SDH TechnologyBhavik JoshiSenior Engineer Technical SupportEmail: [email protected]: +91-9821448943
PDH - Plesiochronous Digital Hierarchy
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION3
Plesio means = nearly
Chronous means= Timing
Plesiochronous –“Almost synchronous, because bits are stuffed into the frames as padding and the calls (signal) location varies slightly - jitters - from frame to frame"
PDH (Plesiochronous Digital Hierarchy)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION4
PDH Systems Worldwide
2048 kbit/s2048 kbit/s
64 kbit/s64 kbit/s
x 4
x 30/31x 24
x 3
x 7x 5
x 3
Japan USA Europe
primary rate
2. order
3.
4.
5.
32064 kbit/s32064 kbit/s
x 3
97728 kbit/s97728 kbit/s
397200 kbit/s397200 kbit/s
x 4
x 4
34368 kbit/s34368 kbit/s
139264 kbit/s139264 kbit/s
x 4
564992 kbit/s564992 kbit/s
x 4
8448 kbit/s8448 kbit/s
44736 kbit/s44736 kbit/s
274176 kbit/s274176 kbit/s
x 6
1544 kbit/s1544 kbit/s
6312 kbit/s6312 kbit/s
x 4
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION5
PDH Multiplex / Demultiplex
139264 kbit/s (+/-15ppm)
64 kbit/sData Signals
15 kHzSound ProgramSignals
1
2048 kbit/s (+/-50ppm)
8448 kbit/s (+/-30ppm)
34 368 kbit/s (+/-20ppm)
64 Channel Capacity:64 x 30 = 1920
0.3 to 3.1 kHzAF signals
DSMX34/140
DSMX8/34
DSMX2/8
1
30
DSMX64k/2
1
30
PCMX 30
1
PCMX 30
5
1
30
4
1
4
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION6
OLTU
34 - 140
8 - 34
2 - 8
OLTU
34 - 140
8 - 34
2 - 8
OLTU
34 - 140
8 - 34
2 - 8
OLTU
34 - 140
8 - 34
2 - 8
main
stand-by
140 Mbit/s 140 Mbit/s
Line TerminatingUnit
Line Terminating Unit
Drop & Insert Station
1,2 ................. 64 1,2 ................. 64
Plesiochronous Drop & Insert
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION7
Plesiochronous Hierarchy based on 2Mbps primary rates permits multiplexing up to 140Mbps respectively.
� Changing from one hierarchical level to anobher requires additional equipment.� Transmitting a multiplexed signal (34/140 Mb, etc) requires specialized equipment.� Redirection (cross-connection) of channels must be done by hand on DDFs.� Administrative connections require separate equipment to support Supervision and protection switching.� Compatibility of transmission and administrative signals between different vendor may give trouble.
Disadvantages of PDH
SDH – Synchronous Digital Hierarchy
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION9
� Need Extensive network management capability within the hierarchy.
� Standard interfaces between equipment.
� Need Inter-working between north American and European systems.
� Facilities to add or drop tributaries directly from a high speed signal.
� Need Standardization of equipment management process.
Needs of SDH
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION10
Why SDH ?
� Simple Drop & Insert of traffic channels(direct access to lower level systems without synchronization)
� Simpler multiplexing(low SDH level can be directly identified from higher SDH level)
� Allows mixing of ANSI and ETSI PDH systems
� SDH is open for new applications (It can carry PDH, ATM, HDTV, Ethernet, MAN, IP...)
� SDH provides TMN (ECCs)(for centralized network control)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION11
Synchronous Network Structure
2Mbit/s34Mbit/s
140Mbit/sSTM-1
STM-4
STM-1 / STS-3c Gateway to SONET
TM
DXC
ADMADMATMSwitch
STM-4/-16/-642Mbit/s
34Mbit/s
140Mbit/s
STM-1
LAN
2Mbit/s
ADM
STM-1
STM-1, STM-4
2Mbit/s
8Mbit/s34Mbit/s
140Mbit/s
ADM : Add Drop MultiplexerDXC : Digital Cross ConnectTM : Terminal MultiplexerDSC: Digital Switching CenterLAN: Local Area Network
DSC
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION12
Path Denominations
VC-2VC-1
VC-4VC-3VC-12
VC-4VC-3
VC-2VC-1
VC-4 VC-3 VC-12
VC-4VC-3
RegS
M X
S M
X
MultiplexSection
