Sunteți pe pagina 1din 2

Photon Netw Commun (2010) 20:224–231

DOI 10.1007/s11107-010-0263-1

Analysis of upstream link bandwidth utilization in GPON


with integrated network surveillance
Hakjeon Bang · Madhan Thollabandi ·
Sungchang Kim · Dong-Soo Lee · Chang-Soo Park

Received: 9 September 2009 / Accepted: 21 July 2010 / Published online: 6 August 2010
© Springer Science+Business Media, LLC 2010

Abstract We present a media access control protocol 1 Introduction


extension to integrate the physical layer surveillance con-
cept into the transmission and the related management system Gigabit-capable passive optical networks (GPONs) address
in the Gigabit-capable passive optical network (GPON). We the first mile of the communication infrastructure between
allocate an unused time slot for network surveillance depend- service provider central offices and customer sites. With
ing upon its availability in the upstream GPON transmission the expansion of new services offered over the Internet,
convergence frame. We analyze the upstream link bandwidth a dramatic increase of bandwidth has been facilitated in the
utilization of the GPON system with network surveillance backbone network through the use of wavelength-division
and show that there is a negligible amount of underutiliza- multiplexing (WDM), providing tens of gigabits per sec-
tion of link bandwidth as a result of this. ond per wavelength. At the same time, local area networks
(LANs) are scaled up and are being upgraded. Such growing
Keywords Gigabit-passive optical networks (GPON) · gap between the capacity of the backbone network and end
Network surveillance · Reflective semiconductor optical users’ needs results in a serious bottleneck of the access net-
amplifier (RSOA) · Media access control (MAC) protocol · work between them. An access network technology is desired
Bandwidth allocation that can provide low-cost efficient equipment to facilitate
multiservice access to end users. Since GPON is an inexpen-
sive, simple, and scalable technology, and capable of deliv-
ering integrated services, it is considered to be an attractive
and promising solution for the broadband subscriber access
network [1]. Typically, GPON includes an optical line ter-
minal (OLT) residing in the central office (CO) and multi-
H. Bang · M. Thollabandi · C.-S. Park (B) ple optical network terminals (ONTs) residing at or near the
Department of Information and Communications,
customer premises. GPON is typically deployed as a tree
Gwangju Institute of Science and Technology,
1 Oryong-Dong, Buk-Gu, Gwangju 500-712, Republic of Korea or tree-and-branch topology, using a single, shared optical
e-mail: csp@gist.ac.kr fiber, and inexpensive optical splitters which divide the sin-
H. Bang gle fiber into separate strands feeding individual subscribers.
e-mail: starm021@gist.ac.kr The OLT is connected to the IP network and backbone of
M. Thollabandi the network operator. Through this interface, multiple ser-
e-mail: madhan@gist.ac.kr vices are provided to the access network. GPON is covered
by International Telecommunication Union-Telecommuni-
S. Kim · D.-S. Lee
cation Standardization sector (ITU-T) standard G.984, using
Hanam Center, Electronics and Telecommunications Research Institute
(ETRI), 1 Oryong-dong, Buk-gu, Gwangju 500-712, Republic of Korea Ethernet, time division multiplexing (TDM), or asynchro-
e-mail: sungchang@etri.re.kr nous transfer mode (ATM) for data transport.
D.-S. Lee Beside the investment costs for a new network infra-
e-mail: d-soolee@etri.re.kr structure, the operator has to consider the operational costs

123
Photon Netw Commun (2010) 20:224–231 225

based on spectral analysis of cavity mode frequency formed


by external cavity of self-injection locked Fabry–Perot laser
diode (FP-LD) [4]. This scheme, however, requires a sep-
arate out-of-band wavelength for network surveillance and
also needs an additional FP-LD at each ONU to generate
the surveillance signal. To alleviate the system cost involved
in network surveillance, an in-service surveillance technique
based on cavity mode analysis of self-injection locked reflec-
tive semiconductor optical amplifier (SL-RSOA) was studied
[5]. As shown in Fig. 1, this configuration can simultaneously
Fig. 1 GPON system architecture utilizing upstream data transmission generate the upstream data signal as well as a distinct cav-
based on SL-RSOA ity mode frequency (surveillance signal) due to the presence
of external cavity at each ONU. Thereby supporting simul-
taneous detection of upstream data signal and surveillance
as well. In the future, new operations, administration, and signal at the OLT. This configuration, however, had compat-
maintenance (OAM) concepts will be necessary to help ibility problems with the existing GPON standard because
the network operator to reduce operational costs and to the media access control (MAC) protocol of GPON restrains
improve customer satisfaction. OAM concepts from the leg- the individual ONUs from transmission of surveillance sig-
acy copper-based telecom infrastructure and from the optical nals outside their allocated time slot, as it might cause severe
network for long haul applications can be adapted to optical power penalty on the upstream data channel. In configuration
access systems. However, the diversity of different access [6], we investigated the provisioning of separate unused time
network topologies, and a multiple number of optical links, slot in the upstream GPON transmission convergence (GTC)
requires new OAM concepts to fulfill the operators’ needs. frame for network surveillance without modifying the GPON
A basic prerequisite for all OAM concepts is knowledge of frame structure and demonstrated the feasibility of the pro-
the status of all components in the network and continuous posed surveillance scheme in GPON. In this article, we evalu-
receipt of as much information as possible about the system’s ate the network performance by modelling the upstream link
behavior at any time. Also each monitoring concept has to be bandwidth utilization with network surveillance and analyze
integrated into the transmission system and into the related the scheduling issues regarding the network surveillance. We
management system, whereas the monitoring system must then propose an algorithm to dynamically evaluate the spare
not affect the transmission characteristics of the transmis- bandwidth availability in the upstream GTC frame and allo-
sion system. cate it for network surveillance, if sufficient enough. Fur-
End-to-end monitoring on higher protocol layers is the thermore, depending upon the average requested bandwidth
solution most often used today to supervise long haul opti- by ONUs, we derived an empirical formula to compute the
cal networks as well as metro and access transmission upper bound on the delay experienced in provisioning the
systems. Bit error rate, frame error rate, loss of synchroniza- unused bandwidth for network surveillance. Finally, we give
tion, loop back testing, and indirect monitoring from forward a comparative analysis of link bandwidth utilization at differ-
error correction (FEC) and the transmission control protocol ent bandwidth allocation rates for network surveillance and
(TCP) are used to assess the transmission quality. In opti- show that there is negligible degradation in network perfor-
cal access networks, this information is used to maintain mance as a result of network surveillance.
the network. A main drawback of using monitoring func-
tions on higher layers is that the transmission quality already
is affected before an alarm appears and also none of these 2 Integration of network surveillance in GPON
parameters provide a view into the root cause of a prob- through MAC protocol extension
lem on the physical layer. Preventive maintenance is not in
place at present because cost effective solutions are not avail- Physical layer testing and supervision functions will be an
able. Rigorous discussion on how today’s supervision func- integral part of transmission systems in the future. The inte-
tions operate and why monitoring functions on the physical gration of supervision functions into the optical transceiver
layer are more useful than monitoring on higher layers can module enables a very cost effective way to monitor phys-
be found else where [2]. Hence real-time physical layer mon- ical layer parameters. The existing OAM protocols of the
itoring is extremely important to support service level agree- transmission systems will be used to transmit control infor-
ments (SLA) and to guarantee network reliability [3]. Several mation for the measurement as well as the results of the
non-intrusive fiber surveillance techniques were proposed in measurement itself. The network information is stored in
the literature, including an in-service surveillance technique the management information base (MIB) of the OLT and

123

S-ar putea să vă placă și