0% found this document useful (0 votes)
652 views62 pages

GPON Principles - Part 1

This document provides an overview of a training program on Gigabit Passive Optical Network (GPON) technology. The objectives of the course are to describe GPON concepts, analyze GPON protocols, understand GPON technologies, device management in GPON systems, networking protection modes, and trends in access network technology. The content will cover GPON network architecture, protocols, key technologies, management and service provisioning, networking protection, and evolution of access networks. GPON uses wavelength division multiplexing over a single fiber for downstream broadcast and upstream time-division multiple access transmissions at gigabit speeds while passively splitting the signal to multiple endpoints without electrical power.

Uploaded by

Mohamed Shabana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
652 views62 pages

GPON Principles - Part 1

This document provides an overview of a training program on Gigabit Passive Optical Network (GPON) technology. The objectives of the course are to describe GPON concepts, analyze GPON protocols, understand GPON technologies, device management in GPON systems, networking protection modes, and trends in access network technology. The content will cover GPON network architecture, protocols, key technologies, management and service provisioning, networking protection, and evolution of access networks. GPON uses wavelength division multiplexing over a single fiber for downstream broadcast and upstream time-division multiple access transmissions at gigabit speeds while passively splitting the signal to multiple endpoints without electrical power.

Uploaded by

Mohamed Shabana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Optical Distribution Networks (FTTH)

Digital Egypt Youth Training Program

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Gigabyte Passive Optical Network
(GPON) Principle

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Foreword
• As new services keep emerging, more and more industries have
realized that they must break through the bandwidth bottleneck as
soon as possible. Optical fibers are the best transmission media so far.
This course focuses on the background, basic concepts, features, and
application scenarios of the GPON technology, management mode of
the GPON system, service provisioning modes for devices, GPON
networking application, and networking protection modes.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Objectives
⚫ Upon completion of this course, you will be able to:
• Describe the concept of GPON.
• Analyze the main protocols of GPON.
• List the key technologies of GPON.
• Understand the device management and authentication modes of the GPON
system.
• List GPON networking protection modes.
• Understand the new trends of the access network technology.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Content
Main Knowledge

1. GPON Network Architecture


2. GPON Protocol Analysis
3. Key GPON Technologies
4. Management and Service Provisioning Modes of the
GPON System
5. GPON Networking Protection
6. Access Network Technology Evolution

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Gigabit = Data transmission Speed is in gigabits

Passive = No Electrical Power required except at terminals [OLT & ONT]

Optical Network = Optical/Light Signal used to carry data

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON History
• Over the years, various PON standards have been
developed. In the late 1990s, the International
Telecommunications Union (ITU) created the
APON standard, which used the Asynchronous
Transfer Mode (ATM) for long-haul packet
transmission.
• Since ATM is no longer used, a newer version was
created called the broadband PON, or BPON.
Designated as ITU-T G.983, this standard provided
for 622 Mbits/s downstream and 155 Mbits/s
upstream.
• While BPON may still be used in some systems,
most current networks use GPON, or Gigabit PON.
The ITU-T standard is G.984. It delivers 2.488
Gbits/s downstream and 1.244 Gbits/s upstream.
• GPON is optimized on the physical layer to
support higher data rates, greater distances, and
higher split ratios than previous PON
technologies.
• The latest version of GPON is a 10-Gigabit version
called XGPON, or 10G-PON

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Gigabit PON (GPON)
• GPON uses optical wavelength division multiplexing (WDM) so a single fiber can be used for both downstream and
upstream data.
• A laser on a wavelength (λ) of 1490 nm transmits downstream data. Upstream data transmits on a wavelength of
1310 nm. If TV is being distributed, a wavelength of 1550 nm is used.
• GPON reuses many G.983.x concepts such as DBA, protection, ranging, PLOAM messaging, etc., and offers robust
support for OAM and QoS.
• Physical Reach: calculated based on the power budget (att. , splitters loss, etc.
• Logical Reach : maximum distance reached based on protocol, independent of optical power budget and it is
limited by ranging protocol
Passive optical network ONU
POS
OLT
INTERNET
PON has a unique architecture
• (broadcast) point-to- VOIP
multipoint in DS direction POS
• (multiple access) multipoint- IPTV
to-point in US direction

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Minimum BW can be guaranteed !
GPON • Unused time-slots can be assigned to heavy users.