RegeneratorSections
Higher Order Path
Lower Order Path
STM-nRSOH
STM-nRSOH
STM-n MSOH
VC-4/3 POH
VC-1/2/3 POH
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION13
Bit Rates, Frame Structure and Interfaces in SDH
P
O
H
RSOH
Pointer
MSOH
Payload
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION14
E4: 139.264 kbit/s
DS3: 44.736 kbit/sE3 : 34.368 kbit/s
AUG C-4
TUG-3 TU-3 VC-3
C-3AU-3
x1
x3
x7
x7
x3
x1
STM-NSTS-3N
AU-4STS-3C
VC-4STS-3C
SPE
STS-1
VC-3STS-1SPE
TUG-2VT
group
x3
xN
x1
x4
DS1: 1.544 kbit/sTU-11 VC-11
C-11VT-1.5 VT-SPE
E1: 2.048 kbit/sTU-12 VC-12
C-12VT-2 VT-SPE
SDH
SONET
ITU-T G.707
BELLCORE GR.253ANSI T1.105
ATM: 149.760 kbit/s
ATM: 48,384 kbit/s
DS2: 6.312 kbit/sTU-2 VC-2
C-2VT-6 VT-SPE
x1
STM-0STS-1
SDH and SONET are International Standards
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION15
RSOH: Regenerator section overheadMSOH: Multiplex section overheadPayload: Area for information transport
Transport capacity of one Byte: 64 kbit/sFrame capacity: 270 x 9 x 8 x 8000 = 155.520 Mbit/sFrame repetition time: 125 µs
1
3
5
9
4
270
270 Columns (Bytes)
1 9transmitrow by row
RSOH
MSOH
AU Pointer Payload(transport capacity)
STM-1 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION16
PAYLOAD CONTAINERPOH
RSOH
POINTER
MSOH
1 9 10 2701
3
4
9
PAYLOAD CONTAINER: 9 (Rows) * 260 (Columns) * 64Kbps = 149.76 Mbps
POH: 9 (Rows) * 1 (Column ) * 64 Kbps = 0.576 Mbps
RSOH: 3 (Rows) * 9 (Columns) * 64 Kbps = 1.728 Mbps
MSOH: 5 (Rows) * 9 (Columns) * 64 Kbps = 2.880 Mbps
SDH Frame Structure
Frame Repetition Time is 125us
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION17
CC--44
STM-1 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION18
VCVC--44
CC--44
VC
VC
-- 4 P
OH
4 P
OH
STM-1 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION19
AUAU PointerPointer
AUAU--44
VCVC--44
CC--44
VC
VC
-- 4 P
OH
4 P
OH
STM-1 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION20
1
3
5
9
4
270270 Columns (Bytes)
1 9
RSOHRSOH AUAU--44
MSOHMSOH
AUAU PointerPointerVCVC--44
VC
VC
-- 4 P
OH
4 P
OH
CC--44
STM-1 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION21
ContainerContainer
Virtual ContainerVirtual Container
Administrative UnitAdministrative Unit
Synchronous Transport ModuleSynchronous Transport Module
Path Overhead
Pointer
Section Overhead
Plesiochronous signal 140Mbit/s
C4
VC-4
AU-4
STM-1
The way of integrating PDH signals into STM-1
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION22
12341234123412 . . . .
11111
22222
33333
44444
STM-1 #1
STM-1 #2
STM-1 #3
STM-1 #4
STM-4
�The STM-4/16/64 bit rate is obtained as integer multiples of the STM-1 tributary bit rate.
�Clock offset at the tributary side is taken into consideration by pointer adaptation on the STM-n output signal.
B1B2
B1B2
SOH termination New SOH
Higher SDH Bitrates
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION23
STM-4 SOH
A1 A1 A1 A1 A1 A1 A1 A1 A1 A1 A1 A1 A2 A2 A2 A2 A2 A2 A2 A2 A2 A2 A2 A2 J0 Z0 Z0 Z0 X X X X X X X X
B1 E1 F1 X X X X X X X X X X X X
D1 D2 D3 X
D4
B2 B2 B2 B2 B2 B2 B2 B2 B2 B2 B2 B2 K1 K2
D7
D10
S1 M1 E2 X X X X X X X X X X X X
D5
D8
D11
D12
D9
D5
36 bytes
B1 and B2 bytes are being recalculatedBytes E1, F1, K1, K2, D1 to D3 and D4 to D12 are taken from tributary #1
A U Pointers
Payload
#1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4 #1 #2 #3 #4
STM-4 Frame Structure
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION24
Basic Elements of SDH
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION25
J1B3C2G1F2H4F3K3N1
V5J2N2K4
AU - PTR
VC-3/4 POH
VC-11/12/ 2 POH
STM-1 SOH
Media dependent bytesX Reserved for national use
SOH: Section overheadPOH: Path overhead
The overheads (SOH, POH) are used for maintenance and supervision of the SDH transmission network.
RSOH
MSOH Payload
P O
H
Pointer
A1 A1 A1 A2 A2 A2 J0 X X
D1 D2 D3
B2 B2 B2 K1 K2D4 D5 D6 D7 D8 D9
D10 D11 D12 S1 M 1 E2 X X
B1 E1 F1 X X
H1 Y Y H2 1 1 H3 H3 H3
Embedded Overhead Bytes
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION26
� Parity check(B1 calculated by regenerator and multiplexers)
� Data communication channels(D1...D3, F1 between regenerators)
� Voice communication channels(E1 between regenerators)
� Frame Alignment(A1, A2)
� Section Trace(J0 Identfication of regenerator source)
A1 A1 A1 A2 A2 A2 J0 B1 E1 F1D1 D2 D3
B2 B2 B2 K1 K2D4 D5 D6D7 D8 D9D10 D11 D12S1 M1 E2
AU - Pointer
Functions of Regenerator Section Overhead
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION27
� Parity check (B2)
� Alarm information (K2)
� Remote error indication (M1,K2)
� Automatic protection switching(K1, K2 Bytes)
� Data communication channels(D4 to D12 between multiplexers)
� Clock source information (S1)
� Voice communications channels(E2 between multiplexers)
A1 A1 A1 A2 A2 A2 J0 B1 E1 F1D1 D2 D3
B2 B2 B2 K1 K2D4 D5 D6D7 D8 D9D10 D11 D12S1 M1 E2
AU - Pointer
Functions of Multiplexer Section Overhead
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION28
�Parity checkB3, V5/ BIP-2 calculated by path terminating point
�Alarm and performance information(V5, G1)
�Structure of the VCSignal label C2
� Multiframe indication for TUs (H4)
� User communications channelbetween path elements (F2, F3)
� Identification of the Path Source(Path Trace J1, J2)
J1B3C2G1F2H4F3K4N1
V5J2N2K4
VC-3/4 POH
VC-11/12/2 POH
Functions of Path Overhead
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION29
Higher-Order POH Functions (VC-3, VC-4)
Path error monitor (B3) BIP-8Path status report (G1) REI (Remote Error Indication)
count of error (BIP-8 results)RDI (Remote Defect Indication)
receiving path AIS, signal failurepath trace mismatch
Path trace (J1) verification of VC connectionuser programmable, 15 characters
Signal label (C2) indication of VC compositionunequipped, equipped-non-specific,TUG structure, locked TU, ATM,async. 34M or 45M, async. 140M,MAN (DQDB), FDDI
Path user channels (F2, F3) 64 kb/s clear channelsAPS signaling (K3) automatic protection switching at the
higher order path levelPosition indicator (H4) multiframe position for the VC-1, VC-2Network operator byte (N1) for tandem connection maintenance
REI; formerly FEBE (Far End Block Error), RDI; formerly FERF (Far End Receive Failure)
J1
B3
C2
G1F2
H4
F3
K3N1
VC-3 / VC-4payload
VC-3 / VC-4
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION30
Functions of Lower Order POH (VC-1x, VC-2)
K4
N2
J2
V5
500µs
125µs
REI RFI RDI1 2 4 5 6 7 83
Signal LabelBIP-2
V5 byte
Path error monitor (V5) BIP-2Path status report (V5) REI (Remote Error Indication)
count of error (BIP-2 results)RFI (Remote Failure Indication)RDI (Remote Defect Indication)
receiving path AIS, signal failure
Signal label (V5) indication of VC compositionunequipped, equipped-non-specific,asynchronous, bit synchronous,byte synchronous, equipped-unused
Path access point identifier (J2) verification of VC connectionuser programmable, 15 characters
Network operator byte (N2) for tandem connection maintenanceAPS signaling (K4) automatic protection switching at the
lower order path level
REI ; former FEBE (Far End Block Error)RDI ; former FERF (Far End Receive Failure)RFI ; formerly this bit was assigned to Path Trace
VC
-1x
/VC
-2
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION31
Frame Areas Covered by Parity Bytes
RSOH
MSOH
Payload
B1:- Supervision of the whole STM-1 frame
- Covers the regeneratorsections of a trans-mission system
B2:- Covers the multiplexsections (from networknode to network node)
B3:- Covers the transmissionpaths from beginning tothe end (tributary totributary)
RSOH
MSOH
PayloadPayload
RSOH
MSOH
Parity bytes providing a means to supervise the transmission quality of a life STM-N signal !
PayloadAU-PTR
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION32
The pointer technology provides a means to accommodate timing differences at SDHnetworks.The pointer indicates the start of the payload within a STM-1frame.
AU-Pointer
1
9
TU-PTR
VC
-4 P
OH
VC-12POH
VC-12
VC-4
STM-1
Pointers
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION33
H1 Y Y H2 1 1 H3 H3 H3
Opportunity fornegative stuffing(more capacity)
Pointerinc/decIDIDIDID
NDF,mapping struc,pointer inc/dec
J1
C4 payload
N N N N S S I D I D I D I D I D
H1 byte H2 byte
0 1 1 01 0 0 1
1 00 1
X X X X X X X X X X X X X X X X X X X X
1 0 0 1 S S 1 1 1 1 1 0 0 0 0 0
Opportunity forpositive stuffing(less capacity)
Pointer interpretation :
New data flag (NDF) disabled :New data flag enabled :AU/TU type AU-4/TU-3 :AU/TU type AU-3/TU-3 :AU-4 pointer 0...782 :TU-3 pointer 0...764 :Null pointer indication (NPI)
Use of the AU-4 Pointer Area, Coding
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION34
Negative Justification
Pointer with inverted D bits
RSOH
MSOH
H1 H2 H3
RSOH
MSOH
H1 H2 H3
RSOH
MSOH
H1 H2
RSOH
MSOH
H1 H2 H3
125µs
250µs
375µs
500µs
Start of VC-4
negative justification byte (data)
New pointer
Actual pointer
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION35
Pointer justification
frame n-1
AU-Pointerframe n
AU-Pointerframe n+1
SDH Network Elements
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION37
IP
SDH Layer Model
PDHATMSDHSDH
multiplexermultiplexer
SDHSDHRegeneratorRegenerator
##CrossCross--connectconnect
SDHSDHmultiplexermultiplexerSDH SDH SDH
PDHATMIP
Regenerator Section
Regenerator Section
Multiplex SectionMultiplex Section
Path
General view of Path Section designations
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION38
Elements of SDH Network
� Regenerator (Reg.)
