP. If there is TU3 with AU4 mapping, then also it is LP but Pointers & POH bytes will be like HOK4N2J2V5LOPOH bytesV1, V2, V3 TU Pointer byteswww.mapyourtech.com52SONET/SDN Terminology Translationwww.mapyourtech.com53SDHVC-11 (virtual container)VC-12VC-2VC-3VC-4

TU-11 (tributary unit)TU-12TU-2TU-3

TUG-2 (TU group)TUG-3

AU-3 = VC-3 + PtrAU-4 = VC-4 + Ptr

AUG = 1 x AU-4,or 3 x AU-3s

STM-1 = AUG + SOH

STM-N = N AUGs + SOH

Regenerator Section

Multiplex Section SONETVT-1.5 SPEVT-2 SPEVT-6 SPESTS-1 SPESTS-3c SPE

VT-1.5 (Virtual Tributary size 1.5)VT-2VT-6 no SONET equivalent (like a 50 Mbit/s VT)

VT GroupNo SONET equivalent

STS-1 SPE + STS-1 PointerSTS-3c SPE + STS-3c Pointer

logical entity (not defined)

STS-3

STS-3N

Section Layer

Line Layer14SONET Overview v.1.0October 2000Learn and Share!53The SDH terminology is slightly more precise; however, there are SONET equivalent for most of the terms. The SDH terms for which there are no equivalent SONET terms reflect the additions that were made to the SONET format in order to create SDH.Note that while the SONET terms STS-N and OC-N make it clear whether an electrical or optional signal is being discussed, in SDH terminology there is only the STM-N term. To be clear, sometimes you will see and e or an o appended to distinguish between optical and electrical signals (for example, STM-1o versus STM-1e).Alarm Propagation ExamplesFor every example, Assumption(s) is/are stated Root Cause(s) is/are stated Diagrammatic representation is made (OFCs are shown in cyan) Alarm(s) generated / condition(s) generated for reporting alarms is/are shown in black Alarm(s) existing at a port is/are shown in red Alarm(s) masked at a port is/are covered with Alarm(s) reported at secondary supprressed alarm page is/are shown in pink, italicised Note(s), whenever required is/are mentioned in greenwww.mapyourtech.com54Alarm Propagation Examples (contd.)Example 1AB

Assumption: AU-4 Mapping on both ports Root Cause: NO XConnect on both portsAU4 Signal Label Unequipped HP-RDIHP- UNEQ HP-RDIAU4 Signal Label Unequipped HP- UNEQ HP-RDIHP-RDINote: 1) if AU-3 mapping, then what happens? 2) In newer version of Tejas software, UNEQ is not reported for this root causewww.mapyourtech.com55Alarm Propagation Examples (contd.)HP-RDIHP- UNEQ AU4 Signal Label Unequipped Signal Label TUG-structureHP-SLMHP-RDITU-LOPExample 2Assumption: AU-4 Mapping on both ports, Root Cause: NO XConnect on the port of BAB

E1VC12Invalid TU Pointer valueLP-RDINote: LP-RDI is not reported on B (See Rule 3a)HP-SLM default action is report SLM, no downstream AISwww.mapyourtech.com56LOSMS-AISAU-AISTU-AISMS-RDIHP-RDILP-RDIAlarm Propagation Examples (contd.)VC-12VC-12 E1E1AC

B (Reg.) Example 3 Assumption: AU-4 Mapping on both ports of A & C Root Cause: Fiber cut in the link from A to BAISMS-RDIHP-RDILP-RDINote: The Reg. can not generate any RDI Actually at C, AU-AIS & TU-AIS conditions are also receivedwww.mapyourtech.com57LOSMS-RDIHP-RDI

LP RDIAlarm Propagation Examples (contd.) MS-AIS LP RDI MS-RDIHP-RDI

E1E1VC-12VC-12AC

BExample 4Assumption: AU-4 Mapping on all ports Root Cause: Fiber cut in the link from A to BVC-12ADM B VC-12 PTTU AIS

Note: Only TU-AIS is reported on Node C (See Rule 4c)LP RDI LP-RDI on B is SSAwww.mapyourtech.com58LOSMS-RDIHP-RDI

LP RDIAlarm Propagation Examples (contd.) MS-AIS LP RDI MS-RDIHP-RDI

E1E1VC-12VC-12AC

BExample 5Assumption: AU-4 Mapping on all ports Root Cause: Fiber cut in the link from A to BVC-4ADM B VC-4 PTNote: Only AU-AIS is reported on Node C (See Rule 4c) LP-RDI on B is not reported (See Rule 3b)AU AISTU AIS

www.mapyourtech.com59Invalid TU Pointers (1-1-2)TU-LOP (1-1-2)ADCBE1(2)VC-12 (1-1-2)Example 6 Assumption: AU-4 Mapping on all ports Root cause: NO XConnect on B, C & D for (1-1-2)E1 (1)E1 (1)VC-12 (1-1-1)LP RDI (1-1-2)Note: Why E1(1) is shown? LP-RDI is not reported on B (See Rule 3a)Alarm Propagation Examples (contd.)www.mapyourtech.com60Invalid TU Pointers (1-1-2)TU-LOP (1-1-2)LP RDI (1-1-2)Note: LP-RDI at node B is secondary suppressed TU-AIS at node A is reported as terminating alarm Alarm Propagation Examples (contd.)VC-12 (1-1-2)ADCBExample 7 Assumption: AU-4 Mapping on all ports Root cause: NO XConnect on C & D for (1-1-2)E1 (1)E1 (1)VC-12 (1-1-1)E1(2)VC-12 (1-1-2)TU-AIS (1-1-2)TU AIS (1-1-2)LP RDI (1-1-2)LP-RDI (1-1-2)www.mapyourtech.com61Invalid TU Pointers (1-1-2)TU-LOP (1-1-2)LP RDI (1-1-2)Note: K-L-M value need not remain same throughout a particular LP, alarms will be reported accordingly on different objectsAlarm Propagation Examples (contd.)TU-AIS (1-1-2)TU AIS (1-1-2)LP RDI (1-1-2)LP-RDI (1-1-2)VC-12 (1-1-2)ADCBExample 8 Assumption: AU-4 Mapping on all ports Root cause: NO XConnect on C for (1-1-2)E1 (1)E1 (1)VC-12 (1-1-1)E1(2)VC-12 (1-1-2)E1(2)VC12(1-1-2)Invalid TU Pointers (1-1-2)TU-LOP (1-1-2)LP RDI (1-1-2)www.mapyourtech.com62Invalid TU Pointers(1-1-1)TU-LOP(1-1-1)LP-RDI(1-1-1)Note: LP-RDI from A is not reported on B (See Rule 3b). Why assumption on SLM?Alarm Propagation Examples (contd.)ACBVC-12(1-1-1)VC-4VC-12(1-1-2)VC-12(1-1-2)E1 (1)E1 (2)E1(2)Example 9 Assumption: AU-4 Mapping on all ports, Root cause: NO XConnect on C for (1-1-1) VC4 PT at node B,For each port, HP-SLM default action is ignore SLMwww.mapyourtech.com63LOSMS-RDIHP-RDILP RDITU AISLP RDI MS-AIS

LP RDIMS-RDIHP-RDI

Alarm Propagation Examples (contd.)VC-12VC-12VC-12E1E1AC

BDExample 10 (with SNCP) Assumption: AU-4 Mapping on all ports Root cause: Fiber-cut in the link from A to B W A-B-C, P A-D-CVC-12Note: SNCP is always uni-directional & for Tejas, it is 1+1www.mapyourtech.com64www.mapyourtech.com65Alarms: Animated DescriptionSDH Alarms and Consequent ActionsRS-TIMLOSLOFRS-BIPMS-EXCMS-AISMS-BIPMS-RDIMS-REIMS-DEGMSTRSTSPIAU-LOPAU-AISMSAHP-UNEQHPOMHP-EXCHP-TIMHP-BIPHP-RDIHP-REIHP-DEGHPOM / HPTTU-AISHP-PLMTU-LOPHPALP-UNEQLPOMLP-EXCLP-TIMLP-BIPLP-RDILP-REILP-DEGLPOM / LPTLP-PLMLPAHP-LOMwww.mapyourtech.com66Learn and Share!LOFLINETRIBPDHNELINENELOFMS-RDIAU/TU-AISPDH-AISA1,A2K2=XXXXX110PROBLEM ON FRAMEALIGNMENT WORDXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com68RS-TIMLINETRIBPDHNELINENERS-TIMMS-RDIAU/TU-AISPDH-AISJOK2=XXXXX110RECEIVED REGENERATORSECTION TRACEIDENTIFIER MISMATCHXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com69RS-BIPLINETRIBPDHNELINENERS-BIPB1ERRORED SIGNALNEAR ENDPERFORMANCECOLLECTIONXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com70LINETRIBPDHLINENEMS-AISMS-AISMS-RDIAU/TU-AISPDH-AISK2=XXXXX110K2=XXXXX111TROUBLE ON THERECEIVED SIGNAL(LOS, LOF, RS-TIM)MS-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com71MS-EXCLINETRIBPDHNELINENEMS-EXCMS-RDIAU/TU-AISPDH-AISB2K2=XXXXX110EXCESSIVE BITERROR RATE( 1X10 E -3)NEAR ENDPERFORMANCECOLLECTIONXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com72MS-BIPLINETRIBPDHNELINENEMS-BIPB2ERRORED SIGNALNEAR ENDPERFORMANCECOLLECTIONMS-REIM1XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com73MS-RDILINETRIBPDHNELINENEMS-RDIMS-RDIK2=XXXXX110TROUBLE ON THERX SIDE(LOS, LOF. RS-TIM,MS-AIS, MS-EXC,

XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com74MS-REILINETRIBPDHNELINENEMS-REIM1FAR ENDPERFORMANCECOLLECTIONERRORED SIGNALMS-REIXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com75MS-DEGLINETRIBPDHNELINENEMS-DEGMS-REIB2M1DEGRADATION(1X10 E -5 1X10 E -9 )NEAR ENDPERFORMANCECOLLECTIONXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com76LINETRIBPDHNELINENEAU-4 XCAU-AISAU-AISPDH-AISG1 =XXXX100XTROUBLE ON THERX SIDE(LOS, LOF, RS-TIM,MS-AIS, MS-EXC,

HP-RDIAU-AISAU/TU-AISAISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com77LINETRIBPDHNELINENEAU-LOPAU-LOPPDH-AISG1 =XXXX100XTROUBLE ON THEAU POINTER VALUE(WRONG SETTINGSDH/SONET, DEG,HW FAILURE)HP-RDIAU/TU-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHH1,H2 www.mapyourtech.com78LINETRIBPDHNELINENEHP-UNEQHP-UNEQC2 = 00000000AU-4 CHANNELNOT CONNETTEDXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com79LINETRIBPDH 140MNELINENEHP-TIMG1 =XXXX100XHP-TIMHP-RDIRECEIVED HIGHER PATH TRACEIDENTIFIER MISMATCHHP-TIMJ1PDH-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com80HP-BIPLINETRIBPDH 140MNELINENEERRORED SIGNALNEAR ENDPERFORMANCECOLLECTIONHP-BIPB3HP-BIPHP-REIG1 (1,2,3,4)XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com81HP-RDILINETRIBPDH 140MNELINENEHP-RDITROUBLE ON THERECEIVED HP(AU-AIS, AU-LOP, HP-TIM,HP-PLM, HP-EXC)

