ITU G.841:1998

ITU G.841:1998 Types And Characteristics Of Sdh Network Protection Architectures Describes various protection mechanisms for Synchronous Digital Hierarchy (SDH) networks, their objectives and their applications.

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.53 tax incl.

$39.83 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
2References
3Termsanddefinitions
4Abbreviations
5Protectionclassification
6Applicationsconsiderations
6.1MSsharedprotectionrings
6.2MSsharedprotectionrings(transoceanicapplication)
6.3MSdedicatedprotectionrings
6.4Unidirectionalandbidirectionalprotectionswitching
6.5LinearVCtrailprotection
6.6Subnetworkconnectionprotection
6.7Linearmultiplexsectionprotectionswitching
7SDHtrailprotection
7.1Linearmultiplexsectionprotection
7.1.1MSPprotocol
7.1.2MSPcommands
7.1.3MSPconditions
7.1.4Switchoperation
7.2MSsharedprotectionrings
7.2.1Two-andfour-fibreMSsharedprotectionrings
7.2.2Networkobjectives
7.2.3Applicationarchitecture
7.2.4Switchinitiationcriteria
7.2.5Protectionswitchprotocol
7.2.6Protectionalgorithmoperation
7.2.7Examples
7.3MSdedicatedprotectionrings
7.4LinearVCtrailprotection
7.4.1Networkarchitecture
7.4.2Networkobjectives
7.4.3Applicationarchitecture
7.4.4Switchinitiationcriteria
7.4.5Protectionswitchingprotocol
7.4.6Protectionalgorithmoperation
8SDHsubnetworkconnectionprotection
8.1Networkarchitecture
8.2Networkobjectives
8.3Applicationarchitecture
8.3.1Routing
8.3.21+1unidirectionalswitching
8.3.3Otherarchitectures
8.4Switchinitiationcriteria
8.4.11+1unidirectionalprotectionswitching
8.4.2Otherarchitectures
8.5Protectionswitchingprotocol
8.5.11+1unidirectionalprotectionswitching
8.5.2Otherarchitectures
8.6Protectionalgorithmoperation
8.6.11+1unidirectionalprotectionswitching
algorithm
8.6.2Otherarchitectures
AnnexA-MSsharedprotectionrings(transoceanic
application
A.1Application
A.2Networkobjectives
A.3Applicationarchitecture
A.4Switchingcriteria
A.5Protectionswitchprotocol
A.6Protectionalgorithmoperation
AnnexB-Multiplexsectionprotection(MSP)1+1optimized
protocol,commandsandoperation
B.11+1bidirectionalswitchingoptimizedfora
networkusingpredominantly1+1bidirectional
switching
B.1.1Lockout
B.1.2Secondarysectionfailure
B.1.3K1/K2bytecoding
B.1.4K2bytecoding
B.1.5Primarysectionmismatch
B.2Switchcommands
B.3Switchoperation
AppendixI-ExamplesofprotectionswitchinginaMSshared
protectionring
I.1Unidirectionalsignalfail(span)inafour-fibre
ring
I.2Unidirectionalsignalfail(ring)
I.3Bidirectionalsignalfail(ring)
I.4Unidirectionalsignaldegrade(ring)
I.5Nodefailure
I.6UnidirectionalSF-Rpreemptingaunidirectional
SD-Sonnon-adjacentspans
I.7UnidirectionalSF-Spreemptingaunidirectional
SF-Ronadjacentspans
I.8UnidirectionalSF-Rpreemptingaunidirectional
SD-Sonadjacentspans
I.9UnidirectionalSF-Rcoexistingwitha
unidirectionalSF-Ronnon-adjacentspans
I.10Nodefailureonaringwithextratrafficcapability
(seeFigureI.11)
I.11UnidirectionalSF-Spre-emptingaunidirectional
SF-Ronadjacentspans-SF-SandSF-R
detectedatadjacentnodes
AppendixII-Generalizedsquelchinglogic
II.1Squelchingforunidirectional(andbidirectional)
circuits
II.2Squelchingofmultiplydroppedandmultiplysourced
unidirectionalcircuits
II.2.1Multiplydroppedunidirectionalcircuits
II.2.2Multiplysourcedunidirectionalcircuits
II.2.3Applicationtoringinterworking

Abstract

Describes various protection mechanisms for Synchronous Digital Hierarchy (SDH) networks, their objectives and their applications.

Contact us