5i' Recommendation G.708 NETWORK NODE INTERFACE FOR THE SYNCHRONOUS DIGITAL HIERARCHY (Melbourne, 1988) The CCITT, considering (a) that network node interface (NNI) specifications are necessary to enable interconnection of synchronous digital network elements for transport of payloads, including digital signals of the asynchronous hierarchy defined in Recommendation G.702; (b) that Recommendation G.707 describes the advantages offered by a synchronous digital hierarchy and multiplexing method and specifies a set of synchronous digital hierarchy bit rates; (c) that Recommendation G.709 specifies the multiplexing structures; (d) that Recommendations G.707, G.708 and G.709 form a coherent set of specifications for the synchronous digital hierar- chy and NNI; (e) that Recommendation G.802 specifies the interworking between networks based on different asynchronous digital hierar- chies and speech encoding laws, recommends that the frame structure for multiplexed digital signals at the network node interface of a synchronous digital network includ- ing ISDN should be as described in this Recommendation. 1 Location of NNI Figure 1-1/G.708 gives a possible network configuration to illustrate the location of the network node interface specified in this Recommendation. Figure 1-1/G.708, p. 2 Basic multiplexing principle and multiplexing elements 2.1 General Frame structures and overheads in this Recommendation are mainly in the context of circuit mode connection types rather than asynchronous transfer mode (ATM). ATM based multiplexing principles are under study. Figure 2-1/G.708 shows the relationship between various multi- plexing elements that are defined below, and illustrates possible multiplexing structures. Figures 2-2/G.708, 2-3/G.708 and 2-4/G.708 are examples of how various signals are multiplexed using these multiplexing elements. The legends used in these figures are defined in S 2.2. Details of the multiplexing method and mappings are given in Recommendation G.709. Note - When signals at bit rates of the various multiplexing elements of the synchronous digital hierarchy (Recommendations G.707, G.708, G.709) are different from existing hierarchy levels in Recommen dation G.702, the signals are not required to be transported via digital networks which are in line with Recommendation G.702. 2.2 Definitions 2.2.1 Container , C-n (n = 1 to 4) This element is a defined unit of payload capacity which is dimensioned to carry any of the levels currently defined in Recom- mendation G.702 and may also provide capacity for transport of broadband signals which are not yet defined. 2.2.2 Virtual container , VC -n Two types of virtual containers have been identified: - Basic virtual container, VC-n (n = 1, 2) This element comprises a single C-n (n = 1, 2) plus the basic virtual container path overhead (POH) appropriate to that level. - Higher order virtual container to VC-n (n = 3, 4) This element comprises a single C-n (n = 3, 4) , an assem- bly of tributary unit groups (TUG-2s) or an assembly of TU-3s, together with virtual container POH appropriate to that level. Figure 2-1/G.708, p. 2 A L'ITALIENNE Figure 2-2/G.708, p. 3 Figure 2-3/G.708, p. 4 Figure 2-4/G.708, p. 5 2.2.3 Tributary unit TU -n (n = 1 to 3) This element consists of a virtual container plus a tributary unit pointer. A tributary unit pointer indicates the phase align- ment of the virtual container (VC-n ) with respect to the POH of the next higher level virtual containers in which it resides. The tributary unit pointer location is fixed with respect to this higher level POH. In certain applications (for example, synchronous mapping pro- viding direct observability of 64 kbit/s channels) the basic vir- tual container has a fixed phase-alignment with respect to the higher level virtual container. In this case, the basic virtual container (VC-1) POH and TU-1 pointer are null. 2.2.4 Tributary unit group , TUG -2 This element consists of a homogeneous assembly of TU-1s or a single TU-2. 2.2.5 Administrative unit, AU -n (n = 3, 4) This element consists of a VC-n (n = 3, 4) plus an administra- tive unit pointer (AU PTR) (n = 3, 4) with respect to the STM-1 frame. The administrative unit pointer location is fixed with respect to the STM-1 frame. 2.2.6 Synchronous transport module level 1, STM-1 This element is the basic building block of the synchronous digital hierarchy and it comprises either one AU-4 or multiple AU-3s, together with the section overhead (SOH). 2.2.7 Synchronous transport module level N, STM-N This element defines the N-th level of the synchronous-digital hierarchy and contains N synchronously multiplexed STM-1 signals. The STM-N-signal can be obtained via single-or multiple-stage multiplexing. Values of N correspond to the synchronous digital hierarchy levels given in Recommendation G.707. 3 Frame structure 3.1 Level 1: 155 520 kbit/s (STM-1) 3.1.1 Basic frame structure The STM-1 frame structure is shown in Figure 3-1/G.708. The three main areas of the STM-1 frame are indicated: - section overhead; - AU pointers; - STM-1 payload. Figure 3-1/G.708, p. 3.1.2 Section overhead Rows 1-3 and 5-9 of columns 1-9 of the STM-1 in Figure 3-1/G.708 are dedicated to the section overhead. The allocation of section overhead capacity and functions is given in Figure 3-4a/G.708. An explanation of the overhead func- tions is given in S 5. 3.1.3 Administrative unit (AU) pointers Row 4 of columns 1-9 and row 1-3 of columns 11-14 in Figure 3-1/G.708 are available for AU pointers. The positions of the pointers of the AUs for different organizations of the STM-1 pay- load are shown in Table 3-1/G.708. The application of pointers and their detailed specifications are given in Recommendation G.709. H.T. [T1.708] TABLE 3-1/G.708 Position of AU pointers ________________________________ AU Position of AU pointer ________________________________ 31 Areas A and B ________________________________ 32 Area As and B ________________________________ 4 Area As and B ________________________________ | | | | | | | | | | | | | | | | | | | | | | | | Table 3-1/G.708 [T1.708], p. 3.1.4 Administrative units in the STM-1 The STM-1 payload can suppport the following types and numbers of administrative units: - one AU-4; or three AU-32s; or four AU-31s. The VC-n associated with each AU-n does not have a fixed phase with respect to the STM-1 frame. The location of the first byte of the VC-n is indicated by the AU-n pointer. The AU-n pointer is in a fixed location in the STM-1 frame as illustrated in Figures 2-2/G.708 to 2-4/G.708 and 3-1/G.708 to 3-3/G.708. The AU-4 may be used to carry, via the VC-4, three TU-32s or four TU-31s. This nested arrangement is illustrated in Figures 3-2/G.708 and 3-3/G.708. The VC-3 associated with each TU-3 does not have a fixed phase relationship with respect to the start of the VC-4. The TU-3 pointer is in a fixed location in the VC-4 and the location of the first byte of the VC-3 is indicated by the TU-3 pointer (illustrated in Figures 3-2/G.708 and 3-3/G.708). FIGURE 3-2/G.708,p . FIGURE 3-3/G.708,p . 3.1.5 VC-4 and VC-3 path overheads The allocation of the VC-4 and VC-3 path overhead capacity and functions is given in Figure 3-4/G.708. An explanation of the over- head functions is given in S 5. The position of the VC-4 and VC-3 path overhead is specified in Recommendation G.709. Figure 3-4/G.708, p. 3.2 Level 4: 622 080 kbitB/Fs (STM-4) This level is obtained by one-byte interleaving of four STM-1s as illustrated in Figure 3-5/G.708. The SOH of the STM-1s shall be 125 s phase aligned prior to multiplexing such that the SOH of the resulting STM-4 is contained in the first 36 columns. The AU pointer value(s) of each STM-1 is/are adjusted to indicate the start of the VC(s) with respect to this new position of the AU pointer(s) which is fixed relative to the STM-4 SOH. FIGURE 3-5/G.708,p . 4 Interconnection of STM-1s The synchronous digital hierarchy, specified in Recommendations G.707, G.708 and G.709, is designed to be univer- sal, allowing transport of a large variety of signals including those specified in Recommendation G.702. However, there are a number of options for structuring an STM-1. This section provides guidelines for the interconnection of STM-1s. Two general cases are considered: - Case 1: STM-1s having the same structure (detailed in S 4.1); - Case 2: STM-1s having different structures (detailed in S 4.2). 4.1 Interconnection of STM-1s having the same structure The interconnection unit used between STM-1s is the VC associ- ated with the AU. This arrangement is shown in row i) of Table 4-1/G.708. 4.2 Interconnection of STM-1s having different structures In the case of STM-1s having different structures, the follow- ing guidelines should be used to facilitate interconnection by bilateral agreement or to resolve contention. The method of interconnection between STM-1s having different structures depends on whether the type of AU is different or whether the type of TUG is different. The cases are considered in three categories: - different types of AU-3s carrying a C-3 payload; - different types of AU carrying the same type of TUG-2; - different types of TUG-2s. 4.2.1 Different types of AU-3s carrying a C-3 payload For the interconnection of different types of AU-3s carrying a C-3 payload, the C-3 payload is transferred from the AU-3 to a corresponding TU-3. This TU-3 is then assembled into a VC-4 using the nested approach illustrated in Figure 3-3/G.708. This arrange- ment is shown in row ii) of Table 4-1/G.708, and is intended to facilitate the transit of C-3 in a VC-3 across a network which can- not support the associated AU-3. 4.2.2 Different types of AU carrying the same type of TUG For the interconnection of a different type of AU carrying the same type of TUG-2, the TUG-2s are transferred between the dissimi- lar AUs. In the absence of bilateral agreement on an AU-3 type, the AU-4 shall be used. This arrangement is shown in row iii) of Table 4-1/G.708. 4.2.3 Different types of TUG-2s For the interconnection of different types of TUG-2s, the TU-1s are transferred from the TUG-22 to the TUG-21. The TUG-21 is used as the interconnection unit. In the absence of bilateral agreement on an AU-3 type, the TUG-21s are directly assembled into a VC-4. This arrangement is shown in row iv) of Table 4-1/G.708. The method of interconnection between an AU-31 containing TUG-21s and an AU-31 containing TUG-22s is for further study. 5 Overhead functions 5.1 Types of overhead Several types of overhead have been identified for application in the synchronous digital hierarchy. The types of overhead described below and their applications are shown in Figure 5-1/G.708. 5.1.1 Section overhead (SOH) Section overhead capacity is added to either an AU-4 or an assembly of AU-3s to create an STM-1. The content always includes STM-1 framing. Content representing section performance monitoring and other maintenance and operational functions can be added or modified without disassembly of the STM-1, as appropriate, for various configurations of elements (e.g. intermediate regenerator monitoring, protection switching control). H.T. [T2.708] _________________________________________________ TABLE 4-1/G.708 { Interconnection of STM-1s } _________________________________________________ | | | | | | | | | | _________________________________________________________________________________________________________________________________ Interconnection { STM-1 structure A Conversion steps Conversion steps STM-1 structure B Parameters _________________________________________________________________________________________________________________________________ i) { AU-x /C-x or TUG-2p } { AU-x VC-x } AU-x VC-x { VC-x <- AU-x } { AU-x /C-x or TUG-2p } { x = 4, 32 or 31 p = 1 or 2 } _________________________________________________________________________________________________________________________________ ii) { AU-3x /C-3x } { AU-3x VC-3x TU-3x VC 4 } AU-4 VC-4 VC-4 <- AU-4 { AU-4/TU-3x /C-3x } x = 1 or 2 _________________________________________________________________________________________________________________________________ iii) { AU-x /TUG-2p } { AU-x VC-x TUG-2p } { AU-y | ua) } TUG-2p { TUG-2p <- VC-z <- AU-z } { AU-z /TUG-2p } { x = 4, 32 or 31 y = 4, 32 or 31 z = 4, 32 or 31; z / x p = 1 or 2 } _________________________________________________________________________________________________________________________________ iv) { AU-x /TUG-22/TU-1p } { AU-x VC-x TUG-21 } { AU-y | ua) } TUG-21 { TUG-21 <- TU-1p <- TUG-22 <- <- VC-z <- AU-z } { AU-z /TUG-22/TU-1p } { x = 4, 32 or 31 y = 4, 32 or 31 z = 4 or 31; z / x p = 1 or 2 (see note) } _________________________________________________________________________________________________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Item to the left is carrying item to the right. Conversion "From To" (to arrive at the interconnection unit). a) In the absence of a bilateral agreement on an AU-3, an AU-4 should be used. Note - The case where x = 31 and z = 31 is for further study. Tableau 4-1/G.708 [T2.708], p. 12 A L'ITALIENNE 5.1.2 Virtual container path overhead (POH) Virtual container path overhead provides for communication between the point of assembly of a virtual container and its point of disassembly. Two categories of virtual container path overhead have been identified: - Basic virtual container path overhead (VC-1, 2 POH) Basic virtual container POH is added to the container (C-1, 2) when the VC-1, 2 is created. Among the functions included in this overhead are virtual container path performance monitoring, signals for maintenance purposes and alarm status indications. - Higher order virtual container path overhead (VC-3, 4 POH) VC-3 POH is added to either an assembly of TUG-2s or a C-3 to form a VC-3. VC-4 POH is added to either an assembly of TU-3s or a C-4 to form a VC-4. Among the functions included within this overhead are virtual container path performance monitoring, alarm status indications, signals for maintenance purposes and multiplex structure indications (VC-3,4 composition). Figure 5-1/G.708, p. 5.2 Overhead descriptions The location of the various section and VC-3, 4 path overhead bytes in the STM-1 frame is illustrated in Figure 3-4/G.708. 5.2.1 SOH byte descriptions 5.2.1.1 Framing: A1, A2 Six bytes are dedicated to each STM-1. The pattern shall be A1A1A1A2A2A2 (A1=11110110, A2=00101000). These bytes shall be pro- vided in all STM-1 signals within an STM-N. 5.2.1.2 Data communication channel: D1-D12 Twelve bytes are allocated for section data communication. These bytes are defined only for STM-1 No. 1 of an STM-N signal. 5.2.1.3 STM identifier: C1 This is a unique number assigned to an STM-1 prior to it being multiplexed to a higher STM-N level. Upon demultiplexing, this byte may be used to identify the position of any particular STM-1 within the incoming STM-N signal. 5.2.1.4 Orderwire : E1, E2 These two bytes provide orderwire channels for voice communi- cation. These bytes are defined only for STM-1 No. 1 of an STM-N signal. 5.2.1.5 User channel: F1 This byte is reserved for user purposes (e.g. network opera- tors). This byte is defined only for STM-1 No. 1 of an STM-N sig- nal. 5.2.1.6 BIP-8: B1 One byte is allocated in each STM-1 for a bit error monitoring function of an elementary regenerator section. This function shall be a Bit Interleaved Parity 8 (BIP-8) code using even parity. The BIP-8 is computed over all bits of the previous STM-N frame after scrambling and is placed in byte B1 before scrambling. (For details of the scrambling process, see Recommendation G.709.) The B1 byte shall be monitored and recomputed at every regenerator. Note - Bit Interleaved Parity-N (BIP-N) code is defined as a method of error monitoring. With even parity, an N bit code is gen- erated by the transmitting equipment over a specified portion of the signal in such a manner that the first bit of the code provides even parity over the first bit of all N-bit sequences in the covered portion of the signal, the second bit provides even parity over the second bit of all N-bit sequences within the specified portion, etc. Even parity is generated by setting the BIP-N bits so that there are an even number of 1s in each of all the N-bit sequences including the BIP-N. 5.2.1.7 BIP-24: B2 x 3 Three bytes are allocated in each STM-1 for a bit error moni- toring function of a section. This function shall be a Bit Inter- leaved Parity 24 (BIP-24) code using even parity. The BIP-24 is computed over all bits of the previous STM-1 frame except for the first three rows of section overhead (A1 through D3) and is placed in bytes B2 before scrambling. This parity code is not recomputed at regenerators. These bytes shall be provided in all STM-1 signals within an STM-N signal. 5.2.1.8 APS channel: K1, K2 Two bytes are allocated for Automatic Protection Switching (APS) signalling. These bytes are defined only for STM-1 No. 1 of an STM-N signal. 5.2.1.9 Spare: Z1, Z2 Six bytes are allocated for functions not yet defined. These bytes have no defined value. These bytes are reserved in all STM-1s of an STM-N. 5.2.2 AU pointer descriptions 5.2.2.1 Pointer value Two bytes are allocated for a pointer which indicates the offset in bytes between the pointer and the first byte of the asso- ciated virtual container POH. For a complete specification and location of these bytes, see Recommendation G.709. 5.2.2.2 Pointer action Three pointer action bytes are allocated in an AU-4 for fre- quency justification purposes. One pointer action byte is allocated for AU-3s and TU-n s. For a complete specification of these bytes, refer to Recommendation G.709. In the event of a negative justification, they carry valid information. 5.2.3 VC-n (n = 3, 4) POH byte descriptions 5.2.3.1 Path BIP-8: B3 One byte is allocated in each virtual container for a path bit error monitoring function. This function shall be a BIP-8 code using even parity. The BIP-8 is computed over all bits of the pre- vious container and is placed in the B3 byte. 5.2.3.2 Path status: G1 One byte is allocated to return the VC-n path terminating status performance information to the VC-n path originating point. 5.2.3.3 Signal label: C2 One byte is allocated to indicate the composition of the VC-n payload. 5.2.3.4 VC- n path user channel: F2 One byte is allocated for user communication purposes. 5.2.3.5 VC- n path trace : J1 This byte is used at the VC-n termination point to verify the VC-n path connection. 5.2.3.6 Spare: Z3-Z5 Three bytes are allocated for as yet undefined purposes. 5.2.3.7 Multiframe indicator: H4 This byte is allocated to provide a multiframe indication, when required. 6 Physical specification of the NNI Specification for physical, electrical or optical characteris- tics of the NNI will be contained in another Recommendation which is under study. Recommendation G.709 SYNCHRONOUS MULTIPLEXING STRUCTURE (Melbourne, 1988) The CCITT, considering (a) that Recommendation G.707 describes the advantages offered by a synchronous digital hierarchy and multiplexing method and specifies a set of synchronous digital hierarchy bit rates; (b) that Recommendation G.708 specifies - the general principles and frame structure of the network node interface (NNI) for the synchronous digital hierarchy; - the overall frame size of 9 rows x 270 columns and section overhead (SOH) definition and its byte allocation; - arrangements for international synchronous inter- connection of STM-1s; (c) that Recommendations G.707, G.708 and G.709 form a coherent set of specifications for the synchronous digital hierar- chy and NNI, recommends that the formats for mapping multiplexing elements into the STM-1 at the Network Node Interface (NNI) and the method of multi- plexing to STM-N shall be as described in this Recommendation. 1 Basic multiplexing structure Descriptions of the various multiplexing elements are given in Recommendation G.708. The relationships between the various multiplexing elements are shown in Figure 1-1/G.709. The detailed multiplexing structure is described in the following sections. Figure 1-1/G.709, p. 2 Mapping formats and multiplexing method 2.1 Mapping and multiplexing up to STM-1 2.1.1 Mapping of VC-4 into AU-4 The STM-1 mapping format for transporting one VC-4 in an AU-4 is shown in Figure 2-1/G.709. The VC-4 consists of a 9-row by 261-column payload structure; the first column of the VC-4 is devoted to path overhead (POH). The payload of the VC-4 shown in Figure 2-1/G.709 is a single C-4. Other possible VC-4 payloads include a single 139 | 64 kbit/s signal in a C-4, four VC-31s (shown in Figure 2-2/G.709 and carried in four TU-31s), three VC-32s (shown in Figure 2-3/G.709 and carried in three TU-32s), and a group of either 21 TUG-21s or 16 TUG-22s (shown in Figure 2-4/G.709). The STM-1 format shown in Figure 2-1/G.709 consists of an AU-4 plus section overhead (SOH). The VC-4 does not have a fixed phase with respect to the AU-4 (and the STM-1); therefore, the location of the first byte of the VC-4 with respect to the AU-4 frame is given by the AU-4 pointer. Note that the AU-4, including the AU-4 pointer, has a fixed location in the STM-1 frame. Figure 2-1/G.709, p. 2.1.2 Mapping of four VC-31s into AU-4 The STM-1 mapping format for transporting four VC-31s in an AU-4 is shown in Figure 2-2/G.709. Each TU-31 consists of a 9-row by 64-column payload structure plus six bytes of POH plus a three-byte TU-31 pointer. The payload of the VC-31 shown in Figure 2-22/G.709 is a single C-31. Other possible VC-31 payloads include a single 34 | 68 kbit/s signal in a C-31 (shown in Figure 5-10/G.709) or a group of either five TUG-21s or four TUG-22s (shown in Figure 2-5/G.709). The four VC-31s are carried independently in the 261-column VC-4. Each of the VC-31s does not have a fixed phase with respect to the start of the VC-4. Therefore, the location of the first byte of each VC-31 with respect to the VC-4 POH is given by a 3-byte TU-31 pointer (H1, H2, H3). These four TU-31 pointers reside in a fixed location in the VC-4 as shown in Figure 2-2/G.709. As described in S 2.1.1, the phase of the VC-4 with respect to the AU-4 is given by the AU-4 pointer. 2.1.3 Mapping of three VC-32s into AU-4 The STM-1 mapping format for transporting three VC-32s in an AU-4 is shown in Figure 2-3/G.709. Each TU-32 consists of a 9-row by 84-column payload structure plus one column of POH and one 3-byte TU-32 pointer. The payload of the VC-32 shown in Figure 2-3/G.709 is a single C-32. Other possible VC-32 payloads include a single 44 | 36 kbitB/Fs signal in a C-32 or a group of seven TUG-21s (shown in Figure 2-5/G.709). The three VC-32s are carried independently in the 261-column VC-4. Each of the VC-32s does not have a fixed phase with respect to the start of the VC-4. Therefore, the location of the first byte of each VC-32 with respect to the VC-4 POH is given by a 3-byte TU-32 pointer (H1, H2, H3). These three TU-32 pointers reside in a fixed location in the VC-4 as shown in Figure 2-3/G.709; 36 fixed stuff bytes are also required in the VC-4. As described in S 2.1.1, the phase of the VC-4 with respect to the AU-4 is given by the AU-4 pointer. Figure 2-2/G.709, p. Figure 2-3/G.709, p. 2.1.4 Mapping of TUG-2s into AU-4 The STM-1 mapping format transporting TUG-21s and TUG-22s into an AU-4 is shown in Figure 2-4/G.709. The AU-4 can carry a group of either 21 TUG-21s or 16 TUG-22s. The TUG-21 payload structure has 9 rows and 12 columns. When used to transport TUG-21s, the VC-4 consists of one column of VC-4 POH, eight columns of fixed stuff, and a remaining 252-column pay- load structure. The 21 TUG-21s are mapped into this 9-row by 252-column structure using a fixed phase with respect to the VC-4. The TUG-21s are single byte interleaved as shown in Figure 2-4/G.709. The TUG-22 payload structure has 9 rows and 16 columns. The VC-4 consists of one column of VC-4 POH, four columns of fixed stuff and 256 payload columns when used to carry the 16 TUG-22s. The TUG-22s are single byte interleaved into the 9-row by 256-column structure. As described in S 2.1.1, the phase of the VC-4 with respect to the AU-4 is given by the AU-4 pointer. Figure 2-4/G.709, p. 2.1.5 Mapping of four AU-31s into STM-1 The STM-1 mapping format for transporting four VC-31s within four AU-31s is shown in Figure 2-6/G.709. A VC-31 is defined to be a 9-row by 64-column payload structure, plus six bytes of POH, located in row 1 to 6 of the first column, according to the figure. Each AU-31 pointer has a fixed phase with respect to the STM-1 frame. As shown in Figure 2-6/G.709, the four AU-31 pointers are located in columns 11 to 14, rows 1 to 3 of the STM-1, one pointer in each column. Columns 11 to 270 of the STM-1 are divided between each of the AU-31s; thus, each AU-31 occupies alternately every fourth column. The phase of each VC-31 is not fixed with respect to its AU-31. Therefore, the location of the first byte of each VC-31 with respect to the AU-31 frame is given by AU-31 pointer (H1, H2, H3). The payload of the VC-31 shown in Figure 2-6/G.709 is a single C-31. Other possible VC-31 payloads include a single 34 368 kbit/s signal in a C-31 and a group of five TUG-21s or four TUG-22s (shown in Figure 2-5/G.709). Figure 2-5/G.709, p. Figure 2-6/G.709, p. 2.1.6 Mapping of three AU-32s into STM-1 The STM-1 mapping format for transporting three VC-32s within three AU-32s is shown in Figure 2-7/G.709. A VC-32 is defined to be a 9-row by 85-column payload structure, with the first column con- sisting of VC-32 POH. When mapped into its AU-32, two columns of fixed stuff are added to each VC-32 payload to make it equal the AU-32 payload capacity. These two fixed stuff columns are fixed with respect to the VC-32 POH and are inserted between columns 29 and 30, and between columns 57 and 58 of the VC-32. Each AU-32 pointer has a fixed phase with respect to the STM-1 frame. As shown in Figure 2-7/G.709, the three AU-32 pointers are located in the fourth row of the first nine columns of the STM-1 frame, between the bytes of the SOH. The remaining 261 columns of the STM-1 are divided between each of the AU-32s; thus, each AU-32 occupies alternately every third column of the 261. AU-32 number one consists of three bytes of AU-32 pointer, plus STM-1 columns 10, 13, 16, | | | where columns 1 through 9 contain the SOH and the AU-32 pointers. The phase of each VC-32 (plus fixed stuff columns) is not fixed with respect to its AU-32. Therefore, the locations of the first byte of each VC-32 with respect to the AU-32 frame is given by the AU-32 pointer (H1, H2, H3). The payload of the VC-32 shown in Figure 2-7/G.709 is a single C-32. Other possible VC-32 payloads include a single 44 | 36 kbitB/Fs signal into a C-32 (shown in Figure 5-8/G.709) and a group of seven TUG-21s (shown in Figure 2-5/G.709). Figure 2-7/G.709, p. 2.1.7 Mapping of TUGs into a VC Figure 2-5/G.709 shows the schematic mapping of TUG-2s into a VC-3. The details of these mappings are given in S 5; this section presents the general multiplexing principles involved. The VC-31 consists of six bytes of VC-31 POH plus a 9-row by 64-column payload structure. This payload structure can be used to carry five TUG-21s or four TUG-22s. The individual TUG-2 has a fixed location in the VC-31 frame; this is shown schematically in Figure 2-5/G.709. The VC-32 consists of nine bytes of VC-32 POH plus a 9-row by 84-column payload structure. This payload structure can be used to carry seven TUG-21s. Again, the individual TUG-21 has a fixed loca- tion in the VC-32 frame. Each TUG-21 can carry a single VC-21 or four VC-11s or three VC-12s. Each TUG-22 can carry a single VC-22 or four VC-12s or five VC-11s. The VCs do not have a fixed phase with respect to the VC-3 POH; TU pointers are used to indicate the position of the VCs in the TUG frame. 