0% found this document useful (0 votes)
12 views33 pages

Section -3.5

The document discusses Next Generation SDH (NGSDH) and Multi-Service Provisioning Platforms (MSPP) as solutions for efficient data transport in telecommunications. NGSDH addresses legacy issues by integrating new technologies like Generic Framing Procedure (GFP), Link Capacity Adjustment Scheme (LCAS), and Virtual Concatenation (VCAT) to enhance bandwidth management and service flexibility. MSPP facilitates multi-service traffic switching and aggregation, allowing seamless integration of SDH and PDH networks while supporting various data services.

Uploaded by

Jag Ram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views33 pages

Section -3.5

The document discusses Next Generation SDH (NGSDH) and Multi-Service Provisioning Platforms (MSPP) as solutions for efficient data transport in telecommunications. NGSDH addresses legacy issues by integrating new technologies like Generic Framing Procedure (GFP), Link Capacity Adjustment Scheme (LCAS), and Virtual Concatenation (VCAT) to enhance bandwidth management and service flexibility. MSPP facilitates multi-service traffic switching and aggregation, allowing seamless integration of SDH and PDH networks while supporting various data services.

Uploaded by

Jag Ram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 33

SECTION 3.

5
NG SDH, MSPP, RPR, SYNCHRONISATION,
PRINCPLE of DWDM & FTTH
Section 3.5

NEXT GENERATION SDH


1.0 INTRODUCTION
Innovation, the lifeline to survival in the telecommunication market, has spurred the
telecommunication industry to adopt NGSDH as the most economic and technologically
feasible solution for transmitting voice & data over carrier network. The new applications,
mostly relying on data packet technology, offer easy implementation and access to applications
based on the Internet, Mobile, Multimedia, DVB, SAN, Ethernet or VPN. The architectures are
increasingly demanding long haul transport that today can only be provided by SDH/SONET.
These technologies have a massive installed base, developed over recent decades.
SDH/SONET has now evolved, and is ready to adapt to the new traffic requirements.

Next Generation SDH enables operators to provide more data transport services while
increasing the efficiency of installed SDH/SONET base, by adding just the new edge nodes,
sometime known as Multi Service Provisioning Platforms (MSPP) / Multi Service Switching
Platforms (MSSP), can offer a Combination of data interfaces such as Ethernet, 8B/10B,
MPLS(Multi Protocol Label Switching) or RPR(Resilient Packet Ring), without removing
those for SDH/PDH. This means that it will not be necessary to install an overlap network or
migrating all the nodes or fiber optics. This reduces the cost per bit delivered, and will attract
new customers while keeping legacy services. In addition, in order to make data transport more
efficient, SDH/SONET has adopted a new set of protocols that are being installed on the
MSPP/MSPP nodes. These nodes can be interconnected with the old equipment that is still
running.

2.0 WHAT IS NEXT GENERATION SDH?


Following major issues that exist in the legacy SDH:

 Difficulty of mapping newer (Ethernet, ESCON, FICON, Fiber Channel etc) services to
the existing SDH transport network.

 Inefficient use of the transport network in delivering data services.

 Inability to increase or decrease available bandwidth to meet the needs of data services
without impacting traffic.

Three mature technologies—

 Generic Framing Procedure (GFP), ITU-T G.7041

 Link Capacity Adjustment Scheme (LCAS), ITU-T G.7042

 Virtual Concatenation (VCAT), ITU-T G.707

-together in Next generation SDH solved the above issues and adding three main
features to traditional SDH:

1. Integrated Data Transport i.e. Ethernet tributaries in addition to 2Mb, 140 Mb, STM-
1,4,16 ----GFP

BRBRAITT, Jabalpur Sec.3.5/ 1


Section 3.5

2. Integrated non blocking, wide-band cross connect (2Mb granularity) making the
efficient use of the transport network in delivering data services ---VCAT

3. Dynamic Bandwidth allocation,

Intelligence for topology discovery, route computation and mesh based restoration------
LCAS

migrating all the nodes or fiber optics. This reduces the cost per bit delivered,

Fig. 1 Block Diagram of NGSDH

Next Generation SDH is Packet Friendly and have IP router like capabilities. It does not
matter if the client stream has constant or variable bit rates.

“VCAT provides more granularity, LCAS provides more flexibility and GFP
efficiently transports asynchronous or variable bit rate data signals over a synchronous or
constant bit rate”.

Hence,

Next Generation SDH = Classic SDH + [GFP+VCAT+LCAS]

3.0 COMPONENTS OF NEXT GEN SDH


3.1 GENERIC FRAMING PROCEDURE (GFP):

Generic Framing Procedure (GFP), an all-purpose protocol for encapsulating packet


over SONET (POS), ATM, and other Layer 2 traffic on to SONET/SDH networks. GFP is
defined in ITU-T G.7041 along with virtual concatenation and link capacity adjustment scheme
(LCAS) transforms legacy SDH networks to Next generation SDH networks.

BRBRAITT, Jabalpur Sec.3.5/ 2


Section 3.5

GFP adds dynamism to legacy SDH. GFP is most economical way of adopting high
speed services, constant bit rate and variable bit rate, in SDH networks and can provide basis
for evolving RPR.

Customer Operator

Edge Adaptation Core

Ethernet S
Na GFP VC LCAS
D
H

?
tiv M
FICON e U
Generic Virtual Link SONET/
Int Frame Concatenation X/
erf Capacity D SDH/
ESCON Procedure Adjustment E OTN
ac M
es Scheme
U
FC X
Fibre LAPS
Channel

Fig. 2 Functional Model of GFP

There are actually two types of GFP mechanisms ;-

1. PDU-oriented known as Frame mapped GFP (GFP-F)

2. Block-code-oriented known as Transparent GFP (GFP-T)

3.1 GFP-F: -

GFP-F (Framed) is a layer 2 encapsulation in variable sized frames. Optimised for data
packet protocols such as DVD, PPP and Ethernet, MPLS etc Frame mode supports rate
adaptation and multiplexing at the packet/frame level for traffic engineering. This mode maps
entire client frame into one GFP frames of constant length but gaps are discarded. The frame is
stored first in buffer prior to encapsulation to determine its length. This introduces delay and
latency.

3.2 GFP-T:

GFP-T is useful for delay sensitive services. GFP-T (Transparent) is a layer 1


encapsulation in constant sized frames. Optimized f or traffic based on 8B/10B codification
such as VoIP,DVB-ASI,1000BASE-T, SAN, Fibre Channel, and ESCON.

