 |
|
|
|
SDH, the physical layer backbone-technology, with up to 10 Gbps speed over
fiber, replaced the earlier PDH (34 to 140M) as the transmission technology for
interconnecting large nodes of the telephone network. However, today we find
more data over the backbone, hence we find more cases where packetizing releases
the SDH from its traditional shackles. The payload is not TDM anymore but a
statistical multiplexing of packets or cells. The updated seminar focuses more
on packets over fiber, with new topics such as GFP, LCAS, POS and RPR. The
course provides the basics and the background needed in order to be familiar
with telephony and data backbone networks, PDH and SDH. We start by shortly
introducing PSTN network and continue with short description of T1 and E1, E3
and T3, etc. Then we dive into SDH and SONET with details about frame structure,
overheads, pointers and protection. We also cover the topic of network elements
and network configurations.
|
|
|
 |
|
|
- Short General Introduction
- Building Blocks: Access, switching and transmission
- TDM and Statistical TDM
- PDH, (Including T1 /E1)
- T1 Frame and E1 Frame
- Use of CRC for Performance monitoring
- The Digital Plesio-synchronous Hierarchy
- Alarms and performance monitoring (AIS, RAI, LOF, OOF, etc.)
- Overview of SDH
- The SONET and SDH Hierarchy
- The Benefit of the Ring with Add-Drop Multiplexers
- Frame Format Structure
- Overhead and Payload>
- AU, AUG, TU, TUG, etc.
- STM-N Frame Structure
- Concatenation
- Overheads
- SDH: RSOH and MSOH, Pointer Overhead
- SONET: Section Overhead, Line Overhead
- Pointers
- Pointers: Why are they necessary?
- What do they point at?
- Positive Stuffing
- Negative Stuffing
- Lower-Order Payload Pointers and E1-G.704 / T1-DS1 Visibility
- Path Overhead
- SDH Alarm Structure
|
|
- Alarms and Performance Monitoring
- Definitions: Alarms, Faults and Defects.
- Performance Monitoring
- Thresholds
- Network Elements and Network Configurations
- Terminal Multiplexer
- Regenerator
- Add/Drop Multiplexer (ADM)
- Wideband Digital Cross-Connects
- Broadband Digital Cross-Connect
- Network Configurations
- Protection Configurations
- Two-Fiber Unidirectional Ring
- Two-Fiber and Four-Fiber Bi-directional Ring
- Protection protocol. K1 and K2 Bytes
- Conclusion
- Glosaary
|
|
|
|
|
 |
 |
 |
- System Communication designers and software & hardware engineers
- Those who design network management systems such as TMN, and are
interested in a clearer understanding and details
- Those interested in basing their knowledge in order to achieve a
complementary background for activities in different fields of interest
|
 |
 |
 |
|
|
 |
 |
 |
|
|
|
|
|
|
|
|