❖ GPON can support up to seven different combinations of


symmetric and asymmetric downstream/upstream data rates
up to a symmetric 2.5 Gb/s.
❖ Maximum logical reach: 60 km
❖ Maximum physical reach: 20 km
❖ Maximum differential fibre distance: 20 km
❖ Split ratio: 1:64, it can be up to1:128

Mainstream rates
currently supported and
can be upgraded to 10G
GPON.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Data Multiplexing Modes
❑ The GPON implements single-fiber bidirectional transmission using the WDM technology.

❑ GPON adopts two multiplexing mechanisms:-


a) in downstream direction (i.e. from OLT to users), data packets are transmitted in a broadcast manner, but
encryption (AES) is used to prevent eavesdropping
b) in upstream direction (i.e. from users to OLT), data packets are transmitted in a TDMA manner.

1490 nm

broadcast ONU

Optical ONU
OLT splitter
1310 nm
ONU

TDMA: time division multiple access

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Downstream Transmission
• GPON principle-Downstream Supports point-to-multipoint (P2MP) multicast transmission.
• Broadcasts the same data to all ONUs in the downstream direction.
• All ONUs receive the same data, and the GEM PORT-ID is used to distinguish the data intended for different
ONUs.
• The downstream frame length of the GPON is fixed at 125 μs.

ONU1

1 2 3 1 2 3 2

ONU2
Optical
OLT splitter 3

ONU3

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Upstream Data
• GPON Upstream Data: Supports time division multiple access (TDMA).
• TDMA mode: The upstream link is divided into different timeslots which are allocated to each ONU (Transits data on
an exclusive timeslot) according to the upstream bandwidth map fields of downstream frames.
• Couples optical signals on an optical splitter.
• Detects and prevents collisions through ranging.
• The upstream transmissions, called burst-mode operations, occur at random as a user needs to send data.
• The system assigns a slot as needed.
• Because the TDM method involves multiple users on a single transmission, the upstream data rate is always slower
than the downstream rate. 1

ONU1

1 2 3 2 2

Optical ONU2
OLT splitter 3

ONU3

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Summery
o While each ONU gets the full downstream rate of 2.488 Gbits/s, GPON uses a time division multiple access (TDMA) format to
allocate a specific timeslot to each user.
o This divides the bandwidth so each user gets a fraction such as 100 Mbits/s depending upon how the service provider allocates
it.
o The upstream rate is less than the maximum because it is shared with other ONUs in a TDMA scheme.
o The OLT determines the distance and time delay of each subscriber. Then software provides a way to allot timeslots to upstream
data for each user.
o The typical split of a single fiber is 1:32 or 1:64. That means each fiber can serve up to 32 or 64 subscribers. Split ratios up to
1:128 are possible in some systems.
o GPON offers full-service support, including Ethernet, ATM, TDM (PSTN, ISDN, E1 and E3) Traffic, etc., by using either ATM or
GPON encapsulation method (GEM), or both (dual or mixed mode).
o GEM is a method which encapsulates data over GPON.
o It is generic in that any packet-based service can be transported using GEM, including Ethernet and native time-division
multiplexing (TDM) services.
o With GEM, the variable-length Ethernet frames are not transmitted natively but are fragmented. This allows the use of fixed,
periodic framing so that services with very strict requirements can be serviced and transported at the right moment.
o Although Ethernet frames must be reassembled after reception, GPON transports Ethernet more efficiently than EPON as it has
much lower overhead.
o GPON supports IP video over Ethernet or ATM and offers standardized support for analog video overlay.
o GPON offers more bandwidth capabilities and much more flexibility than BPON and EPON, It is also a better system for
supporting video services than BPON and EPON.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Contents
1. GPON Network Architecture
2. GPON Protocol Analysis
3. Key GPON Technologies
4. Management and Service Provisioning Modes of the GPON System
5. GPON Networking Protection
6. Access Network Technology Evolution

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Basic concepts of GPON

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Basic concepts of GPON:
❑ A GEM(GPON Encapsulation Mode) port is used to identify the virtual service channel that carries the service
stream between the OLT and the ONU.