HP-RDIHP-RDIG1 =XXXX100XXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com82HP-REILINETRIBPDH 140MNELINENEFAR ENDPERFORMANCECOLLECTIONERRORED SIGNALHP-REIHP-REIHP-REIG1 (1, 2, 3, 4)XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com83HP-DEGLINETRIBPDH 140MNELINENENEAR ENDPERFORMANCECOLLECTIONHP-DEGHP-DEGHP-REIG1 (1,2,3,4)DEGRADATION(1X10 E -5 1X10 E -9 )

B3XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com84HP-EXCLINETRIBPDH 140MNELINENENEAR ENDPERFORMANCECOLLECTIONHP-EXCHP-EXCHP-RDIEXCESSIVE BITERROR RATE( 1X10 E -3)B3G1 =XXXX100XXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com85LINETRIBPDHNELINENEHP-PLMHP-PLMTU-AISPDH-AISG1 =XXXX100XUNEXPECTED HIGHERPATH PAYLOD LABELHP-RDIXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHC2www.mapyourtech.com86LINETRIBPDH1.5-2-34-45MNELINENETU XCTU-AISTU-AISTROUBLE ON THERX SIDE(AU-AIS, AU-LOP,HP-TIM, HP-PLM)TU-AISAISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHLP-RDIV5 = XXXXXXX1PDH-AISAISwww.mapyourtech.com87LINETRIBPDH1.5-2-34-45MNELINENETU-LOPTU-LOPV5 = XXXXXXX1TROUBLE ON THETU POINTER VALUE(DEGRADATION,HW FAILURE)TU-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHV1, V2LP-RDIPDH-AISAISwww.mapyourtech.com88LINETRIBPDH1.5-2-34-45MNELINENELP-TIMV5 = XXXXXXX1LP-TIMLP-RDIRECEIVED LOWER PATH TRACEIDENTIFIER MISMATCHLP-TIMJ2PDH-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com89LP-BIPLINETRIBPDH1.5-2-34-45MNELINENEERRORED SIGNALNEAR ENDPERFORMANCECOLLECTIONLP-BIPV5 (1, 2)LP-BIPLP-REIV5 (3)XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com90LP-RDILINETRIBPDH1.5-2-34-45MNELINENELP-RDITROUBLE ON THERECEIVED LP(TU-AIS, TU-LOP, LP-TIM,LP-PLM, LP-EXC)

LP-RDILP-RDIV5 = XXXXXXX1XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com91LP-REILINETRIBPDH1.5-2-34-45MNELINENEFAR ENDPERFORMANCECOLLECTIONERRORED SIGNALLP-REILP-REILP-REIV5 (3)XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com92LP-DEGLINETRIBPDH1.5-2-34-45MNELINENENEAR ENDPERFORMANCECOLLECTIONLP-DEGLP-DEGLP-REIV5 (3)DEGRADATION(1X10 E -5 1X10 E -9 )

V5 (1, 2)XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com93LINETRIBPDH1.5-2-34-45MNELINENELP-EXCNEAR ENDPERFORMANCECOLLECTIONLP-EXCLP-EXCLP-RDIEXCESSIVE BITERROR RATE( 1X10 E -3)V5 (1, 2)V5 = XXXXXXX1XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com94LINETRIBPDH1.5-2-34-45MNELINENELP-PLMLP-PLMUNEXPECTED LOWERPATH PAYLOD LABELPDH-AISLP-RDIV5 = XXXXXXX1XXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com95LINETRIBPDHNELINENELP-UNEQLP-UNEQV5 (5, 6, 7) = 000TU CHANNELNOT CONNETTEDXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHwww.mapyourtech.com96LINETRIBPDH1.5-2MNELINENEHP-LOMHP-LOMV5 = XXXXXXX1TROUBLE ON THEMULTIFRAME ALIGNMENTWORDTU-AISXXX= DETECTEDXXX= GENERATEDXXX= SENT BACKXXX= MONITOREDAIS= SIGNAL PASSED THROUGHH4LP-RDIPDH-AISAISwww.mapyourtech.com97Regenerator SectionMultiplex SectionHigher Order PathLower Order PathA1/A2J0B1K2B2M1K2C2J1B3G1G1H4C2V5J2V5V5V5V5LOS LOFRS-TIMRS-BIPMS-AISMS-BIPMS-REIMS-RDIAU-AISAU-LOPHP-UNEQHP-TIMHP-BIPHP-REIHP-RDITU-AISTU-LOPTU-LOMHP-PLMLP-UNEQLP-TIMLP-BIPLP-REILP-RDILP-PLMAISAISAISAISAISAISAISError indicator alarm sent upstreamAlarm indicator sent upstreamError/alarm detectionwww.mapyourtech.com98www.mapyourtech.com99Performance Monitoringwww.mapyourtech.com100Overhead TerminationLPTHPTMSTRSTRSTMSTHPTLPTRSOHMSOHVC-4 POHVC-12, VC-3 POH2M, 34M UnitSTM-n Unit2M, 34M UnitLPT: Lower-order Path terminationHPT: High-order Path terminationMST: Multiplex Section TerminationRST: Regenerator Section TerminationSTM-n UnitSTM-n Unit or140M UnitSTM-n Unit or140M Unit Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 100Overhead bytes carry administration, monitoring, and maintenance information for the signals being transmitted in the network.Recalling basic SDH theory, there are two kinds of overhead:2.1 Section Overhead (SOH) and Path Overhead (POH). SOH is further classified into Multiplex Section Overhead (MSOH) and Regenerator Section Overhead (RSOH).POH is further classified into High Order Path Overhead (HOPOH) and Low Order Path Overhead (LOPOH) For each segment of a transmission link, the corresponding overheads are terminated accordingly.The above figure shows the Low Order Path (VC-12,or VC-3) Termination. Between LTPs several sets of HPT, between HTPs several sets of MST and between MSTs several sets of RST might be used. For the High Order Path (VC-4) Termination, no LTP is used.Overhead of higher layer runs transparent low layers until they are terminated in the same level as they were created at the transmitting end. For example in the above figure, the HOPOH would run transparent through MST and RST of both transmitting and receiving sides.Typical location of termination functions is shown above. But it depends on equipment design. Especially, HTP location might vary depending on the cross connection level setting. Learn and Share!www.mapyourtech.com101Overhead Termination STM-N unitSTM-NTSI unitRSTMSTHPTLPTCrossconnect Level

