FTTx from Rostelecom: technology features. Development and security of a broadband access network using FTTB technology in a residential area of ​​the city of Izhevsk Technology of active optical networks fttb

In our reviews, we have already managed to consider dozens and hundreds of tariffs for Internet access. We covered almost all Russian regions and large cities. We talked about access technologies, but did not cover this topic 100%. In this review, we correct the situation by talking about FTTx. Rostelecom's FTTx technology is a high-speed Internet connection via optical fiber. Let's see how it works and what opportunities it promises to subscribers.

For a long time Rostelecom promoted ADSL technology. After a slow Dial-Up with a busy voice line, ADSL was a breath of fresh air. The technology allowed and still allows you to get speeds up to 24 Mbps. But this is only for downloads - the return from ADSL is weak and does not exceed 0.3 Mbps. Although when using some standards, indicators up to 3.5 Mbps are achieved. In practice, this is almost invisible.

ADSL requires the simplest telephone line with a resistance of no more than 900 ohms. That is, the length of the conductors plays a decisive role. The line must be good, with a resistance between the cores of at least 100 MΩ. There are also requirements for the capacity of the entire telephone loop. Such ideal lines exist, but they are few. Therefore, the maximum speed will be only for those who live in the immediate vicinity of the telephone exchange. A distance of 5-6 km for a telephone line with ADSL is considered the limit, the access speed drops to 2-3 Mbps.

What has changed with the advent of optics

FTTB technology and FTTx technology are almost the same thing. The Latin letter B stands for Building (building). Full decoding of the abbreviation FTTB - Fiber-To-The-Building. That is, an optical cable to the building. In the case of FTTx, it is an optical cable to point X. Where X can be a building, an entrance, a local communication center.

Optical cable is an ideal means of communication. Losses in it are minimal, the speed is up to several Gbit / s. Today, there are technologies that allow fiber optics to be installed in every home. But the result is a high connection cost. The situation was corrected by technology from Rostelecom GPON - passive optics in each apartment. It is capable of providing speeds up to 1 Gbps for each subscriber.

Let's get back to Rostelecom FTTB (aka FTTx). The scheme for building a network in this case is as follows:

  • A high-speed optical cable reaches the house communication center installed in the basement or in the attic (upper floor).
  • A twisted pair cable is being laid along the entrance - it is possible to bring it into each apartment.
  • The twisted pair is connected directly to the subscriber equipment - this is a computer or a router.

If the ports on the home communication node are gigabit, each subscriber will be able to receive speeds up to 1 Gbps. In practice, the numbers are many times less, Rostelecom's tariffs do not give more than 200-250 Mbps. The final values ​​depend on the connection region.

There is information that for some subscribers Rostelecom can offer individual tariffs with speeds up to 1 Gb / s - this point needs to be clarified at the offices.

In fact, the same 100 Mbps on FTTx is enough for the eyes. Movies are downloaded in 15-20 minutes - during this time you can warm up tea or order pizza. Smaller files are downloaded in seconds. The technology does not require any modem. Rostelecom specialists will connect the cable to the network card of your PC, and you're done - you have broadband Internet at home. If the Internet is needed on several devices, use a router (router).

Setting up the connection

Setting up a Rostelecom FTTx router consists in creating a PPPoE connection. The subscriber is issued a card with a login and password - these data will be required for authorization. Next, go to the router settings, create a PPPoE connection, give it an arbitrary name, enter a username and password. We reboot the router, watch the Internet indicator - it should light up and blink. Now we connect home devices to the router and enjoy network access.

FTTx technology involves connecting to the home data network (CGL) via twisted pair. This is such a copper cable for eight cores. You can run it behind skirting boards or under the ceiling. We recommend that you immediately purchase at least the simplest router. Suitable model is TP-LINK TL-WR840N. Its cost is from 900 rubles. The device connects to the SPD of Rostelecom via FTTx and organizes a wireless access point within a radius of 10-15 meters - just within the apartment for 2-3 rooms.

In the private sector, Rostelecom's optics can go directly into the house, without any house communication centers. It's not called FTTx, it's called FTTB. The speeds are about the same. Instead of a communication node, a media converter is installed, and a router is connected to it.

A modern office is unthinkable without a computer. The number of home users is also steadily increasing. All this leads to a serious increase in demand for data transmission services: Internet access, dedicated channels, virtual networks, etc. The most promising Internet technology, one might say, the technology of tomorrow, is fiber-optic networks, the contours of which are already emerging today. We are talking about FTTx technology, the development of which is already on the agenda, which is a common name for two types of access - Fiber To The Home (FTTH - fiber-optic cable to the house) and Fiber To The Building (FTTB) (fiber-optic cable to the building; refers to an apartment building or office).

FTTx technology family

The FTTx family today includes several different subspecies:

FTTN(Fiber to the Node) - optics to a network node (usually a city or district station or communication center);
FTTC(Fiber to the Curb) - optical fiber to a microdistrict, quarter or group of houses (this type of access technology is used for the construction of communication substations - the so-called extensions);
FTTB(Fiber to the Building) - fiber to the building (since the mid-2000s, this technology has been used to connect all multi-storey and apartment buildings);
FTTH(Fiber to the Home) - fiber to the home (the most recent and progressive of architectures, which is just gaining momentum. The fiber is brought directly to an apartment or a private house).
In simple words, these subspecies differ in essence in how close the provider's optical fiber approaches the user of the communication channel.

The most popular technology is FTTB

Modern technology of Internet access - FTTB- stands for "Fiber to the Building", that is, translated into Russian: "optical cable to the house, building." The concept of FTTB describes a general approach to organizing a cable infrastructure on an access network. According to it, an optical cable runs from the central node of the telecom operator to a certain object (usually an apartment building or office building). It is included in a multiport switch. Well, then there is already a wiring to the subscriber using a conventional copper twisted pair. At the time of writing, FTTB access technology is many times faster and more reliable than modern technologies and broadband access, including 3G/4G/LTE. it is also impossible not to mention the possibility of upgrading the built network to support access speeds up to 1Gb / s and 10 GB / s by replacing switches and end equipment. At the same time, as a rule, there is no need to change the built optical infrastructure and the house distribution network. Thanks to the development of FTTB technology, it became possible to significantly expand the range of services provided to the subscriber, including:

Internet access (speed up to 100 Mbps);
- IPTV (viewing at least 100 MPEG2, MPEG4), HD, VoD channels);
- VoIP (for some users)

FTTB assumes both a ring distribution model of switches and a star model, where switches are connected by beams to aggregators, which allows you to build a high-performance network that is also scalable, flexible, secure and cost-effective.

What does FTTx technology give subscribers?

Reliable and high-quality communication.
The operation of a channel organized using FTTx access technology is not affected by weather conditions, third-party EM interference, there are no breaks and the speed does not drop. If there is no damage on the cable, then at the end you will always get exactly the speed that is stated in the tariff.
High speed Internet access. Using the features of the FTTx access technology allows ordinary subscribers to use speeds up to 100 Mbps, and in some cases up to 1 Gbps, and also makes it possible to significantly increase the amount of transmitted information. The connection speed in this case is limited only tariff plan and the speed of the local network inside the premises or building.
symmetrical channel. If you have ever used ADSL access, you know that the speed of the outgoing channel is much lower than the speed of the incoming one. Sometimes this can be a very critical moment, especially when file-sharing networks work when transferring large files. A symmetrical FTTx link assumes the same high speed for outgoing and incoming channels. This feature allows ordinary users to host game and web servers at home.

Connection of several communication services at once via one cable. This is the so-called "Tripple Play", that is, if you wish, you can connect 3 services to one line at once: Internet, telephony and interactive digital television. At the same time, however, the connection of a special access device - a router - is considered a prerequisite. The router must support VLAN port separation technology (Example: Zyxel Keenetic, D-link DIR-300, Sagemcom 2804, 3804).

What is the advantage of FTTx technology over xDSL technology

An optical cable compares favorably in that it allows you to connect Internet, telephone and cable TV with just one cable at once: the bandwidth of an optical cable can easily cope with such a load.

In Russia, there is a growing interest in the deployment of access networks with the possibility of providing a subscriber with a broadband communication channel. The reason for this interest is the rapid increase in bandwidth requirements for communication networks, driven by the emergence of new broadband services. These services include business services (video conferencing, remote learning, telemedicine) and entertainment services (video on demand, digital broadcasting, HDTV, on-line games, etc.). The technologies currently in use cannot provide a cost-effective solution to meet growing demands, so not quite familiar technologies are being used.

One of them is FTTx (Fiber To The ... - “fiber to ...”) - a technology for organizing access networks with bringing optical fiber to a certain point. Despite the fact that FTTx is not a new technology, however, it is becoming widespread right now.

There are several options for implementing FTTx, of which we can distinguish:

FTTH - Fiber To The Home (bringing fiber to the apartment);

FTTB - Fiber To The Building (bringing fiber to the building).