❑ The GPON encapsulation mode (GEM) frame is the smallest service bearing unit in the GPON technology and is
the most basic encapsulation structure.

❑ All services are encapsulated in GEM frames for transmission on the GPON line and are identified by GEM ports.
ONU OLT

❑ A GEM port can carry one or more services.


GEM Port
Identified
T-CONT
by ONU-ID

GEM Port
T-CONT

Identified
by Port-ID Identified
by Alloc-ID

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Basic concepts of GPON:
❑ Each GEM port is identified by a unique Port-ID, which is globally allocated by the OLT. That is, each ONU/ONT
of the OLT cannot use the GEM ports with the same Port-ID.

❑ The GEM port is similar to the VPI/VCI identifier in the ATM virtual connection.

❑ The T-CONT is the carrier for services in the upstream direction of the GPON. All GEM ports are mapped to T-
CONTs.

❑ A T-CONT is the basic bearer unit in the upstream direction of the GPON line.

❑ A T-CONT is the basic control unit of the upstream service stream in the GPON system. Each T-CONT is
uniquely identified by an Alloc-ID which is globally allocated by the OLT. That is, each ONU/ONT of the OLT
cannot use T-CONTs with the same Alloc-ID.

❑ the OLT uses the DBA scheduling mode for upstream transmission

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


ONU Identifier (ONU-ID)

ONU-ID is an 8-bit identifier that an OLT assigns to an ONU during ONU activation via PLOAM messages. The ONU-ID is
unique across the PON and remains until the ONU is powered off or deactivated by the OLT.

Allocation Identifier (ALLOC_ID)

ALLOC_ID is a 12-bit number that the OLT assigns to an ONU to identify a traffic-bearing entity that is a recipient of
upstream bandwidth allocations within that ONU. This traffic-bearing entity is also called T-CONT.

Each ONU is assigned a default ALLOC_ID which is equal to that ONU's ONU-ID, and may be assigned additional
ALLOC_IDs as per OLT's discretion.

Transmission Containers (T-CONT)

A Transmission Container (T-CONT) is an ONU object representing a group of logical connections that appear as a single
entity for the purpose of upstream bandwidth assignment on the PON. For a given ONU, the number of supported T-
CONTs is fixed. The ONU autonomously creates all the supported T-CONT instances during ONU activation. The OLT
discovers the number of T-CONT instances supported by a given ONU.
National Telecommunication Institute ‫المعهد القومي لالتصاالت‬
To activate a T-CONT instance to carry upstream user traffic, the OLT has to establish a mapping between T-CONT
instance and an ALLOC_ID, which has been previously assigned to the ONU via PLOAM messages. Any ALLOC_ID
assigned to the ONU, including the default ALLOC_ID, can be associated with single user traffic T-CONT.

There are 5 types of T-CONTs which can be allocated to the user-

Type 1: This T-CONT is of fixed bandwidth type and mainly used for services sensitive to delay and high priority
like VOIP & VOICE.

Type 2 and Type 3: Both T-CONT are of guaranteed bandwidth types and mainly used for video services and data
services of higher priorities.

Type 4: This T-CONT is of best-effort type and mainly used for data services such as Internet and services of low
priority which do not require high bandwidth.

Type 5: This T-CONT is of mixed type, involving all bandwidth types and bearing all services.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


(Multiple choice with more than one correct answer)

Which of the following statements about the GEM frame and T-CONT access are correct?

A. More than one ONU under the PON can share a GEM Port ID
B. More than one GEM port can be mapped to the same T-CONT
C. Alloc-ID is allocated by the ONU
D. The ONUs connected to the same GPON port of an OLT do not have T-CONTs with the same
Alloc-ID

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Contents
1. GPON Network Architecture
2. GPON Protocol Analysis
3. Key GPON Technologies
4. Management and Service Provisioning Modes of the GPON System
5. GPON Networking Protection
6. Access Network Technology Evolution

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Resource Sharing:
Multiplexing Principles

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Service Mapping - Upstream Multiplexing
GPON encapsulation mode (GEM) ports and transmission containers (T-CONTs) divide a passive optical network
(PON) network into virtual connections for service multiplexing.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Service Mapping - Upstream Multiplexing

Figure shows the service multiplexing principle in the GPON system


(mapping between services, GEM ports, and T-CONTs):

❑ Services are first mapped to different GEM ports on the ONT.

❑ Services carried by a GEM port are mapped to different types of T-CONTs for upstream service scheduling.

❑ One T-CONT can carry one or multiple GEM ports, depending on the specific configuration.

❑ Each ONT supports multiple T-CONTs and can be configured with different service types.

❑ After the data carried by the T-CONT, it is transmitted upstream to the OLT, the GEM port is demodulated, and then
the service payload in the GEM port is demodulated for processing.
Other processing steps are the same as those in switches or the access network)

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


GPON Service Mapping - Downstream Multiplexing
❑ In the downstream direction, all services are encapsulated into the GEM port in the GPON service processing unit
and broadcast to all the ONUs connected to the GPON port.
❑ An ONU filters the data according to the GEM port ID, retains only the GEM port belonging to the ONU,
encapsulates the service.

❑ Then sends the service from the service interface of the Port

GEM Port
ONU to the user equipment. Port ONU

filter
Port
❑ A shared GEM port is a multicast GEM port. Port
Port

GEM Port
PON OLT ONU
Port

filter
Port
Port

GEM Port
Port ONU

filter
Port

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Which of the following statements about the service Multiplexing
are incorrect?

❑A T-CONT can carry one or more GEM ports


❑Each GEM port can only carry one type of service stream
❑After carrying service streams, a GEM port must be mapped to a T-
CONT
❑Each ONU only supports one T-CONT

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


What mode are used to transmit the GPON upstream and
downstream data?

• Downstream Transmission: multicast


• Upstream Transmission: time division multiple

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Contents
1. GPON Network Architecture
2. GPON Protocol Analysis
3. Key GPON Technologies
4. Management and Service Provisioning Modes of the GPON System
5. GPON Networking Protection
6. Access Network Technology Evolution

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Key GPON Technologies

Ranging

Upstream dynamic
GPON Technologies bandwidth allocation

Downstream AES
encryption

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


What is the issue?
The OLT is responsible for allocating different timeslots to each ONU to transmit upstream data.

The distances between ONUs and OLTs are different. The transmission time of optical signals on the optical fiber is different,
and the time when the optical signal arrives at each ONU is also different.

However, the access network is shared, ONU upstream transmissions could collide if they were transmitted at random
times.
ONU1

How to ensure that each ONU can accurately locate timeslots? ONU2

ONU3
How to avoid conflicts between upstream data from multiple ONUs and ONU4
implement frame synchronization?

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Ranging Is Required
The OLT measures delay and sets a register in each ONU via PLOAM (Physical Layer Operations, Administration and
Maintenance, sent In DL frame) messages to equalize its delay with respect to all other ONUs on the access network.
This is called Ranging.

Once the delay of all ONUs have been set, the OLT transmits grants to individual ONUs.
A grant is permission to use a defined interval of time for upstream transmission.

The grant map is dynamically re-calculated every few milliseconds.


20 km
The map allocates bandwidth to all ONUs such that each ONU
receives timely bandwidth for its needs. 12 km

ONU

OLT

3 km

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Ranging Principles
• The ranging process is as follows:
• The OLT obtains the Round-Trip Delay (RTD) of each ONU through ranging and calculates the physical distance of each ONU.

ONU1

RTD1 = 10 us, calculation distance = 1 km


ONU2

RTD2 = 20 us, calculation distance = 2 km

RTD3 = 30 us, calculation distance = 3 km


ONU3
• Then, the OLT specifies a proper equalization delay (EqD).
• In the ranging process, a window needs to be opened, that is, quiet zone to suspend the upstream transmission channels of another
ONUs. The OLT opens the window by setting BWmap to null without authorizing any timeslot.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Ranging Result
• Using RTD and EqD, the OLT can ensure that data frames sent by different ONUs are synchronized and do not
conflict on an optical splitter.
• All ONUs are at the same logical distance and send data in the corresponding timeslots.

1
1
RTD1+EqD1

ONU1 2
2
RTD2 +EqD2
ONU2
Conflict 3
RTD3 +EqD3 3
ONU3

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


“Improved QoS and more efficient use of PON bandwidth”

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


How to allocate upstream timeslots
(bandwidth)?

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Static B.W Allocation Vs. Dynamic B.W Allocation

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


37
SBA+DBA modes
• The GPON system uses the SBA+DBA mode to achieve effective bandwidth utilization.
• TDM services are configured with a bandwidth through SBA to ensure high QoS.
• Bandwidths for other services are dynamically allocated through DBA.
• The implementation of DBA is closely related to the QoS guarantee mechanism.
• The GPON system supports dynamic bandwidth allocation through status reporting and OLT service
monitoring (non-status reporting).

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Static Bandwidth Allocation-SBA
• Bandwidth can also be allocated in static mode, or fixed mode.
• In this mode, an OLT periodically allocates a fixed bandwidth to each ONU based on the ONUs service level
agreement (SLA), bandwidth, and delay indicators.
• In fixed mode, an OLT uses a polling mechanism.
• The bandwidths allocated to ONUs may vary but the bandwidth allocated to each ONU is the same in each
polling period.
• The bandwidth guarantee depends on an ONUs SLA but not on its upstream service traffic.
• An ONU is allocated a fixed bandwidth even carrying no upstream services.
• The allocation mode is simple and applies to services, such as TDM, that have a fixed traffic, but does not
apply to IP services that have burst requirements on bandwidth.
• If the mode applies to the IP services, the upstream bandwidth usage is low because the upstream
bandwidth cannot be adjusted dynamically based on the upstream service traffic.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Dynamic Bandwidth Allocation - DBA
• PON requires an effective TDMA mechanism to control the upstream traffic so that data packets from
multiple ONUs do not collide in upstream transmission.
• However, the mechanism requires QoS management in an ODN network.
• The management cannot be implemented or may cause severe efficiency decrease because ODN is a
passive network.

• To resolve the problem, ITU-T Recommendation G.984.3 is developed, which defines the DBA protocol for
managing upstream PON traffic.

• In the GPON system, the OLT controls an ONUs upstream data traffic by sending authorization signals to
the ONU.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


➢What is DBA?
o The DBA technology is Effective mechanism used to dynamically allocate upstream bandwidths (uplink traffic) within
microseconds or milliseconds.
o Subscribers can obtain a bandwidth higher than the maximum fixed bandwidth
So, they are enjoying better services.

➢Why is DBA required?


o DBA is used to transmit the data as much as possible on conditions that not congestion occurs on the upstream
optical path to increase the upstream bandwidth utilization.
o Compared with the static bandwidth allocation, DBA helps fully utilize upstream line bandwidths, specifically, when
some users do not need bandwidths, idle timeslots are allocated to users who require large bandwidths.
o So more ONTs can be allowed to transmit, and/or more bandwidth may be allocated to a particular ONT.

➢What is the advantage of DBA?


o Improve the upstream line bandwidth utilization of the PON ports.
o Connect more users to the PON ports.
o Provide users with better services at higher bandwidths, especially for services that have bandwidth bursts.

Therefore, DBA applies to services that require burst bandwidths.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


41
How does DBA be implemented?
DBA has two implementation modes:
Status Reporting (SR) mode
o ONU sends a status report for data to be sent.
Non-Status Reporting (NSR) mode
o OLT monitors the upstream data of an ONU in real time.
o ONU does not need to report the data status.

Because OLT always monitors → OLT resources are occupied !!


→ Therefore, the SR mode is recommended.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


42
NSR-DBA: Working Mechanism

• an OLT constantly allocates a small amount of extra bandwidth to each ONU.


• If the ONU has no traffic to send, it transmits idle frames.
• If the OLT observes that an ONU is not sending idle frames, it increases the bandwidth allocation to
that ONU.
• Once that ONU starts sending idle frames, the OLT reduces its allocation accordingly.
NSR-DBA has the advantage that the ONUs need not be aware of DBA, however, its disadvantage is that
there is no way for the OLT to know how to allocate bandwidth to several ONUs in the most efficient way.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


How the OLT allocates timeslots to ONTs?

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Which T-CONT sends data first and which later?

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


SR-DBA: Working Mechanism
SR-DBA:
• Involves explicit T-CONT buffer status provided by the ONUs when OLT polls them.
• In this method, the OLT solicits T-CONT buffer status, and the ONUs respond with a separate report for each
assigned T-CONT.
• The report contains the data currently waiting in T-CONTs in the specified time slots.

• OLT receives the status (DBA) report, re-calculates bandwidth allocation (BW Map) through DBA algorithm and
sends new BW Map to the ONUs in-band with downstream traffic.
• The ONU receives the BW Map from OLT and sends the data in the specified time slots.
• Therefore, each ONU dynamically adjusts its upstream bandwidth according to its actually transmitted data
traffic, improving upstream bandwidth usage.

• When an ONU has no information to send, upon receiving a grant from the OLT, it sends an idle cell upstream to
indicate that its buffer is empty.
• This informs the OLT that the grants for that T-CONT can be assigned to other T-CONTs.
• If an ONU has a long queue waiting in its buffer, the OLT can assign multiple T-CONTs to that ONT.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


DBA Process

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Implementation Process of SR-DBA

• The DBA module of the OLT continuously collects DBA report information, performs calculation, and sends the calculation result to each
ONU in the form of BW Map.
• Each ONU sends upstream burst data in their respective timeslots according to the BW Map information to occupy the upstream bandwidth.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


National Telecommunication Institute ‫المعهد القومي لالتصاالت‬
T-CONT Bandwidth Terms
• Based on service priorities, the system sets SLA for each ONU, restricting service
bandwidth.
• The maximum bandwidth and the minimum bandwidth pose limits to the bandwidth of
each ONU, ensuring various bandwidth types for services of different priorities.
• In general, voice service enjoys the highest, then video service and data service the lowest
in terms of service priority.
• OLT grants bandwidth based on services, SLA and the actual condition of the ONU.
• Services of higher priority enjoy higher bandwidth.

• Transmission containers (T-CONTs): Dynamically receives the authorization from the OLT,
manages the upstream bandwidth allocation at the transmission convergence layer of the
PON system, and improves the upstream bandwidth in the PON system.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


51
DBA Basics - T-CONT
Bandwidth Types : The prioritization of assigned bandwidth [highest to lowest priority].

Reserved for OAM and queue-


T-CONT type can accommodate one or more B.W type length reporting
Type4
 Type1 Total link TCONT4 Best-effort bandwidth
capacity Maximum Additional
 Type2

T-CONT type5
bandwidth bandwidth
Shared Type3
bandwidth
Non-assured bandwidth
 Type3 T-CONT 3

 Type4 Type2 Assured bandwidth


Guaranteed
 Type5 bandwidth
Type1
TCONT1
Fixed bandwidth

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


DBA types
➢Type [1] →Fixed bandwidth
• The fixed bandwidth is reserved for specific ONUs or specific services on ONUs.
• It cannot be used by other ONUs even if no upstream service streams are carried on the specific ONUs.
• Mainly used for services sensitive to time delay and of higher priorities
• Applications: VoIP , voice, TDM

➢Type [2] → Assured bandwidth


• The assured bandwidth is available at any time required by an ONU.
• When the bandwidth required by the service streams on the ONU is smaller than the assured bandwidth, the system can
use the DBA mechanism to allocate the remaining bandwidth to services on other ONUs.

• Mainly used or video services and data services of higher priorities.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


53
DBA types
➢Type [3] → Assured bandwidth + Maximum bandwidth
• Combined type
• Subscriber is allocated with a certain bandwidth + additive bandwidths at the same time
• Cannot exceed the maximum bandwidth configured for the subscriber.
• Applications: VoIP and IPTV service.

➢Type [4] → Best-Effort bandwidth


• Mainly used for data services (such as Internet and email), and services of lower priorities.
• These services do not require high bandwidth.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


54
DBA types
➢Type [5] →Fixed bandwidth+ Assured bandwidth+ Maximum bandwidth
• Is the mixed T-CONT type, involving all bandwidth types and bearing all services.
• subscriber is allocated with a fixed bandwidth that cannot be used by other subscribers + the
subscriber can use the assured bandwidth when necessary + can occupy certain bandwidths
Cannot exceed the maximum bandwidth configured for the subscriber

• Provides the bandwidth to an ONU at any time when required


• Allows subscribers to preempt some bandwidth. (The total used bandwidth cannot exceed the
maximum configured bandwidth.)

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


55
Relationship between T-CONT Types and Bandwidth types

T-CONT Type
Bandwidth Type
Type1 Type2 Type3 Type4 Type5

Fixed BW X No No No X

Assured BW No Y Y No Y

Maximum BW Z=X Z=Y Z>Y Z Z≥X+Y

According to service priorities, the system sets the SLA for each ONU and limits the bandwidth of the services.
The maximum and minimum bandwidths limit the bandwidth of each ONU at extreme conditions to ensure that
the bandwidth varies according to the service priorities. Generally, the voice service has the highest priority,
followed by video and data services.
The OLT allocates the bandwidth according to the service, SLA, and actual ONU conditions. The higher the priority is,
the higher the bandwidth is.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


DBA Summery
❑ DBA is a methodology that allows quick adoption of users' bandwidth allocation based on current traffic
requirements and it is especially good for dealing with bursts upstream traffic.

❑ GPON uses TDMA for managing upstream access by ONUs, and at any one point in time, TDMA provides unshared
timeslots (upstream bandwidth over time) to each ONU for upstream transmission.

❑ DBA allows upstream timeslots to shrink and grow based on the distribution of upstream traffic loads.

❑ An ONU must have at least one T-CONT, but most have several T-CONTs, each with its own priority or traffic class,
and each corresponds to a particular upstream timeslot on the PON.

❑ Without DBA support on the OLT, upstream bandwidth is statically assigned to T-CONTs, which cannot be shared, and
can be changed only through a management system.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Questions for this session: (Multiple choice with more than one correct answer)

Which of the following statements about the DBA are correct?

1.The adjustment of DBA for the upstream bandwidth is dynamically.


2.DBA can improve upstream bandwidth utilization.
3.The NSR mode does not occupy the OLT resources.
4.DBA has five types.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


What about Security?

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Why Encryption
• The broadcast technology is used in the GPON downstream direction. On the same PON port, data is the
same on the backbone optical fiber and after optical splitting.
• The data received by each ONU is the same. How to ensure that the data intended for one ONU is not
parsed by other ONUs?

• The GPON supports AES128 encryption for downstream broadcast data.


• Advanced encrypt system (AES) is an international encryption algorithm.
• Only the payload in a GEM frame is encrypted.
• The GPON system periodically exchanges and updates the AES key to improve the reliability of
the line data.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


AES Encryption in the GPON system
1 1 User 1
ONU
Decryption

OLT 1 3 2 1 3 1 1 3 2 1 3 1
2 User 2
ONU
Decryption
Encryption

3 3 User 3
ONU
Decryption

• The OLT initiates a key replacement request.


• The ONU responds to the request, generates a new key, and sends the new key to the OLT for three times.
• After receiving the new key, the OLT starts key switching, and notifies the ONU (also three times) of the frame number of
the new key by using related commands.
• The ONU switches the check key in the corresponding data frame.

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Which of the following statements about the Line encryption are
incorrect?
▪ A. The GPON system uses the Advanced Encryption Standard 128
(AES128) algorithm to encrypt the data packets
▪ B. The line encryption algorithms used in GPON systems will increase
overhead
▪ C. The line encryption algorithms will prolong transmission delays.
▪ D. the GPON system aperiodically exchanges and updates the AES keys

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


DBA (Dynamic Bandwidth Assignment)

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬


Thank You

National Telecommunication Institute ‫المعهد القومي لالتصاالت‬

You might also like