Gigabit-Capable Passive Optical Networks by Dave Hood, Elmar Trojer(auth.)

By Dave Hood, Elmar Trojer(auth.)

Gigabit-capable passive optical networks (G-PON) have a wide and extending base of help between telecommunications operators world wide. Written through of the specialists within the box, this booklet explains G-PON intimately. in addition to a background that clarifies the explanations for lots of of the present good points, the publication seems at present and evolving expertise and discusses the various possible choices for destiny entry networks.Content:
Chapter 1 advent (pages 1–8):
Chapter 2 method requisites (pages 9–47):
Chapter three Optical Layer (pages 49–125):
Chapter four Transmission Convergence Layer (pages 127–218):
Chapter five administration (pages 219–254):
Chapter 6 prone (pages 255–337):
Chapter 7 different applied sciences (pages 339–362):

Show description

Read Online or Download Gigabit-Capable Passive Optical Networks PDF

Best networks books

Computer Networks (4th Edition) - Problem Solutions

Whole recommendations for machine Networks (4th version) by way of Andrew Tanenbaum.

Advances in Neural Networks - ISNN 2010: 7th International Symposium on Neural Networks, ISNN 2010, Shanghai, China, June 6-9, 2010, Proceedings, Part I

This ebook and its sister quantity acquire refereed papers awarded on the seventh Inter- tional Symposium on Neural Networks (ISNN 2010), held in Shanghai, China, June 6-9, 2010. construction at the luck of the former six successive ISNN symposiums, ISNN has develop into a well-established sequence of renowned and high quality meetings on neural computation and its purposes.

Sensor Networks and Configuration: Fundamentals, Standards, Platforms, and Applications

Advances in networking effect many types of tracking and regulate structures within the such a lot dramatic method. Sensor community and configuration falls lower than the class of contemporary networking structures. instant Sensor community (WSN) has emerged and caters to the necessity for real-world purposes. method and layout of WSN represents a extensive study subject with functions in lots of sectors reminiscent of undefined, domestic, computing, agriculture, surroundings, and so forth, in keeping with the adoption of primary rules and the cutting-edge expertise.

Additional resources for Gigabit-Capable Passive Optical Networks

Sample text

That is at the optical level. Various other attacks are also possible, for example, injecting traffic that descrambles to long sequences of zeros or ones, hoping to desynchronize the far end receiver. Higher layer threats such as flooding the network with illegitimate traffic are also recognized. They can be dealt with through management capabilities defined in OMCI, for example, to filter or limit the rate of various kinds of traffic. 2 Privacy and Theft of Service Downstream traffic on a PON is accessible to anyone with an optical detector, even non-ONU devices of suitable sophistication.

3. On-demand path trace allows an endpoint to discover its route through the layer 2 network. 1731 define additional functions such as AIS (alarm incoming signal), a signal that prevents unnecessary alarm propagation. A fault detected at a given network element (NE) causes an alarm at that network element. The NE then generates AIS to the affected downstream clients so they know that the problem has already been detected and reported, and they need not declare their own alarms. Ethernet CFM is structured in nested layers, where a layer encompasses a pair of endpoints that typically corresponds to a domain of responsibility.

In this use case, the PON need not add security because the traffic is deemed to be secure already. 987 XG-PON was developed, some operators regarded this security model as inadequate. They feared that physical access to the upstream fiber flow might indeed be possible. ). 987 XG-PON recommendations add upstream encryption to the options, as well as encryption of downstream multicast traffic. Following the principle of layered security, keys themselves are encrypted during key exchange. 1X, with its open-ended ability to support virtually any authentication protocol.

Download PDF sample

Rated 4.52 of 5 – based on 14 votes