BRBRAITT, Jabalpur Sec.3.5/ 3


Section 3.5

Fig. 3 GFP-F & GFP-T

Transparent mode accepts native block mode data signals and uses SDH frame merely
as a lightweight digital wrapper. GFP-T is very good for isocronic or delay sensitive protocols
&SAN (ESCON). GFP-T is used for FC, Gigabit Ethernet etc.

3.2 CONCATENATION (V-CAT & C-CAT) :

SDH concatenation consists of linking more than one VCs to each other to obtain a rate
that does not form part of standard rates. Concatenation is used to transport pay loads that do
not fit efficiently into standard set of VCs.

Two concatenation schemes are:

1. Contiguous concatenation

2. Virtual concatenation

Fig. 4: VCAT Efficiency

BRBRAITT, Jabalpur Sec.3.5/ 4


Section 3.5

3.2.1 Contiguous concatenation:

The traditional method of concatenation is termed as contiguous. This means that


adjacent containers are combined and transported across the SDH network as one container.
Contiguous concatenation is a pointer based concatenation. It consists of linking N number of
VCs to each other in a logical manner within the higher order entity i.e. VC4 and above. The
concatenated VCs remain in phase at any point of network. The disadvantage is that it requires
functionality at every N/E adding cost and complexity. Lower order VCs (VC-12, VC3)
concatenation is not possible in contiguous concatenation as shown in Fig.

3.2.2 Virtual Concatenation:

Virtual concatenation maps individual containers in to a virtually concatenated link.


Any number of containers can be grouped together, which provides better bandwidth
granularity than using a contiguous method. It combines a number of lower/higher order VCs
(VC-12, VC3 & VC4 payload) that form a larger concatenation Group, and each VC is treated
as a member. 10 Mb Ethernet would be made up of five VC-12s, creating these finely tuned
SDH pipes of variable capacities improve both, scalability and data handling/controlling ability
as per SLA (service level agreement).

The transport capacity with or without VC is shown in Fig. 4

VCs are routed individually and may follow different paths, within the network, only
the path originating and path terminating equipment need to recognize and process the virtually
concatenated signal structure as shown in Fig. 5

Transporting Concatenated Signals

Contiguous Concatenation
C-4 C-4

C-4 C-4
C-4 C-4 C-4 C-4

C-4 C-4 One Path C-4 C-4


NE NE

Core Network VC-4-4c

Virtual Concatenation
VC-4
Path 1 #1
Differential Delay
VC-4 VC-4 VC-4
#1 #1 #1
VC-4 VC-4
VC-4 #2
#2 #2

VC-4 VC-4-2v
Path 2 #2

Fig. 5 Virtual & Contiguous Concatenation

BRBRAITT, Jabalpur Sec.3.5/ 5


Section 3.5

Virtual concatenation Benefits:

1. Use the same core NEs, modify only edge NEs.

2. Low investment and fast ROI (return on investment).

3. Efficient & scalable i.e. fine granularity and multi-path capability.

4. SDH gives best QoS, well engineered and reliable.

3.3 Link Capacity Adjustment Scheme(LCAS):

Link Capacity Adjustment Scheme (LCAS) is an emerging SONET/SDH standard and is


defined in ITU-T G.7042 having capability to dynamically change the amount of bandwidth
used in a virtually concatenated channel i.e. bandwidth management flexibility. LCAS is bi-
directional signaling protocol exchanged over the overhead bytes, between Network Elements
that continually monitors the link. LCAS can dynamically change VCAT path sizes, as well as
automatically recover from path failures. LCAS is the key to provide “bandwidth on demand”.

LCAS enables the payload size of VCG (group of VCs) to be adjusted in real time by
adding or subtracting individual VCs, from VCG dynamically, without incurring hits to active
traffic. In LCAS, signalling messages are exchanged between the two VCs end points to
determine the number of concatenated payloads and synchronize the addition/removal of SDH
channels using LCAS control packets.

Benefits of LCAS :-

A . Call by call bandwidth (Bandwidth on demand)

Customer

 rents a 6Mb Internet connection (VC-12-3v)

 calls to get additional 2Mb

Operator

 will provision additional VC-12 path

.and will hitless add it to existing connection via LCAS!

Fig. 6 Bandwidth call by call

BRBRAITT, Jabalpur Sec.3.5/ 6


Section 3.5

B. Bandwidth on Schedule

A customer is offered a fixed bandwidth of 100 Mb (VLAN) Ethernet, allotting 46 VC-


12 ( 0ne VC12 = 2.176 Mb x 46 = 100.1 Mb). Every night for one hour additional 900 M
ESCON service is provisioned by LCAS. New revenue opportunity at low traffic hours.

Fig. 7 Bandwidth on scheduled Time

LCAS is not only used for dynamic bandwidth adjustment but also for survivability
options for next generation SDH. LCAS is a tool to provide operators with greater flexibility in
provisioning of VCAT groups, adjusting their bandwidth in service and provide flexible end-to-
end protection options. LCAS is defined for all high and low order payloads of SDH.

BRBRAITT, Jabalpur Sec.3.5/ 7


Section 3.5

MULTI-SERVICE PROVISIONING PLATFORM


1.0 INTRODUCTION
MSPP is deployed in the boundary of Access and Metro core backbone. TEC has
prepared two different platforms for catering to the needs of the inter city and intra
equipment. The first platform is the STM-16 with the GFP-F, GFP-T protocols and layer-2
switching functionality and caters to the need of inter-city traffic. This platform also includes
higher cross connect capability, and supports EoS as per IEEE standards. The second
platform is using Multi service Provisioning Platform (MSPP), and caters to the need for the
intra-city traffic requirements.

The main application of this system shall be for multi-service traffic switching and
aggregation at MAC layer, traffic grooming and traffic consolidation of TDM traffic at SDH
layer from access network towards core network. Another prominent application of MSPP
shall be, multiple SDH ring inter connection at STM1 tributary interfaces as well as at STM4
& 16 aggregate interfaces. The equipment shall provide an integrated cross connect matrix to
switch digital signals at SDH layer.

The MSPP equipment shall be capable of simultaneously interfacing the PDH streams and
mapping / de-mapping into SDH payloads and vice-versa, thus enabling the co-existence of
SDH & PDH on the same equipment. This is the greatest advantage for the network as SDH
and PDH existing in the present network can integrate easily which in turn enables quick
bandwidth provisioning to the customer.