VC-12 or VC-32M or 34M2M or 34M unitSTM-N unitSTM-NTSI unitRSTMSTHPTCrossconnect Level

VC-4140M140M unitSTM-N unitSTM-NTSI unitRSTMSTHPTHPTMSTRSTCrossconnect Level

VC-12 or VC-3STM-NSTM-N unit STM-N unitSTM-NTSI unitRSTMSTRSTCrossconnect Level

VC-4STM-NSTM-N unitMST Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 101The STM-N interface unit has RST, MST and HPT functions.1.1 The HPT is activated or deactivated depending on internal interface condition to the TSI unit (cross-connection).1.2 When the cross-connection level of the corresponding VC-4 (AU-4) is set to either VC-12 or VC-3 (LOVC) level, the HTP is activated. This means that regardless LO path which is carried by the VC-4 is connected to 2 or 34M tributary interface or extended to another STM-N line (either an aggregate or tributary line), the HO path is terminated at this point (within the STM-N interface card).1.3 When the cross-connection level of the corresponding VC-4 (AU-4) is set to VC-4 (HOVC) level, the HTP is deactivated. It does not matter if the VC-4 carries LOVCs or 140M.The 2M or 34M interface unit has LPT function.The LO path is terminated in the tributary interface card.The 140M interface unit has HPT function.The HO path that carries a 140M is terminated in the tributary interface card.

note : An AU-4 (VC-4) that carries LOVCs is called VC organized AU. It distinguishes the one which carries a single VC-4 (140M).Learn and Share!Performance Monitoring Pointwww.mapyourtech.com102 Physical Layer

Section Layer

Adaptation High/Low-order Path Termination Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 102SDH equipment has many performance monitoring (PM) items to help operators activity. They are grouped and belong to above categories.Physical LayerThe physical layer includes optical interfaces, PDH interfaces and external clock interface.Section LayerThis layer is related to RSOH and MSOH termination.AdaptationAdaptation is a transport processing function, i.e. AU-4 pointer processing.High/Low-order Path TerminationPM items related to path quality are included in this category.

Learn and Share!www.mapyourtech.com103Performance Monitoring -Physical Layer- Optical InterfaceLDBC:Laser Diode Bias Current PDH InterfaceCV-L:Code Rule ViolationES-L:Errored SecondSES-L:Severely Errored Second

External Clock InterfaceCV- :Code Rule ViolationES- :Errored Second)SES- :Severely Errored Second : L or P Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 103LDBC (Laser Diode Bias Current) The driving current of a laser diode consists of high speed pulse current and constant bias current. The bias current is controlled to keep the optical output level constant. Increase of this value suggests degradation of the laser diode. It should be noted that the current varies with environment temperature change also.CV (Code Violation) Quality of PDH input signal is checked by the detection of the EDC (Error Detection Code ) rule violation.The EDCfor 2M is CRC or HDB3, for 34M is HDB3 andfor 140M is CMI.The CV is the error count during the measuring period (15 min. or 1 day)The detected errors (CV) are also converted to ES (Errored Second) and SES (Severely Errored Second). ES and SES will be explained latter.Same PM is applied to the external clock from the PRC (or SSU), when it used and the interface is Table 6/G.703.L stands for Line and P for Path.Error check by CRC belongs to P, because it can detect errors of entire 2M transmission (2M path) even if it pass through multiplexing system. HDB3 belongs to L, because it can detect only 2M line errors but cannot check errors occurred in multiplex system.Learn and Share!www.mapyourtech.com104Performance Monitoring -Section Layer- Regenerator (RS) and Multiplex (MS) Section ES-:Errored SecondSES- :Severely Errored SecondsBBE- :Background Block ErrorUAS- :Unavailable SecondsOFS- :Out of Frame Seconds (OOF) Multiplex Section Far-endES-MSFE:Errored SecondSES-MSFE:Severely Errored SecondsBBE-MSFE:Background Block ErrorUAS-MSFE:Unavailable Seconds

Multiplex Section PSC:Protection Switching Count PSD:Protection Switching Duration : RS or MS Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 104The error performance of RS and MS is checked by BIP-n (Bit Interleaved Parity n), EDC of STM-N, using B1 and B2 in SOH. And it is translated to ES, SES, BBE (Background Block Error) and UAS (Unavailable Seconds), which will be explained latter. (They will be explained latter.)They are reported as number of seconds or errored blocks during a measuring period (15 min. and 1 day).OFS (Out of Frame Second) 2.1 One second period in which loss of STM-N frame synchronization is detected.The result of MS error detection is reported to the other end of the MS using MS-REI. It is processed to ES-MSFE, SES-MSEF, BBE-MSFE and UAS-MSFE. Thus, the transmitting side of the MS can know the transmission quality of the STM-N that it sent out. FE means far end.PSC (Protection Switch Count) Frequency of the multiplex section protection switching.PSD (Protection Switch Duration) Accumulated time (in seconds) of protection line occupation (during 15 min. and 1 day). For the revertive switch (1:1) mode only.Learn and Share!www.mapyourtech.com105Performance Monitoring -Adaptation- AU-4 Pointer PJE (positive):Pointer Justification Event (positive) PJE (negative):Pointer Justification Event (negative)

Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 105 When the AU-4 and the VC-4 are not synchronous, i.e. they are generated by using different clock signal, the frequency justification takes place. If the AU-4 is faster than the VC-4, the positive justification is applied, and for opposite case, the negative justification. This is carried out by the pointer processing.1.1 PJE(positive)Occurrence of the positive justification is counted and reported.1.2 PJE(negative)Occurrence of the negative justification is counted and reported. When the all NEs in the network slave to a single PRC, usually the justification does not happen, except for unusual case like large jitter occurrence. Therefore, reporting of PJE indicates :3.1 Some of NEs (including itself) went into the internal clock mode.3.2 The node is handling a VC-4 that is generated in a different network.Learn and Share!www.mapyourtech.com106Performance Monitoring -Path Termination- High/Low-order Path (receiving direction)ES-:Errored SecondSES- :Severely Errored SecondsBBE- :Background Block ErrorUAS- :Unavailable Seconds High/Low-order Path (transmitting direction)ES-FE:Errored SecondSES-FE :Severely Errored SecondsBBE-FE :Background Block ErrorUAS-FE :Unavailable Seconds : HO or LO Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 106 Error performance of all path is checked using BIP-n.1.1 High order path:BIP-8 by B3 in POH1.2 Low order path:BIP-2 by V5 in POHThe results are processed to ES, SES, BBE and UAS.The detected error count is reported back to the opposite path originating point as REI (Remote Error Indication) and they are also processed to ES, SES, BBE and UAS. FE is an acronym of far end.Learn and Share!www.mapyourtech.com107Terms and Definitions(used by error performance)EDC:Error Detection Code

Block:block

EB:Errored Block

Defect:defect

ES:Errored Second

SES:Severely Errored Second

BBE:Background Block Error

CV:Code Violation

UAS:Unavailable Second Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 107To express error performance of a transmission line many parameters are used. Those terms related to error performance will be explained by following slides. They are defined by G.826.EDC (Error Detection Code)Error detection mechanisms are inherent to transmission systems. Examples are CRC, Parity Check, BIP-n (used by SDH), etc.BlockA sequence of bits used by an EDC. A block is a set of consecutive bits associated with the path. Each bit belongs to one and only one block.Next slide explains the concept of the block using BIP-8 of VC-4 as an example.

Learn and Share!www.mapyourtech.com108BIP-8 of VC-412234811112222333344445555666677778888234931262226323482349Groupof8bitsVC-4261Block(18792bits/block)B3BIP-8 check sequence Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 108BIP-n (Bit Interleaved Parity - n)Monitoring method called BIP-n is used for SDH section and path.The signal to be monitored, which is one frame in the above figures case, is divided into small blocks of n-bit size. An even parity check is applied to each bit of all blocks in the frame, from 1st to the nth bit independently. The corresponding bit of the B byte in the next frame shows the result.Error performance of a VC-4 path uses BIP-8 as described above.All bits in a VC-4 frame is divided to small blocks with 8 consecutive bits (2349 blocks in total). kth bit of each small block is checked as described in the right drawing. The EDC of a VC-4 path is BIP-8.Each checking sequence has its own parity result but it is not considered as the block. Because it is not a consecutive sequence of bits and the definition of the block requires consecutive bits.One cycle of EDC (BIP-8 in this case) is completed when all 8 checking sequence is finished and it is applied to consecutive bits of a path.Therefore, in this case, the block corresponds to a VC-4 frame.The block of RS error check is a entire STM-N frame and the block of MS error detection is a STM-N frame excluding RSOH portion.

Learn and Share!www.mapyourtech.com109Terms and Definitions(used by error performance)EDC:Error Detection Code

Block:block

EB:Errored Block

Defect:defect

ES:Errored Second

SES:Severely Errored Second

BBE:Background Block Error

CV:Code Violation

UAS:Unavailable Second Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 109EB (Errored Block):A block in which one or more bits are in error. For BIP-n, when a parity error is detected in one or more check sequences, that block is considered as EB.Defect:In-service defect conditions for near-end are:LO path: LOP, LOM, SLM,TU-AIS,UNEQHO path: LOP, SLM,TIM,AU-AIS,UNEQSection: LOF, LOS,TIM,MS-AISand for far-end:RDI LOP:Loss of pointerLOM:Loss of multiframe (for LOVC)LOF:Loss of frame (STM-N frame)LOS:Loss of signalTIM:Trace Indicator MismatchSLM:Signal Label MismatchAIS:Alarm Indication SignalUNEQ:Unequiped (one of signal label indication)

Learn and Share!www.mapyourtech.com110Terms and Definitions(used by error performance)EDC:Error Detection Code

Block:block

EB:Errored Block

Defect:defect

ES:Errored Second

SES:Severely Errored Second

BBE:Background Block Error

CV:Code Violation

UAS:Unavailable Second Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 110ES (Errored Second):A one second period with one or more errored blocks (EB) or at least one defect. (For VC-4, one second period consist of 8000 blocks (1sec/125us = 8,000).SES (Severely errored second) :A one second period which contains > 30% errored blocks or at least one defect. SES is a subset of ES. (In case of VC-4, SES threshold is 2400 blocks/sec (8000 x 30% = 2400).)BBE (Background Block Error) :An errored block not occurring as part of an SES.Relation between ES, SES and BBE is depicted in next slide.

Learn and Share!Generation and Detection of SDH Performancewww.mapyourtech.com111Bit Error Generation Mechanism Mechanism: Bit interleaved parity (BIP) Transmit end: The result of BIP is placed in the relevant bytes of the next frame Receive end: Compare the result of BIP with the bytes of the next frame

B1: BIP8 for the regenerator section error monitoring functionB2: BIP24 for multiplex section error monitoring functionB3: BIP8 for monitoring the bit error performance of VC-4V5: BIP2 for monitoring the bit error performance of VC-12Notice: The Sequence of descramble& BIPGeneration and Detection of SDH Performancewww.mapyourtech.com112B1B2B3V5RSTMSTHPTLPTLPTHPTMSTRSTErrors occurring in Low order path will not be detected in High order path, High order bit errors will trigger Low order errors.Error Detection and ReportGeneration and Detection of SDH Performancewww.mapyourtech.com113TermsTerm Description BE Errored block, in which one or more bits are in error. BBE Background block error, it is an errored block occurring outside of the period of UAT and SES. FEBBE Far end block of background error, it is a BBE event detected at the far end. ES Errored second, it is a certain second with one or more errored blocks detected. FEES Far end errored second, in which an ES event detected at the far end. SES Severely errored second, it is a certain second which contains 30% errored blocks or at least one serious disturbance period (SDP). Here, the SDP is a period of at least four consecutive blocks or 1ms (taking the longer one) where the error ratios of all the consecutive blocks are 10-2 or loss of signal occurs. Generation and Detection of SDH Performancewww.mapyourtech.com114Term Description FESES Far end severely errored second, in which an SES event detected at the remote end. CSES Consecutive severely errored second, in which the SES events consecutively occur, but last less than 10 seconds.FECSES Far end consecutive severely errored second, in which a CSES event detected at the far end. UAS Unavailable second, it is a period of 10 consecutive seconds during which the bit error ratio per second of the digital signal in either of the transmission directions of a transmission system is inferior to 10-3 . These ten seconds are considered to be part of unavailable time.TermsGeneration and Detection of SDH Performancewww.mapyourtech.com115Adjust pointers as required in practice, so as to tolerate rate asynchronization and phase difference of payload signals. That is, perform pointer justification on information payloads to make the payloads synchronous with the STM-N frameMechanismAdministrative unit pointer (AU_PTR)Tributary unit pointer (TU_PTR) Sort

Pointer JustificationGeneration and Detection of SDH Performancewww.mapyourtech.com116

H1 Y Y H2 F F H3 H3 H3VC49

row10270 Column91Location:Causation:Network is out of synchronizationPointer justification state:NameByte numbering and content of the fourth row in STM-1 frameRate relation 789101112ZeroH3H3H3InfoInfoInfoInformation = container PositiveH3H3H3Stuffing Stuffing Stuffing Information< container NegativeInfoInfoInfoInfoInfoInfoInformation> container Generation Mechanism of AU Pointer JustificationGeneration and Detection of SDH Performancewww.mapyourtech.com117

Causation:Transformed from AU pointer justification The system clock is not consistent with the received clock Pointer justification occurs at the upstream NE where the service passes

Remote detection:Occur at the local station, report at the remote stationLocal detection: Generate at the local station, report locally

Generation Mechanism of TU Pointer JustificationDetection and Reporting of Pointer JustificationRelationship between Alarms and Performancewww.mapyourtech.com118ItemPerformance EventAlarm EventLocal endRemote endLocal endRemote endRSRSBBE-B1_OVER-MSMSBBEMSFEBBEB2_OVERMS_REIHPHPBBEHPFEBBEB3_OVERHP_REILPLPBBELPFEBBEBIP_OVERLP_REIFunctions of alarm and performance for bit error threshold crossingAlarm and Performance are belong to different levels. Alarm indicates the fault of transmission, performance indicates the signal degrade of transmission. If the value of performance is high than threshold it will translate into alarm. For example bit error can translate into EXC alarm then causes the traffic interrupt.Relationshipwww.mapyourtech.com119Relation between ES, SES and BBE

Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 119Learn and Share!www.mapyourtech.com120Terms and Definitions(used by error performance)EDC:Error Detection Code

Block:block

EB:Errored Block

Defect:defect

ES:Errored Second

SES:Severely Errored Second

BBE:Background Block Error

CV:Code Violation

UAS:Unavailable Second Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 120CV- L (Code Violation-Line):Line error detected by the line code rule violation.HDB3 is the line code for 2M and 34M PDH signal. 2M external clock interface (Table 6/G.703) uses HDB3.CMI is the line code for 140M PDH signal.CV- P (Code Violation-Path):Error of 2M signal detected by using CRC. Applicability depends on equipment design.UAS (Unavailable Second):See next slide.

Learn and Share!www.mapyourtech.com12110 sec.10 sec.< 10 sec.Unavailability detectedAvailability detectedUnavailable periodAvailable periodError-free secondSeverely errored secondSESErrored secondESUnavailable Second Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 121UAS (Unavailable Second) :A period of unavailable period begins at the onset of ten consecutive SES events. These ten seconds are considered to be part of the unavailable time. A new available period begins at the onset of ten consecutive non-SES events. Occurrence of ESs during this ten seconds is allowed. These ten seconds considered to be part of the available time.The length of unavailable period in seconds is named Unavailable Second (UAS).

