0% found this document useful (0 votes)
12 views

01-07 Key GPON Techniques

The document outlines seven key techniques used in GPON (Gigabit Passive Optical Networks), including ranging, burst optical/electrical technology, dynamic bandwidth allocation (DBA), forward error correction (FEC), line encryption, automatic registration, and service flow creation. Each technique addresses specific challenges in GPON systems, such as data transmission conflicts, bandwidth management, error correction, and security. The document provides detailed explanations and principles for implementing these techniques to enhance GPON performance and reliability.

Uploaded by

omid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

01-07 Key GPON Techniques

The document outlines seven key techniques used in GPON (Gigabit Passive Optical Networks), including ranging, burst optical/electrical technology, dynamic bandwidth allocation (DBA), forward error correction (FEC), line encryption, automatic registration, and service flow creation. Each technique addresses specific challenges in GPON systems, such as data transmission conflicts, bandwidth management, error correction, and security. The document provides detailed explanations and principles for implementing these techniques to enhance GPON performance and reliability.

Uploaded by

omid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

GPON

Special Topic 7 Key GPON Techniques

7 Key GPON Techniques

About This Chapter

Key GPON techniques include:


l Ranging
l Burst optical or electrical technology
l DBA
l FEC
l Line encryption

7.1 GPON Ranging


Why Is Ranging Required
The logic reaches from ONUs to an OLT vary. Therefore, the time required for transmitting
optical signals over optical fibers is different and the times when the ONUs receive optical
signals is different. In addition, the round trip delays (RTDs) between an OLT and ONUs also
vary depending on time and environment. Therefore, collisions may occur when ONU sends
data in TDMA mode (in this mode, only one of the ONUs connecting to a PON port sends
data at a moment), as shown in Figure 7-1. The OLT must precisely measure the distances
between itself and each ONU to provide a proper timeslot for converged upstream data from
all ONUs to prevent data conflict. In this way, the OLT controls the time for each ONU to
send data upstream.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 24


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

Figure 7-1 Cell transmission without ranging

Ranging Principles
Ranging process is as follows:
l The OLT starts ranging for an ONU when the ONU registers with the OLT for the first
time and obtains the round trip delay (RTD) of the ONU. Based on the RTD, the OLT
calculates the physical reach of this ONU.
l The OLT specifies a proper equalization delay (EqD) for the ONU based on the physical
reach.
NOTE

The OLT requires a quiet zone during ranging to pause the upstream transmission channel of the ONUs
connected to it. The quiet zone is implemented by emptying BWmap so that no timeslot is allocated for data
transmission.

Ranging Results
RTD and EqD synchronize data frames sent by all ONUs, preventing data conflict on optical
splitters. In this way, all ONUs locate at the same logic reach and they send data at specified
timeslots, thereby preventing upstream cell conflict.

Figure 7-2 Cell transmission with ranging

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 25


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

7.2 GPON Burst Optical/Electrical Technology


TDMA is used in GPON upstream direction. An ONU transmits data only within the
allocated timeslots. In the timeslots that are not allocated to it, the ONU immediately disables
the transmission of its optical transceiver to prevent other ONUs from being affected. The
OLT then receives the upstream data from each ONU in a burst manner based on timeslots.
Therefore, both OLT and ONU optical modules must support burst receive and transmit
function to ensure normal running of the GPON system. Figure 7-3 shows the burst transmit
function supported by ONU optical modules, and Figure 7-4 shows the burst receive function
supported by OLT optical modules.

Figure 7-3 Burst transmit function supported by ONU optical modules

Ranging can be implemented to prevent cells transmitted by different ONUs from conflicting
with each other on the OLT. However, the ranging accuracy is ± 1 bit and the cells transmitted
by different ONUs have a protection time of several bits (not a multiple of 1 bit). If the ONU
optical modules do not support the burst receive and transmit function, the transmitted signals
overlap and distortion occurs.

NOTE

In the GPON system, all data is broadcast downstream to ONUs. The transmission requires OLT optical
modules to transmit optical signals continuously and ONU optical modules to receive optical signals
continuously. Therefore, in GPON downstream direction, the OLT optical modules are not required to
support the burst transmit function, the ONU optical modules are not required to support the burst
receive function.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 26


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

Figure 7-4 Burst receive function supported by OLT optical modules

l The distance from each ONU to the OLT varies and therefore the optical signal
attenuation varies for each ONU. As a result, the power and level of packets received by
an OLT at different timeslots various.
l If the OLT optical modules do not support the burst receive and transmit function, an
error occurs when the optical signals sent by the ONU with a long transmission distance
and large optical attenuation are recovered on the OLT because the optical power level is
less than the threshold (only the signals with the optical power level greater than the
threshold can be recovered). Dynamic threshold adjustment enables the OLT to
dynamically adjust the threshold for optical power levels based on the strengths of
signals received by the OLT. This ensures that all ONU signals can be recovered.