MSPP is implemented with two different back haul transmission rates, viz. STM-16 and
STM-64. TEC has also been working on the STM-64 in BSNL Metro networks. Apart from
the standard interfaces on the tributary side, the revised STM-16 provides POS (packet over
SDH) capability on Ethernet interface at 10Mb,100 Mb, and 1000Mb. The equipment is also
envisaged to support DS-3 of SONET. The encapsulation of Ethernet on SDH capability shall
be in accordance with ITU-T G.7041. the system should support Tandem Connection
Monitoring (TCM) on N1 byte and N2 byte for HO path & LO path respectively.

ADMs supporting GFP and VCAT are known as Multi Service Provisioning Platform
(MSPP). Service providers can now deliver packet based transport services using existing
SDH infrastructure. GFP and VCAT is located at the endpoint s of the network, therefore
MSPP need only be deployed at the edge of the transport network. MSPP targets all
application connecting ultra-high capacity backbones to end customers at their premises. The
advent of GFP has created a spur of customer located equipment and MSPP cards that
function as aggregating Ethernet traffic onto SDH rings. The generic structure of a next
generation MSPP is shown in (fig1). This platform consists of the integration of metro WDM
with Ethernet /RPR and SDH VC-4 switching fabrics. Integration means both direct inter
working, in terms of WDM wavelengths, and full NMS/control plane integration for
management and path provisioning.

BRBRAITT, Jabalpur Sec.3.5/ 8


Section 3.5

MSPP

MSPP MSPP

MSPP

Fig 1 MSPP Applications

2.0 FEATURES OF MSPP:


The major features of MSPP are as listed below:

1. Generic Framing Protocol-Frame (GFP-F)

2. Generic Framing Protocol-Transparent (GFP-T)

3. Link Capacity Adjustment Scheme (LCAS).

4. Virtual concatenation (V-CAT)

5. Layer 2 switching.

6. Integrated higher cross connect capability

7. Ethernet on SDH (EoS)

8. PoS capability on Ethernet interface

9. DS-3 tributary interface of SONET hierarchy

10. Support block code oriented payload (FICON)

11. ESCON (Enterprise system connection)

BRBRAITT, Jabalpur Sec.3.5/ 9


Section 3.5

12. FC (Fiber Channel) at gigabit Ethernet interface

13. Tandem Connection Monitoring (TCM) on N1 & N2 bytes

14. Multi service traffic switching

15. Traffic aggregation at MAC layer

16. Traffic grooming

17. Traffic consolidation of TDM traffic at SDH layer from access towards core network.

18. Multiple SDH rings interconnection at STM-1tributary interfaces as well as at STM-4/16


aggregate interfaces.

19. Interfacing the PDH streams (2Mb, 34Mb, 140Mb) and mapping / De-mapping into SDH
payloads and vice-versa.

Key Technologies

A key set of technologies for delivering client services efficiently via MSPP are:

 Generic Framing Procedure (GFP), ITU-T G.7041

 Link Capacity Adjustment Scheme (LCAS), ITU-T G.7042

 Virtual Concatenation (VCAT), ITU-T G.707

VCAT is used to provide better data granularity, GFP is used to wrap the data in a
converged TDM network, & LCAS is used to dynamically allocate& manage B/W.

BRBRAITT, Jabalpur Sec.3.5/ 10


Section 3.5

RESILIENT PACKET RING (RPR)


Ethernet can be transported over SDH using one of the two possible mechanism or a
combination of both:-

1. SPRs

2. RPRs

Shared Protection Ring MSPPs supports SPRs to provide Ethernet and packet
transport over SDH infrastructure. The implementation of this technology varies from vendors
to vendors. It allows the provisioning of bandwidth on the SDH ring for packet transport by
statistical multiplexing Ethernet traffic on to a shared packet ring (Circuit) that each MSPP
node can access.

SPR technology is a precursor to true RPR. SPR processes inherent


deficiencies that limit the scalability of the SPR solution. At every node on the SPR ring, a
router or switch will process each packet which can be time consuming for a large network
rings. As a result Ethernet will have trouble meeting the jitter and latency requirement for
voice and video. Conventional SDH has implemented improvements, such as VCAT and
LCAS, to suite data application. However, SDH transport creates point to point circuits that
are not particularly suited for data applications. SDH also reserves bandwidth for every source
on the ring and prevents nodes from claiming unused bandwidth.

Over few years demand for Internet protocol is growing at a fast pace while
voice demand is remaining more or less stable. Circuit switched voice traffic has to be
converted into packet switched data traffic. This does not match with the present SDH
technology. Protocols like Frame relay, ATM &PPP are inefficient, costly and complex to scale
the increasing demand for data services.

One of major advantages of RPR is that it protects existing investments in fibre


and other transmission infrastructure. Most of the metro area fibre is ring based; therefore RPR
will best utilising existing fibre facilities. Moreover, apart from dark fibre, RPR can also
operate over SDH or DWDM equipment, allowing smooth and efficient migration.

RPR is a MAC layer, ring based protocol that combines intelligence of IP routing and
statistical multiplexing with the bandwidth efficiencies and resiliency of optical rings. RPR
network consist of two counter rotating fibre rings that are fully utilized for transport at all
times for superior fibre utilisation. RPR permits more efficient use of bandwidth using
statistical multiplexing. It also eliminates the need for manual provisioning, because the
architecture lends itself to the implementation of automated provisioning. Moreover, there is
no need for channel provisioning as each ring member can communicate with every other
member based on MAC address. RPR also provides two priority queues at the transmission
level, which allow the delivery of delay and jitter sensitive application, such as voice and video.

RPR is fibre based ring network architecture. Data is carried in packets rather than over
TDM circuits. RPR networks retain many of the performance characteristics, such as
protection, low latency and low jitter on SDH. RPR architecture is highly scalable, very reliable
and easy to manage in comparison to legacy point to point topologies. RPR achieves a loop free
topology across the rings with rapid re-convergence on ring break. RPR supports auto

BRBRAITT, Jabalpur Sec.3.5/ 11


Section 3.5

discovery of other RPR network elements on the ring. New RPR nodes announce themselves to
their direct neighbours with control messages and distribute changes in their settings or
topologies.

The emerging solution for metros data transport applications is Resilient Packet
Ring (RPR). RPR is a newly proposed standard of Ethernet transport. The goal of RPR is to
increase the manageability and resiliency of Ethernet services while providing maximum
capacity and usage over an established SDH ring. It has two features:

1. Efficient Ring Topology

2. Less than 50 ms recovery time from fibre cut i.e. resilience.

RPR is originated from a protocol called dynamic packet transport (DPT). RPR can be
seen as a way towards simpler n/w architecture for packet transport because management is
centralized and controls both switching and transport. Protection and restoration in transport
layer (SDH or WDM) can be switched off reducing cost and complexity. Next-generation
SDH devices such as MSPPs (multi-service provisioning platforms) are evolving to support
RPR.

Fig. 1 Resilient Protection Ring

RPR is a dual ring network:

 packet based

 data and control traffic flow on both ringlets

 spatial re-use through destination stripping

BRBRAITT, Jabalpur Sec.3.5/ 12


Section 3.5

 RPR is intended for use in MAN & WAN

 RPR is standardized as IEEE 802.17

 Defines a MAC protocol, introducing the concept of a transit path.

 physical layer agnostic

RPR effectively transforms a chain of point-to-point SDH paths between nodes to a


single virtual shared medium. The shared transport ring created by RPR can then be used over
multiple SDH nodes to carry connection-oriented transport services, and enable optimal and
fair use of bandwidth for busty services through highly efficient statistical multiplexing,
overbooking and spatial reuse transport mechanisms. RPR has many virtues of Ethernet like
data efficiency, simplicity and cost advantage. SDH & Ring topology is perfect match for each
other, but they are best suited for TDM n/w with circuit switched applications like voice traffic.
Each circuit is allocated fixed bandwidth that is wasted when not in use.

RPR is a MAC protocol supporting dual counter rotating rings that can potentially
replace traditional SDH rings. RPR MAC introduces the concept of a transit path. At each
node on an RPR ring, traffic is not destined for the node, simply passes through, avoiding the
queuing and scheduling on a hop-by-hop basis.

BRBRAITT, Jabalpur Sec.3.5/ 13


Section 3.5

SYNCHRONISATION
Synchronous is the first word in the term SDH for a very good reason. If
synchronization is not guaranteed, considerable degradation in network function, and even total
failure of the network can be the result.

1.0 WHY SYNCHRONIZING NETWORKS?

New digital technologies and value-added time sensitive services like real-time Video
on Demand, high speed Internet access, Videoconferencing, Bank to Bank crypted data
exchange, multimedia applications, are based on reliable network architectures (Internet, GSM,
ATM, SDH, xDSL and many other network technologies).

All those architectures and services underlie one basic principle: networks must be
synchronized.

Moreover, dramatic subscriber growth and consumer demand are driving


Telecommunication operators to place emphasis on quality, reliability and breadth of services.
Therefore, it is imperative that they address the serious timing and solve synchronization
problems that may degrade service quality. When timing synchronization is off, quality issues
range from distorted, unreadable faxes and corrupted or lost data to frozen images on
videoconferencing systems , requiring retransmission as shown in Table-1.

Table-1: Loss of synchronization consequences on services

Service Consequences

Voice Traffic Clicks can be heard during conversation


(PSTN)

Fax Transmission Loss of part or all of transmitted lines

Data Transfer on Data corruption


PSTN

Video Conferencing Loss of image(s). Image at receiver frozen

Coded Data Loss of message (if coding key is lost)

SDH Pointer movements and faults at SDH/ PDH


junction

This table clearly shows that the more services have a high value added, the more they
require to be supported by a very reliable synchronization function.

BRBRAITT, Jabalpur Sec.3.5/ 14


Section 3.5

2.0 THE PRINCIPLE OF NETWORK SYNCHRONISATION

Synchronization is the means used in digital transmissions in order to ensure that all
network elements (NE) operate at the same frequency.

Fig. 1: Information Sending/Receiving : Place of Synchronization Problem

When a message has to be transmitted between two points (i.e. two cities), the internal
clock in the sender will control the frequency of information sent from this node (f1). A second
clock located on the receiver node will control the frequency at which received data is read (f2).

The basic principle of synchronization is that the two frequencies must be exactly the
same in order to allow the receiver to interpret the digital signal properly.

 Should f1>f2, the sender will transmit information faster than the receiver can
“understand” it, this will "miss" information ("slips of deletion").

 Should f2>f1, the sender is slower than the receiver, this will duplicate a part of
received information ("slips of repetition).

3.0 PLANNING OF SYNCHRONIZATION NETWORKS

The planning of synchronization in the networks of the operators is fully independent to


each other with the exception of one operator providing another operator with synchronization
Signals. The architecture of the synchronization network of an operator shall be in accordance
with the ETSI standard EN 300 462-2-1. The clock reference signals are distributed between
levels of the hierarchy via distribution trails offered by normal SDH or PDH transmission
systems. No special transport network for the distribution of synchronizing signals is used. It
shall be noted that a 2.048 Mbit/s signal crossing SDH network shall not be used for timing
distribution in the synchronization network.

To avoid this worst case scenario, all network elements are synchronized to a central
clock. This central clock is generated by a high-precision primary reference clock (PRC) unit
conforming to ITU-T Recommendation G.811. This specifies an accuracy of 1X10 -11. This
clock signal must be distributed throughout the entire network. A hierarchical structure is used
for this; the signal is passed on by the subordinate synchronization supply units (SSU) and

BRBRAITT, Jabalpur Sec.3.5/ 15


Section 3.5

synchronous equipment clocks (SEC). The synchronization signal paths can be the same as
those used for SDH communications.

The clock signal is regenerated in the SSUs and SECs with the aid of phase-locked
loops. If the clock supply fails, the affected network element switches over to a clock source
with the same or lower quality, or if this is not possible, it switches to hold-over mode. In this
situation, the clock signal is kept relatively accurate by controlling the oscillator by applying
the stored frequency correction values for the previous hours and taking the temperature of the
oscillator into account. Clock islands must be avoided at all costs, as these would drift out of
synchronization with the passage of time and the total failure disaster would be the result. Such
islands are prevented by signaling the network elements with the aid of synchronization status
messages (SSM, part of the S1 byte). The SSM informs the neighboring network element about
the status of the clock supply and is part of the overhead. Special problems arise at gateways
between networks with independent clock supplies. SDH network elements can compensate for
clock offsets within certain limits by means of pointer operations. Pointer activity is thus a
reliable indicator of problems with the clock supply.

Figure 2: Clock supply hierarchy structure

The topology of the hierarchical synchronization network is tree-like as shown in figure


2. The synchronization architecture requires that the timing of all network element clocks are
traceable to a PRC and hence the principal structure is the synchronization network reference
chain as shown in figure 3. Timing is distributed via master-slave synchronization from the
PRC to all clocks in the chain. To ensure the correct operation of the synchronization network it
is important that clocks of lower hierarchical level only accept timing from clocks of the same
or higher hierarchical level and that timing loops are avoided. The distribution network shall be
designed so that the requirements for the hierarchical network reference chain (described
below) will be met even under fault conditions.