Learn and Share!www.mapyourtech.com122

Storage of PM datatimepastfuture0**0*0*000000000000000000**0**0*0*0000000000**item aitem bitem xitem yitem aitem bitem xitem ymemoryoldnewZero Suppressionall zero data with time stamp of occurrenceZero SuppressionPM items of one facility Alarm and Performance Monitoring SDHFS0341EIssue 2, December 2001 122All PM items counting are accumulated in 15 minutes and 1 day period and they are stored in a memory.Accumulation periods are controlled by a clock. The 15 min. accumulation is reported and stored at every hh:00, hh:15, hh:30 and hh:45 and the 1 day accumulation report is at 00:00 of each day. For 15 min., data of maximum 32 periods can be stored and the oldest data is discarded when the memory overflows. When all PM items of a group (facility) are zero count, the data of that period is not stored until some of the items register non-zero counting. This is called zero suppression. The end of the zero suppression is indicated by storing a zero data with a time stamp (not a 15 min. increment but a real time) of new count occurrence.Therefore, thirty-two 15 min. periods does not always mean 8 hours but longer.For 1 day, only yesterdays data is stored.This data storage method is a typical one, and there is slight difference depending on design.The data of current on going period is also retrievable and it is updated every 1 minute.For the current data, it is possible to set a threshold (programmable) and when the count exceeds the threshold TCA (Threshold Crossing Alert) is reported.

Learn and Share!Bit error defects familywww.mapyourtech.com123EXC = EXCessively errored signalDEG = DEGraded signalCMI = Code Mark Inversion

All members of the [large] family of bit error defects have a common originerrors in the transmission/reception of a signal.

SDH calculates a parity check and places the results in the overhead.Occurs in both Tx and Rx. A difference indicates a bit error in transmission/receptionAnother detection mechanism is for electrical signalsAn invalid sequence is a code violation PPI-EXC and ES-CMI defect originate from code violations.

SDH paths and sections may have EXC and DEG defects [Different degrees of errors]EXC represent an EXCessive number of bit errors the signal is so badly errored as to be unusable EXC defects represent a bit error ratio of 10-3 or 10-4. EXC results in a protection switch at the closure point of a sub-network connection and may be configured to insert AIS and RDI. DEG defects represent a bit error ratio of 10-5 or lessDEG does not result in a protection switch or raising of any consequent action.What is Performance Monitoringwww.mapyourtech.com124Performance monitoring is used to measure Traffic QualityHow? By counting anomalies and defects.

Why are they needed?To diagnose faults in a network OR detect occurrence of dribbling errors.Measure a networks performance and its service capability.At the edge of the networkWithin the networkCheck service level agreements for end customers and find out whether they have been satisfied or breached.

Reporting performance monitoringNE collects and logs PMs continuously for all connections.EC-1 collects PMs from all NEs in span of control.INM collects PMs from the complete network.Performance Monitoring Pointswww.mapyourtech.com125Performance Monitoring Points [PMPs] are points at which software collects performance monitoring [PM] data. The PM data is a measure of the quality of the transmission path at that point.

PDH End UserLP_NE V5, B3LP_FE V5, G1TU_PJEVc-12Vc-12PPI_CVVc-4Vc-4STM-NRS-OOF A1, A2RS-NE B1MS_NE B2MS_FE M1AU_PJEHP_NE B3HP_FE G1Optical Link via NetworkPDH End UserNE1NE2Table of PM pointswww.mapyourtech.com126PMs count will occur at the same points as where alarms will occurFE[Far End] PMs are associated with the RDI defect category. The destination you are sending to has received your signal in a defective state.PMP-TypeByteDefectsRS-OOFA1, A2RS-NEB1RS-LOS, RS-LOFMS_NEB2All RS defects, MS-AIS, MS-EXCMS_FEM1MS-RDIAU_PJEN/AN/AHP_NE, HPOM_NEB3All RS, MS defects, AU-AIS, AU-LOP, HP-LOM, HP-TIM, HP-PLM, HP-EXCHP_FE, HPOM_FEG1HP-RDITU_PJEN/AN/ALP_FELPOM_FEG1[VC-3]V5(b3[VC-12]HP-RDI, LP-RDILP_NELPOM_NEB3[VC-3]V5(b1-b2[VC-12]All RS, MS, AU, HP defects, TU-AIS, TU-LOP, LP-TIM, LP-PLM, LP-EXC, INT-LO-BUFFERES-CVN/AES-LOSPPI-CVN/APPI-LOSBIP Errors vs Block Errorswww.mapyourtech.com127B1 is an 8 bit parity byte, calculated across the complete SDH frame [2430 bytes for an STM-1 signal].B1 byte is generated/terminated at every NE.ANSI specifies BIPETSI/ITU specifies Block ErrorsThe B1 Byte is treated as 1 blockThe B1 Byte is treated as BIP-8 [since it has 8 bits]Example01010101Transmitted01110101011100010010011010101010Received= 1 Block Error, = 2 BIP Errors= 1 Block Error, = 1 BIP Error= 1 Block Error, = 5 BIP Errors= 1 Block Error, = 8 BIP Errors = Bit ErrorDefinition of BBE, ES, SES, UASwww.mapyourtech.com128Background Block Error [BBE]A Background Block Error [BBE] is a single errored Block in the SDH frame, not occurring as part of an SES or a UAS.Errored Second [ES]An Errored Second [ES] is a second during which at least one anomaly or one defect occurs, but not occurring as part of a UAS.Severely Errored Second [SES]A Severely Errored Second [SES] is a second during which at least X anomalies or one defect occurs, but not occurring as part of a UAS. By definition an SES is always an ES.Unavailable Second [UAS]An Unavailable Second is a second during which the signal is unavailable. It becomes unavailable at the onset of 10 consecutive seconds that qualify as SES, and continue to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES.How to interrupt SES and UASwww.mapyourtech.com129The difference between SES and UAS is conceptually difficult to understand.Therefore it is better clarified through the use of a diagram.Unavailable periods/detection and available periods/detection are indicated.= 2400 (> 10 secs) 0 0 0 1

Defects BBE ES SES UASNo Defects 0 0 0 0LOS, LOF (< 10 secs) 0 1 1 0LOS, LOF (> 10 secs) 0 0 0 11-Second filterFrame B1 errorsFrame RS defect, LOS, LOF1- second BBE, ES, SES, UASSDH Frame B1 Errors/Defects

