Final Report
Final Report
Submitted to:
Submitted by:
March 2016
INTRODUCTION
Regional telecom training centre
(An ISO Certified Institute)
PUNJAB TELECOM CIRCLE
INTRODUCTION TO THE
ASSIGNED JOB
(2)
(3)
(4)
(5)
Electromagnetic Immunity :
(vii) Security
(viii)
TRANSMISSION SEQUENCE :
(1)
(2)
(3)
(4)
(5)
The optical fibre has two concentric layers called the core and the
cladding. The inner core is the light carrying part. The surrounding
cladding provides the difference refractive index that allows total
internal reflection of light through the core. The index of the
cladding is less than 1%, lower than that of the core. Typical
values for example are a core refractive index of 1.47 and a
cladding index of 1.46. Fibre manufacturers control this difference
Step Index
(II)
Graded Index
The step index fibre has a core with uniform index throughout.
The profile shows a sharp step at the junction of the core and
cladding. In contrast, the graded index has a non-uniform core.
The Index is highest at the center and gradually decreases until it
matches with that of the cladding. There is no sharp break in
indices between the core and the cladding.
(II)
INTRINSIC ATTENUATION
It is loss due to inherent or within the fibre. Intrinsic attenuation
may occur as
Absorption - Natural Impurities in the glass absorb light energy.
Scattering - Light rays travelling in the core reflect from small
imperfections into a new pathway that may be lost through the
cladding.
EXTRINSIC ATTENUATION
It is loss due to external sources. Extrinsic attenuation may occur
as
Macrobending - The fibre is sharply bent so that the light travelling
down the fibre cannot make the turn & is lost in the cladding.
Microbending - Microbending or small bends in the fibre caused by
crushing contraction etc. These bends may not be visible with the
naked eye.
Attenuation is measured in decibels (dB). A dB represents the
comparison between the transmitted and received power in a
system.
FIBRE SPLICING
Operation of Fusion Splicers
Splicer Operation
It is awkward at first to hold, strip, cleave and place the fiber in the clamps.
Practice makes perfect. Here are five general steps to complete a fusion splice:
Strip, Clean, & Cleave
a. Strip
Strip fiber to appropriate length per your splicer's instruction manual
b. Cleaning
Clean the fiber with Fiber-Clean towelettes or a lint-free wipe and isopropyl
alcohol so that the fiber squeaks
c. Cleaving
Place fiber (after stripping and cleaning it) in cleaver using the fiber guide to
position.
It align the fiber in the cleave area to cleave at the proper length Depress the
cleaver arm gently . Remove and safely discard the fiber scrap
2. Load Splicer
Position tip of fiber near electrodes . Do not bump tips into anything . Ease
placement by bowing fibers in groove
3. Splice Fibers
READ The Manual.Place first cleaved fiber in v-groove with fiber tip near the
electrodes
Close the fiber clamps Repeat on opposite side for second fiber.Select program on
fusion splicer . Initiate fuse cycle (can be manual or automatic)
ii
Channels
PCM
Bit Rate
30
120
480
1920
7680
1
4
16
64
256
2 mbps
8 mbps
34 mbps
140 mbps
565 mbps
Filtering
Sampling
Quantisation
Encoding
Line Coding
FILTERING
Filters are used to limit the speech signal to the frequency band 300-3400 Hz.
SAMPLING
It is the most basic requirement for TDM. Suppose we have an
analogue signal. The amplitude of the sample is depend upon the amplitude of the
input signal at the instant of sampling. The duration of these sampled pulses is
equal to the duration for which the switch S is closed. Minimum number of samples
are to be sent for any band limited signal to get a good approximation of the
original analogue signal and the same is defined by the sampling Theorem. i.e.
Fs>2fH
QUANTISATION
The process of measuring the numerical values of the samples and giving them a
table value in a suitable scale is called "Quantising". Of course, the scales and the
number of points should be so chosen that the signal could be effectively
reconstructed after demodulation.
Quantising, in other words, can be defined as a process of breaking down a
continuous amplitude range into a finite number of amplitude values or steps.
ENCODING
Conversion of quantized analogue levels to binary signal is called encoding. To
represent 256 steps, 8 level code is required. The eight bit code is also called an
eight bit "word".