In general, the quality of timing will deteriorate as the number of synchronized clocks
in tandem increases and hence for practical synchronization network design, the number of
network elements in tandem should be minimized. Based on theoretical calculations it is
recommended that the longest chain should not exceed 10 SSUs and 20 SECs interconnecting
any SSUs with restriction that the total number of SECs is limited to 60 (refer to figure 3). It is
preferable that all SSUs and SECs are able to recover timing from at least two synchronization
trails. The slave clock shall reconfigure to recover timing from an alternative trail if the original
trail fails. Where possible synchronization trails should be provided over diversely routed

BRBRAITT, Jabalpur Sec.3.5/ 16


Section 3.5

paths. In the event of a failure of synchronization distribution, all network elements will seek to
recover timing from the highest hierarchical level clock source available. To effect this, both
SSUs and SECs may have to reconfigure and recover timing from one of their alternate
synchronization trails.

Fig. 3: Synchronization network reference chain

SSM and squelching may be used on SDH trails for correct reference transfer between
the SSUs. The use of SSM also makes it possible to recover timing for the SEC clocks in the
chain from the opposite direction if the signal in the original direction fails.

A general procedure in planning the synchronization network may be as follows.

If the synchronous method is used:

 Find out the connections to the national PRC-system

 Plan the locations for SSUs

 Plan the synchronization trails

BRBRAITT, Jabalpur Sec.3.5/ 17


Section 3.5

If the pseudo-synchronous method is used:

 Plan the PRC system

 Plan the locations for SSUs

 Plan the synchronization trails

When planning the placing for SSUs the importance of the node locations for the
traffic networks to be synchronized and the synchronization network itself is considered. The
maximum number of SEC clocks between two SSUs has also to be taken into account (refer
to figure 3). When planning the synchronization trails first the transmission systems for the
transfer of synchronization are selected. Secondly the timing configuration of the selected
systems is planned in detail.

BRBRAITT, Jabalpur Sec.3.5/ 18


Section 3.5

DENSE WAVELENGTH DIVISION MULTIPLEXING


1.0 INTRODUCTION
The emergence of DWDM is one of the most recent and important phenomena in the
development of fiber optic transmission technology. Dense wavelength-division multiplexing
(DWDM) revolutionized transmission technology by increasing the capacity signal of
embedded fiber. One of the major issues in the networking industry today is tremendous
demand for more and more bandwidth. Before the introduction of optical networks, the reduced
availability of fibers became a big problem for the network providers. However, with the
development of optical networks and the use of Dense Wavelength Division Multiplexing
(DWDM) technology, a new and probably, a very crucial milestone is being reached in
network evolution. The existing SONET/SDH network architecture is best suited for voice
traffic rather than today’s high-speed data traffic. To upgrade the system to handle this kind of
traffic is very expensive and hence the need for the development of an intelligent all-optical
network. Such a network will bring intelligence and scalability to the optical domain by
combining the intelligence and functional capability of SONET/SDH, the tremendous
bandwidth of DWDM and innovative networking software to spawn a variety of optical
transport, switching and management related products.

2.0 DEVELOPMENT OF DWDM TECHNOLOGY


Early WDM began in the late 1980s using the two widely spaced wavelengths in the
1310 nm and 1550 nm (or 850 nm and 1310 nm) regions, sometimes called wideband WDM.
The early 1990s saw a second generation of WDM, sometimes called narrowband WDM, in
which two to eight channels were used. These channels were now spaced at an interval of about
400 GHz in the 1550-nm window. By the mid-1990s, dense WDM (DWDM) systems were
emerging with 16 to 40 channels and spacing from 100 to 200 GHz. By the late 1990s DWDM
systems had evolved to the point where they were capable of 64 to 160 parallel channels,
densely packed at 50 or even 25 GHz intervals.

As fig. 1 shows, the progression of the technology can be seen as an increase in the
number of wavelengths accompanied by a decrease in the spacing of the wavelengths. Along
with increased density of wavelengths, systems also advanced in their flexibility of
configuration, through add-drop functions, and management capabilities.

Figure 1 Evolution of DWDM

BRBRAITT, Jabalpur Sec.3.5/ 19


Section 3.5

3.0 VARIETIES of WDM


Early WDM systems transported two or four wavelengths that were widely spaced.
WDM and the “follow-on” technologies of CWDM and DWDM have evolved well beyond
this early limitation.

3.1 WDM

Traditional, passive WDM systems are wide-spread with 2, 4, 8, 12, and 16 channel
counts being the normal deployments. This technique usually has a distance limitation of less
than 100 km.

3.2 CWDM

Today, coarse WDM (CWDM) typically uses 20-nm spacing (3000 GHz) of up to 18
channels. The CWDM Recommendation ITU-T G.694.2 provides a grid of wavelengths for
target distances up to about 50 km on single mode fibers as specified in ITU-T
Recommendations G.652, G.653 and G.655. The CWDM grid is made up of 18 wavelengths
defined within the range 1270 nm to 1610 nm spaced by 20 nm.

3.3 DWDM

Dense WDM common spacing may be 200, 100, 50, or 25 GHz with channel count
reaching up to 128 or more channels at distances of several thousand kilometers with
amplification and regeneration along such a route.

4.0 DWDM System Function


DWDM stands for Dense Wavelength Division Multiplexing, an optical technology
used to increase Band width over existing fiber optic backbones. Dense wavelength division
multiplexing systems allow many discrete transports channels by combining and transmitting
multiple signals simultaneously at different wavelengths on the same fiber. In effect, one fiber
is transformed into multiple virtual fibers. So, if you were to multiplex 32 STM-16 signals into
one fiber, you would increase the carrying capacity of that fiber from 2.5 Gb/s to 80 Gb/s.
Currently, because of DWDM, single fibers have been able to transmit data at speeds up to
400Gb/s.

A key advantage to DWDM is that it's protocol and bit rate-independent. DWDM-based
networks can transmit data in SDH, IP, ATM and Ethernet etc. Therefore, DWDM-based
networks can carry different types of traffic at different speeds over an optical channel. DWDM
is a core technology in an optical transport network. Dense WDM common spacing may be
200, 100, 50, or 25 GHz with channel count reaching up to 128 or more channels at distances
of several thousand kilometers with amplification and regeneration along such a route.

BRBRAITT, Jabalpur Sec.3.5/ 20


Section 3.5

Fig. 2 Block Diagram of a DWDM System

The concepts of optical fiber transmission, loss control, packet switching, network
topology and synchronization play a major role in deciding the throughput of the network.