� Terminal Multiplexer (TM)
� Add/Drop Multiplexer (ADM)
� Digital Cross Connect (DXC)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION39
SDH Regenerator
STM-N STM-NApplications: Line Signal Regenerationin Point-to-Point and RingNetworks
Terminal Multiplexer
STM-NPDH & STM-MTributariesM<N
Applications:Point-to-Point, TransmissionSystems (STM-1, STM-4, STM-16, STM-64)
SDH Network Elements
Regenerator, Amplifies the optical signal after converting back to electrical and generates a new optical signal of the same format Reshaping & timing of data stream
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION40
STM-1/4STM-1/4
Tributary Ports : n x 2 Mbit/s ( 34 Mbit/s)
ADM
......
WEST EAST
Add Drop Multiplexer
The Add And Drop Multiplexer (ADM) passes the (high rate) STM-n through from his
one side to the other and has the ability to drop or add any (low rate) tributary. The
ADM used in all topologies
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION41
16x16x
4x 4x
VC11
34
2
SDH Multiplexer
VC 4VC 3
VC 12
2.4 Gbit/s
622 Mbit/s
2.4 Gbit/s
622 Mbit/s
140 Mbit/s
34 (45)Mbit/s
2 (1.5)Mbit/s
140 Mbit/s
34 (45)Mbit/s
2 (1.5)Mbit/s
155 Mbit/s155 Mbit/s
VC12
VC3
140VC4
VC12
VC3
1402
2VC12
VC122
2140
VC12
22
3434
22
VC12
140 Mbit/s
34 Mbit/s 34 Mbit/s
140 Mbit/s
VC4140
155 VC4
155 Mbit/s
Synchronous Cross Connect
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION42
Digital Cross Connect:
�A digital cross connect is an equipment which has the capability of interconnecting tributaries
�An Agg to Agg connection, a trib to aggregate connection and a tributary to tributary connection is also possible in case of a Digital Cross Connect
Digital Cross Connect (DXC)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION43
SDH Network Topologies
PointPoint--toto--Point NetworkPoint Network
Chain Network Chain Network
TerminalMultiplexer
(TM)
TerminalMultiplexer
(TM)Regenerator
Trib
utar
ies
Trib
utar
ies
TerminalMultiplexer
(TM)
TerminalMultiplexer
(TM)
Add DropMultiplexer
(ADM) Trib
utar
ies
Trib
utar
ies
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION44
Ring Network
Add DropMultiplexer
(ADM)
Add DropMultiplexer
(ADM)
Add
Drop
Mul
tiple
xer
(ADM
)
Add DropMultiplexer
(ADM)
Add DropMultiplexer
(ADM)
Add DropM
ultiplexer(ADM
)
Trib
utar
ies
Trib
utar
ies
Tributaries Tributaries
TributariesTributaries
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION45
2Mbit/s34Mbit/s
140Mbit/sSTM-1
STM-4SDH
STM-1 / STS-3c Gateway to SONET
TM
DXC
ADMADMATM
Switch
STM-4/-162Mbit/s
34Mbit/s
140Mbit/s
STM-1
LAN
2Mbit/s
ADM
STM-1
STM-1, STM-4
2Mbit/s
8Mbit/s
34Mbit/s
140Mbit/s
ADM : Add Drop MultiplexerDXC : Digital Cross ConnectTM : Terminal Multiplexer
Hybrid Networks Connect Old and New Technologies
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION46
LOS Loss Of Signal LOS Loss Of Signal TSE Test Sequence Error (Bit Err.) TSE Test Sequence ErrorLSS Loss of Sequence Synchron. LSS Loss of Sequence Synchr.LTI Loss of incoming Timing Ref. LTI Loss of inc. TimingRefOOF Out Of Frame OOF Out Of FrameLOF Loss Of Frame LOF Loss Of FrameB1 Regenerator Section BIP Err. B1 Section BIP ErrorsB2 Multiplex Section BIP Err. B2 Line BIP ErrorsMS-AIS Multiplex Section AIS AIS-L Line AISMS-RDI Mux Sect. Remote Defect Ind. RDI-L Line remote Defect Ind.MS-REI Mux Sect. Remote Errro Ind. REI-L Line Remote Error Ind.AU-LOP Loss Of AU Pointer LOP-P SP Loss Of PointerAU-NDF New Data Flag AU Pointer NDF-P SP New Data FlagAU-AIS AU Alarm Ind. Signal AIS-P SP AISAU-PJE AU Pointer Just. EventB3 HO Path BIP Errors B3 SP BIP ErrorsHP-UNEQ HO Path Unequipped UNEQ-P SP UnequippedHP-RDI HO Path Remote Defect Ind. RDI-P SP Remote Deect. Ind.HP-REI HO Path Remote Error Ind. REI-P SP Remote ERrro Ind.
PDI-P SP Payload Defect Ind.HP-TIM HO Path Trace Ident. Mismatch TIM-P SP Trace Ident. MismatchHP-PLM HO Path Payload Label Mism. PLM-P SP Payload Label MismatchTU-LOP Loss Of TU Pointer LOP-V VP Loss Of PointerTU-NDF New Data Flag TU Pointer NDF-V VP New Data FlagTU-AIS TU AIS AIS-V VP AISTU-LOM Loss Of Multiframe LOM Loss Of MultiframeBIP-2/B3 LO Path BIP Errors UNEQ-V VP UnequippedLP-RDI LO Path Remote Defect Ind. RDI-V VP Remote Defect Ind.LP-REI LO Path Remote Error Ind. REI-V VP Remote Error Ind.LP-RFI LO Path Remote Failure Ind. RFI-V VP Remote Failure Ind.