DATE TIME FRAME B1 Errors Defects01/01/2000 00:00:00 0001 0 -01/01/2000 00:00:00 0002 0 -01/01/2000 00:00:00 0003 1 - . . . . . .01/01/2000 00:00:00 7998 0 -01/01/2000 00:00:00 7999 0 -01/01/2000 00:00:00 8000 0 - ---- TOTAL B1 Errors (x) = 0001}1-Second PM Counts

DATE TIME BBE ES SES UAS01/01/2000 00:00:00 1 1 0 001/01/2000 00:00:01 x x x x01/01/2000 00:00:02 x x x x 15-Minute Filterwww.mapyourtech.com1331- second BBE, ES, SES, UAS15-Minute Filter15-Minute BBE, ES, SES, UAS15-Minute PM Counts

DATE TIME BBE ES SES UAS01/01/2000 00:00 3 3 1 001/01/2000 00:15 x x x x01/01/2000 00:30 x x x x1-Second PM Counts

DATE TIME BBE ES SES UAS01/01/2000 00:00:00 1 1 0 001/01/2000 00:00:01 0 0 0 001/01/2000 00:00:02 0 1 1 0 . . . . . . . . . . . .01/01/2000 00:14:57 2 1 0 001/01/2000 00:14:58 0 0 0 001/01/2000 00:14:59 0 0 0 0}24 Hour Filterwww.mapyourtech.com1341- second BBE, ES, SES, UAS24-Hour Filter24-Hour BBE, ES, SES, UAS}24-Hour PM Counts

DATE BBE ES SES UAS01/01/2000 40 33 3 002/01/2000 x x x x03/01/2000 x x x x . . . . . . . . . . . .1-Second PM Counts

DATE TIME BBE ES SES UAS01/01/2000 00:00:00 1 1 0 001/01/2000 00:00:01 0 0 0 001/01/2000 00:00:02 0 1 1 0 30 . . . . 30 1 . 4 . . .01/01/2000 23:59:57 0 0 1 001/01/2000 23:59:58 5 1 0 001/01/2000 23:59:59 0 0 0 0TIME B1 Errors Defects1 5 -2 50 -3 500 -4 5000 -5 0 LOS6 40 LOS7 400 LOS8 4000 LOS9 2500 LOF10 2700 -11 3000 -12 4000 -13 5000 -14 6000 -15 7000 -16 0 -17 50 -18 0 -19 100 -20 0 -21 30 -22 0 -23 35 -24 0 -25 0 -26 0 -27 40 -28 0 LOF29 0 -BBE= 5 ES= 1 SES= UAS= BBE= 50 ES= 1 SES= UAS= BBE= 500 ES= 1 SES= UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= 1 BBE= ES= SES= UAS= BBE= 40 ES= 1 SES= UAS= BBE= ES= 1 SES= 1 UAS= BBE= ES= SES= UAS= TOTAL BBE= 595 ES= 15 SES= 11 UAS= 12 B1 errors5000 > 2400 [ 2400 [>10 secs]AND / ORDefectsLOS, LOF [>10secs]Unavailability DetectedAvailability DetectedB1 errorsX < 2400 [>10secs]AND / ORDefectsNo Defects [>10secs]www.mapyourtech.com135Accumulation of PMs over time 10 Second Period2 Seconds that qualify as SESwww.mapyourtech.com136FAQsQuestion and Answerswww.mapyourtech.com137What is the difference between an anomaly and a defect?Anomaly is a single occurrence of, or commencement of a conditionDefect is a persistent or repeated occurrence of an anomalyWhat is the main difference between a POM alarm and a LO or HO alarm?LPs / HPs are present on terminationPOMs are present when traffic is un-terminatedWhat is the main principle behind masking?Present alarm closet to sourceReduce the amount of fault analysis and alarm presentationA car fail alarm is raised on a PIU, What should you do?This alarm needs to be cleared first because it will mask all other alarms raised on the card/slot instanceWhat is the difference between a regenerator and a multiplexer?Regenerator terminates the RSOH, MSOH + payload continue, regenerator generates new OHMultiplexer fulfils the same function of a regenerator and also terminates / generates a MSOHQuestion and Answerswww.mapyourtech.com138What alarms does the Multiplex Section Termination give?Provides pointer processing and gives AU alarmsWhere are the Low Path Termination points?On PDH tributariesIf an unprotected limb has two POMs present which one is active the Rx or the Tx?Rx is activeIn a protected connection is a limb has a HPT or LPT present can HPOM/LPOM also be active?YesWhich bytes are responsible for the reporting of a LOF alarm, what section overhead are they found?A1 and A2 In RSOHWhere is AIS reported in relation to a defect?AIS is reported downstream from a defect, a user would look upstream to resolve the issueQuestion and Answerswww.mapyourtech.com139Why is there no RS-AIS alarm?Possibly redundancy [Like the TIM alarms which only has RS-TIM]Could also be that RS alarms on regenerators are passive and operate as a pass through. Multiplexers drop traffic and are better therefore to address issueHow many consequent actions are there and what are they?AIS, RDI/REI and protection switchesWhich alarm is more serious, RDI or REI?RDI is more seriousWhat type of cards produce CMI alarms?Electrical cards [comes from Code Mark Inversion line coding]What consequent actions does a DEG alarm produce?It doesntWhat type of payload would you expect on the raising of a UNEQ alarm?0What bytes carry PM information and where are they calculated?B1, B2 and B3. Calculated in hardware139Learn and Share!Various presentation collected from Internet {Huawei,Tejas,Nortel & Marconi) available free of costwww.mapyourtech.comwww.google.com

For further queries do reach on www.mapyourtech.comwww.mapyourtech.com140Referenceswww.mapyourtech.com141Thank You!