4.0 TRANSMISSION WINDOWS


Today, usually the second transmission window (around 1300 nm) and the third and
fourth transmission windows from 1530 to 1565 nm (also called conventional band) and from
1565 to 1620 nm (also called Long Band) are used. Technological reasons limit DWDM
applications at the moment to the third and fourth window.

The losses caused by the physical effects on the signal due by the type of materials used
to produce fibres limit the usable wavelengths to between 1280 nm and 1650 nm. Within this
usable range the techniques used to produce the fibres can cause particular wavelengths to have
more loss so we avoid the use of these wavelengths as well.

5.0 DWDM SYSTEM COMPONENTS


Figure 3 shows an optical network using DWDM techniques that consists of five main
components:

1. Transmitter (transmit transponder):

- Changes electrical bits to optical pulses

- Is frequency specific

- Uses a narrowband laser to generate the optical pulse

2. Multiplexer/ demultiplexer:

- Combines/separates discrete wavelengths

3. Amplifier:

- Pre-amplifier boosts signal pulses at the receive side

BRBRAITT, Jabalpur Sec.3.5/ 21


Section 3.5

- Post-amplifier boosts signal pulses at the transmit side (post amplifier) and on the receive side
(preamplifier)

- In line amplifiers (ILA) are placed at different distances from the source to provide recovery
of the signal before it is degraded by loss.

- EDFA (Eribium Doped Fiber Amplifier) is the most popular amplifier.

4. Optical fiber (media):

- Transmission media to carry optical pulses

- Many different kinds of fiber are used

5. Receiver (receive transponder)

- Changes optical pulses back to electrical bits

- Uses wideband laser to provide the optical pulse

Figure 3: DWDM System Components

5.0 BENEFITS of DWDM


• Increases bandwidth (speed and distance)

• Does not require replacement or upgrade their existing legacy systems

• Provides "next generation" technologies to meet growing data needs

• Less costly in the long run because increased fiber capacity is automatically available;
don't have to upgrade all the time

6.0 OPTICAL NE TYPES


We have already met following NEs:

(a) Optical Multiplexer/Demultiplexer

Multiplexing and Demultiplexing of different wavelength signals.

(b) Optical Amplifiers

BRBRAITT, Jabalpur Sec.3.5/ 22


Section 3.5

Pure optical 1R regeneration (just amplification) of all transmitted signals.

(c) Transponders

Wavelength “change” and 2R regeneration (reshaping and amplification) or 3 R


regeneration (reshaping retiming and amplification).

(d) Regenerators

Real 3 R regeneration (reshaping, retiming and amplification) of the signal.


Therefore, the signals have to be demultiplexed, electrically regenerated and
multiplexed again. They are necessary if the length to be bridged is too long to be
covered only by optical amplifiers, as these only perform reshaping and retiming.

(e) Optical Add/Drop Multiplexer

Adding and Dropping only specific wavelengths from the joint optical signal.
This may use complete de-multiplexing or other techniques.

(f) Optical cross-connects

To cater for the huge amount of data expected in an optical network even the
cross-connects have to work on a purely optical level.

BRBRAITT, Jabalpur Sec.3.5/ 23


Section 3.5

FIBER TO THE HOME


The Department of Telecom (DOT) formulated a comprehensive Broadband policy in
the year 2004 and the year 2007 had also been declared as the “Year of Broadband”. By
2010, the total Internet users in the country are estimated to be around 40 millions out of
which 20 millions are expected to be Broadband users. To meet the Government of India’s
goal, it is essential to drive Fiber To The Home (FTTH) technology along with other
broadband access technologies for providing broadband access. Today, majority of
broadband connectivity is offered through Digital Subscriber Line (DSL), Cable Modem and
to the limited extent with Wireless technology. FTTH provides enormous bandwidth and long
reach offering multi-play services (Data, Voice, Video etc.) on a single fiber. FTTH is future
proof solution for providing add-on services such as Video on demand, Online Gaming,
HDTV etc.

1.0 INTRODUCTION
Growing demand for high speed internet is the primary driver for the new access
technologies which enable experiencing true broadband. Today’s, there is an increasing
demand for high bandwidth services in market around the world. However, traditional
technologies, like Digital Subscriber Line (DSL) and cable modem technologies, commonly
used for “broadband access,” which have access speeds to the order of a megabit per second,
with actual rates strongly dependent on distance from the exchange (central office) and quality
of the copper infrastructure, can not fulfill today’s customer demand for bandwidth hungry
applications such as high-definition TV, high-speed Internet access, video on demand, IPTV,
online gaming, distance learning etc. Amongst various technologies, the access methods based
on the optical fiber has been given extra emphasis keeping into long term perspective of the
country. It has many advantages over other competing access technologies of which ‘Being
Future Proof’ and providing ‘True Converged Network’ for high quality multi-play are the
salient ones. The stable and long term growth of Broadband is, therefore, going to be dependent
on robust growth of fiber in the last mile.

However, for providing multi-play services (voice, video, data etc.) and other futuristic
services fiber in the local loop is must. The subscriber market for multi-play is large and
growing and includes both residences and businesses. Businesses need more bandwidth and
many of the advanced services that only fiber can deliver. All view Multi- Play as a strong
competitive service offering now and into the future and are looking at fiber as the way to
deliver. Optical fiber cables have conventionally been used for long-distance communications.
However, with the growing use of the Internet by businesses and general households in recent
years, coupled with demands for increased capacity, the need for optical fiber cable for the last
mile has increased. A primary consideration for providers is to decide whether to deploy an
active (point-to-point) or passive (point-to-multipoint) fiber network.

2.0 FIBE TO THE x (FTTx)


Today, fiber networks come in many varieties, depending on the termination point:
building (FTTB), home (FTTH), curb (FTTC) etc. For simplicity, most people have begun to
refer to the fiber network as FTTx, in which x stands for the termination point. As
telecommunications providers consider the best method for delivering fiber to their subscribers,
they have a variety of FTTx architectures to consider. FTTH, FTTB, and FTTC each have
different configurations and characteristics.

BRBRAITT, Jabalpur Sec.3.5/ 24


Section 3.5

2.1 FTTH (Fiber To The Home):

FTTH is now a cost-effective alternative to the traditional copper loop. “Fiber to the
Home” is defined as a telecommunications architecture in which a communications path is
provided over optical fiber cables extending from an Optical Line Terminal (OLT) unit
located in telecommunications operator’s switching equipment connects to an Optical
Network Terminal (ONT) at each premise. Both OLTs and ONTs are active devices. This
communications path is provided for the purpose of carrying telecommunications traffic to
one or more subscribers and for one or more services (for example Internet Access,
Telephony and/or Video-Television). FTTH consists of a single optical fiber cable from the
base station to the home. The optical/electrical signals are converted and connection to the
user’s PC via an Ethernet card. FTTH is the final configuration of access networks using
optical fiber cable.

