Table of Contents
1Scope
2References
3Termsanddefinitions
4Abbreviations
5Protectionclassification
6Applicationsconsiderations
6.1MSsharedprotectionrings
6.2MSsharedprotectionrings(transoceanicapplication)
6.3MSdedicatedprotectionrings
6.4Unidirectionalandbidirectionalprotectionswitching
6.5LinearVCtrailprotection
6.6Subnetworkconnectionprotection
6.7Linearmultiplexsectionprotectionswitching
7SDHtrailprotection
7.1Linearmultiplexsectionprotection
7.1.1MSPprotocol
7.1.2MSPcommands
7.1.3MSPconditions
7.1.4Switchoperation
7.2MSsharedprotectionrings
7.2.1Two-andfour-fibreMSsharedprotectionrings
7.2.2Networkobjectives
7.2.3Applicationarchitecture
7.2.4Switchinitiationcriteria
7.2.5Protectionswitchprotocol
7.2.6Protectionalgorithmoperation
7.2.7Examples
7.3MSdedicatedprotectionrings
7.4LinearVCtrailprotection
7.4.1Networkarchitecture
7.4.2Networkobjectives
7.4.3Applicationarchitecture
7.4.4Switchinitiationcriteria
7.4.5Protectionswitchingprotocol
7.4.6Protectionalgorithmoperation
8SDHsubnetworkconnectionprotection
8.1Networkarchitecture
8.2Networkobjectives
8.3Applicationarchitecture
8.3.1Routing
8.3.21+1unidirectionalswitching
8.3.3Otherarchitectures
8.4Switchinitiationcriteria
8.4.11+1unidirectionalprotectionswitching
8.4.2Otherarchitectures
8.5Protectionswitchingprotocol
8.5.11+1unidirectionalprotectionswitching
8.5.2Otherarchitectures
8.6Protectionalgorithmoperation
8.6.11+1unidirectionalprotectionswitching
algorithm
8.6.2Otherarchitectures
AnnexA-MSsharedprotectionrings(transoceanic
application
A.1Application
A.2Networkobjectives
A.3Applicationarchitecture
A.4Switchingcriteria
A.5Protectionswitchprotocol
A.6Protectionalgorithmoperation
AnnexB-Multiplexsectionprotection(MSP)1+1optimized
protocol,commandsandoperation
B.11+1bidirectionalswitchingoptimizedfora
networkusingpredominantly1+1bidirectional
switching
B.1.1Lockout
B.1.2Secondarysectionfailure
B.1.3K1/K2bytecoding
B.1.4K2bytecoding
B.1.5Primarysectionmismatch
B.2Switchcommands
B.3Switchoperation
AppendixI-ExamplesofprotectionswitchinginaMSshared
protectionring
I.1Unidirectionalsignalfail(span)inafour-fibre
ring
I.2Unidirectionalsignalfail(ring)
I.3Bidirectionalsignalfail(ring)
I.4Unidirectionalsignaldegrade(ring)
I.5Nodefailure
I.6UnidirectionalSF-Rpreemptingaunidirectional
SD-Sonnon-adjacentspans
I.7UnidirectionalSF-Spreemptingaunidirectional
SF-Ronadjacentspans
I.8UnidirectionalSF-Rpreemptingaunidirectional
SD-Sonadjacentspans
I.9UnidirectionalSF-Rcoexistingwitha
unidirectionalSF-Ronnon-adjacentspans
I.10Nodefailureonaringwithextratrafficcapability
(seeFigureI.11)
I.11UnidirectionalSF-Spre-emptingaunidirectional
SF-Ronadjacentspans-SF-SandSF-R
detectedatadjacentnodes
AppendixII-Generalizedsquelchinglogic
II.1Squelchingforunidirectional(andbidirectional)
circuits
II.2Squelchingofmultiplydroppedandmultiplysourced
unidirectionalcircuits
II.2.1Multiplydroppedunidirectionalcircuits
II.2.2Multiplysourcedunidirectionalcircuits
II.2.3Applicationtoringinterworking Abstract
Describes various protection mechanisms for Synchronous Digital Hierarchy (SDH) networks, their objectives and their applications.