2.2 STM-N multiplexing 2.2.1 STM-N frame format The STM-N signal is formed by single byte interleaving N STM-1 signals. The STM-N frame structure is depicted in Figure 2-8/G.709. The first byte of the STM-N signal shall be the first A1 framing byte from STM-1 No. 1 followed sequentially by the first A1 byte from STM-1 No. 2 through No. N. The first bit to be transmit- ted shall be the most significant bit of the first A1 framing byte from STM-1 No. 1. Before byte interleaving STM-1 signals to form an STM-N sig- nal, all of the SOH and the AU-n (n = 3 or 4) pointers in the sig- nals to be interleaved must be 125 us frame aligned. The alignment is accomplished by adjusting the values of the AU-n pointers to reflect the new relative positions of the VC-n s. Note that is is permitted to mix STM-1s containing AU-3s and STM-1s containing AU-4s in the same STM-N. Figure 2-8/G.709, p. 2.2.2 STM-N interleaving If an STM-N level signal is input to a byte interleaver with STM-M level output (M > N), N bytes of each STM-N are consecutively placed on the output STM-M signal. This method of interleaving is illustrated in Figure 2-9/G.709 where STM-X, STM-Y and STM-Z (X + Y + Z = M) inputs are sequentially interleaved to form an STM-M output. Figure 2-9/G.709, p. 2.2.3 Concatenated STM-1s STM-1 signals can be concatenated together to form an STM-Nc which can transport payloads requiring greater than one C-4 capa- city. A concatenation indication, used to show that this multi-C-4 payload carried in a single VC-4-Nc should be kept together, is contained in the AU-4 pointer. See S 3.4 for details. 2.3 Maintenance signals 2.3.1 Section maintenance signals The section alarm indication signal (AIS) is detected as an all 1s in bits 6, 7, 8 of byte K2 after descrambling. Far end receive failure (FERF) is to return an indication to the transmitting STM-N MUX that the receiving STM-N MUX has detected an incoming section failure or is receiving section AIS. FERF is detected by a 110 code in bit positions 6, 7 and 8 of the K2 APS byte after descrambling. 2.3.2 Path maintenance signals The VC-n (n = 3, 4) unequipped indication is an all 0s VC-n path signal label after descrambling. This code indicates to VC-n terminating equipment that the VC-n is intentionally unoccupied so that alarms can be inhibited. This code is generated as an all 0s VC-n path signal label and a valid VC-n path BIP-8 (byte B3); the VC-n payload is unspecified. An alarm indication signal (AIS) is a signal sent downstream as an indication that an upstream failure has been detected and an alarm generated. The TU-n (n = 1, 2, 3) path AIS is specified as all 1s in the entire TU-n , including the TU-n pointer. Similarly, the AU-n (n = 3, 4) path AIS is specified as all 1s in the entire AU-n , including the AU-n pointer. All path AISs are carried within STM-N signals having valid SOH. The path status byte (G1) is used to convey the terminating path status and performance to the originator of a VC-n (n = 3 or 4). Bits 1 through 4 convey the count of errors detected using the path BIP-8 code. This code has nine legal values, 0-8. The remain- ing seven possible values should be interpreted as zero errors. 2.4 Timing recovery The STM-N (N _" 1) signal must have sufficient bit timing con- tent at the NNI. A suitable bit pattern, which prevents a long sequence of 1s and 0s, is provided by using a scrambler. Its opera- tion shall be functionally identical to that of a frame synchronous scrambler of sequence length 127 operating at the line rate. The generating polynomial shall be 1 + x 6 + x 7. Figure 2-10/G.709 gives a functional diagram of the frame synchro- nous scrambler. The scrambler shall be reset to 1111111 on the most signifi- cant bit of the byte following the last byte of the first row of the STM-N SOH. (This is the most significant bit of the 9 x N + 1 transmitted byte of the STM-N; see Figure 2-8/G.709.) This bit, and all subsequent bits to be scrambled, shall be added modulo 2 to the output from the x 7 position of the scrambler. The scrambler shall run continuously throughout the complete STM-N frame. The first row of the STM-N SOH (9 x N bytes, including the A1 and A2 framing bytes) shall not be scrambled. Note - Care should be taken in selecting the binary content of the bytes reserved for national use and which are excluded from the scrambling process of the STM-N signal, to ensure that long sequences of 1s or 0s do not occur. Figure 2-10/G.709, p. 2.5 Conceptual steps for STM-N assembly For a better understanding of the detailed structure of the STM-N frame shown in Figure 2-8/G.709, the conceptual steps required to assemble the STM-N frames in the direct (non-nested) arrangement are listed: 1) Each VC-n (n = 3 or 4) has either six or nine bytes devoted to path overhead (POH) functions. Of these, the BIP-8 error check byte (B3) is calculated over the entire contents of the VC-n and the result is placed in the B3 byte of the following frame. If it is appropriate, the VC-n unequipped signal consisting of an all 0s pattern for the VC-n is inserted. (See S 2.3.) 2) After all of the required VC-n s have been assembled, AU-n pointer values are calculated so as to frame align all of the AU-n s within a single STM-N frame. If the contents of the VC-n are lost due to an equipment or other failure, the AU-n path AIS signal is inserted into the AU-n AU-n path AIS is defined in S 2.3. 3) The SOH bytes are then added to the STM-N frame. It is convenient to consider the last five rows of the SOH first. Of the N x 45 such SOH bytes, N x 9 are allocated to the N x 3 B2, N x 3 Z1 and N x 3 Z2 bytes. Thus, each STM-1 has a full comple- ment (3) of these bytes in the STM-N. The remaining STM-N SOH bytes in the last five rows (K1 and K2, D4-D12 and E2) are limited to the first STM-1 in any STM-N signal. The content of the unused SOH bytes of STM-1 No. 2 through No. N are for national use. 4) The N x 3 B2 bytes of an STM-N contain a bit interleaved parity N x 24 (BIP-N x 24) code using even parity which is calculated across the entire previous STM-N frame excluding the first three rows of SOH. 5) A line signal failure would result in the inser- tion of a section AIS at this point in the assembly of an STM-N (see S 2.3). 6) The remaining bytes of SOH contained in the first three rows (27 x N bytes) of the STM-N are added next. Of these, the B1, E1, F1, D1-D3 bytes are present only in STM-1 No. 1 of any STM-N signal. The content of the unused SOH bytes of STM-1 No. 2 through No. N are for national use. 7) The STM-1s are then byte interleaved to form an STM-N, as described in S 2.2.2, and subsequently serialized and scrambled as described in S 2.4. 8) The final operation is the calculation of a BIP-8 code over the entire STM-N bit stream on a frame-by-frame basis. The result is loaded into byte B1 of STM-1 No. 1 in the fol- lowing frame when the SOH is loaded. 3 Pointer 3.1 AU pointer The AU pointer provides a method of allowing flexible and dynamic alignment of the VC within the AU frame. Dynamic alignment means that the VC is allowed to "float" within the AU frame. Thus the pointer is able to accommodate differences not only in the phases of the VC and SOH, but in the frame rates as well. 3.1.1 AU pointer location The AU-4 pointer is contained in bytes H1, H2 and H3 as shown in Figure 3-1/G.709. The three individual AU-32 pointers are con- tained in three separate H1, H2 and H3 bytes as shown in Figure 3-2/G.709. Likewise the four individual AU-31 pointers are contained in four separate H1, H2 and H3 bytes as shown in Figure 3-3/G.709. Figure 3-1/G.709, p. Figure 3-2/G.709, p. Figure 3-3/G.709, p. 3.1.2 AU pointer value The pointer contained in H1 and H2 designates the location of the bytes where the VC begins. The two bytes allocated to the pointer function can be viewed as one word as shown in Figure 3-4/G.709. The last 10 bits (bits 7-16) of the pointer word carry the pointer value. The two S bits (bits 5 and 6) indicate the AU type. As illustrated in Figure 3-4/G.709, the AU-4 pointer value is a binary number with a range of 0 to 782 which indicates the offset between the pointer and the first byte of the VC. As shown in Fig- ure 3-1/G.709, the H1 and H2 bytes contain the pointer value while the position which the pointer indicates is the very first byte of the consecutive three bytes. Figure 3-4/G.709 also indicates two additional valid pointers: the concatenation indication (CI) and the null pointer indication (NPI). The CI is indicated by 1001 in bits 1-4, with bits 5-6 unspecified, and ten 1s in bits 7-16. The NPI is indicated by 1001 in bits 1-4, with bits 5-6 unspecified, and five 1s in bits 7-11 followed by five 0s in bits 12-16. As illustrated in Figure 3-4/G.709, the AU-32 pointer value is also a binary number with a range of 0 to 782. Since there are three AU-32s in the STM-1, each AU-32 has its own associated H1, H2 and H3 bytes. In Figure 3-2/G.709, the H bytes are shown in sequence. The first H1, H2, H3 set refers to the first AU-32, and the second set to the second AU-32, and so on. The same is true for the information bytes. For the AU-32s, each pointer operates independently. Likewise, as illustrated in Figure 3-4/G.709, the AU-31 pointer value is a binary number with a range of 0 to 581. Since there are four AU-31s in the STM-1, each AU-31 has its own associ- ated H1, H2 and H3 bytes. In Figure 3-3/G.709, the H bytes are shown in sequence. The first H1, H2, H3 set refers to the first AU-31, the second set to the second AU-31, and so on. The same is true for the information bytes. For the AU-31s, each pointer operates independently. In all cases, the STM-1 SOH and AU pointer bytes are not counted in the offset. For example, in an AU-4, the pointer value of 0 indicates that the VC starts in the byte location that immedi- ately follows the last H3 byte, whereas an offset of 87 indicates that the VC starts three bytes after the K2 byte. Figure 3-4/G.709, p. 28 Figure 3-4/G.709 [T2.709], p. 28 3.1.3 Frequency justification If there is a frequency offset between the frame rate of the SOH and