Fig. 1 FTTH Configuration

2.2 FTTB (Fiber To The Building):

“Fiber to the Building” is defined as a telecommunications architecture in which a


communications path is provided over optical fiber cables extending from an Optical Line
Terminal (OLT) unit located in telecommunications operator’s switching equipment connects
to an Optical Network Unit (ONU) or Remote Terminal(RT) at the boundary of the apartment
or office or building enclosing the home or business of the subscriber or set of subscribers,
but where the optical fiber terminates before reaching the home living space or business
office space and where the access path continues to the subscriber over a physical medium
other than optical fiber (for example copper loops).

Fig. 2 FTTB Configuration

FTTB regarded as a transitional stage to FTTH. By introducing fiber cables from the
fiber termination point to the home living space or business office space FTTB can be
converted to full FTTH. Such a conversion is desirable as FTTH provides better capacity and
longevity than FTTB. Optical fiber cable is installed up to the metallic cable installed within
the building. A LAN or existing telephone metallic cable is then used to connect to the user.

BRBRAITT, Jabalpur Sec.3.5/ 25


Section 3.5

2.3 FTTC (Fiber To The Curb):

A method of installing optical fiber cable by the curb near the user’s home. An optical
communications system is then used between the remote unit (optical signal/electrical
conversion unit) installed outside (such as near the curb or on Street Cabinet) from the installation
center. Finally, coaxial or other similar cable is used between the remote unit and user.

Fig.3 FTTC Configuration

3.0 WHY FTTH?

FTTH is a true multi-service communications access which simultaneously


handles several phone calls, TV/video streams, and Internet users in the home/office. There are
several advantages of deploying FTTH over other traditional access technologies as given
below:

 FTTH provides end-users with a broad range of communications and


entertainment services, and faster activation of new services.

 Competition is beginning to offer a “multi-play” (i.e., voice, video, data etc)


bundle.

 FTTH provides Service Provider’s with the ability to provide “cutting edge”
technology and “best-in-class” services.

 Deploying a fiber optic cable to each premises will provide an extraordinary


amount of bandwidth for future services.

 FTTH provides carriers with an opportunity to increase the average revenues


per user (ARPU), to reduce the capital investment required to deliver multiple
services, and to lower the costs of operating networks (fewer outdoor
electronics, remote management, ..) will result in less operational expense.

 FTTH provides the community in which it’s located with superior


communications which enhance the efficiency of local business and thus deliver
economic advantage for the community.

 Around the world FTTH is viewed as strategic national infrastructure similar to


roads, railways, and telephone networks.

4.0 Technology Options for FTTH Architecture:


When deciding which architecture to select a provider has many things to consider
including the existing outside plant, network location, the cost of deploying the network,

BRBRAITT, Jabalpur Sec.3.5/ 26


Section 3.5

subscriber density and the return on investment (ROI). At present different technology options
are available for FTTH architecture .The network can be installed as an active optical network,
or a passive optical network (PON.

4.1 Active Optical Network


The active optical network implementation is known as the “Active Node” and is
simply described as a “point-to-point” solution. Subscribers are provided a dedicated optical
cable and the distribution points are handled by active optical equipment. These active
architectures have been setup as either “Home Run Fiber” or “Active Star Ethernet”.

4.1.1 Home Run Fiber (Point-to-Point) Architecture

A Home Run Fiber architecture is one in which a dedicated fiber line is connected at the
central office (CO) to a piece of equipment called an Optical Line Terminator (OLT). At the
end user location, the other side of the dedicated fiber connects to an Optical Network Terminal
(ONT). Both OLTs and ONTs are active, or powered, devices, and each is equipped with an
optical laser The Home Run fiber solution offers the most bandwidth for an end user and,
therefore, also offers the greatest potential for growth. Over the long term Home Run Fiber is
the most flexible architecture; however, it may be less attractive when the physical layer costs
are considered. Because a dedicated fiber is deployed to each premise, Home Run Fiber
requires the installation of much more fiber than other options, with each fiber running the
entire distance between the subscriber and the CO.

User’s Premise

Point To Point

CO

Fig. 4 Home Run Fiber (Point-to-Point) architecture

4.1.2 Active Star Ethernet (Point-to-Multi Point) Architecture

Active Star Ethernet (ASE) architecture is a point-to-Multi-point architecture in which


multiple premises share one feeder fiber through a Ethernet switch located between the CO and
the served premises.

User’s Premise

P2M Switched
Ethernet
CO

Fig. 5 Active Star Ethernet (ASE) architecture

BRBRAITT, Jabalpur Sec.3.5/ 27


Section 3.5

With Active Star Ethernet (ASE) architecture, end users still get a dedicated fiber to
their location; however, the fiber runs between their location and Ethernet switch. Like Home
Run Fiber, subscribers can be located as far away from the Ethernet switch and each subscriber
is provided a dedicated “pipe” that provides full bidirectional bandwidth. Active Star Ethernet
reduces the amount of fiber deployed; lowering costs through the sharing of fiber.

4.2 Passive Optical Network (Point-to-Multipoint) Architecture


A Passive Optical Networks (PON) is based on the premise of a point-to-multipoint
architecture. Passive Optical Network is essentially a cost effective optical fiber based access
system for providing multi-play (voice, video, data etc) services, being rolled out by BSNL
shortly, to both business and residential customers. A Passive Optical networks (PON) use
optical fiber and optical power splitters to connect the Optical Line Terminal (OLT) at the local
exchange (CO) to the subscriber’s Optical Network Unit (ONU) on his premises. Passive
splitters are located downstream from the CO and can split the fiber signal up to 32 or more
times over a maximum distance of 10-20 km. This means that the bandwidth is split, or shared,
between users as well. The architecture is called passive because all splitters and intermediate
equipment located between the CO and the ONT is passive; that is, it has no active electronics
and therefore does not need separate power. This approach greatly simplifies network operation
& maintenance, and reduces the cost. Another advantage is that much less fiber is required than
in point-to point topologies.

There are two common splitter configurations are being used for PON architecture i.e.
centralized and the cascaded approaches

A. Centralized Splitter Approach

In Centralized Splitter Approach typically uses a 1x32 splitter in an outside plant


enclosure, such as a fiber distribution terminal. In the case of a 1x32 splitter, each device is
connected to an OLT in the central office. In this approach, optical splitters are concentrated in
a single location from which all customer’s optical network terminals (ONTs) at 32 homes are
connected.