The first bit gives the sign of the voltage to be coded. Next 3 bits gives the segment
number. There are 8 segments for the positive voltages and 8 for negative
voltages. Last 4 bits give the position in the segment. Each segment contains
16 positions.
LINE CODING
Line codec chips converts the encoded signal into HDB code which is compatible
for transmit over channel.
OVERVIEW OF SDH
With the introduction of PCM techonology in the 1960s, communications
networks were gradually converted to digital technology over the next few years.
To cope with the demand for ever higher bit rates, a multiplex hierarchy called the
plesiochronous digital hierarchy (PDH) evolved. The bit rates start with the basic
multiplex rate of 2 Mbit/s with further stages of 8, 34 and 140 Mbit/s. In North
America and Japan, the primary rate is 1.5 Mbit/s. Hierarchy stages of 6 and 44
Mbit/s developed from this. Because of these very different developments,
gateways between one network and another were very difficult and expensive to
realize. PCM allows multiple use of a single line by means of digital time-domain
multiplexing. The analog telephone signal is sampled at a bandwidth of 3.1 kHz,
quantized and encoded and then transmitted at a bit rate of 64kbit/s. The growing
demand for more bandwidth meant that more stages of multiplexing were needed
throughout the world. Slight differences in timing signals mean that justification or
stuffing is necessary when forming the multiplexed signals. Inserting or dropping
an individual 64 kbit/s channel to or from a higher digital hierarchy requires a
considerable amount of complex multiplexer equipment.
Homogeneity of equipment
Problem of Channel segregation
The problem cross connection of channels
Inability to identify individual channels in a higher-order bit stream.
Insufficient capacity for network management;
Most PDH network management is proprietary.
Theres no standardized definition of PDH bit rates greater than 140
Mbit/s.
There are different hierarchies in use around the world. Specialized
interface equipment is required to interwork the two hierarchies.
In 1988 SDH standard introduced with three major goals:
Avoid the problems of PDH
Achieve higher bit rates (Gbit/s)
Better means for Operation, Administration, and Maintenance (OA&M)
SDH is an ITU-T standard for a high capacity telecom network. SDH is a
synchronous digital transport system, aim to provide a simple, economical and
flexible telecom infrastructure. The basis of Synchronous Digital Hierarchy (SDH)
SDH RATES
SDH is a transport hierarchy based on multiples of 155.52Mbit/s
The basic unit of SDH is STM-1:
STM-1 = 155.52 Mbit/s
STM-4 = 622.08 Mbit/s
STM-16 = 2588.32 Mbit/s
STM-64 = 9953.28 Mbit/s
Each rate is an exact multiple of the lower rate therefore the hierarchy is
synchronous
SDH HIERARCHY:
SDH defines a multiplexing hierarchy that allows all existing PDH rates to be
transported synchronously.
The following diagram shows these multiplexing paths:.
FIGURE
Multiplex unit: A basic SDH multiplex unit includes multiple containers (C-n),
virtual containers (VC-n), tributary units (TU-n), tributary unit groups (TUG-n),
administrative units (AUn) and administrative unit groups (AUG-n), where n is the
hierarchical sequence number of unit level.
Container: Information structure unit that carries service signals at different rates.
G.709 defines the criteria for five standard containers: C-11, C-12, C-2, C-3 and C4.
Virtual container (VC): Information structure unit supporting channel layer
connection of SDH. It terminates an SDH channel. VC is divided into lower-order
and higher-order VCs. VC-4 and VC-3 in AU-3 are higher-order virtual containers.
Tributary unit (TU) and tributary unit group (TUG): TU is the information structure
that provides adaptation between higher-order and lower-order channel layers.
TUG is a set of one or more TUs whose location is fixed in higher-order VC
payload.
Administrative unit (AU) and administrative unit group (AUG): AU is the
information structure that provides adaptation between higher-order channel layer
and multiplex section layer. AUG is a set of one or more AUs whose locations are
fixed in the payload of STM-N.
upper left corner and ending with the byte in the lower right corner. The frame
repetition rate is 125 ms., each byte in the payload represents a 64 kbit/s channel.
The STM-1 frame is capable of transporting any PDH tributary signal.
The first 9 bytes in each of the 9 rows are called the overhead. G.707 makes a
distinction between the regenerator section overhead (RSOH) and the multiplex
section overhead (MSOH). The reason for this is to be able to couple the functions
of certain overhead bytes to the network architecture. The table below describes
the individual functions of the bytes.