PDI-V VP Payload Defect Ind.LP-TIM LO Path Trace Ident. Mismatch TIM-V VP Trace Ident. MismatchLP-PLM LO Path Payload Label Mism. PLM-V VP Payload Label Mism.
Mux
Sec
tM
ux S
ect ..
Phy
sP
hys .
/./ Reg
Reg
..S
ect
Sec
t ..H
ighe
rH
ighe
r Ord
erO
rder
Pat
hP
ath
Low
erLo
wer
Ord
erO
rder
Pat
hP
ath
Line
Line
(L)
(L)
STSSTS
Pat
hP
ath
(SP
)(S
P)
VTVT
Pat
hP
ath
(VP
)(V
P)
Phy
sP
hys .
/./ Sec
tion
Sec
tion
LCD Loss of Cell Delineation I.610HCOR Correctable Header ErrorsHUNC Uncorrectable Header ErrorsVP-AIS Virtual Path AIS I.610VP-RDI Virtual Path Remote Defect Indication I.610VC-AIS Virtual Channel AIS I.610VC-RDI Virtual Channel Remot Defect Indication I.610Vx-AIS Virtual Channel AIS & Virtual, Path AIS simultan. (O.191)Vx-RDI Virtual Channel RDI & Virtual, Path RDI simultan. (O.191)LOC Loss Of Continuity I.610
ATM
ATM
Pat
hP
ath
EVENTS SDHEVENTS SDH EVENTS SONETEVENTS SONET
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION47
LOS/LOFRS-TIMBIP Err.
"1"AIS
MS-AIS "1"
MS-BIP Err.MS-REI
MS-RDI
AU-AISAU-LOP
AIS
"1"
HP-UNEQ
HP-TIMHP-BIP Err.
HP-REI
HP-RDI
"1"AIS
TU-AISTU-LOP
LOM
HP-PLMLP-UNEQ
LP-TIM
LP-BIP Err.
LP-REILP-RDI
LP-PLM
"1"
"1"
"1"
AIS
AIS
RegeneratorSection
MultiplexSection
Higher OrderPath
Lower OrderPath
(J0)(B1)(K2)
(B2)(M1)
(K2)
(C2)(J1)
(B3)
(G1)
(G1)
(H4)(C2)(V5)
(J2)(V5)(V5)
(V5)(V5)
SDH Maintenance Interactions
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION48
DWDM Evolution
� A simple analogy for the history of optical networks:
It started like this….One lane, slow traffic (STM-1, STM-4)
More recent systems give you this….Faster traffic (STM-16, STM-64, 10GE), but still only one lane
With DWDM you get this…Up to 32 lanes, each running at any speed from 100Mbps to 10 Gbps
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION49
DWDM Evolution
� Early WDM (late 80s)–Two widely separated wavelengths (1310, 1550nm)
� “Second generation” WDM (early 90s)– Two to eight channels in 1550 nm window
– 400+ GHz spacing
� DWDM systems (mid 90s)–16 to 40 channels in 1550 nm window
–100 to 200 GHz spacing
� Next generation DWDM systems–64 to 160 channels in 1550 nm window
–50 and 25 GHz spacing
DWDM Fundamentals
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION51
Principal F.O. Transmission
� the electrical signal processing is according to international standards
� the convertion into the "optical freuqency band" enables to use the advantages coming up with F.O. transmission
electricalsignalprocessing
ElectricalTransmission
E / O -Conversion
ElectricalTransmission
O / E -Conversion
electricalsignalprocessing
OpticalTransmission
Fiber as transmission medium
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION52
Principles of Transmission
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION53
Increasing Network Capacity Options
Faster Electronics(TDM)
Higher bit rate, same fiberElectronics more expensive
More Fibers(SDM)
Same bit rate, more fibersSlow Time to MarketExpensive EngineeringLimited Rights of WayDuct Exhaust
WDM
Same fiber & bit rate, more λλλλsFiber CompatibilityFiber Capacity ReleaseFast Time to MarketLower Cost of OwnershipUtilizes existing TDM Equipment
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION54
WDM Basics - Introduction
� WDM – Wavelength Division Multiplexing
� The ability to use different wavelengths in a single fiber, to split and to combine them.