7.3 GPON DBA


In the GPON system, the OLT controls an ONU's upstream data traffic by sending
authorization signals to the ONU. PON requires an effective TDMA mechanism to control the
upstream traffic so that data packets from multiple ONUs do not collide in upstream
transmission. However, the mechanism requires QoS management in an ODN network. The
management cannot be implemented or may cause severe efficiency decrease because ODN is
a passive network.

A mechanism for upstream GPON traffic management has been a primary focus in
standardization of GPON traffic management. To resolve the problem, ITU-T
Recommendation G.984.3 is developed, which defines the DBA protocol for managing
upstream PON traffic.

DBA enables the OLT to monitor congestion on the PON network in real time. Then, the OLT
can dynamically adjust bandwidths based on congestion, bandwidth usages, and
configurations. DBA supports the following functions:
l Improves upstream bandwidth usages on a PON port.
l Supports more users on a PON port.
l Provides higher bandwidths for users, especially the services with significant bandwidth
bursts.

Figure 7-5 shows DBA principles.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 27


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

Figure 7-5 DBA principles

l The embedded DBA module of an OLT continuously collects DBA reports, performs
calculation, and uses the BWMap field in the downstream frame to notify the ONU of
the DBA calculation result.
l According to the BWMap information, the ONUs send data upstream in the timeslots
allocated to them, and occupy the upstream bandwidth. Therefore, each ONU
dynamically adjusts its upstream bandwidth according to its actually transmitted data
traffic, improving upstream bandwidth usage.

Bandwidth can also be allocated in static mode, or fixed mode. In this mode, an OLT
periodically allocates a fixed bandwidth to each ONU based on the ONU's service level
agreement (SLA), bandwidth, and delay indicators.
l In fixed mode, an OLT uses a polling mechanism. The bandwidths allocated to ONUs
may vary but the bandwidth allocated to each ONU is the same in each polling period.
The bandwidth guarantee depends on an ONU's SLA but not on its upstream service
traffic. An ONU is allocated a fixed bandwidth even carrying no upstream services.
l The allocation mode is simple and applies to services, such as TDM, that have a fixed
traffic, but does not apply to IP services that have burst requirements on bandwidth. If
the mode applies to the IP services, the upstream bandwidth usage is low because the
upstream bandwidth cannot be adjusted dynamically based on the upstream service
traffic.

7.4 GPON FEC


In actual applications, the transmission of digital signals introduces bit errors and jitter, which
degrade signal transmission quality.

To resolve the preceding issue, an error correction technology is required. Among the error
correction technologies, the effective ones achieve transmission reliability by reducing
bandwidth usages, which also increases telecom device complexity. The error correction
technologies are used for controlling errors. The codes involved in these technologies are
classified as error detection codes and error correction codes based on usage scenarios.
l Error detection codes, such as parity check codes, are used for detecting error codes.
l Error correction codes, such as BCH codes, Reed-Solomon (RS) codes, and Hamming
codes, are used for automatically correcting errors.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 28


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

The only difference between the error detection codes and error correction codes lies in
performance parameters applied in different usage scenarios. FEC uses error correction codes.

FEC is a data coding technology, which enables the RX end to check error bits in transmission
based on the coding data. FEC is unidirectional, not supporting error information feedback.

Redundant codes are added to signals on the TX end. Then, the RX end checks the signals for
errors based on error-correcting code (ECC) and corrects errors is there is any. Common FEC
codes include Hamming codes, RS codes, and convolutional codes. Figure 7-6 shows FEC
principles.

Figure 7-6 FEC principles

In the GPON FEC algorithm, the most common RS code RS (255,239) is used, where the
code word is 255 bytes long, consisting of 239 data bytes followed by 16 overhead redundant
bytes. RS code RS (255,239) complies with ITU-T Recommendation G.984.3. The FEC
algorithm drops the bit error rate (BER) of 10-3 to 10-12 for GPON lines. However, due to
the overhead caused by multi-frame tail fragments, the bandwidth throughput of the GPON
system with FEC enabled is about 90% of that with FEC disabled.

FEC characteristics are as follows:


l Does not require data retransmission, thereby improving real-time efficiency.
l Enables lines to tolerate louder noises on a basis of a higher bandwidth overhead. (In this
case, users must balance between the transmission quality and the bandwidth usage
based on site requirements.)

Based on the preceding characteristics, FEC applies to:


l The services requiring error detection and correction at the RX end without
retransmission.
l Data transmission if the network is in a poor condition. For example, the transmission
distance from the OLT to an ONT is long or the transmission line is of poor quality,
which results in insufficient optical power budget or high BERs.
l The services requiring no delays (a retransmission prolongs the delay).

FEC status can be configured in GPON systems based on GPON ports in the downstream
direction (by running the port fec command) and based on ONUs in the upstream direction.
To configure the FEC status in the upstream direction based on ONUs, run either of the
following commands:
l In profile mode, run the fec-upstream command.
l In discrete mode, run the ont fec-upstream command.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 29


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

7.5 GPON Line Encryption


In a GPON system, downstream data is broadcast to all ONUs. Then, unauthorized ONUs can
receive the downstream data of authorized ONUs, causing system risks.