A1, A2 The Frame Alignment Word is used to recognize the beginning of an STMN frame
J0: Path Trace. It is used to give a path through an SDH Network a "Name". This
message (Name) enables the receiver to check the continuity of its connection with
the desired transmitter
B1: Bit Error Monitoring. The B1 Byte contains the result of the parity check of
the previous STM frame, before scrambling of the actual STM frame. This check is
carried out with a Bit Interleaved Parity check.
E1 Engineering Orderwire (EOW). It can be used to transmit speech signals
beyond a Regenerator Section for operating and maintenance purposes
F1 User Channel. It is used to transmit data and speech for service and
maintenance
D1 to D3 Data Communication Channel at 192 kbit/s (DCCR). This channel is
used to transmit management information via the STM-1 frames
MSOH (multiplex section overhead)
The Multiplex Section OverHead uses the 5th through 9th rows, and first 9
columns in the STM-1 frame.
B2 : Bit Error Monitoring. The B2 Bytes contains the result of the parity check of
the previous STM frame, except the RSOH, before scrambling of the actual STM
frame. This check is carried out with a Bit Interleaved Parity check (BIP24)
K1, K2 Automatic Protection Switching (APS). In case of a failure, the STM frames
can be routed new with the help of the K1, K2 Bytes through the SDH Network.
Assigned to the multiplexing section protection (MSP) protocol
K2 (Bit6,7,8) MS_RDI: Multiplex Section Remote Defect Indication (former
MS_FERF: Multiplex Section Far End Receive Failure)
D4 to D12 Data Communication Channel at 576 kbit/s (DCCM). (See also
D1-D3 in RSOH above)
S1 (Bit 5 - 8) Synchronization quality level:
0000 Quality unknown
0010 G.811 10-11/day frequency drift
0100 G.812T transit 10-9 /day frequency drift
1000 G.812L local 2*10-8/day frequency drift
1011 G.813 5*10-7/day frequency drift
1111 Not to be used for synchronization
E2 Engineering Orderwire (EOW). Same function as E1 in RSOH
M1 Multiplex Section Remote Error Indicator, number of interleaved bits which
have been detected to be erroneous in the received B2 bytes.
Z1, Z2 Spare bytes
DDF
Electrical
Signal
Optical
Signal
E/O FDF
Transmitter
Converter
Electrical
Signal
DDF
O/E
Receiver
Converter
FDF
a single module. The same unit also incorporates sufficient dropping capacity,
which is upgradable, to make a cost effective solution for small capacity networks.
The system has protection facility and utilizes the inherent management capacities
of SDH with a Craft Terminal (nothing but a PC) or through a full fledged
Network Management System. The physical and technical features of AC1 range
of equipments are briefly outlined here.
MOTHERBOARD CARD
Remote indication, remote control and station alarm port (LOOPS): This port is
basically used for the various alarm indication purpose. This facilitates us with four
remote indication inputs and two dry loops outputs for station alarm or remote
control purpose.
2M Port: These are PCM ports carrying 2 Mbit/s data . These ports has 21 PCM
carrying capacity.
These data port function block is composed of the
following functions:
HPA : High order Path Adaptation (Tributary Unit order 12 management)
LPT : Lower order Path Termination (Virtual Container order 12 management)
PPI : PDH Physical Interface of G.703 port
Power supply access ports: "PWRA" and/or "PWRB" ports, used when the
equipment is powered from oneor two 48 Vsources, the power source(s) should be
limited to 100 VA.
"PWR" port used when the equipment is powered from a
main voltage (230 V AC), via an optional power block (100-240V//48V - 1.5A).
IC1.1-2G CARD
EOW/AUX Configuration
The EOW/AUX interface provides a 64 kbit/s data channel ; this channel may be
carried by a Byte of the SDH frame.
Select in the STM1-SOH configuration table :
E1 or E2 or F1
STM-DUAL
Figure3.5: STM-DUAL
4E/FE
E3DS3
COMMISSIONING OF STM-1(SIEMEN)
IP Addresses : To operate the STM -1 Equipment with NMS, we must set the IP
address of NMS. First three bytes of IP address of NMS must be same as that of
STM-1 Equipment.
To change the IP address of NMS following point:
My Network Places---Properties---Local Area Network---Properties
IP Address ---Properties
Now change the IP addresses of NMS and STM-1 Equipment As shown..
EQUIPMENT
INVENTORIES
Hardware Submenu Item
This menu displays the hardware inventory data, according to concerned
modules.Software Submenu Item
This menu displays the software inventory data, according to concerned modules.
SECURITY
Supervisor : All rights
Operator : May set configuration and maintenance operations
Observer : Not authorized to make any modifications (Read only access)
Passwords modification needs Supervisor access rights.
MANAGEMENT
This menu item displays the "Management" dialog box, which is the trap
destination table and the manager table. In network management, the manager
sends to an equipment some requests as SET and GET ; the equipment sends
responses to the requests ; it can also send TRAPS on its own if an event occurred
in the equipment. A TRAP is a Protocol Data Unit (PDU) sent by the equipment to
the manager. Up to ten managers can operate simultaneously in the same network.
At a given moment, only one manager can control the equipment.
One equipment may address up to ten different managers. Each trap sent by this
equipment, is routed to all managers identified in its trap destination table.
SYNCHRONISATION
The role of synchronisation plan is to determine the distribution of
synchronisation in a network and to select the level of clocks and facilities to be
used to time the network. This involves the selection and location of master clocks
for a network, the distribution of primary and secondary timing through out the
network and an analysis of the network to ensure that acceptable performance
levels are achieved. Improper synchronisation planning or the lack of planning can
cause severe performance problems resulting in excessive slips, long periods of
network downtime, elusive maintenance problems or high transmission error rates.
Hence, a proper synchronisation plan which optimises the performance, is a must
for the entire digital network. The status of synchronisation in the DOT network is
as follows
For synchroisation of the SDH network, it has been decided to use the
clock source available through the TAXs at the major stations. The synchronisation
plan is based upon provision of Synchronisation Supply Units (SSUs) which will
be deployed as an essential component of the synchronisation network which will
support synchronised operation of the SDH network. The architecture employed in
the SDH requires that the timing of all the network clocks be traceable to Primary
Reference Clock (PRC) specified in accordance with ITU Rec.G.811. The classical
method of synchronising network element clocks is the hierarchical method
(masterslave synchronisation) which is already adopted in the DOT network for
the TAXs. This masterslave synchronisation uses a hierarchy of clocks in which
each level of the hierarchy is synchronised with reference to a higher level, the
highest level being the PRC.
NETWORK TOPOLOGIES
Topology is the layout pattern of interconnections of the various elements
(links, nodes, etc.) of a computer network. Network topologies may be physical or
logical. Physical topology means the physical design of a network including the
devices, location and cable installation. Logical topology refers to how data is
actually transferred in a network as opposed to its physical design.
STM-1 can work with any topology given below:
Point to point topology.
Star topology.
Bus topology.
Ring topology.
But point to point and ring topology is commonly used in STM networks. Few of
above topologies are explained below.
POINT TO POINT TOPOLOGY
LINEAR PROTECTION
The simplest form of back-up is the so-called 1 + 1 APS. Here, each
working line is protected by one protection line. If a defect occurs, the protection
agent in the network elements at both ends switches the circuit over to the
protection line. The switchover is triggered by a defect such as LOS. Switching at
the far end is initiated by the return of an acknowledgment in the backward
channel. 1+1 architecture includes 100% redundancy, as there is a spare line for
each working line. Economic considerations have led to the preferential use of 1:N
architecture, particularly for long-distance paths. In this case, several working lines
are protected by a single back-up line. If switching is necessary, the two ends of the
affected path are switched over to the back-up line. The 1+1 and 1:N protection
mechanisms are standardized in ITU-T Recommendation G.783. The reserve
circuits can be used for lower-priority traffic, which is simply interrupted if the
circuit is needed to replace a failed working line.
RING PROTECTION
A ring is the simplest and most cost-effective way of linking a number of
network elements. Various protection mechanisms are available for this type of
network architecture, only some of which have been standardized in ITU-T
UNIDIRECTIONAL RINGS
Figure shows the basic principle of APS for unidirectional rings. Traffic is
transmitted simultaneously over both the working line and the protection line. If
there is an interruption, the receiver switches to the protection line and
immediately takes up the connection.
CROSS-CONNECTION
Cross Connection is important function of STM-1 Equipment. By using this
function we can connect PCMs of one station toPCMs of another station. For
example 1st PCM of Patiala station can be connect to 7th PCM of Rajpura station.
Now multiple connections are established. We can also give them protective
pathby using protection function of cross connection.
The DIGITAL TRANSMISSION ANALYSER 140 Mbps (MAC - 390) is a combined Digital
Transmitter and Receiver, designed for use with digital transmission system operating at 2 Mb/s, 8
Mb/s, 34 Mb/s and 140 Mb/s. It incorporates almost all the features for measurements on a 30Channel PCM MUX equipment and upto IV order MUX equipment.
1.1 FEATURES
A host of repetitive and Pseudo-random test patterns to suit the requirements of error
measurements at 2Mb /s, 8Mb /s, 34Mb /s and 140Mb /s.
The time setting can be from a few seconds to a few hours, depending on the feasibility. The
standards are set by ITU (International Telecommunication Union). The time set for the
measurement of BER, is called gating time. Larger the gating time better is the assessment of
BER. But for the measurement of BER, the Digital Equipment has to be taken off-line.
No of faulty bits
BER =
Total no of bits
Digital communication can just run with one error bit in one thousand bits received. For more
than one error bit, in one thousand bits received, communication gets affected. For good quality
communication, the requirement is, not more than one error bit in one million bits.
1.2.2 Jitter
Abrupt and unwanted variations of one or more signal characteristics, such as the interval
between successive pulses, the amplitude of successive cycles, or the frequency or phase of
successive cycles. Jitter must be specified in qualitative terms (e.g., amplitude, phase, pulse
width or pulse position) and in quantitative terms (e.g., average, RMS, or peak-to-peak). The
low-frequency cut-off for jitter is usually specified at 1 Hz. Contrast with drift, wander.
Short term variations of the significant instances of a digital signal from their reference position
in time.( Short term frequency equal to or greater than 10 Hz.). Long term variations of
significant instances of a digital signal from their ideal positions in time, are called wander.
(Long-term variationsfrequency less than 10 Hz).
Jitter, like BER, is transmission impairment. It is not very significant in the case of voice signal
transmission but it has a great impact in the transmission of data signals, especially with highspeed digital transmission. The present bit rates are as high as 565 Mb/s and (140 x 16) Mb/s.
Today Jitter is considered as a performance parameter of any digital transmission system.
For example, Jitter due to unwanted phase change is called Phase Jitter. The amount of change of
phase, converted into time, is generally expressed in milli-seconds or nano-seconds.
BER and Jitter are the unwanted by products of any transmission system and they get associated
with the transmission path and affect the quality of transmission. Bit Errors beyond a limit, affect
the communication and Jitter in the digital transmission system, is a source of generation of
errors.
Digital Transmission Analyzer (DTA) is used for the measurement of both BER and Jitter.
-3
or any second
S (Errored)
100
S( Available )
TS AS
TS
%US=
S(unavailable )
100
S ( available )
ASES
AS
1.4 Alarms
Simulate alarm condition at distance station and observe on craft
terminal as well as on system module, like AIS, LOF, LOS, payload mismatch,
degraded
signal, path unequipped, major and minor. Some alarms may be critical or
major or
minor.e.g. degraded signal- major. Path unequipped- critical , loss of
reference source- major
, payload mismatch - critical, AIS-minor, LOF and LOS- critical, Loss of pointer
switching, circuit switching is not going to support high switch rates and high
traffic rates in future.
FUTURE TRENDS
In future huge data rates will require in transmission media, of course media as
optical fiber will not change but technology like SDH has to modify. A modified
version of the SDH as DWDM,RPR, MLLN technology which consist of the
optical multiplexing offer us huge data rates of the order of giga bits. In case of
wireless technologies by changing modulation techniques can enhance the data
rates and security. Upcoming technologies like 3G supports data rates in mega bits
which are pretty much better. In switching the entire circuit switching network are
to be modified to packet switched networks and will be IP based. In nutshell future
technologies will be more efficient, precise and faster as compression to present
technologies.
REFERENCES:
www.bsnl.co.in
en.wikipedia.org
www.google.com/images
STM-1 Equipment PDFs
BSNL Class Notes and PPTs