In this course project, we will implement the presented methods.

Selection and justification of broadband access technology

The term "broadband" is used to refer to a permanent and high-speed Internet connection. However, broadband access is not only a high speed of information exchange, but also a special way to use the worldwide network. A broadband user has the ability to receive or send a large amount of any information at any second, which may include color images, audio and video clips, animation, television content and much more. Broadband access provides the user with the most advanced services, regardless of the point of connection. The owner of broadband access has more opportunities to use multimedia services and to provide information to his business. These are file exchange, video conferencing, games; security systems services; telephone and banking services, etc. All this has become available thanks to modern broadband access networks (BBA).

Broadband access also contributes to the emergence of new areas of human activity and enriches existing ones. It stimulates economic growth and opens up new opportunities for investment and employment.

FTTX construction methods

FTTx technology (eng. Fiber to the x - optical fiber to point X), whose name comes from the capital letters of the English expression Fiber-to-the-build / home, which means "optics to every home." This term is used for any computer network in which a fiber optic cable reaches a specific location (point X) from a communication node. The wide bandwidth of FTTx systems opens up new possibilities for providing subscribers with more new services.

FTTB technology (eng. Fiber to the Building - fiber to the building) - today the most demanded construction technology in Russia broadband networks. The widespread use of FTTB was facilitated by the decline in prices for optical cable (OC), the emergence of cheap optical receivers, transmitters and optical amplifiers (OA). The use of optics in FTTB allows the use of fast Metro Ethernet technology for data transmission, eliminates the need to ground the carrier cable, eliminates equipment failure from static electricity, and facilitates coordination of the deployed network in supervisory authorities. The topology of the network built using FTTB technology is shown in the figure below.

The topology of this network largely repeats the hybrid fiber-coaxial network and also consists of a data transmission node, a backbone fiber-optic communication line (FOCL) and a distribution network. The difference between FTTB is only in the replacement of the GVKS optical nodes with “second level nodes” (amplifying points) and the distribution network cable from coaxial cable to optical. The headend and home distribution network do not need to be upgraded, and the backbone may only need to increase the number of optical fibers. Based on the foregoing, in FTTB networks, the number of fiber optics being laid and the number of installed optical receivers is increasing.

The FTTB network built using this technology consists of two overlay networks: one for analog cable television services, the other for data transmission services. It combines their use of different fibers in the same OCs in sections of the backbone and in distribution networks of second-level nodes. Otherwise, unlike DOCSIS, when using FTTB, all equipment is strictly specialized: either TV transmission or data transmission, and if one equipment fails, the other service does not suffer.

When using the FTTB option, the optical fiber is brought into the house, usually in the basement or attic (which is more cost-effective) and connected to the ONU (Optical Network Unit). On the side of the telecom operator, an optical line terminal OLT (Optical Line Terminal) is installed. The OLT is the primary device and determines the traffic exchange parameters (for example, signal reception/transmission time intervals) with the ONU (or ONT, in the case of FTTH) subscriber devices.

Further distribution of the network around the house takes place over a twisted pair cable.

This approach is advisable to apply in the case of network deployment in multi-apartment buildings and business centers of the middle class. Russian telecom operators are deploying FTTB networks so far only in large cities, but in the future, the use of this technology is everywhere. In FTTB, there is no need to run expensive optical cable with a large number of fibers, as with FTTH.

FTTH - (eng. Fiber to the Home - optical fiber to the apartment). Considering that Russian subscribers live mainly in apartment buildings, FTTH means, unlike FTTB, bringing optical fiber to the subscriber's apartment.

There are two types of FTTH networks: based on Ethernet and based on PON.

Ethernet based architectures

The need for rapid time-to-market and cost savings for subscribers has led to the emergence of a network architecture based on Ethernet switching. Ethernet data transmission and Ethernet switching became profitable in the enterprise networking market and led to lower prices, finished products and faster

development of new products. At the heart of the first European projects of Ethernet FTTH networks

lay an architecture in which switches located on the basement floors of apartment buildings were combined into a ring using Gigabit Ethernet technology. This structure provided excellent resistance to various types of cable damage and was very cost-effective, but its disadvantages included the division of the bandwidth within each access ring (1 Gb / s), which in the long term gave a relatively small throughput, and also caused difficulties in scaling the architecture.

Then the Ethernet star architecture became widespread. This architecture requires dedicated fiber optic links (usually single-mode, single-fiber 100BX or 1000BX Ethernet data links) from each endpoint to a point of presence (POP) where they are connected to the switch. The terminals can be located in individual residential buildings, apartments or apartment buildings, in the basement of which there are switches that bring lines to all apartments using appropriate transmission technology.

Ethernet FTTH architecture with star topology:

PON based architectures

When using a PON-based architecture for FTTH deployment, the fiber optic line is distributed to subscribers using passive optical splitters with a splitting ratio of up to 1:64 or even 1:128. The PON-based FTTH architecture typically supports the Ethernet protocol. In some cases, an additional downstream wavelength is used to provide traditional analog and digital TV services to users without the need for IP-enabled set-top boxes.

The figure below shows a typical PON using various optical network termination (ONT) or optical network unit (ONU) devices. ONTs are intended to be used by an individual end user. ONUs are typically located in basements or basements and are shared by a group of users. Voice services, as well as data and video services are brought from the ONU or ONT to the subscriber via cables laid at the subscriber's premises.

Passive optical network (PON) architecture:

Currently, there are three different PON network standards, which are listed in the table. Bandwidth parameters indicate the combined data rate in the downstream and upstream. This data rate is divided between 16, 32, 64 or 128 subscribers, depending on the deployment plan.

Table Varieties of PON


The BPON architecture is a legacy technology that is currently still in use by some service providers in the US, but is rapidly being superseded by other architectures. While EPON was designed to reduce cost by using Gigabit Ethernet technology, the GPON architecture was designed to provide higher downstream data rates, lower overhead, and enable ATM and TDM traffic. Despite the added support for older protocols, this feature is still rarely used in practice. Instead, the GPON architecture is used as the Ethernet transport platform.

Communication organization scheme for FTTX technology

The general plan for the construction of FOCL of the course project

FTTB Technology Organization Scheme

FTTH technology organization chart

What is FTTB?

FTTB (Fiber-To-The-Building) is translated from English as "optics to the building" and means the use of optical cable instead of copper wires. Copper wires are used to operate the telephone and the Internet using ADSL technology, but they do not allow the use of high-speed Internet, and in addition, they have low noise immunity - at a great distance from the PBX, your Internet speed can be quite low.

An optical cable compares favorably in that it allows you to connect Internet, telephone and cable TV with just one cable at once: the bandwidth of an optical cable can easily cope with such a load.

What does FTTB technology give subscribers?

– Reliable communication. If earlier, when working on the Internet, there were regular breaks or a drop in speed, and the technical service could not help you in any way, referring to the lack of technical capability, then in the case of connecting the Internet from OJSC Rostelecom using FTTB technology, there can be no such problems in principle. If the cable is not damaged, then the Internet will always work at the speed declared in your tariff.

– High speed Internet. FTTB technology allows you to significantly increase the amount of transmitted information.

– The speed of connection to the Internet of OJSC Rostelecom using FTTB technology is limited only by your tariff plan and the speed of the local network inside the building, which is up to 100 Mb per second, which should be enough even for the most demanding users. In addition, FTTB technology gives subscribers another advantage - it is a symmetrical channel. When using ADSL, the speed of the outgoing channel (through which information is sent from the subscriber) is much lower than the speed of the incoming channel, which can be critical for those users who constantly exchange files or upload videos to the Internet. A symmetrical FTTB link assumes the same high speed for the outgoing and incoming channels. In addition, the synchronous line allows you to host game and web servers right at home, without having to pay hosting companies to host information on the server.

– No need to buy and configure a modem. When connecting the Internet from OJSC Rostelecom using FTTB technology, the company's specialists will run a cable to your apartment directly to your computer; to work on the Internet, you just need to plug it into the network port of your computer. Buying and configuring additional equipment such as a modem is not required unless you intend to set up a LAN at home or WiFi network, or connect additional services (IPTV).

FTTB has only one drawback - so far, unfortunately, not every home has such an opportunity. In addition, as a rule, private households and low-rise buildings are not connected to the Internet using FTTB technology. But there is good news: OJSC Rostelecom in the near future promises to introduce new technology providing digital services - GPON (Gigabit-capable Passive Optical Networks), with which you can connect to the Internet in any area of ​​the city, regardless of the type and number of floors of your house.

How to connect?

After the provider brings an Ethrrnet line to your apartment and issues a login and password for a PPPoE connection, you can safely start working on the network, for this you need to connect this cable to the LAN connector of your computer and create it using your operating system. After starting the connection, the login and password are checked, everything is correct, the system will inform you about the connection to the Internet.