Line encryption is used to eliminate these security risks. The GPON system uses the
Advanced Encryption Standard 128 (AES128) algorithm to encrypt the data packets
transmitted in plaintext mode so that the packets are transmitted in ciphertext mode,
improving system security. Enable line encryption if the usage scenarios promote high
security requirements.
l The line encryption algorithms used in GPON systems neither increase overhead nor
decrease bandwidth usages.
l The line encryption algorithms will not prolong transmission delays.

Figure 7-7 shows line encryption process.

Figure 7-7 Line encryption process

Key Exchange and Switchover


1. The OLT initiates a key exchange request to the ONU. The ONU responds to the request
and sends a new key to the OLT.
2. After receiving the new key, the OLT switches the key to the new one and uses the new
key to encrypt data.
3. The OLT sends the frame number that uses the new key to the ONU.
4. The ONU receives the frame number and switches the verification key on data frames.
NOTE

l Due to length limitation on PLOAM messages, the ONU sends the key to the OLT in two pieces and
sends both parts of the key three times for extra redundancy. If the OLT is unsuccessful in receiving either
part of the key all three times it is transmitted, the OLT initiates a key exchange request to the ONU again
until the OLT receives the same key for three times.
l The OLT issues a command three times to the ONU to notify the ONU of using the frame number of the
new key. The ONU switches the verification key on data frames after receiving the command only once.

Configuration Method
l In GPON systems, run either of the following commands to configure line encryption
status based on GEM ports (excluding multicast and broadcast GEM ports).
– In profile mode, run the gem add command.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 30


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

– In discrete mode, run the gemport add command.


l Run either of the following commands to encrypt a GEM port in ONT management and
control channels (OMCCs):
– In profile mode, run the omcc encrypt command.
– In discrete mode, run the ont omcc encrypt command.

7.6 ONT Automatic Registration and Service Flow


Creation

Overview
The OLT supports the pre-configuration of the service flow creation policy on the PON port.
When the ONU that meets conditions goes online, registration and service flow creation are
automatically implemented based on the pre-configured policy. This function simplifies the
configuration process and improves the installation and deployment efficiency.
NOTE
The ONU ID is configured during the pre-configuration of the service flow creation policy. When the
ONU starts to register with the OLT, the ONU ID and vendor identity are verified. Only the ONU
meeting conditions can implement automatic registration.

O&M for these automatically created service flows is the same as that for commonly created
service flows.

NOTE
Automatic registration and service flow creation are supported in the PON profile mode only. They are
not supported in the distributed mode.

Automatic Service Flow Creation


The automatic service flow creation process covers 2 scenarios: no ONU is manually added;
the ONU is manually added.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 31


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

Figure 7-8 Process of automatic service flow creation (no ONU is manually added)

Figure 7-9 Process of automatic service flow creation (the ONU is manually added)

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 32


Copyright © Huawei Technologies Co., Ltd.
GPON
Special Topic 7 Key GPON Techniques

Configuring Automatic Service Flow Creation


1. Configure an automatic ONU addition policy.
Run the ont auto-add-policy command to configure an automatic ONU addition policy.
NOTE

When auto-confirm is set to enable, you do not need to run the ont confirm command on the
GPON port to confirm the ONU. When auto-confirm is set to disable, you need to run the ont
confirm command on the GPON port.
2. Configure the automatic service flow creation policy.
Run the auto-service-port
command to configure the automatic service flow creation policy.
For details about how to configure automatic service flow creation, see "Configuring
Automatic Service Flow Creation (GPON)."

7.7 ONT Automatic Migration and Aging

Automatic Migration
When the ONU automatic migration function is enabled, if a PON port or fiber is faulty, the
ONU connected to this faulty PON port is migrated to another PON port. If the ONU
automatic adding policy is met, the ONU is automatically removed from the original PON
port, and then added to the new PON port. In this process, the OLT does not report the SN
authentication conflict alarm. The ONU connected to the original PON port must meet the
following conditions:
l The ONU is offline.
l The ONU supports OMCI management.
l The ONU is not a member of the type C protection group.
l The ONU supports SN authentication.

NOTE
Automatic migration and aging are supported in the PON profile mode only. They are not supported in
the disperse mode.

Automatic Aging
When an offline ONU is aged and meets automatic adding policy, the OLT automatically
deletes the aged ONU to save resources. The ONU automatic aging period can be configured.
The value range is 1–365. The default value is no-aging, which indicates no aging. For an
aged ONU that meets the automatic adding policy, it will be automatically registered after
being powered on.

Configuring Automatic Migration and Aging


1. Configure ONU automatic migration.
Run the ont auto-migration command to configure ONU automatic migration.
2. Configure ONU automatic aging.
Run the ont auto-aging command to configure ONU automatic aging.

Issue 02 (2018-06-15) Huawei Proprietary and Confidential 33


Copyright © Huawei Technologies Co., Ltd.

You might also like