Splitter Splitter

1X32 1X32

Central Office

Fig. 6 Centralized Splitter Approach

B. Cascaded Splitter Approach

A cascaded split configuration results in pushing splitters deeper into the network as
shown in fig.6. Passive Optical Networks (PONs) utilise splitter assemblies to increase the
number of homes fed from a single fibre. In a Cascaded PON, there will be more than one
splitter location in the pathway from central office to customer. Currently, standard splitter
formats range from 1 x 2, 1 x 4, 1 x 8, 1 x 16 and 1 x 32 so a network might use a 1 x 4 splitter

BRBRAITT, Jabalpur Sec.3.5/ 28


Section 3.5

leading to a 1 x 8 splitter further downstream in four separate locations. Optimally, there would
eventually be 32 fibers reaching the ONTs of 32 homes.

1X16
1X8
1X2
Splitters
Splitters

1X2
1X4
1X4 1X16

Central Office

Fig. 7 Cascaded Splitter Approach

There are several “flavors” of PON technology, i.e. new access technology named
APON (ATM Passive Optical Network), BPON (Broadband Passive Optical Networking),
EPON (Ethernet Passive Optical Networking) and GPON (Gigabit Passive Optical
Networking) which delivers gigabit-per-second bandwidths while offering the low cost and
reliability.

4.2.1 APON

ATM PON (APON) was standardized by the ITU in 1998 and was the first PON
standard developed. It uses ATM principles as the transport method and supports 622 Mbps
downstream services and 155 Mbps upstream service shared between 32-64 splits over a
maximum distance of 20 km.

4.2.2 BPON

Shortly after APON, Broadband PON (BPON) followed and is very similar to APON.
BPON also uses ATM, but it also boasts superior features for enhanced broadband services like
video. BPON has the higher performance numbers then APON pre-splitting maximum of 1.2
Gbps downstream and 622 Mbps upstream.

4.2.3 EPON

The IEEE standardized Ethernet PON (EPON) in the middle of 2004. It uses Ethernet
encapsulation to transport data over the network. EPON operates at rates of 1.25Gbps both
downstream and upstream (symmetrical) over a maximum reach of 20

4.2.4 GPON

Gigabit PON (GPON) is the next generation of PON’s from the line of APON and
BPON. The ITU has approved standard G.984x for it. GPON will support both ATM and
Ethernet for Layer 2 data encapsulation so is clearly an attractive proposition. It supports 2.5
Gbps downstream and 1.25 Gbps upstream.

BRBRAITT, Jabalpur Sec.3.5/ 29


Section 3.5

5.0 User Categories


FTTH / FTTB Networks may deliver services to the following categories of users:

 Residential refers to private users in their homes. Residential users may live in
“MDU” (multi-dwelling units such as apartments/condominiums) or “SFU” (single
family dwelling units such as stand-alone houses/villas/landed property).

Business refers to large (corporate), medium, and small (Small Business, Small Office
Home Office) business users. Businesses may occupy “MTU” (multi-tenanted units such as
office blocks/towers) or “STU” (single-tenanted units such as a stand-alone office building or
warehouse).

6.0 PON Architecture:


The key interface points of PON are in the central office equipment, called the OLT for
optical line terminal, and the CPE, called ONU for optical network unit (for EPON) and ONT
for optical network terminal (for GPON). Regardless of nomenclature, the important difference
between OLT and ONT devices is their purpose. OLT devices support management functions
and manage maximum up to 128 downstream links. In practice, it is common for only 8 to 32
ports to be linked to a single OLT in the central office. On the other hand the ONT (or ONU)
devices in the CPE support only their own link to the central office. Consequently, the
ONT/ONU devices are much less expensive while the OLTs tend to be more capable and
therefore more expensive.

1. OLT: The OLT resides in the Central Office (CO). The OLT system provides
aggregation and switching functionality between the core network (various network interfaces)
and PON interfaces. The network interface of the OLT is typically connected to the IP network
and backbone of the network operator. Multiple services are provided to the access network
through this interface,.

2. ONU/ONT: This provides access to the users i.e. an External Plant / Customer
Premises equipment providing user interface for many/single customer. The access node
installed within user premises for network termination is termed as ONT. Whereas access node
installed at other locations i.e. curb/cabinet/building, are known as ONU. The ONU/ONT
provide, user interfaces (UNI) towards the customers and uplink interfaces to uplink local
traffic towards OLT.

3. PON: Distributed or single staged passive optical splitters/combiners provides


connectivity between OLT & multiple ONU/ONTs through one or two optical fibers. Optical
splitters are capable of providing up to 1:64 optical split, on end to end basis. These are
available in various options like 1:4, 1:8, 1:16, 1:32 and 1:64.

4. NMS: Management of the complete PON system from OLT.

 One OLT serves multiple ONU/ONTs through PON

 TDM/TDMA protocol between OLT & ONT

 Single Fiber/ Dual Fiber to be used for upstream & downstream

BRBRAITT, Jabalpur Sec.3.5/ 30


Section 3.5

 Provision to support protection for taking care of fiber cuts, card failure etc.

 Maximum Split Ratio of 1:64

 Typical distance between OLT & ONT can be greater than 15Km (with unequal
splitting - up-to 35Km)

Fig. 8 PON Architecture

 Downstream transmission I.e. from OLT to ONU/ONT is usually TDM

 Upstream traffic I.e. from ONU/ONT to OLT is usually TDMA

 PON system may be symmetrical or asymmetrical

 PON and fiber infrastructure can also be used for supporting any one way
distributive services e.g. video at a different wavelength

PON is configured in full duplex mode in a single fiber point to multipoint (P2MP)
topology. Subscribers see traffic only from the head end, and not from each other. The OLT
(head end) allows only one subscriber at a time to transmit using the Time Division Multiplex
Access (TDMA) protocol. PON systems use optical splitter architecture, multiplexing signals
with different wavelengths for downstream and upstream.

7.0 EPON & GPON Applications:

Residential or Business Services

BRBRAITT, Jabalpur Sec.3.5/ 31


Section 3.5

High Speed Internet

Transparent LAN Service

Broadcast Video

Multi-Play (Voice, Video, Data etc.)

TDM Telephony

Video on Demand

On –line Gaming

IPTV etc

Wireless Services

Wireless backhaul over PON

BRBRAITT, Jabalpur Sec.3.5/ 32

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy