Gigabit-Capable Passive Optical Networks by Dave Hood, Elmar Trojer(auth.)
By Dave Hood, Elmar Trojer(auth.)
Gigabit-capable passive optical networks (G-PON) have a wide and extending base of help between telecommunications operators world wide. Written through of the specialists within the box, this booklet explains G-PON intimately. in addition to a background that clarifies the explanations for lots of of the present good points, the publication seems at present and evolving expertise and discusses the various possible choices for destiny entry networks.Content:
Chapter 1 advent (pages 1–8):
Chapter 2 method requisites (pages 9–47):
Chapter three Optical Layer (pages 49–125):
Chapter four Transmission Convergence Layer (pages 127–218):
Chapter five administration (pages 219–254):
Chapter 6 prone (pages 255–337):
Chapter 7 different applied sciences (pages 339–362):
Read Online or Download Gigabit-Capable Passive Optical Networks PDF
Best networks books
Whole recommendations for machine Networks (4th version) by way of Andrew Tanenbaum.
This ebook and its sister quantity acquire refereed papers awarded on the seventh Inter- tional Symposium on Neural Networks (ISNN 2010), held in Shanghai, China, June 6-9, 2010. construction at the luck of the former six successive ISNN symposiums, ISNN has develop into a well-established sequence of renowned and high quality meetings on neural computation and its purposes.
Advances in networking effect many types of tracking and regulate structures within the such a lot dramatic method. Sensor community and configuration falls lower than the class of contemporary networking structures. instant Sensor community (WSN) has emerged and caters to the necessity for real-world purposes. method and layout of WSN represents a extensive study subject with functions in lots of sectors reminiscent of undefined, domestic, computing, agriculture, surroundings, and so forth, in keeping with the adoption of primary rules and the cutting-edge expertise.
- Resource Allocation and Cross Layer Control in Wireless Networks (Foundations and Trends in Networking, V. 1, No. 1)
- Polymer Alloys II: Blends, Blocks, Grafts, and Interpenetrating Networks
- Instructor's Solutions Manual for Data Networks
Additional resources for Gigabit-Capable Passive Optical Networks
That is at the optical level. Various other attacks are also possible, for example, injecting trafﬁc that descrambles to long sequences of zeros or ones, hoping to desynchronize the far end receiver. Higher layer threats such as ﬂooding the network with illegitimate trafﬁc are also recognized. They can be dealt with through management capabilities deﬁned in OMCI, for example, to ﬁlter or limit the rate of various kinds of trafﬁc. 2 Privacy and Theft of Service Downstream trafﬁc on a PON is accessible to anyone with an optical detector, even non-ONU devices of suitable sophistication.
3. On-demand path trace allows an endpoint to discover its route through the layer 2 network. 1731 deﬁne additional functions such as AIS (alarm incoming signal), a signal that prevents unnecessary alarm propagation. A fault detected at a given network element (NE) causes an alarm at that network element. The NE then generates AIS to the affected downstream clients so they know that the problem has already been detected and reported, and they need not declare their own alarms. Ethernet CFM is structured in nested layers, where a layer encompasses a pair of endpoints that typically corresponds to a domain of responsibility.
In this use case, the PON need not add security because the trafﬁc is deemed to be secure already. 987 XG-PON was developed, some operators regarded this security model as inadequate. They feared that physical access to the upstream ﬁber ﬂow might indeed be possible. ). 987 XG-PON recommendations add upstream encryption to the options, as well as encryption of downstream multicast trafﬁc. Following the principle of layered security, keys themselves are encrypted during key exchange. 1X, with its open-ended ability to support virtually any authentication protocol.