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION55
Why DWDM ?
a) Overcome fiber exhaust / lack of fiber availabilityproblems (Better utilization of available fiber)
d) Cost effective transmission
e) No O-E-O conversion delays
f) Wave length leasing instead of Bandwidth leasing
b) Space & Power savings at intermediate stations
c) Easier capacity expansion
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION56
Broadband ApplicationsBroadband Applications
IPIP
ATMATM
SDH / SONETSDH / SONET
Photonic layer: WDMPhotonic layer: WDM
The mainstream viewNew proposals
Future Broadband Network Layers
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION57
Point-to-point TDM
1310 nm/1550 nm TDM point-to-point connections with opto-electrical regenerators
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION58
Point-to-point WDM
Classic WDM point-to-point connection with opto-electrical regenerators
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION59
Optical Networking
TM16TM
16TM16TM
16
WD
M
TM16TM16TM16TM16
WD
M
STM-16
STM-16
STM-16
STM-16
4 * STM-16 = 10 Gb/s
TM16
TM16TM
16
WD
M
TM16
TM16TM16
STM-16
STM-16
STM-16
8 * STM-16 = 20 Gb/sILA
8 * STM-16 = 20 Gb/s WD
M
TM16
TM16TM
16
WD
M
TM16
TM16TM16
STM-16
STM-16
STM-16
32 * STM-16 = 80 Gb/s
OAD32 * STM-16 = 80 Gb/s
WD
M
8
-
-
2
1
8
-
-
2
1
32
-
-
2
1
32
-
-
2
1
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION60
Optical Fiber Amplifiers
TDM point-to-point connections with optical fiber amplifiers (OFAs)
OFA basics
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION61
DWDM basics
Transmission of multiple channels using WDM systems with 8, 16 or 32 channels (multiplexing of 2.5 Gbit/s signals)
W a n d e l & G o l t e r m a n n
A D V A N C E D N E T W O R K T E S T E R
A N T - 2 0
W a n d e l & G o l t e r m a n n
F i b e r F O X W G O F T - 1 0
Ma in
S e t
?
S t a r tS t o p
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION62
TERMTERM
TERM
Conventional TDM Transmission—10 Gbps
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
TERM
40km1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
TERM1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
TERM1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
1310RPTR
TERM
120 km
OC-48
OA OAOA OA120 km 120 km
OC-48OC-48
OC-48
OC-48OC-48
OC-48OC-48
DWDM Transmission—10 Gbps
1 Fiber Pair4 Optical Amplifiers
Why DWDM—The Business Case
TERM
4 Fibers Pairs 32 Regenerators
40km 40km 40km 40km 40km 40km 40km 40km
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION63
WDM Classification
WDM Classification is based on the Channel spacing between 2 Wave lengths
Channel spacing > 200GHz is called CWDM
Channel spacing > 100 GHz is called WDM
Channel spacing < 100GHz is called DWDM
Channel spacing < 25GHz is called UDWDM
100 GHz is equal to 0.8 nm
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION64
Infrared Spectrum
O-Band E-Band S-Band C-Band L-Band
1260-1360nm
1360-1460nm
1460-1530nm
1530-1565nm
1565-1625nm
CWDM CWDMFuture DWDM DWDM DWDM
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION65
Wavelength allocation for DWDM(ITU-T G.692)
C-Band (1530 – 1562nm):
L-Band (1574 – 1608nm):
The channel central frequencies are allocated in equal frequency spacing of 100 GHz or 0.1 THz.
All the channel central frequencies are anchored to the 193.1 THz reference. The channel central wavelength corresponding to the reference frequency is 1552.52 nm.
Also called conventional band or 1550 band
Also called Long wavelength band or 1580nm band
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION66
(nm)
1532
.68
1533
.47
1534
.25
1535
.04
1535
.82
1536
.61
1537
.40
1538
.19
1538
.98
1539
.77
1540
.56
1541
.35
1542
.14
1542
.94
1543
.73
1544
.53
1545
.32
1546
.12
1546
.92
1547
.72
1548
.52
1549
.32
1550
.12
1550
.92
1551
.72
1552
.52
1553
.33
1554
.13
1554
.94
1555
.75
1556
.56
1557
.36
1558
.17
1558
.98
1559
.79
1560
.61
1561
.42
1562
.23
1530
.33
1531
.12
1531
.90
(THz)
195.
719
5.6
195.
519
5.4
195.
319
5.2
195.
119
5.0
194.
919
4.8
194.
719
4.6
194.
519
4.3
194.
219
4.1
194.
019
3.9
193.
819
3.7
193.
619
3.5
193.
419
3.3
193.
219
3.1
193.
019
2.9
192.
819
2.7
192.
619
2.5
192.
419
2.3
192.
219
2.1
192.
019
1.9
196.
019
5.9
195.
8C
37C
36C
35C
34C
33C
32C
31C
30C
29C
28C
27C
26C
25C
24C
23C
22C
21T
one
ch.
C20
C19
C18
C17
C16
C15
C14
C13
C12
C11
C10
C09
C08
C07
C06
C05
C04
C03
C02
C01
C40
C39
C38
Carrier wavelength
Carrier frequency
Channel number
Note 1: Optical carriers are allocated on ITU-T 100 GHz (0.1 THz) grid in Rec. G. 692.
2: Tone channel is dedicated for operation & maintenance support.
3. C13 is the Centre Wavelength
Wavelength allocation in C-Band
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION67
(nm)
1577
.03
1577
.86
1578
.69
1579
.52
1580
.35
1581
.18
1582
.02
1582
.85
1583
.69
1584
.53
1585
.36
1586
.20
1587
.04
1587
.88
1588
.73
1589
.57
1590
.41
1591
.26
1592
.10
1592
.95
1593
.79
1594
.64
1595
.49
1596
.34
1597
.19
1598
.04
1598
.89
1599
.75
1600
.60
1601
.46
1602
.31
1603
.17
1604
.03
1604
.88
1605
.74
1606
.60
1607
.47
1608
.33
1574
.54
1575
.37
1576
.20
(THz)
190.
