Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2011 | Volume: 10 | Issue: 3 | Page No.: 591-596
DOI: 10.3923/itj.2011.591.596
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

A Novel Protection Architecture Scheme for EPON

Xiao-Lin Zhou, Fa-Xin Yu, Yu-Chun Wen and Zhe-Ming Lu

Abstract:
With the rapid development of the Internet and extraordinary increase of bandwidth requirement, fiber based networks emerge and become more and more popular. The EPON (Ethernet Passive Optical Network) technology, which combines the mature Ethernet technology and high-bandwidth PON technology, is an ideal access method to achieve fiber based network service and appears to be the most widely-used access network. Thus, information reliability is becoming more and more important, making the protection of fiber based networks more and more necessary and crucial. Nowadays most EPONs are protected against failures by adopting redundant network equipments. This study proposes a novel protection method for EPON, which is more reliable and safer than existing schemes. This protection architecture scheme is able to provide protection for EPON and point out the exact failure reason for further physical recovery and repairing by the Network Management (NM) Server. Actual operations show that the proposed scheme can provide protection for at least three types of failures, i.e., the ONU link failure, the OLT link failure and the OLT failure.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Role of Edge Connectivity and Centrality Factors in Survivable Optical Network Design
  •    Shortest Path Tree with Embedded Backups-an Exhaustive Link Failure Recovery Algorithm
  •    A Framework to Recover Single Link Failure on Shortest Path in Shortest Path Tree
  •    Video Signal Identifier for Optical Line Monitoring in FTTH
  •    Information and Communication Technologies (ICT), Internet as a Tool in the Developing World, Challenges and the Way Forward
  •    MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
  •    Passive Optical Signal Tapping Device
  •    On the Differences between Hiding Information and Cryptography Techniques: An Overview
How to cite this article:

Xiao-Lin Zhou, Fa-Xin Yu, Yu-Chun Wen and Zhe-Ming Lu, 2011. A Novel Protection Architecture Scheme for EPON. Information Technology Journal, 10: 591-596.

DOI: 10.3923/itj.2011.591.596

URL: https://scialert.net/abstract/?doi=itj.2011.591.596

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom