Address
Floor 3, Building B, Honghua Science And Technology Innovation Park,
Longhua District, Shenzhen
Work Hours
Monday to Friday: 9AM - 9PM
Weekend: 10AM - 6PM
Address
Floor 3, Building B, Honghua Science And Technology Innovation Park,
Longhua District, Shenzhen
Work Hours
Monday to Friday: 9AM - 9PM
Weekend: 10AM - 6PM
Let’s explore the key technologies of GPON.
The key technologies of GPON include Ranging, Upstream dynamic bandwidth allocation, and Downstream AES encryption.
Why do we need to measure the distance?
The distances between ONUS and OLTS are different. The transmission time of optical signals on the optical fiber is different, and the time when the optical signal arrives at each ONU is also different.
The OLT allocates different timeslots to each ONU to transmit upstream data. How to ensure that each ONU can accurately locate timeslots?
How to avoid conflicts between upstream data from multiple ONUs and implement frame synchronization?
The ranging process is as follows:
The OLT obtains the round trip delay (RTD) of the ONU through the ranging process and calculates the physical distance of each ONU.
Then, the OLT specifies a proper equalization delay (EqD)
In the ranging process, a window needs to be opened, that is, a quiet zone to suspend the upstream transmission channels of other ONUS. The OLT opens the window by setting BWmap to null without authorizing any timeslot.
Through the RTD and the EqD, the data frames sent by the ONUs are synchronized, so as to ensure that no conflict occurs on the optical splitter when the ONUs send data.
All ONUs are at the same logical distance and send data in the corresponding timeslots.
Why is DBA Required?
What is DBA?
Why DBA is required?
SR-DBA: status report-DBA
SR-DBA Implementation
The DBA module of the OLT continuously collects DBA report information, performs calculations, and sends the calculation result to each ONU in the form of a BW Map.
Each ONU sends upstream burst data in their respective timeslots according to the BW Map information to occupy the upstream bandwidth.
The GPON system uses the SBA+DBA mode to achieve effective bandwidth utilization.
There are three mechanisms for the GPON to report DBA status:
The implementation mechanism of the DBA function consists of the following parts:
Transmission containers (T-CONTS): Dynamically receives the authorization from the OLT, manages the upstream bandwidth allocation at the transmission convergence layer of the PON system.
Bandwidth type:
FB, AB, NAB, and BE
T-CONT type:
According to service priorities, the System sets the SLA for each ONU and limits the bandwidth of the services.
The maximum and minimum bandwidths limit the bandwidth of each ONU at extreme conditions to ensure that the bandwidth varies according to the service priorities. Generally, the voice service has the highest priority, followed by video and data services.
The OLT allocates the bandwidth according to the service, SLA, and actual ONU conditions. The higher the priority is, the higher the bandwidth is.
T-CONTs are classified into five types. During upstream service scheduling, different types of T-CONTs are selected based on service types. Each T-CONT bandwidth type has specific QoS features, which are mainly reflected in the bandwidth guarantee. The QoS features are classified into fixed bandwidth, assured bandwidth, assured/maximum bandwidth, maximum bandwidth, and hybrid mode (corresponding to Type 1 to Type 5 of five T-CONT types).
Why Encryption ls Required?
The broadcast technology is used in the GPON downstream direction. On the same PON port, data is the same on the backbone optical fiber and after optical splitting. The data received by each ONU is the same. How to ensure that the data intended for one ONU is not parsed by other ONUs?
GPON supports AES128 encryption for downstream broadcast data
Advanced Encryption System (AES) is an international encryption algorithm.
Only the payload in a GEM frame is encrypted.
The GPON system periodically exchanges and updates the AES key to improve the reliability of the line data.
AES encryption in the GPON system
The OLT initiates a key replacement request. The ONU responds to the request, generates a new key, and sends the new key to the OLT three times.
After receiving the new key, the OLT starts key Switching and notifies the ONU (also three times) of the frame number of the new key by using related commands. The ONU switches the check key in the corresponding data frame.