that of the VC, then the pointer value will be incremented or decremented as needed, accompanied by a corresponding positive or negative justification byte or bytes. Consecutive pointer opera- tions must be separated by at least three frames (i.e. every fourth frame) in which the pointer value remains constant. If the frame rate of the VC is too slow with respect to that of the SOH, then the alignment of the VC must periodically slip back in time and the pointer value must be incremented by one. This operation is indicated by inverting bits 7, 9, 11, 13 and 15 ( I-bits ) of the pointer word to allow 5-bit majority voting at the receiver. Three positive justification bytes appear immediately after the last H3 byte in the AU-4 frame containing inverted I-bits. Subsequent pointers will contain the new offset. This is illustrated in Figure 3-5/G.709. For AU-32 frames, a positive justification byte appears immediately after the associated H3 byte of the individual AU-32 frame containing inverted I-bits. Subsequent pointers will contain the new offset. This is illustrated in Figure 3-6/G.709. The same is true for AU-31 as shown in Figure 3-7/G.709. If the frame rate of the VC is too fast with respect to that of the SOH, then the alignment of the VC must periodically be advanced in time and the pointer value must be decremented by one. This operation is indicated by inverting bits 8, 10, 12, 14 and 16 ( D-bits ) of the pointer word to allow 5-bit majority voting at the receiver. Three negative justification bytes appear in the H3 bytes in the AU-4 frame containing inverted D-bits. Subsequent pointers will contain the new offset. This is illustrated in Figure 3-8/G.709. For AU-32 frames, a negative justification byte appears in the H3 byte of the individual AU-32 frame containing inverted D-bits. Subsequent pointers will contain the new offset. This is illus- trated in Figure 3-9/G.709. The same is true for AU-31 as shown in Figure 3-10/G.709. Figure 3-5/G.709, p. Figure 3-6/G.709, p. Figure 3-7/G.709, p. Figure 3-8/G.709, p. Figure 3-9/G.709, p. Figure 3-10/G.709, p. 3.1.4 New data flag Bits 1-4 (N-bits) of the pointer word carry a new data flag (NDF) which allows an arbitrary change of the pointer value if that change is due to a change in the payload. Four bits are allocated to the flag to allow error correction. The decoding may be performed by accepting NDF enabled if at least three bits match. Normal operation is indicated by a 0110 code in the N-bits. NDF is indicated by inversion of the N-bits to 1001. The new alignment is indicated by the pointer value accompanying the NDF and takes effect at the offset indicated. NDF should be enabled when the pointer value transits between its normal value and the CI or NPI. 3.1.5 Pointer generation The following summarizes the rules for generating the AU pointers. 1) During normal operation, the pointer locates the start of the VC within the AU frame. The NDF is set to 0110. 2) The pointer value can only be changed by rules 3, 4 or 5. 3) If a positive justification is required, the current pointer value is sent with the I-bits inverted and the sub- sequent positive justification opportunity is filled with dummy information. Subsequent pointers contain the previous pointer value incremented by one. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 4) If a negative justification is required, the current pointer value is sent with the D-bits inverted and the subsequent negative justification opportunity is overwritten with actual data. Subsequent pointers contain the previous pointer value decremented by one. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 5) If the alignment of the VC changes for any rea- son other than rules 3 or 4, the new pointer value shall be sent accompanied by NDF set to 1001. The NDF only appears in the first frame that contains the new values. The new location of the VC begins at the first occurrence of the offset indicated by the new pointer. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 3.1.6 Pointer interpretation The following summarizes the rules for interpreting the AU pointers. 1) During normal operation, the pointer locates the start of the VC within the AU frame. 2) Any variation from the current pointer value is ignored unless a consistent new value is received three times con- secutively or it is preceded by one of rules 3, 4 or 5. 3) If the majority of the I-bits of the pointer word are inverted, a positive justification operation is indicated. Subsequent pointer values shall be incremented by one. 4) If the majority of the D-bits of the pointer word are inverted, a negative justification operation is indicated. Subsequent pointer values shall be decremented by one. 5) If the NDF is set to 1001, then the coincident pointer value shall replace the current one at the offset indicated by the new pointer value regardless of the state of the receiver. 3.2 TU-3 pointers There are two types of TU-3 pointers: TU-31 and TU-32. The TU-3 pointer provides a method of allowing flexible and dynamic alignment of VC-3 within the TU-3 frame, independent of the actual contents of the VC. Dynamic alignment means that the VC-3 is allowed to "float" within the TU-3 frame. 3.2.1 TU-3 pointer location Three individual TU-32 pointers are contained in the three separate H1, H2 and H3 bytes as shown in Figure 3-11/G.709. Four individual TU-31 pointers are contained in the four separate H1, H2 and H3 bytes as shown in Figure 3-12/G.709. 3.2.2 TU-3 pointer value The TU-3 pointer value contained in H1 and H2 designates the location of the byte where the VC-3 begins. The two bytes allocated to the pointer function can be viewed as one word as shown in Figure 3-4/G.709. The last ten bits (bits 7-16) of the pointer word carry the pointer value. The two S bits (bits 5 and 6) indicate the TU type. The TU-32 pointer value is a binary number with a range of 0-764 which indicates the offset between the pointer and the first byte of the VC-32 as shown in Figure 3-11/G.709. The TU-31 pointer value is a binary number with a range of 0-581 which indicates the offset between the pointer and the first byte of the VC-31 as shown in Figure 3-12/G.709. Figure 3-11/G.709, p. Figure 3-12/G.709, p. 3.2.3 Frequency justification If there is a frequency offset between the TU-3 frame rate and that of the VC-3, then the pointer value will be incremented or decremented as needed accompanied by a corresponding positive or negative justification byte. Consecutive pointer operations must be separated by at least three frames in which the pointer value remains constant. If the frame rate of the VC-3 is too slow with respect to that of the TU-3 frame rate, then the alignment of the VC must periodi- cally slip back in time and the pointer must be incremented by one. This operation is indicated by inverting bits 7, 9, 11, 13 and 15 (I-bits) of the pointer word to allow 5-bit majority voting at the receiver. A positive justification byte appears immediately after the individual H3 byte in the TU-3 frame containing inverted I-bits. Subsequent TU-3 pointers will contain the new offset. If the frame rate of the VC-3 is too fast with respect to that of the TU-3 frame rate, then the alignment of the VC must be periodically advanced in time and the pointer must be decremented by one. This operation is indicated by inverting bits 8, 10, 12, 14 and 16 (D-bits) of the pointer word to allow 5-bit majority voting at the receiver. A negative justification byte appears in the indi- vidual H3 byte in the TU-3 frame containing inverted D-bits. Subse- quent TU-3 pointers will contain the new offset. 3.2.4 New data flag Bits 1-4 (N-bits) of the pointer word carry a NDF which allows an arbitrary change of the value of the pointer if that change is due to a change in the VC-3. Four bits are allocated to the flag to allow for error correc- tion. The decoding may be performed by accepting NDF enabled if at least three bits match. Normal operation is indicted by a 0110 code in the N-bits; NDF is indicated by inversion of the N-bits to 1001. The new alignment is indicated by the pointer value accom- panying the NDF and takes effect at the offset indicated. 3.2.5 Pointer generation The following summarizes the rules for generating the TU-3 pointers. 1) During normal operation, the pointer locates the start of the VC-3 within the TU-3 frame. The NDF is set to 0110. 2) The pointer value can only be changed by rules 3, 4 or 5. 3) If a positive justification is required, the current pointer value is sent with the I-bits inverted and the sub- sequent positive justification opportunity is filled with dummy information. Subsequent pointers contain the previous pointer value incremented by one. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 4) If a negative justification is required, the current pointer value is sent with the D-bits inverted and the sub- sequent negative justification opportunity is overwritten with actual data. Subsequent pointers contain the previous pointer value decremented by one. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 5) If the alignment of the VC changes for any rea- son other than rules 3 or 4, the new pointer value shall be sent accompanied by the NDF set to 1001. The NDF only appears in the first frame that contains the new value. The new VC location begins at the first occurrence of the offset indicated by the new pointer. No subsequent increment or decrement operation is allowed for at least three frames following this operation. 3.2.6 Pointer interpretation The following summarizes the rules for interpreting the TU-3 pointers. 1) During normal operation the pointer locates the start of the VC-3 within the TU-3 frame. 2) Any variation from the current pointer value is ignored unless a consistent new value is received three times con- secutively or it is preceded by one of rules 3, 4 or 5. 3) If the majority of the I-bits of the pointer word are inverted, a positive justification is indicated. Subse- quent pointer values shall be incremented by one. 4) If the majority of the D-bits of the pointer word are inverted, a negative justification is indicated. Subse- quent pointer values shall be decremented by one. 5) If the NDF is set to 1001, then the coincident pointer value shall replace the current one at the offset indicated by the new pointer value regardless of the state of the receiver. 3.3 TU-1/TU-2 pointers The TU-1 pointer is only used with floating mapping. Floating and locked modes of operation are described in S 5.2. The TU-1 and TU-2 pointers provide a method of allowing flexi- ble and dynamic alignment of the VC-1/VC-2 within the TU-1 and TU-2 multiframes, independent of the actual contents of the VC. 3.3.1 TU-1/TU-2 pointer location The TU-1/TU-2 pointers are contained in the V1 and V2 bytes as illustrated in Figure 3-13/G.709. Figure 3-13/G.709, p. 3.3.2 TU-1/TU-2 pointer value The TU pointer word is shown in Figure 3-14/G.709. The pointer value (bits 7-16) is a binary number which indi- cates the offset from V2 to the first byte of the VC-1/VC-2. The range of the offset is different for each of the TU sizes as illus- trated in Figure-3-15/G.709. Note that the pointer bytes are not counted in the offset calculation. Figure 3-14/G.709, p. Figure 2-15/G.709, p. 3.3.3 TU-1/TU-2 multiframe indication byte TU-1/TU-2 multiframe indication byte (H4) relates to the lowest level of multiplexing structure and indicates a variety of different multiframes for use by certain payloads. Specifically it provides: - 500 us (4-frame) multiframe identifying frames containing TU-1/TU-2 pointers in the floating TU-1/TU-2 mode, and reserved byte locations in the locked TU-1 mode; - 2 ms (16-frame) multiframe for byte synchronous out-slot-signalling for 2048 kbitB/Fs payloads in the locked TU-1 mode; - 3 ms (24-frame) multiframe for byte synchronous out-slot-signalling for 1544 kbitB/Fs payloads in the locked TU-1 mode. The coding of the H4 byte is illustrated in Figures 3-16/G.709 to 3-18/G.709. Figure 3-16/G.709, p. 40 Figure 3-17/G.709 [T3.709], p. 41 Figure 3-18/G.709 [T4.709], p. 42 For network elements that operate only in the floating TU-1/TU-2 mode, a simplified multiframe alignment byte may be used. The simplified version provides only the 500 us multiframe. The 2 or 3 ms multiframe of any signalling within floating TU-1s is indi- cated by per-TU multiframe indicators carried within the TU-1. Figure 3-13/G.709 shows the VC-1/VC-2 mapping in the multiframed TU-1/TU-2. A converter from locked to floating TUs is permitted to pass H4 through transparently. A converter from floating to locked TUs must recover and align the multiframes from all of the floating TUs, and thus can transmit any convenient full multiframe on the locked TU side. 3.3.4 TU-1/TU-2 frequency justification The TU-1/TU-2 pointer is used to frequency justify the VC-1/VC-2 exactly the same way that the TU-3 pointer is used to frequency justify the VC-3. A positive justification opportunity immediately follows the V3 byte. Additionally, V3 serves as the negative justification oppor- tunity such that when the opportunity is taken, V3 is overwritten by data. This is also shown in Figure 3-15/G.709. The indication of whether or not a justification opportunity has been taken is pro- vided by the I- and D-bits of the pointer in the current TU mul- tiframe. The value contained in V3 when not being used for a nega- tive justification is not defined. The receiver is required to ignore the value contained in V3 whenever it is not used as nega- tive justification. 3.3.5 TU-1/TU-2 sizes Bits 5 and 6 of TU-1/TU-2 pointer indicate the size of the TU. Four sizes are currently provided as shown in Table 3-1/G.709. H.T. [T1.709] TABLE 3-1/G.709 ___________________________________________ Size (binary) Designation { TU pointer range (in 500 us) } ___________________________________________ 01 TU-22 0 a 571 00 TU-21 0 a 427 10 TU-12 0 a 139 11 TU-11 0 a 103 ___________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Table 3-1/G.709 [T1.709], p. Note that this technique is only used at the TU-1/TU-2 levels. 3.3.6 New data flag (NDF) Bits 1-4 (N-bits) of the pointer word carry an NDF. It is the mechanism which allows an arbitrary change of the value of a pointer, and possibly also the size of the TU, if that change is due to a change in the payload. If the change includes a change in size then, implicitly, there must be a simultaneous new data tran- sition in all of the TUs in the TUG-21. As with the TU-3 pointer NDF, the normal value is 0110 (transmitted), and the value 1001 (received exactly) indicates a new alignment for the VC, and possibly a new size. If a new size is indicated, then all TU pointers (1 to 4) in the TUG-21 must simul- taneously indicate NDF with the same new size. The new alignment, and possibly size, is indicated by the pointer value and size value accompanying the NDF and takes effect at the offset indicated. The NDF should be enabled when the pointer value transits between its normal value and the concatenation indication (CI). 3.3.7 TU concatenation TU-2s may be concatenated to form a TU-2-mc (concatenated m x TU-2s) to carry payloads requiring a capacity of more than a C-21 (for the TU-21 case) or C-22 (for the TU-22 case). A CI (1001 in bits 1-4, bits 5-6 unspecified, and all 1s in bits 7-16 of the TU-2 pointer) is used to show that this multi-C-2 payload, carried in a single VC-2-mc (concatenated m x VC-2), must be kept together. Note that the TU-2 is carried in a TUG-2 as shown in Figure 5-4/G.709 and Figure 5-5/G.709. If a TU-2 pointer contains the concatenation indication, then the pointer processor determines that this TU-2 is concatenated to the previous TU-2, and all operations indicated by the previous TU-2 pointer are to be performed on this TU-2 as well. 3.3.8 TU pointer generation and interpretation The rules for generating and interpreting the TU-1/TU-2 pointer for the VC-1/VC-2 are an extension to the rules provided in SS 3.2.5 and 3.2.6 for the TU-3 pointer with the following modifi- cations: 1) The term TU-3 is replaced with TU-1/TU-2 and the term VC-3 is replaced with VC-1/VC-2. 2) Additional pointer generation rule 6: If the size of the TU within a TUG-21 is to change, then an NDF, as described in rule 5, is to be sent in all TUs of the new size in the group simultaneously. 3) Additional pointer interpretation rule 6: If an NDF of 1001 and an arbitrary new size of TU are received simultane- ously in all of the TUs within a TUG-21, then the coincident pointers and sizes shall replace the current ones immediately. 3.4 Pointer operation for STM-1 concatenation A concatenation indication contained in the AU-4 pointer is used to show that the STM-1 is part of an STM-Nc. The AU-4 within the first STM-1 of an STM-Nc shall have a nor- mal range of pointer values. All subsequent AU-4s within the grouped STM-Nc shall have their pointer values set to 1001 in bits 1-4, bits 5-6 unspecified, and all 1s in bits 7-16. Since this value does not indicate a valid offset, the pointer processors shall interpret this value to mean that they shall perform the same operations as performed on the first AU-4 of the grouped STM-Nc. The NDF must be set when changing a pointer to/from the concatena- tion value. 3.4.1 Pointer generation The following additional pointer generation rule shall apply for AU-4 pointers: If an STM-Nc signal is being transmitted, a pointer is gen- erated for the AU-4 within the first STM-1 only. The concatenation indication is generated in place of the other pointers; all opera- tions indicated by the AU-4 pointer in the first STM-1 apply to each STM-1 in the STM-Nc. 3.4.2 Pointer interpretation The following additional pointer interpretation rule shall apply for AU-4 pointers: If the pointer contains the concatenation indication, then the operations performed on the STM-1 are identical to those performed on the first STM-1 within the STM-Nc. Rules 3 and 4 of S 3.1.6 do not apply to this pointer. 4 Path overhead 4.1 VC-1/VC-2 path overhead The first byte in the VC-1/VC-2 pointed to by the TU-1/TU-2 pointer is the VC-1/VC-2 path overhead byte. This byte is desig- nated as V5. This byte provides the functions of error checking, signal, label and path status of the VC-1/VC-2 paths. The bit assignments of the VC-1/VC-2 POH are specified in the following paragraphs and are illustrated in Figure 4-1/G.709. V5 is used only in floating mode VC-1/VC-2s and is designated as an R-byte in locked mode VC-1/VC-2s. Floating mode and locked mode operation is described in S 5.8. Bits 1 and 2 are used for error performance monitoring. A bit interleaved parity (BIP) scheme is specified. Bit 1 is set such that parity of all odd number bits (1, 3, 5 and 7) in all bytes in the previous VC-1/VC-2 is even and bit 2 is set similarly for the even number bits (2, 4, 6 and 8). Note that the calculation of the BIP-2 includes the VC-1/VC-2 POH bytes but excludes the TU-1/TU-2 pointers. Bit 3 is a VC-1B/FVC-2 path far-end-block-error (FEBE) indica- tion that is set to 1 and sent back towards a VC-1/VC-2 path origi- nator if one or more errors were detected by the BIP-2, and is oth- erwise set to 0. Bit 4 is unused (X). The receiver is required to ignore the value of this bit. Bits 5 through 7 provide a VC-1/VC-2 signal label. Eight binary values are possible in these three bits. Value 0 indicates "VC-1/VC-2 path unequipped", and value 1 indicates "VC-1/VC-2 path equipped - non-specific payload". The remaining six values are reserved to be defined as required in specific VC-1/VC-2 mappings. Any value received, other than 0, indicates an equipped VC-1/VC-2 path. Bit 8 is a VC-1/VC-2 path remote alarm indication. This bit is set to a 1 if either a TU-1/TU-2 path alarm indication signal (AIS) or a signal failure condition is being received, otherwise it is set to 0. The VC-1/VC-2 path remote alarm indication is sent back by the VC-1/VC-2 assembler. Figure 4-1/G.709, p. 4.2 VC-3/VC-4 path overhead The VC-3/VC-4 POH will be assigned to and remain with the pay- load until the payload is demultiplexed and will be used for func- tions that are necessary in transporting all VC-3/VC-4. Note that this does not preclude the allocation of other overhead in specific mappings (such as justification control for mapping asynchronous 44 | 36 kbit/s signals). That type of overhead is payload specific whereas the POH defined in this section is payload independent. The VC-4/VC-32 POH consists of nine bytes denoted J1, B2, C2, G1, F2, H4, Z1-Z3. The VC-31 POH consists of six bytes denoted J1, B3, C2, G1, G2, H4. 4.2.1 VC-3/VC-4 path trace (J1) This is the first byte in the VC; its location is indicated by the associated AU/TU pointer. This byte is used to repetitively transmit a 64 byte, fixed length string so that a path receiving terminal can verify its continued connection to the intended transmitter. The content of the message is not constrained by this standard since it is assumed to be user programmable at both transmit and receive ends. 4.2.2 Path BIP-8 (B3) One byte is allocated in each VC-3 or VC-4 for a path error monitoring function. This function shall be a BIP-8 code using even parity. The path BIP-8 is calculated over all bits of the previous VC-3 or VC-4 before scrambling. The computed BIP-8 is placed in the B3 byte of the VC-3 or VC-4 before scrambling. 4.2.3 Signal label (C2) One byte is allocated to indicate the composition of the VC-3/VC-4. Of the 256 possible binary values, two are defined here and the remaining 254 values are reserved to be defined as required in specific VC-3/VC-4 mappings. - Value 0 indicates "VC-3/VC-4 path unequipped". This value shall be originated if the section is complete but there is no VC-3/VC-4 path originating equipment. - Value 1 indicates "VC-3/VC-4 path equipped - non-specific payload". This value can be used for all payloads that need no further differentiation, or that achieve differentia- tion by other means such as messages from an operations system. Note that any value received, other than value 0, constitutes an "equipped" condition. 4.2.4 Path status (G1) One byte is allocated to convey back to a VC-3/VC-4 path ori- ginator the path terminating status and performance. This feature permits the status and performance of the complete duplex path to be monitored at either end, or at any point along that path. As illustrated in Figure 4-2/G.709, bits 1 through 4 convey the count of interleaved-bit blocks that have been detected in error by the path BIP-8 code (B3). This count has nine legal values, namely 0-8 errors. The remaining seven possible values represented by these four bits can only result from some unrelated condition and shall be interpreted as zero errors. VC-3/VC-4 path remote alarm indica- tion is sent back by the VC-3/VC-4 assembler whenever the VC-3/VC-4 assembler is not receiving a valid signal. The VC-3/VC-4 path remote alarm indication is bit 5, which is set to one to indicate VC-3/VC-4 path remote alarm and is otherwise set to zero. The specific received conditions under which VC-3/VC-4 path remote alarm is initiated are path AIS, signal failure conditions or path tracer mismatch. Bits 6, 7 and 8 are not used. 4.2.5 Path user channel (F2) One byte is allocated for user communication purposes between path elements. 4.2.6 Multiframe indicator (H4) This byte provides a generalized multiframe indicator for pay- loads. Currently, this indicator is only used for TUG-structured payloads as described in S 3.3.3. 4.2.7 Spare (Z3-Z5) Three bytes are allocated for future, as yet undefined, pur- poses. These bytes have no defined value. The receiver is required to ignore the value contained in these bytes. Figure 4-2/G.709, p. 5 Mapping of tributaries into VCs Accommodation of asynchronous and synchronous tributaries presently defined in Recommendation G.702 shall be possible. At the TU-1/TU-2 level, asynchronous accommodation utilizes only the floating mode, whereas synchronous accommodation utilizes both the locked and the floating mode. Figure 5-1/G.709 shows TU-1 and TU-2 sizes and formats. 5.1 Mapping of tributaries into VC-4 5.1.1 Asynchronous 139 | 64 kbit/s One 139 | 64 kbit/s signal can be mapped into a VC-4 container of an STM-1 frame as shown in Figures 5-2/G.709 and 5-3/G.709. The VC-4 container consists of nine bytes (1 column) path overhead (POH) plus a 9 row by 260 column payload structure as shown in Figure 5-2/G.709. This payload can be used to carry one 139 | 64 kbit/s signal: - Each of the nine rows is partitioned into 20 blocks, consisting of 13 bytes each (Figure 5-2/G.709). - In each row one justification opportunity (S) bit and five justification control (C) bits are provided (Figure 5-3/G.709). - The first byte of one block consists of: i) eight information (I) bits (byte W), or ii) eight fixed stuff (R) bits (byte Y), or iii) one justification control (C) bits, plus five fixed fixed stuff (R) bits, plus two overhead (O) bits (byte X), or iv) six information (I) bits, plus one justifica- tion opportunity (S) bit, plus one fixed stuff (R) bit, (byte Z). - The last 12 bytes of one block consists of infor- mation bits (I). The sequence of all these bytes is shown in Figure 5-3/G.709. The overhead (O) bits are reserved for further overhead com- munication purposes. The set of five justification control (C) bits in every row is used to control the corresponding justification opportunity (S) bit. C C C C C = 0 0 0 0 0 indicates that the S bit is an information bit, whereas C C C C C = 1 1 1 1 1 indicates that the S bit is a justification bit. Majority vote should be used to make the justification decision in the desynchronizer for protection against single and double bit errors in the C bits. The value contained in the S bit when used as justification bit is not defined. The receiver is required to ignore the value contained in this bit whenever it is used as a justification bit. Figura 5-1/G.709, p. Figura 5-2/G.709, p. Figura 5-3/G.709, p. 5.1.2 TUG-22 Sixteen TUG-22s can be mapped into a VC-4. This is illustrated in three-dimensional form in a) of Figure 5-4/G.709 and in linear form in b) of Figure 5-4/G.709. Figure 5-4/G.709, p. 5.1.3 TUG-21 Twenty-one TUG-21s can be mapped into a VC-4. This is shown in three-dimensional form in a) of Figure 5-5/G.709 and in linear form in b) of Figure 5-5/G.709. Figure 5-5/G.709, p. 50 5.1.4 TU-32 Three TU-32s can be mapped into a VC-4. This is illustrated in Figure 5-6/G.709. Figure 5-6/G.709, p. 5.1.5 TU-31 Four TU-31s can be mapped into a VC-4. This is illustrated in Figure 5-7/G.709. Figure 5-7/G.709, p. 5.2 Mapping of tributaries into VC-32 5.2.1 Asynchronous 44 | 36 kbit/s One 44 | 36 kbit/s signal can be mapped into a VC-32, as shown in Figure 5-8/G.709. The VC-32 consists of nine subframes every 125 us. Each sub- frame consists of one byte of VC-3 POH, 621 data bits, a set of five justification control bits, one justification opportunity bit and two overhead communication channel bits. The remaining bits are fixed stuff (R) bits. The O bits are reserved for future overhead communication purposes. The set of five justification control (C) bits is used to con- trol the justification opportunity (S) bit. C C C C C = 0 0 0 0 0 indicates that the S bit is a data bit, whereas C C C C C = 1 1 1 1 1 indicates that S bit is a justification bit. Majority vote should be used to make the justification decision in the desynchronizer for protection against single and double bit errors in the C bits. The value contained in the S bit when used as justification bits is not defined. The receiver is required to ignore the value contained in this bit whenever it is used as a justification bit. Figure 5-8/709, p. 5.2.2 TUG-21 Seven TUG-21s can be mapped into a VC-32. This is illustrated in Figure 5-9/G.709. The figure also illustrates the formation of the TUG-21 from TU-11, TU-12 and TU-21. Figure 5-9/G.709, p. 5.3 Mapping of tributaries into VC-31 5.3.1 Asynchronous 34 | 68 kbit/s One 34 | 68 kbit/s signal can be mapped into a VC-31 as shown in Figure 5-10/G.709. In addition to the VC-31 POH, the VC-31 consists of a payload of 9 x 64 bytes every 125 us. This payload is divided in three sub- frames, each subframe divided in 12 sectors and consisting of: - 1431 information (I) bits. - two sets of five justification control bits (C1, C2). - two justification opportunity bits (S1, S2). - 93 fixed stuff bits (R). Two sets (C1, C2) of five justification control bits are used to control the two justification opportunity bits S1and S2respectively. C1C1C1C1C1= 0 0 0 0 0 indicates that S1is a data bit while C1C1C1C1C1 = 1 1 1 1 1 indicates that S1is a justification bit. C2 bits control S2in the same way. Majority vote should be used to make the justification decision in the desynchronizer for protec- tion against single and double bit errors in the C bits. The value contained in S1and S2when they are justification bits is not defined. The receiver is required to ignore the value contained in these bits whenever they are used as justification bits. Note - The same mapping could be used for bit or byte syn- chronous 34 | 68 kbit/s. In these cases, S1 bit should be a fixed stuff and the S2 bit an information bit. By setting the C1 bits to 1 and the C2 bits to 0, a common desynchronizer could be used for both asynchronous and synchronous 34 | 68 kbit/s. Figure 5-10/G.709, p. 5.3.2 TUG-22 Four TUG-22s can be mapped into a VC-31. This is illustrated in Figure 5-11/G.709. The figure also illustrates the formation of the TUG-22 from TU-11, TU-12 and TU-22. 5.3.3 TUG-21 Five TUG-21s can be mapped into a VC-31. This is illustrated in Figure 5-12/G.709. The figure also illustrates the formation of the TUG-21 from TU-11, TU-12 and TU-21. 5.4 Mapping of tributaries into VC-22 5.4.1 Asynchronous 8448 kbit/s One 8448 kbit/s signal can be mapped into a VC-22. Figure 5-13/G.709 shows this over a period of 500 us. In addition to the VC-22 POH, the VC-22 consists of: - 4220 information (I) bits. - 24 justification control bits (C1, C2). - eight justification opportunity bits (S1, S2). - 316 fixed stuff (R) bits. Figure 5-11/G.709, p. 56 Figure 5-12/G.709, p. 57 Two sets (C1, C2) of three justification control bits are used to control the two justification opportunity bits S1and S2respectively. C1C1C1= 0 0 0 indicates that S1is a data bit while C1C1C1 = 1 1 1 indicates that S1 is a justification bit. C2 bits control S2in the same way. Majority vote should be used to make the justifica- tion decision in the desynchronizer for protection against single bit error in the C bits. The value contained in S1and S2when they are justification bits is not defined. The receiver is required to ignore the value contained in these bits whenever they are used as justification bits. Figure 5-13/G.709, p. 5.4.2 Synchronous 8448 kbit/s One bit or byte synchronous 8448 kbitB/Fs signal can be mapped into a VC-22. Figure 5-14/G.709 shows this over a period of 500 us. Note - A common desynchronizer can be used for both asynchro- nous and synchronous mappings. Figure 5-14/G.709, p. 5.5 Mapping of tributaries into VC-21 5.5.1 Asynchronous 6312 kbit/s One 6312 kbit/s signal can be mapped into a VC-21. Figure 5-15/G.709 shows this over a period of 500 us. In addition to the VC-2 POH, the VC-21 consists of 3152 data bits, 24 justification control bits, eight justification opportun- ity bits and 32 overhead communication channel bits. The remaining bits are fixed stuff (R). The O bits are reserved for future over- head communication purposes. Two sets (C1, C2) of three justification control bits are used to control the two justification opportunities S1and S2respectively. C1C1C1 = 0 0 0 indicates that S1is a data bit while C1C1C1 = 1 1 1 indicates that S1is a justification bit. C2controls S2in the same way. Majority vote should be used to make the justification decision in the desynchronizer for protection against single bit errors in the C bits. The value contained in S1and S2when they are justification bits is not defined. The receiver is required to ignore the value contained in these bits whenever they are used as justification bits. 5.5.2 Bit synchronous 6312 kbit/s The bit synchronous mapping for 6312 kbit/s tributary is shown in Figure 5-16/G.709. Note that a common desynchronizer can be used for both asyn- chronous and bit synchronous mapping. Figure 5-15/G.709, p. Figure 5-16/G.709, p. 5.5.3 Byte synchronous 6312 kbit/s Under study. 5.6 Mapping of tributaries into VC-12 5.6.1 Asynchronous 2048 kbit/s One 2048 kbit/s signal can be mapped into a VC-12. Figure 5-17/G.709 shows this over a period of 500 us. In addition to the VC-1 POH, the VC-12 consists of 1023 data bits, six justification control bits, two justification bits and eight overhead communication channel bits. The remaining bits are fixed stuff (R) bits. The O bits are reserved for future overhead communication purposes. Two sets (C1, C2) of three justification control bits are used to control the two justification opportunities S1and S2respectively. C1C1C1 = 0 0 0 indicates that S1is a data bit while C1C1C1 = 1 1 1 indicates that S1is a justification bit. C2controls S2in the same way. Majority vote should be used to make the justif- ication decision in the desynchronizer for protection against sin- gle bit errors in the C bits. The value contained in S1and S2when they are justification bits is not defined. The receiver is required to ignore the value contained in these bits whenever they are used as justification bits. Figure 5-17/G.709, p. 5.6.2 Bit synchronous 2048 kbit/s The bit synchronous mapping for 2048 kbit/s tributaries is shown in Figure 5-18/G.709. Note that a common desynchronizer can be used for both asyn- chronous and bit synchronous mappings. Figure 5-18/G.709, p. 5.6.3 Byte synchronous mapping for 2048 kbit/s Figure 5-19/G.709 shows byte synchronous mapping for 30-chan- nel 2048 kbit/s tributaries employing Channel Associated Signalling (CAS). Signalling is carried in byte 19. The signalling assign- ments are shown in Figure 5-20/G.709. The S1, S2, S3and S4bits contain the signalling for the 30 x 64 kbit/s channels. The phase of the signalling bits is indi- cated in the P1and P0 bits in floating TU mode, and in the mul- tiframe indicator byte (H4) in locked TU mode. This is illustrated in Figure 5-20/G.709. Byte synchronous mapping of 31 channel tributaries is shown in Figure 5-21/G.709. Byte 19 carries tributary channel 16. Figure 5-19/G.709, p. Figure 5-20/G.709, p. Figure 5-21/G.709, p. 5.7 Mapping of tributaries into VC-11 5.7.1 Asynchronous 1544 kbit/s One 1544 kbit/s signal can be mapped into a VC-11. Figure 5-22/G.709 shows this over a period of 500 us. In addition to the VC-1 POH, the VC-11 consists of 771 data bits, six justification control bits, two justification opportunity bits and eight overhead communication channel bits. The remaining bits are fixed stuff (R) bits. The eight O bits are reserved for future communication purposes. Two sets (C1, C2) of three justification control bits are used to control the two justification opportunities, S1and S2respectively. C1C1C1 = 0 0 0 indicates that S1is a data bit while C1C1C1 = 1 1 1 indicates that S1is a justification bit. C2controls S2in the same way. Majority vote should be used to make the justif- ication decision in the desynchronizer for protection against sin- gle bit errors in the C bits. The value contained in S1and S2when they are justification bits is not defined. The receiver is required to ignore the value contained in these bits whenever they are used as justification bits. Figure 5-22/G.709, p. 5.7.2 Bit synchronous 1544 kbit/s The bit synchronous mapping for 1544 kbit/s tributaries is shown in Figure 5-23/G.709. Note that a common desynchronizer can be used for both asyn- chronous and bit synchronous mappings. Figure 5-23/G.709, p. 5.7.3 Byte synchronous mapping for 1544 kbit/s The byte synchronous mapping for 1544 kbit/s is depicted in Figure 5-24/G.709. The S1, S2, S3and S4bits contain the signalling for the 24 x 64 kbit/s channels. The phase of the signalling bits can be indicated in the P1and PO bits in floating TU mode, and in the mul- tiframe indicator byte (H4) in locked mode. This is illustrated in Figure 5-25/G.709. The usage of the PP bits has options, because the common signalling method and another channel associated signal- ling method (e.g. Recommendation G.704, SS 3.1.3 and 3.2.3) do not need the PP bits. The operations of the alternative channel associ- ated signalling method is shown in Figure 5-26/G.709. Figure 5-24/G.709, p. Figure 5-25/G.709, p. Figure 5-26/G.709 [T5.709], p. 5.8 Floating and locked mode conversion There are two possible multiplexing modes of the TU struc- tures: floating and locked. In the floating TU mode four consecutive 125 us VC-n frames are organized into a 500 us multiframe, the phase of which is indi- cated by the multiframe indicator byte (H4) in the VC-n POH. This 500 us TU multiframe is shown in Figure 3-13/G.709. Locked TU mode of transport is a fixed mapping of synchronous structured payloads into a VC-n . This provides a direct correspon- dence between subtending tributary information and the location of that information within the VC-n . Since the tributary information is fixed and immediately identifiable with respect to the TU-n or AU-n pointer associated with the VC-n , no TU pointers are avail- able for payload usage. Figure 5-27/G.709 illustrates the conversion between floating and locked TU modes for each of the four TU sizes. Note that cer- tain bytes (R) in the current set of mapping are not used in the floating mode in order that those mappings can be used in both floating and locked modes. Since the V1-V4 and V5 bytes are reserved, the 500 us TU multiframe is unnecessary. Therefore the role of the multiframe indicator byte (H4) in locked mode is to define 2 and 3 ms signalling frames for byte synchronous mappings. Figure 5-27/G.709, p.