119
0.0
189.
918
9.8
189.
718
9.6
189.
518
9.4
189.
318
9.2
189.
118
9.0
188.
918
8.8
188.
718
8.6
188.
518
8.4
188.
318
8.2
188.
118
8.0
187.
918
7.8
187.
718
7.6
187.
518
7.4
187.
318
7.2
187.
118
7.0
186.
918
6.8
186.
718
6.6
186.
518
6.4
190.
419
0.3
190.
2L0
4L0
5L0
6L0
7L0
8L0
9L1
0L1
1L1
2L1
3L1
4L1
5L1
6L1
7L1
8L1
9L2
0To
ne c
h.L2
1L2
2L2
3L2
4L2
5L2
6L2
7L2
8L2
9L3
0L3
1L3
2L3
3L3
4L3
5L3
6L3
7L3
8L3
9L4
0
L01
L02
L03
Carrier wavelength
Carrier frequency
Channel number
Note 1: Optical carriers are allocated on ITU-T 100 GHz (0.1 THz) grid in Rec. G. 692.
2: Tone channel is dedicated for operation & maintenance support.
Wavelength allocation in L-Band
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION68
Comparison of CWDM and DWDM Technologies
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION69
CWDM Channel Grid ITU-T G.694.2
1470
1490
1510
1530
1550
1570
1590
1610
1370
1390
1410
1430
1450
1350
1330
1310
1290
1270
DWDM:driven by longhaul networks, expensive, high transparency,superior scalability
CWDM:limited to Max 16/18 channels, 40-100Gbps fiber capacityremote storage, intra-enterprise, high speed data transferowned/leased fibers, local carriers
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION70
DWDM Vs CWDM
DWDM Components
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION72
Main Components in DWDM
1) Transponder
2) Omux/Odmux
3) Optical Amplifier
4) OADM5) Regenerator
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION73
Optical Multiplexer
Optical De-multiplexer
Optical Add/Drop Multiplexer(OADM)
Transponder
DWDM Components
λλλλ1
λλλλ2
λλλλ3
λλλλ1
λλλλ2
λλλλ3
850/1310850/1310850/1310850/1310 15xx
λλλλ1
λλλλ2
λλλλ3
λλλλ1...n
λλλλ1...n
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION74
Optical Amplifier(EDFA)
Optical AttenuatorVariable Optical Attenuator
Dispersion Compensator (DCM / DCU)
More DWDM Components
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION75
Multiplexer / Demultiplexer
Wavelengths Converted via Transponders
Wavelength Multiplexed Signals
DWDMMux DWDM
Demux
Wavelength Multiplexed Signals
Wavelengths separated into individual ITU Specific lambdas
Loss of power for each Lambda
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION76
VOA EDFA DCM
VOAEDFADCM
Service Mux(Muxponder)
Service Mux(Muxponder)
DWDM SYSTEM DWDM SYSTEM
Typical DWDM Network Architecture
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION77
Optical Add/Drop Filters (OADMs)
OADMs allow flexible add/drop of channels
Drop Channel
Add Channel
Drop & Insert
Pass Through loss and Add/Drop loss
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION78
Transponder
A device that takes an optical signal, performs electrical3R regeneration & re-transmits the signal in optical formIn to Wavelength grid as per G.192
It allows any Wavelength as input to DWDM
For every input Wavelength, one transponder is required
Its very useful for Wavelength leasing, as customer can Send any wavelength
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION79
2R/3R TX Transponders
2 modes: 2R/3R operation:
� 2R (Re-amplification, Re-sampling)• PDH 140 Mbit/s, 565 Mb/s• SDH STM-16, STM-4, STM-1• SONET,ATM,IP,Digital CATV)• Output signal quality depends on input quality
� 3R (Re-amplification, Re-sampling, Re-timing)• SDH STM-16• Eliminating timing jitter
(Output is a standard SDH signal)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION80
Transponder
Transponders in Terminal
Transponders in OADM
OADM
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION81
Mux/Transponders in DWDM
PDH
ATM
GbE
SDH / SONET
SDH
TRP
TRP
TRP
TRP
MUX
SANTRP
Digital Video
TRP
Fibre
� 2.5 Gb/s
� 10Gb/s
� Full transparency
� Colored SDH I/Fs
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION82
Ethernet at Data Link LayerLayer 2
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION83
Ethernet Frame Format
� Same frame regardless of rate (10/100/Gigabit/10GigE LAN)� Variable Frame Size – must have integer number of bytes� 64 - 1518 bytes excluding Preamble and SFD� Note:
– Undersized frames : less than 64 bytes are considered as a errored frames.
– Oversized frames – Jumbos (larger than 1518 bytes or 1522 with VLAN) are considered valid
Data (46-1500)L/T (2)SA (6)DA (6) FCS (4)SFD (1)Preamble (7)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION84
Ethernet Media Access Control (MAC)
� Preamble – Allows physical layer to detect carrier and
acquire sync (7 bytes of alternating 1’s and 0’s)� SFD - Start of Frame Delimiter
– Identifies the beginning of a frame (1 byte - 10101011)
Data (46-1500)L/T (2)SA (6)DA (6) FCS (4)SFD (1)Preamble (7)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION85
Ethernet Media Access Control (MAC)Ethernet Frame Fields
� Addresses– DA - Destination Address– SA - Source Address– Addresses have the following format - 00-80-C7-11-2D-29– Each source address is unique– First 3 bytes are OUI (Organizational Unique Identifier), and
Last 3 bytes are vendor specific.� Length/Type Field – use depends on frame type
– 802.3 frame - indicates length of data field (<=1500)– Ethernet Type II (DIX) frame - indicates type of frame data
(>=1536)
Data (46-1500)L/T (2)SA (6)DA (6) FCS (4)SFD (1)Preamble (7)
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION86
The Ethernet Frame
� Data– The payload
� FCS - Frame Check Sequence– A 32 bit cyclic redundancy check
performed on the frame for error detection. Frames with CRC errors are discarded at receiving station
Data (46-1500)L/T (2)SA (6)DA (6) FCS (4)SFD (1)Preamble (7)
Fields used for FCS calc
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION87
Frame Types
� Unicast FrameFrame which is destined to a single destination
� Broadcast FrameFrame which is destined to all the destination on thenetworkDestination MAC Address:
FF-FF-FF-FF-FF-FFBroadcast traffic can be very polluting because all thestations on the network receive it and process it
� Multicast FrameFrame which is destined to a group of destinationsDestination MAC address:
01-00-5E-xx-xx-xxMore efficient than broadcast trafficPause Flow control frame is a multicast frame
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION88
Unicast
� Unicast: Frames are sent from one device to only one other device.
� The destination address contains the MAC address of the destination
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION89
Multicast
� Multicast: Frames are sent from one device to many other devices which are part of the multicast group
� The destination address contains a multicast group address
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION90
Broadcast
� Broadcast: Frames are sent from one device to all other devices in the broadcast domain.
� The destination address is the Ethernet broadcast address of FF-FF-FF-FF-FF-FF
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION91
Ethernet layers 2 and 1 with IPG and IFS
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION92
IPG and IFS
� The Physical Layer rate 125 Mbps incase of 100M Ethernet Port and 1250Mbps incase of 1 GigE port.
� IPG = Idle time between the transmission of 2 consecutive frames. IPG is at least 12bytes.
� Minimum allowed IPG is 96 bit time:– 96 nanoseconds at Gigabit Ethernet rate (1000BX)– 0.96 microseconds at Fast Ethernet rate (100BT)– 9.6 microseconds at Ethernet (10BT)
� If frames are transmitted with minimum IPG the traffic is transmitted at maximum rate
� IFS : InterFrame Spacing is at least 20 bytes which includes IPG, Preamble and SFD
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION93
Frame Rate
� Ethernet Frame Data size = 64 to 1518 bytes = 512 to 12144 bits� Overhead = 7 bytes (Preamble) + 1 byte (SFD) + 96 bits (IPG) =
160 bits� Frame rate = Max data rate / (Data size + Overhead)
– If max data rate is 1 Gbps (1000B-X) and data size is 64 bytes: Frame rate = 1,488,095 Fps
– If max data rate is 100 Mbps (100B-T) and data size is 64 bytes: Frame rate = 148,809 Fps
– If max data rate is 10 Mbps (10B-T) and data size is 64 bytes: Frame rate = 14,880 Fps
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION94
Frame Rate and Efficiency
1.3 %13,003,90181,274160 bits1518 Bytes (12144 bits)
1.9 %19,157,088119,731160 bits1024 Bytes (8192 bits)
3.7 %37,593,984234,962160 bits512 Bytes (4096 bits)
13 %135,135,135844,594160 bits128 Bytes (1024 bits)
23 %238,095,2381,488,095160 bits64 Bytes (512 bits)
Percentage of bandwidth lost
Total bits lost(overhead)
Frames persecond
Overhead per frame
Data size
� If we take the example of Gigabit Ethernet we see that efficiency increases with the frame length
� It also applies to 10BaseT and 100BaseTX
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION95
Jumbo & Oversized Frames
� Data field beyond 1518 bytes – up to 65535 bytes (vendor dependent)
� 1518 bytes frame �98.7 % Efficiency
� 9018 data bytes �99.97% Efficiency
� Why Jumbo then?– Increase efficiency– Decrease CPU time
� FCS becomes less efficient for frames above 12000 bytes
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION96
Jumbo Frames
� MAC Frame Structure
Ethernet Variante II Frame
0-9000 7
SD
L
Typ Source
AddressDataFCS Preamble
16624
Length46-9000 0x0600 - FFFF
0x0800 = IP
Frame: 64 - 9018 Bytes
DestinationAddress
© 2008 JDSU. All rights reserved. JDSU CONFIDENTIAL & PROPRIETARY INFORMATION97
Runts and Undersized Frames
� RUNT: A frame that is greater than 2 bytes and less than 64 bytes, it has an SFD and a bad FCS (CRC error). Generally fragments are caused by collisions, but may be caused by faulty network equipment (e.g. network adapters, hubs, etc.) Fragments are everyday occurrences on moderately to heavily utilized networks.
� Undersize frame: The frame which frame size is less than 64 bytes but there is no FCS Error.
� Similarly Jabber and Oversized frame