If you intend to distribute the Internet to several devices (Laptop, smartphone, Smart TV, etc.), you will need an Ethernet router, which you can purchase from a provider or in a store.
Important! Please note that not all routers can support all provider services such as IPTV, VOIP, etc. Therefore, when purchasing a router, it is still better to consult with the provider.

State educational institution

higher professional education

Volga State University of Telecommunications and Informatics

Department of "Communication lines and measurements in communication technology"

Course work

discipline "Design and construction of FOCL"

TECHNOLOGY DESIGNFTTB/ FTTH

Performed by students FO-91

Inkin I.I.

Sedyshov V.

Sorokin S.

Knyazev I.

Head Andreev R.V.

Samara 2012

1. Organization of an optical access network

1.1 Statement of the problem

In Russia, there is a growing interest in the deployment of access networks with the possibility of providing a subscriber with a broadband communication channel. The reason for this interest is the rapid increase in bandwidth requirements for communication networks, driven by the emergence of new broadband services. These services include business services (video conferencing, remote learning, telemedicine) and entertainment services (video on demand, digital broadcasting, HDTV, on-line games, etc.). The technologies currently in use cannot provide a cost-effective solution to meet growing demands, so not quite familiar technologies are being used.

One of them is FTTx (Fiber To The ... - “fiber to ...”) - a technology for organizing access networks with bringing optical fiber to a certain point. Despite the fact that FTTx is not a new technology, however, it is becoming widespread right now.

There are several options for implementing FTTx, of which we can distinguish: - Fiber To The Home (bringing the fiber to the apartment); - Fiber To The Building (bringing the fiber to the building).

In this course project, we will implement the presented methods.

1.2 Choice and justification of broadband access technology

The term "broadband" is used to refer to a permanent and high-speed Internet connection. However, broadband access is not only a high speed of information exchange, but also a special way to use the worldwide network. A broadband user has the ability to receive or send a large amount of any information at any second, which may include color images, audio and video clips, animation, television content and much more. Broadband access provides the user with the most advanced services, regardless of the point of connection. The owner of broadband access has more opportunities to use multimedia services and to provide information to his business. These are file exchange, video conferencing, games; security systems services; telephone and banking services, etc. All this has become available thanks to modern broadband access networks (BBA).

Broadband access also contributes to the emergence of new areas of human activity and enriches existing ones. It stimulates economic growth and opens up new opportunities for investment and employment.

1.3 FTTX construction methods

FTX

FTTx technology (eng. Fiber to the x - optical fiber to point X), the name of which comes from the capital letters of the English expression Fiber-to-the-build / home, which means "optics to every home." This term is used for any computer network in which a fiber optic cable reaches a specific location (point X) from a communication node. The wide bandwidth of FTTx systems opens up new possibilities for providing subscribers with more new services.

FTTB

FTTB technology (Eng. Fiber to the Building - fiber to the building) is by far the most demanded technology in Russia for the construction of broadband networks. The widespread use of FTTB was facilitated by the decline in prices for optical cable (OC), the emergence of cheap optical receivers, transmitters and optical amplifiers (OA). The use of optics in FTTB allows the use of fast Metro Ethernet technology for data transmission, eliminates the need to ground the carrier cable, eliminates equipment failure from static electricity, and facilitates coordination of the deployed network in supervisory authorities. The topology of the network built using FTTB technology is shown in the figure below.

The topology of this network largely repeats the hybrid fiber-coaxial network and also consists of a data transmission node, a backbone fiber-optic communication line (FOCL) and a distribution network. The difference between FTTB is only in the replacement of the GVKS optical nodes with “second level nodes” (amplifying points) and the distribution network cable from coaxial cable to optical. The headend and home distribution network do not need to be upgraded, and the backbone may only need to increase the number of optical fibers. Based on the foregoing, in FTTB networks, the number of fiber optics being laid and the number of installed optical receivers is increasing.

The FTTB network built using this technology consists of two overlay networks: one for analog cable television services, the other for data transmission services. It combines their use of different fibers in the same OCs in sections of the backbone and in distribution networks of second-level nodes. Otherwise, unlike DOCSIS, when using FTTB, all equipment is strictly specialized: either TV transmission or data transmission, and if one equipment fails, the other service does not suffer.

When using the FTTB option, the optical fiber is brought into the house, usually in the basement or attic (which is more cost-effective) and connected to the ONU (Optical Network Unit). On the side of the telecom operator, an optical line terminal OLT (Optical Line Terminal) is installed. The OLT is the primary device and determines the traffic exchange parameters (for example, signal reception/transmission time intervals) with the ONU (or ONT, in the case of FTTH) subscriber devices.

Further distribution of the network around the house takes place over a twisted pair cable.

This approach is advisable to apply in the case of network deployment in multi-apartment buildings and business centers of the middle class. Russian telecom operators are deploying FTTB networks so far only in large cities, but in the future, the use of this technology is everywhere. In FTTB, there is no need to run expensive optical cable with a large number of fibers, as with FTTH.

FTTH

FTTH - (eng. Fiber to the Home - optical fiber to the apartment). Considering that Russian subscribers live mainly in apartment buildings, FTTH means, unlike FTTB, bringing optical fiber to the subscriber's apartment.


There are two types of FTTH networks: based on Ethernet and based on PON.

Ethernet based architectures

The need for rapid time-to-market and cost savings for subscribers has led to the emergence of a network architecture based on Ethernet switching. Ethernet data transmission and Ethernet switching became profitable in the enterprise networking market and led to lower prices, finished products and faster

development of new products. At the heart of the first European projects of Ethernet FTTH networks

lay an architecture in which switches located on the basement floors of apartment buildings were combined into a ring using Gigabit Ethernet technology. This structure provided excellent resistance to various types of cable damage and was very cost-effective, but its disadvantages included the separation of the bandwidth within each access ring (1 Gb / s), which gave in the long term a relatively small bandwidth, and also caused scaling difficulties. architecture.

Then the Ethernet star architecture became widespread. This architecture requires dedicated fiber optic links (usually single-mode, single-fiber 100BX or 1000BX Ethernet data links) from each endpoint to a point of presence (POP) where they are connected to the switch. The terminals can be located in individual residential buildings, apartments or apartment buildings, in the basement of which there are switches that bring lines to all apartments using appropriate transmission technology.

Ethernet FTTH architecture with star topology:


PON based architectures

When using a PON-based architecture for FTTH deployment, the fiber optic line is distributed to subscribers using passive optical splitters with a splitting ratio of up to 1:64 or even 1:128. The PON-based FTTH architecture typically supports the Ethernet protocol. In some cases, an additional downstream wavelength is used to provide traditional analog and digital TV services to users without the need for IP-enabled set-top boxes.

The figure below shows a typical PON using various optical network termination (ONT) or optical network unit (ONU) devices. ONTs are intended to be used by an individual end user. ONUs are typically located in basements or basements and are shared by a group of users. Voice services, as well as data and video services are brought from the ONU or ONT to the subscriber via cables laid at the subscriber's premises.

Passive optical network (PON) architecture:


Currently, there are three different PON network standards, which are listed in the table. Bandwidth parameters indicate the combined data rate in the downstream and upstream. This data rate is divided between 16, 32, 64 or 128 subscribers, depending on the deployment plan.

Table Varieties of PON

The BPON architecture is a legacy technology that is currently still in use by some service providers in the US, but is rapidly being superseded by other architectures. While EPON was designed to reduce cost by using Gigabit Ethernet technology, the GPON architecture was designed to provide higher downstream data rates, lower overhead, and enable ATM and TDM traffic. Despite the added support for older protocols, this feature is still rarely used in practice. Instead, the GPON architecture is used as the Ethernet transport platform.

1.4 Communication scheme for FTTX technology

The general plan for the construction of FOCL of the course project

FTTB Technology Organization Scheme

FTTH technology organization chart

2. Selection and justification of the type of optical fiber and the design of the optical cable

2.1 Selecting the type of optical fiber

The implementation of FTTB technology will require the following type of optical fiber and G.652 twisted pair - single-mode stepped fiber with unshifted dispersion is a fundamental component of an optical telecommunications system and is classified by the G.652 standard. The most common type of fiber optimized for signal transmission at a wavelength of 1310 nm. The upper limit of the L-band wavelength is 1625 nm. Macrobending requirements - mandrel radius 30 mm.

Parameters of RH rec. G.652

Characteristic

Wavelength, nm

Mode spot diameter, µm

Shell diameter, µm

Protective coating diameter, µm

0.6 maximum

0.6 maximum

0.6 maximum

0.6 maximum

Shell flattening

1.0% maximum

1.0% maximum

1.0% maximum

1.0% maximum

1260 Maximum

1260 maximum

1260 maximum

1260 maximum

Macrobending loss, dB

0.1 maximum at 1550 nm

0.1 maximum at 1550 nm

0.1 maximum at 1550 nm

0.1 maximum at 1550 nm

Test voltage, GPa

0.69 minimum

0.69 minimum

0.69 minimum

0.69 minimum

Zero dispersion wavelength, nm

from 1300 to 1324

from 1300 to 1324

from 1300 to 1324

from 1300 to 1324

Chromatic dispersion coefficient, ps/nm*km, max, in the wavelength range: 1285-1330 1525-1575

Variance sign



PMD coefficient, ps/√km


According to the parameters indicated in this table, an optical fiber of the G.652.A type is suitable for us.

CAT6a twisted pair is a communication cable consisting of one or more pairs of insulated conductors twisted together (with a small number of turns per unit length), covered with a plastic sheath. The twisting of insulated conductors is carried out to increase the connection of the conductors of one pair (electromagnetic interference equally affects both wires of the pair) and the subsequent reduction of electromagnetic interference from external sources, as well as mutual interference during the transmission of differential signals.

To reduce the coupling of individual cable pairs (periodic convergence of conductors of different pairs), in UTP cables of category 5 and above, the wires of the pair are twisted with different pitches. Twisted pair is one of the components of modern structured cabling systems<#"599313.files/image009.gif">

Rice. "Twisted Pair CAT6a"

optical technology twisted pair

To implement FTTH technology, optical fibers of the G.652.A and G.657..657 types will be required - a single-mode optical fiber characterized by a low level of bending loss, designed primarily for FTTH networks of multi-apartment buildings, and their advantages are especially obvious in a limited space. You can work with G.657 standard fiber almost like with a copper cable.

Parameters of RH rec. G.657

Characteristic

Wavelength, nm

Mode spot diameter, µm

Shell diameter, µm

Core eccentricity, µm

Shell ellipticity

Cable cutoff wavelength, nm

Macrobending loss, dB: radius, mm number of turns max. at 1550 nm max. at 1625 nm

Test voltage, GPa

Chromatic dispersion coefficient, ps/nm*km, 1285-1330 nm 1525-1575 nm

Attenuation coefficient, dB/km; at wavelength, nm



PMD coefficient, ps/km

2.2 Choice of optical cable design

To implement our project, we need the following types of optical cables:

OKLSt

Application: optical communication cables are intended for laying in cable ducts, special pipes, collectors, tunnels, on bridges and overpasses, as well as in light soils and in places infested with rodents.

Use of optical fibers in accordance with Recommendations G.651, G.652, G.655

Use of dry water-blocking materials (“dry” core design).

· Manufacture of the shell from materials that do not spread combustion, halogen-free, with low smoke emission (grade OKLSt-N).

· Manufacture of a cable with an inner aluminum-polyethylene sheath for increased moisture resistance (AlPe).

Design description:

OKLST type cables (with one PE sheath up to 192 OV) for laying in cable ducts

2. Central power element (CSE), a dielectric fiberglass rod (or a steel cable in a PE sheath), around which optical modules are twisted.

Cordels (if necessary) - solid PE rods for structural stability.

Armor in the form of corrugated steel tape with a water-blocking tape underneath.

The outer sheath is made of low or high density PE composition.

Advantages:

Compact design

The minimum weight

excellent mechanical properties;

resistance to rodents;

Long service life

· use of materials of the best foreign and domestic manufacturers;

minimum coefficient of friction.

OKLZht

Application: designed for hanging on the poles of urban power facilities; suspensions on the supports of the contact network of the railway, overhead communication lines; air laying along the supports of the city energy facilities; laying on trays and overpasses.

· Use of optical fibers in accordance with Recommendations G.651, G.652, G.655;

· The use of a hydrophobic compound to fill the voids of the twist along the entire length;

· Manufacture of the outer shell from non-flammable materials;

The use of ripping cords;

· Manufacture of a cable with two PE sheaths;

· Manufacture of cables with up to 192 fibers;

· Calculation of the design and parameters of the cable according to the requirements of a particular project, depending on the values ​​of the lengths of spans, sags and operating conditions;

Design description:

Cables type OKLZh-(T) (from 2 to 144 OV) for aerial laying (classic design, in accordance with TT FSK)

1. Optical fibers are freely laid in polymer tubes (optical modules) filled with thixotropic gel along the entire length.

2. Central strength element (CSE) in the form of a fiberglass rod, around which optical modules (modules and cordels) are twisted.

Cordel - solid PE rods - for structural stability.

Belt insulation in the form of lavsan tape, superimposed over the twist.

Hydrophobic gel that fills the voids of the twist along the entire length.

The inner shell is made of low or high density PE composition.

Strength elements in the form of a layer of aramid threads.

The outer shell is made of high density PE composition.

Advantages:

minimum weight and diameter;

high mechanical properties;

· optimum rigidity and low coefficient of friction of the shell (for blowing into special pipes);

· low temperature of a laying;

Large operating temperature range

selection of the optimal design for specific operating conditions;

Ease of laying and installation;

Long service life.

2.3 Selection and justification of cross equipment

Structural diagram of the FTTB aggregation node

Optical cross KRS-48

Description

The KPC-48 model belongs to a series of standard 2U form factor rack-mount switchgear and provides switching of up to 48 FC, ST, SC, MT-RJ, E-2000 optical ports and up to 72 LC ports.

Optical adapters are mounted on 4 interchangeable brackets, which are attached to the front panel of the case using two latches.

Patch cord organizer

Description

They are designed to allow cables coming from inside the cabinet, such as from the back of patch panels, to be routed to the front of network equipment. Compact, only 1U high, the organizer has a special opening in the center, protected by brushes that do not allow dust and other contaminants to enter the cabinet. Two holders are used for cable management. The holders are slit in the front, which makes it easy to install and remove cables.

Pigtail SM

Description

Mounting optical cord (pigtail) SM is used for terminating the main optical cable when wiring in distribution cross equipment.

It is a piece of fiber optic cable terminated on one side. Pigtails are used for quick termination of fiber optic cables in telecommunication networks by attaching the pigtail to the cable using welding or mechanical connectors. In fact, a pigtail is an optical cord (patch cord) without a second connector, so the requirements for pigtails are similar to those for patch cords. Accordingly, much attention is paid to the quality of the pigtail, to direct and reverse losses, the asymmetry of the position of the fiber in the connector ferrule, and mechanical strength.

Pigtails are used in the installation of passive distribution devices, such as optical distribution boxes.

Optical sockets

Description

Optical sockets - designed to connect optical cords with FC/PC connectors. Provides high-quality alignment of connectors thanks to a high-precision centralizer, and the latches provided by the design provide a secure fit. The optical pass-through adapter is protected from dirt and dust by plastic plugs.

Patchcord SM FC-LC duplex

Description

A patch cord is an optical cable that ends on both sides with connectors of various types. It is used to connect optical telecommunications equipment to an optical distribution box.

Typology of patch cords:

According to the type of cable used in the production, patch cords are divided into: single-mode "SM" (singl-mode) or multi-mode "MM" (multi-mode).

According to the type of cable used in the production, patch cords are divided into: duplex "DPX" (duplex) or simplex "SPX" (simplex).

In addition, they also differ in the type of connectors - "FC", "LC", "SC", "ST", "MT-RJ", they can be connecting (the same connectors on both sides) or transitional (different connectors on different sides ).

Patchcord SM LC-LC duplex

Description

Optical connecting cords with LC - connectors. Patch cords are made of 9/125 µm single mode fiber, 50/125 µm multimode fiber or 62.5/125 µm fiber. The cable is sheathed in yellow, orange, white or blue, depending on the type of cable.

Switch 100Base-FX(24 ports)+10GBase-L(2 ports)

Description

Switch - a device designed to connect several nodes of a computer network within one or more network segments<#"599313.files/image022.gif">

Optical SFP module

Description

SFP modules are designed to be installed in a slot of a router or switch and provide its connection to the network using the required interface. SFP converters support hot-swap mode. Various modules are available to connect necessary equipment to various transmission media: multimode fiber, single-mode fiber, twisted pair. The 1000Base-LX GLC-T module provides data transmission over Category 5 twisted-pair cable up to 100 meters.

XFP Optical Module

Description

This module supports digital diagnostic technology, which allows you to monitor device operation parameters in real time, such as: operating temperature, laser current deviation, emitted optical power, received optical power, supply voltage.

An alarm system is supported when parameters go beyond the established tolerances.

Structural diagram of the FTTB access node configuration

Pigtail FC/PC SM (0.9) 1,5m

Optical mounting cord

Connector type: FC

Fiber Type: Singlemode

Cord Type: Simplex

Buffer: 0.9/3mm.

Length: 1.5 meters.

Optical socket FC/PC/SM

Designed to connect optical cords with FC type connectors. Provides high-quality alignment of connectors thanks to a high-precision centralizer, and the latches provided by the design provide a secure fit. The optical pass-through adapter is protected from dirt and dust by plastic plugs.

Square socket - type S, fixation in a cross with screws. Type of connectors: FC

Case material: metal

Housing color: silver, yellow or red caps

Centralizer material: zirconia ceramic

Connector Polishing: PC/UPC/SPC

Fiber Type: SingleMode

Outlet type: simplex

Patchcord SM FS-LS duplex

The thickness of the cord is usually 2 or 3 mm, the length is 1, 2, 3 or more meters. Optical patch cords can consist of single-mode fibers SM (Single Mode) 9/125 (understood as the diameters of the light-conducting core / sheath in microns) or multi-mode fibers MM (Multi Mode) 50 (62.5) / 125 (respectively, means the diameters of the optical fiber and its isolation). Patch cords can consist of one fiber (Simplex) or two (Duplex).

Mechanical characteristics:

Cable color yellow

Number of inclusions 1000

Vibration 1...200Hz with 4g acceleration

Shock 40g pulse duration 18ms

Climate characteristics:

Temperature range - 40 °С to + 80 °С

Atmospheric pressure 26kPa

Relative humidity 100% at +25°С

Tip face geometry

Curvature radius, mm 10...25

Top offset, µm<50

Fiber end position, nm. +50/-50...-125

Optical characteristics

Direct loss, dB max. 0.25 typ. 0.1

Return loss, dB min. -50 typ. -55

The cost of each next meter: 36 rubles.

Optical module sfp 1000 base-LX

Optical interface with SC connector;

Single fiber WDM transceiver;

Operating wavelengths 1310nm, 1550nm, single-mode fiber;

Signal transmission range 3 km.;

Data transfer rate 1.25 Gbps;

Possibility of execution with extended temperature range (-40..+85);

Complies with RoHS directives;

Electronic electric meter Mercury-200

Measurement and accounting of electricity in the domestic, small-engine and industrial sectors

Accuracy class: 2.0

Rated-maximum current, A: 5-50

Rated frequency 50 Hz

Apparent and active power consumed by the voltage circuit 10V.A and 2.0 W, respectively

The total power consumed by the current circuit is not more than 2.5 V.A

Operating temperature range, 0С: from -20 to +55

Calibration interval: 8 or 16 years (see modifications)

Average service life: at least 30 years

Number of tariff zones: 1-4

Multi-tariff meters have a serial built-in CAN interface that provides information exchange with a computer

Possibility of mounting both in a traditional way and on a DIN rail

Introductory automatic power supply

Automata (circuit breakers) are designed to protect electrical circuits - your electrical wiring from overloads and short circuits. This is a good alternative to today's obsolete plugs, automatic plugs, which lose both in safety and reliability, as well as in quality and durability. In everyday life, modular machines are used. Outwardly, they are very neat, they take up little space in the shield due to their compactness. Very handy and easy to mount: just snap onto a DIN rail to mount them. If necessary, they can be just as easily replaced. Choosing the right machine is very important. To do this, calculate the total power consumption of your electrical appliances (you can use their passports), expressed in watts (W) and divide it by your mains voltage ~ 220 V. However, the network load is usually reactive.

Standard terminal block AVK 2.5

General information about the product:

Insulating material PA 66

igniter class acc. up to UL 94 V2

Width 5mm

Length 44.2mm

Height (MR 35) 44.5 mm / CE Technical data

Rated voltage 750 V

Rated current 24 A

Cross section 2.5 mm2

Norm EN 60947-7-1Technical data

Rated voltage 750 V

Rated current 24 A

Cross section 2.5 mm2

VDE standard IEC 60947-7-1/CSA Technical data

Rated voltage 600 V ~

Rated current 20 A Cross section 26-12 mm2 Technical data

Rated voltage 630 V

Rated current 21 A 2

Cross section 2.5 mm2

Connected wires

Minimum single core cross section 0.5 mm2

Maximum single core cross section 4 mm

Minimum stranded cross section 1.5 mm2

Maximum stranded cross section 2.5 mm2Section 26-12

connection type vidali

Stripping length 10 mm

Tightening torque 0.4 Nm

Double conversion uninterruptible power supply (Ippon Innova RT 1000)

Phase input voltage

output power 1000 VA / 900 W

output connectors: 8 (with battery power - 8)

rack mountable

interfaces: USB, RS-232

output waveform: sine wave

Patch panel wall horizontal 24*RJ-45, UTP, Cat.5e

The wall-mounted patch panel has 24 ports and a design that allows mounting and cutting from the front side, after removing the decorative and protective cover.

Bandwidth, MHz: 100

Number of ports: 24

Version: Unshielded

Socket type: RJ45/8P8C

Connector Plating Material: Gold, 50 µin.

Type of IDC contacts: 110

Coating material of IDC contacts: C5191

Allowable core diameter, AWG(mm): 24-26(0.511-0.404)

Wiring diagram: T568A/B

PCB material: FR 94-V0

Marking: All ports are numbered on the front. There are additional areas for marking ports.

Support Structure Material: Steel 1.52mm

Compliance with standards: ISO/IEC 11801-2, EN 50173-2, TIA/EIA 568-B.2

Supported applications: 10Base-T, 100Base-TX, 1000Base-T

Temperature ranges, C: Storage from -40 to +70

Operation: 0 to +70

Mounting: Wall

Dimensions HxWxD, mm: 69.85x287.02x25.65

KRS-24, cross optical 19 1U 24 ports

KRS-24, optical cross rack 24 ports - designed for terminating an optical cable, protecting the welding site from external influences and mounting in a 19" rack. The cross is equipped with three interchangeable brackets: 3 brackets for 8 ports of any type to choose from: SC, FC, ST , LC, etc. In accordance with the type of interchangeable bar installed, the name of the cross also changes.

Key Features: Form Factor: 1U

Case material: metal

Overall dimensions: 405x230x44 mm.

Weight: 2.1 kg.

Add. information: there are 4 options for cable entry, from different sides of the optical cross

Ethernet switch 10/100 base T built-in

Allows you to create computer networks (including computers, printers, servers) without patch panels. Peripherals must use 10/100 base T Ethernet network cards for 10/100 Mbit/s communication Expansion of existing network possible by replacing RJ 45 socket Power indicator light on front panel. Convenient and feature-safe access to the Reset function 6 RJ 45 ports Cable connection to 1 side RJ 45 connector Tool-free connection socket that also serves to perform a communication test Installed in a 3-gang Batibox, deep. 50 mm (recommended).

Structural diagram of the PON P2MP aggregation node

Optical module xpf 10GBASE-LR

Characteristics:

Standard: IEEE 802.3ae 10GBASE-LR 10Gigabit Ethernet

Optical Receiver Sensitivity -12.6dBm (Max.)

Transceiver type: XFP (Small Form Factor Pluggable)

Connector: Duplex LC

Data rate: 9.95 Gbps to 10.7 Gbps

Wavelength: 1310nm

Cable type: Single mode optical cable 9/125µm

Maximum cable length: 10 km

Physical parameters

Supply voltage

+3.3V and +5.0V supported

Working temperature

-5o to 70o C

Storage temperature

-40o to 85o C

Humidity

0% to 85% RH

EMI certifications

FCC Class B

Patchcord SM SC-SC/APC simplex

Optical cord SC-SC APC 9/125 single-mode simplex is used for switching between optical crosses, connecting optical equipment, connecting optical crosses. They also have alternative names - SC-SC optical patch cord and SC-SC optical connecting cord. Pay attention to the type of optical cable, the type of optical connectors on both sides, and the type of ferrule grinding, in order to avoid installation problems.

End diameter

fiber type

Singlemode, SingleMode

Connector TypeSC

polishing type

Connector color

Back buffer color

Tip material

zirconia

Return Loss

Insertion Loss

≤ 0.3 dB

Pigtail sm sc/PC

Optical mounting cord SC PC 62.5/125 is used for terminating optical communication lines in optical distribution boxes. The cord must be cut in half in order to get 2 pigtails. The price is for 1 pigtail. Pay attention to the type of optical cable, type of optical connector and type of ferrule polishing, in order to avoid installation problems.

Optical socket SC/PC SM

Optical socket SC/PC SM simplex is a device that serves as a connecting element when using a fiber optic cable. Designed for single-mode operation.

Specifications:

Designed for 500 inclusions.

SC connector type.

Possible direct losses are not more than 0.2 dB.

Operating temperature range from -40o C to +75o C

Structural diagram of PON P2MP access node configuration

Optical splitter

Purpose

The main purpose of the planar PLC splitter is the use in PON networks. At any site: at the station, in the coupling, when entering the house, the optical signal is divided between several users into several fibers using a passive device that does not require maintenance - a splitter.

Capabilities

There are the following options for dividing the luminous flux using splitters: 1x2, 1x4, 1x8, 1x16, 1x32, 1x64.

Various splitter manufacturing options allow using them in PON networks of any architecture, regardless of the data transmission technology used by the operator.

The minimum dimensions of the splitter (4x4x40 mm), as well as the use of splitters already terminated with an SC connector with a pigtail of various lengths, provide a flexible approach to network installation.

The splitter can be integrated into an optical distribution box, coupling, outdoor and driveway cabinets, floor boxes, or directly into a subscriber access device.

Specifications

Splitters support all kinds of FTTH network architecture:

· BPON, GPON, GE-PON, P2P;

· data transfer.

Configuration

· unfinished for the possibility of welding (for example, in couplings);

· terminated by connectors of type: FC, SC, LC;

· type of polishing of connectors: SPC, UPC, APC.

Execution

in a compact steel case with fiber exits in a tape version;

· in a compact steel case with 900 µm sheath fiber outlets;

· in an aluminum/plastic case with fiber exits in a 2-3 mm patchcord sheath;

· for installation in 19"" constructive, ODF.

Specification

Wavelength.................................1260…1360 Nm, 1450…1625 Nm

Max. signal ...............17 dBm, 1550 Nm

Operating temperatures...................-40°C…+85°C

Rel. humidity .................................5% … 85%

Dimensions (HxWxD, mm):

х4, 1х8 .......................................... 4 х 4 х 40 mm

x 16 .............................. 5 x 4 x 40 mm

x 32 .............................................. 7 x 4 x 50 mm

Boxed .................................10 x 80 x 100 mm

Available in 19""..................................44 x 300 x 482.6 mm

Optical characteristic

Specification

Optical splitter configuration

Insertion loss, dB*

Permissible uneven division of optical power between output ports, dB*

Permissible changes in optical power loss during transmission between the input and each of the output ports, due to a change in polarization, dB *

Return loss, dB

Directivity, dB

Operating wavelength

Operating temperature range, °C


Optical cross-connects KRS-8, KRS-16 and KRS-24 for rack mounting


Optical rack-mount distribution boxes are convenient patch panels for connecting and distributing linear optical cable fibers using optical pigtails and patch cords. Made of light aluminum alloy with anti-corrosion coating or steel with IP-55 protection degree. Cassettes for laying welding points allow the use of heat-shrinkable KDZS tubes with a length of 60 mm or 40 mm. FC, SC or ST type adapters are installed in special sockets.

Certificate of Conformity of the State Committee for Communications of the Russian Federation No. OS-1-OK-125

Subscriber optical cross

The SKRU rack-mount crossover switchgear is designed for terminating, distributing and switching optical cables, connecting optical fibers to the equipment of optical transmission systems, as well as for monitoring the characteristics of an optical cable during operation.

Dimensions: 485x212x44 mm

Weight: 2.0 kg

Features: Metal structure 0.8-1.0 mm thick provides the necessary rigidity of the product and is installed in mounting racks (cabinets) of 19” construction

The oblong-shaped cable entry is located on the back of the housing

The KU-01 splice plate provides a bending radius of at least 30 mm, which makes it possible to avoid additional losses during the operation of the FOCL.

Equipment:

Splice plate KU-01

Cover for splice plate KU-01

Splice plate fixture

marker table

Nylon ties

TsSE fixture

M5 screws (for attaching the CSE to the case)

Planks for adapters

Blanking strips

Self-adhesive pads with cable clips

Metal clamp for attaching the cable to the case

Individual packaging made of corrugated cardboard

3. Selection and justification of equipment

3.1 Optical line terminal equipment

The optical line terminal (OLT) is designed to organize broadband multiservice multiple access over an optical fiber of a tree structure according to the G.983.X standard using PON technology.


The PON G.983 standard covers the passive component of the network and active devices, regulates the protocols for interaction between the OLT central node and the ONT subscriber nodes, the parameters of the optical transceiver interfaces (signal strengths, wavelengths) for the OLT and ONT, determines the permissible topologies and the length of the P0N network . The P0N technology provides for the use of the C-band (1530-1565 nm) for the transmission of DWDM signals.

In accordance with the G.983.1 standard, one fiber-optic segment of the PON network can cover up to 32 subscriber nodes within a radius of up to 20 km.

Each subscriber node is designed for an ordinary residential building or office building and, in turn, can cover hundreds of subscribers, providing service interfaces 10/100Base-TX, E1/E2/E3/E4, digital video, ATM, STM-1/4.

The central node can have ATM, SDH (STM-1/4/16), Gigabit Ethernet network interfaces for connecting to backbone networks.

Functional features of OLT application:

· Optical fiber becomes the best medium for building backbone networks and small-diameter access networks.

· Passive branching nodes can significantly improve network reliability by eliminating intermediate active elements between the central office and the subscriber node.

· With the most perfect concept of FTTH (fiber to the apartment), each subscriber becomes a terminal.

· Due to the gigantic bandwidth of the fiber, the optimal solution is achieved when a single fiber coming from a central node or otherwise a POP (Point-Of-Presence) is branched into many subscribers. This makes the construction of a fiber-optic cable system economical and reduces the subsequent costs of its maintenance.

· Solutions based on PON and DWDM technologies best meet these requirements.

· A significant reduction in the cost of using PON technology in the basic version of two wavelengths (1550 nm, 1310 nm).

· Efficiently utilizes the bandwidth of the optical fiber.

· The network is built with passive fiber branching.

· PON - Multiservice network.

· Dynamic bandwidth allocation.

· Natural development to DWDM network.

Possibility of reservation of both all and individual subscribers,

· Turning the "last mile" concept into a "first mile" concept.

3.2 ONU equipment

Device versatility

One of the important distinguishing features of the DIR-100 is its versatility. By purchasing the DIR-100, the user can decide whether to use it as a broadband router, Triple Play router or VLAN switch. To obtain a new device, simply download the necessary software from D-Link's FTP server. In this case, the hardware of the device remains unchanged. Here is a description of the functionality of DIR-100 as a Triple Play Router.

Triple Play Services

The popularity and availability of Triple Play services is growing day by day. The user simply needs to connect the Triple Play router and order the appropriate service from the provider. The DIR-100 Triple Play Router, recommended for use in ISP networks, allows users to access the Internet, view IPTV broadcasts and use VoiceOverIP services with guaranteed transmission speed. Thus, with the help of one WAN connection, voice, video and Internet traffic (Triple Play) is simultaneously transmitted.

The principle of operation of the device is quite simple. Its two ports support NAT and firewall functions. These ports are designed to connect personal computers and organize access to the Internet. The other two ports do not support routing functions - these ports connect to the WAN port in transparent bridge mode. It is possible to connect to these two ports, for example, an IP telephone or equipment necessary for the implementation of the IP television service (IPSTB).

Support for VLAN and queue prioritization
Support for VLANs (802.1Q and port-based) is especially important for this device. Since it is this function that allows each type of traffic to be transmitted over its own virtual network.
The device also supports 802.1p queue prioritization to ensure good quality of service, allowing users to use latency-sensitive applications such as audio/video streaming and VoIP on the network.
Safety
The ports of the Triple Play DIR-100 router designed for connecting a personal computer are equipped with security features. So, they have a built-in firewall to protect computers on the network from virus and DOS attacks.


HTV-1000 is a reliable and time-tested set-top box that allows IP TV service operators to quickly and cost-effectively deploy a TV broadcasting network of any size.

supports major media protocols

support for DOLBY DIGITAL digital surround sound

HD TV support

ability to record TV programs

low cost of organization of city-scale Internet television networks

high price/quality ratio

The device can be connected to any TV signal receiver.

TV box features

Viewing HD video and TV content

Viewing multicast streams (TV channels) by list

Creating a list of TV channels manually

TV channel preview window

Image Format Conversion

Playback of video and audio data of various formats: MPEG-TS, MPEG-PS, avi, mkv, mov, mp4, wmv, ac3, mp3, wmv

Decoding video streams of the following standards: MPEG2, MPEG4P2, h264,VC-1, WMV9

Decoding of audio streams of the following standards: mpeg2-audio, mp3, AC-3

Playback of media data located on UPnP servers

Playback of media data from USB flash memory, discs

Ability to connect a USB keyboard, USB mouse

Support for SMB and NFS file systems

Support WI-FI usb adapters

Built-in YouTube player

Built-in web browser

Built-in list of radio stations

Access to the Picassa service

Built-in game programs

Set-top box volume and mute control with remote control

Low power consumption

For IP TV operators and video content providers

Logo setting

Operator key setting, digital signature

Set-top box control key installation

Remote software update

Open source software allows you to adapt your own control and monitoring systems

Adding Your Own Commands

Remote indicator control on the front panel

Remote restart of the set-top box with a change in boot mode

Playing content from the operator's UpnP media server

Java Script capabilities - to control the IPTV set-top box, play various types of content and set up the set-top box behavior model

Specifications of the set-top box

Video modes

HD 1080i720p/i576p/ito 1920 x 1080 x 32 bitTV standard 4:3 or 16:9

Video codecs/2 [email protected] [email protected] 4.1 up to 30 Mbps

MPEG4 part 2 (ASP) DivX4, DivX5, XviD

Audio codecslayer I/IIlayer IIlayer III (mp3)Digitalsubtitlesmedia protocols: RTSP, RTP, UDP, IGMPon-Chip (SoC)DDR 128MbFlash 1Mb, Flash 128Mb

Software shutdown, 5 V; 1.5 Aout: RCA, S-Video, SCART, HDMI, Component RGB or (Y Pr Pb): S/PDIF (Dolby AC-3 multi-channel), LR RCA2.0

remote control RC-510/100Base-T Auto MDI/MDIX RJ-45

operating temperature range, 10°C- 40°C

storage temperature range, 0°C- 50°C

humidity 40%~60%

supply voltage 100- 240 V, 50/60 Hz, 7W

dimensions 300 mm x 237 mm x 64 mm

Base operating system linux2.6.16agent: WebKit

built-in media portal with IPTV functionality

HTTP 1.1, HTML 4.01 XHTML 1.0/1.11, 2, 3, CSS 1, 2, 31.0, XSLT 1.0, XPath 1.02.01.1ECMA-262, revision 5JavaScript API

latest firmware release 0.2.03

Separately supplied MiddleWare for broadcast operator node

support for SAMBA and NFS protocols


It is also possible to transfer data not via cable, but via Wi-Fi


D-Link DVG-2001S IP telephony gateway, which is a universal solution with which you can integrate Internet telephony into your home or office telephone network. Many will be surprised: why do you need an IP phone at home? Until recently, this really would have seemed like a useless undertaking, however, IP telephony is increasingly crowding out its traditional progenitor. So, for example, by connecting to the operator, the SIPNET user gets the opportunity to:

significant savings on international and long-distance calls

communicate with other subscribers of the SIPNET network for free

call from anywhere to Moscow and St. Petersburg for free

personalize the cost and quality of calls in any direction

order connection of two subscribers anywhere in the world

Any Internet user with broadband access at a speed of 64 Kb/s and higher can connect to SIPNET. To do this, you just need to install one of the standard softphones on your computer or buy a SIP phone or a SIP gateway. We will talk about one of them in this article. S opens the line of D-Link VoIP gateways, it is extremely easy to configure and operate, reliable and compact.

Device specification:

Ports: 1 FXS port, 1 Ethernet 10/100 Mbps port

supported protocols: SIP

compression: G.711/G.723/G.729AB;

echo removal method: G.168

Stream: 6-64 kbps (depends on codec)

Support for DHCP, PPPoE;

support for NAT traversal

Possibility to update the firmware

The device is equipped with one FXS port for connecting an analog phone and one LAN port (Fast Ethernet) for connecting to a home or office network. The gateway cannot boast of either a built-in router or a switch. The LAN port connects to a switch or ADSL modem/router, and any telephone set can be connected to the phone jack. You can choose any device you like: a DECT radio handset, a telephone with an answering machine, etc. The ability to choose from a huge variety of phones is one of the advantages of IP gateways over IP phones, the range of which is significantly limited.


IP telephony requires software called X-lite

X-lite settings

Download program<#"599313.files/image041.gif">

A window with current accounts appears:

Choose to add (Add ...)


We fill in the following:

Display name - the name displayed on the phone, for example Vasya

User name - your login for<Домашнего Интернета>, for example, while it will be 7846XXXX

Password - your password in our system." should be replaced with "your password”

Authorization user name - same as User name but without 7846

Domain - 88.200.176.4

Leave the rest of the tabs as default.

Phone ready to go


After configuration, a dialog box will appear asking you to update the program version: A new version of X-Lite is available for downloading. Do you want to download it now?. The update must be canceled by clicking "No".

Click on the arrow (Show menu) and select "About".


Version 3.0 build 29712 Build 41150 works fine. Hearing problems can be caused by firewalls, antivirus, router, etc.

4. Calculation of the parameters of the optical path

4.1 Calculation of the optical power budget for FTTB

The transmission of information with the required quality in the regeneration section of the FOCL without optical amplifiers, taking into account losses and dispersion distortions, is provided at the expense of a power reserve (net power budget) equal to the difference between the energy potential of the FOTS (overlapped attenuation) and the cost of optical power for losses and interference suppression and distortion of optical pulses in the line:

[dB], where:

[dB], where:

The total value of additional losses is the sum of additional losses due to the intrinsic noise of the laser, due to noise due to the emission of optical power during the transmission of "zero", due to the noise of inter-symbol interference and, accordingly, is equal to:

Additional losses due to the inherent noise of the radiation source are calculated by the formula:

[dB]

< RIN<-140 дБм.

Let RIN=-130[dBm]

Additional losses due to noise due to the emission of optical power during the transmission of "zero" are determined by the formula:

[dB], where:


[dB]

4.2 Optical path attenuation calculation for FTTB


Here, the Rayleigh scattering loss component per wavelength is determined by the relations:

,, where ,


, where ;


This is the reference wavelength;

[dB/km]

[µm]=800 [nm]

[dB/km]

[dB/km]

[dB/km]

[dB/km]

[dB/km]

[dB/km]

4.3 Energy potential margin calculation for FTTB

To characterize the FOTS power budget, the concept of energy potential (overlapped attenuation) is introduced, which is defined as the allowable optical loss of the optical path or ESP between the normalization points, at which the required quality of digital optical signal transmission is ensured. Optical losses are due to attenuation losses and additional power losses due to the influence of reflections, dispersion (chromatic and polarization mode), mode noise and chirp effect.

The energy potential is calculated as the difference between the power level of optical radiation at the transmission and the sensitivity level of the receiver

Values ​​and in table 1.

[dBm].

4 Optical power budget calculation for FTTH

The transmission of information with the required quality in the regeneration section of the FOCL without optical amplifiers, taking into account losses and dispersion distortions, is provided at the expense of a power reserve (net power budget) equal to the difference between the energy potential of the FOTS (overlapped attenuation) and the cost of optical power for losses and interference suppression and distortion of optical pulses in the line:

[dB], where:

ECU attenuation together with station cables (patch cords);

The total value of additional losses, dB.

The maximum attenuation value of ESC together with station cables (patchcords) is calculated as follows:

[dB], where:

The number of permanent connections of the OF on the ESC.

The number of permanent connections on the ECU is equal to:

The total value of additional losses is the sum of additional losses due to the intrinsic noise of the laser, due to noise due to the emission of optical power during the transmission of "zero", due to the noise of inter-symbol interference and, accordingly, is equal to:

Additional losses due to the inherent noise of the radiation source are calculated by the formula:

[dB]

[dB]

The value of the source noise parameter - RIN is usually in the range of -120< RIN<-140 дБм.

Let RIN=-130[dBm]

Additional losses due to noise due to the emission of optical power during the transmission of "zero" are determined by the formula:

[dB], where:

The ratio of the optical radiation power of the source when transmitting "zero" to the optical radiation power when transmitting "one". As a rule, the value of this value is in the range of 0.01 0.1.

[dB]

4.5 Optical path attenuation calculation for FTTH

The attenuation coefficient is calculated at the central wavelength of the optical channel. It is first necessary to determine the spectral range in which the central wavelength lies. To calculate the spectral loss characteristic of an optical fiber, we use the known approximate formulas. The resulting fiber attenuation ratio in dBm/km is defined as the sum of:


Here, the Rayleigh scattering loss component per wavelength is determined by the relations:

,, where ,


The loss component due to OH- impurities is calculated as follows:

, where ;


This is the reference wavelength;

[nm] because the center wavelength is closer to 1550 [nm].

Attenuation coefficient of the reference wavelength:

[dB/km]

[µm]=800 [nm]

[dB/km]

[dB/km]

[dB/km]

[dB/km]

[dB/km]

Resulting fiber attenuation coefficient:

The maximum value of the attenuation coefficient of the optical fiber:

[dB/km]

3 Energy potential margin calculation for FTTH

To characterize the FOTS power budget, the concept of energy potential (overlapped attenuation) is introduced, which is defined as the allowable optical loss of the optical path or ESP between the normalization points, at which the required quality of digital optical signal transmission is ensured. Optical losses are due to attenuation losses and additional power losses due to the influence of reflections, dispersion (chromatic and polarization mode), mode noise and chirp effect.

The energy potential is calculated as the difference between the power level of optical radiation at the transmission and the sensitivity level of the receiver

where W is the energy potential (overlapped attenuation), dBm;

Optical radiation power level of the FOTS transmitter, dBm;

Receiver sensitivity level, dBm.

Values ​​and in table 1.

5. Security system for FTTx technology

5.1 General

Choosing the Right Topology

It is not recommended to use concentrators for the VoIP infrastructure, which make it easier for attackers to intercept data. In addition, since digitized voice usually travels over the same cabling and through the same network equipment as regular data, the information flows between them must be properly separated. This, for example, can be done using the VLAN mechanism (however, you should not rely only on them). Servers participating in the IP telephony infrastructure should preferably be placed in a separate network segment, protected not only by the protection mechanisms built into switches and routers (access control lists, address translation and attack detection), but also by using additionally installed tools (firewalls, systems intrusion detection, authentication systems, etc.).

Physical Security

It is desirable to prohibit unauthorized user access to network equipment, including switches, and, if possible, place all non-user equipment in specially equipped server rooms. This will prevent an unauthorized connection from an attacker's computer. In addition, you should regularly check for unauthorized devices connected to the network, which can be "embedded" directly into the network cable. Such devices can be identified in different ways, for example, using scanners (InternetScanner, Nessus), which remotely recognize the presence of “foreign” devices on the network.

Access control

Another fairly simple way to protect the VoIP infrastructure is to control MAC addresses. Do not allow IP phones with unknown MAC addresses to access gateways or other elements of the IP network carrying voice data. This will prevent unauthorized connection of "foreign" IP phones that can listen to your conversations or make telephone calls at your expense. Of course, the MAC address can be faked, but still, you should not neglect such a simple protective measure, which is implemented without any problems on most modern switches and even hubs. Nodes (mainly gateways, dispatchers and monitors) must be configured in such a way as to block all attempts of unauthorized access to them. To do this, you can use both the capabilities built into operating systems and third-party products. And since we work in Russia, then we should use tools certified by the State Technical Commission of Russia, especially since there are a lot of such tools.

Virtual Local Area Network (VLAN) technology provides a secure division of a physical network into several isolated segments that operate independently of each other. In IP telephony, this technology is used to separate the transmission of voice from the transmission of ordinary data (files, e-mail messages, etc.). Managers, gateways, and IP phones are placed on a dedicated VLAN for voice transmission. As I noted above, VLAN significantly complicates the life of attackers, but does not remove all problems with eavesdropping on negotiations. There are methods that allow attackers to intercept data even in a switched environment.

Encryption

Encryption must be used not only between gateways, but also between the IP phone and the gateway. This will protect the entire path that voice data travels from one end to the other. Ensuring confidentiality is not only an integral part of the H.323 standard, but is also implemented in the equipment of some manufacturers. However, this mechanism is almost never used. Why? Because the quality of data transmission is a priority, and continuous encryption / decryption of a voice data stream takes time and often introduces unacceptable delays in the process of transmitting and receiving traffic (a delay of 200-250 ms can significantly reduce the quality of negotiations). In addition, as mentioned above, the lack of a single standard does not allow all manufacturers to accept a single encryption algorithm. However, in fairness, it must be said that the difficulties of intercepting voice traffic so far allow you to look at its encryption through your fingers. But you still shouldn’t completely abandon encryption - you need to secure your negotiations. In addition, selective encryption can be used only for certain fields in VoIP packets.

Firewall

The corporate network is usually protected by firewalls (ITU), which can also be successfully used for the VoIP infrastructure. You just need to add a set of rules that take into account the network topology, the location of the installed VoIP components, and so on. Two types of firewalls can be used to protect VoIP components. The first, corporate, is placed at the exit from the corporate network and protects all its resources at once. The second type is a personal ITU that protects only one specific node, on which there can be a subscriber station, a gateway or a Protector manager. In addition, some operating systems (Linux or Windows 2000) have built-in personal firewalls that allow you to use their capabilities to increase the security of your VoIP infrastructure. Depending on the standard used for IP telephony, the use of firewalls can lead to various problems. After using the SIP protocol, the subscriber stations exchanged information about the connection parameters, all interaction is carried out through dynamically allocated ports with numbers greater than 1023. In this case, the ITU "does not know" in advance which port will be used for voice data exchange, and will to block such an exchange. Therefore, the firewall must be able to analyze SIP packets in order to determine the ports used for communication and dynamically create or change its rules. A similar requirement applies to other IP telephony protocols. Another problem is that not all ITUs are able to correctly process not only the IP telephony protocol header, but also its data body, since often important information, such as information about subscriber addresses in the SIP protocol, is located in the data body. A firewall's inability to "get to the bottom" can lead to the inability to exchange voice data through the firewall or "open" a hole in it that is too big for attackers to exploit.

Authentication

Various IP phones support authentication mechanisms that allow you to use its capabilities only after presenting and verifying a password or personal PIN number that allows the user to access the IP phone. However, it should be noted that this solution is not always convenient for the end user, especially in the daily use of an IP phone. The usual tension between security and convenience arises. 1918 and address translation

It is not recommended to use IP addresses accessible from the Internet for VoIP, this significantly reduces the overall level of infrastructure security. Therefore, whenever possible, use addresses specified in RFC 1918 (10.x.x.x, 192.168.x.x, etc.) that are not routable on the Internet. If this is not possible, then it is necessary to use the mechanism of address translation (networkaddress translation, NAT) on the firewall that protects your corporate network.

Intrusion detection systems

It has already been described above about some attacks that can disrupt the VoIP infrastructure. To protect against them, you can use well-established and well-known intrusion detection tools in Russia (intrusiondetectionsystem), which not only identify attacks in a timely manner, but also block them, preventing them from harming corporate network resources. Such tools can protect both entire network segments (for example, RealSecureNetworkSensor or Snort) and individual nodes (CiscoSecure IDS HostSensor or RealSecureServerSensor). The versatility and vastness of the topic do not allow us to consider in detail the information security of IP-telephony. But those aspects that I was able to highlight still show that VoIP is not such a closed and incomprehensible area as it seems at first glance. Attack methods already known from conventional telephony and IP networks can be applied to it. And their relative ease of implementation puts security first, along with quality of service for IP telephony.

2 Anti-vandal security system (based on Censor)

Protection of "passive" cabinets FTTH (PON)

The main feature of broadband networks with PON technology is that a completely passive optical network with a tree topology is created between the central node and remote subscriber nodes. In the intermediate nodes of the tree there are passive optical splitters (splitters) that do not require power and maintenance. Splitters, as a rule, are placed in anti-vandal cabinets, which are not of interest to intruders as an object of theft and profit. However, being installed in the entrances of apartment buildings, they are often subjected to acts of vandalism committed without a specific purpose by "unreliable contingent". There are also acts of intentional damage to such property by unscrupulous competitors of the operator. Therefore, the issue of ensuring the safety and protection of "passive" cabinets is no less acute than the same issue in relation to cabinets with active equipment.

At the same time, the FTTH cabinet has neither a power supply nor a physical Ethernet port for connecting equipment to the center - that's why it is "passive". Providing power entails laying cables, installing an uninterruptible power supply, an electricity meter, etc. Creating an Ethernet port from an optical termination, which is essentially designed to generate revenue from subscribers, is extremely inefficient economically. Not to mention the fact that with all such organizational and technical measures, the security system will require a separate anti-vandal cabinet, which can surpass all protected cabinets in cost. Therefore, the principle of security with the installation in each cabinet of an independent monitoring device that requires power and a communication channel is not suitable here. Yes, this is not advisable, because in such a closet there is nothing special to control - only an autopsy. So what, the problem has no solution? As it turned out, there is a solution, and a very successful one! Moreover, for the operators of OJSC Svyazinvest and alternative operators that have their own traditional fixed-line networks, it looks especially elegant! And it was offered by the Customers themselves - Users of APK CENSOR.

It is possible to implement the protection of FTTH (PON) cabinets by means of APK CENSOR using existing equipment manufactured and supplied to Customers today - based on the unique SOKOL well protection system of its own design and production by CJSC SPC Computer Technologies.

Recall that "SOKOL" is a professional Russian solution for the protection of cable ducts based on the address-parallel method of monitoring sensors. The system successfully withstood the annual test cycle at real facilities of the Perm TUES PFE of Uralsvyazinform OJSC. The uniqueness of the SOKOL system is that it allows you to control 60 tamper-evident sensors on one two-wire line 20 km long with any number of branches (parallel connections) and any topology (star, tree, ring, mixed, linear). The system compares favorably with analogues by the highest reliability, confirmed during operation, ease of installation and maintenance, the presence of protection against breaks and short circuits, as well as cost-effectiveness.

Hardware-wise, the system consists of object devices (as a rule, these are cable guards and communication wells BOKS with modules for monitoring addressable sensors of the Moscow Ring Road installed in them), installed on the exchange in the premises of the cross, and addressable tamper sensors (ATS) installed on the periphery, for example, in wells. There are also isolation blocks (IB) that protect loops from short circuit. DAK tamper sensors are active, i.e. have a built-in microprocessor and a certain algorithm of operation, as well as non-polar in terms of connection to the loop. Moreover, when connected, the address is assigned to them automatically - you do not need to program anything. Addressable sensors operate independently of each other, i.e. when one is triggered, all the others remain protected. In addition, thanks to the possibility of organizing a star topology in the SOKOL subsystem, the loop can be protected from breakage: if there is a break in one place, all sensors remain protected, if there is a break in two or more places, only the disconnected segment will go out of control. With the use of optional BI isolation blocks, it is possible to protect the loop from a short circuit: in the event of a short circuit, the system will automatically turn off the damaged section of the loop, and all other sensors will be monitored.

Thus, "SOKOL" is simply an ideal means of protecting such small and grouped objects as cabinets. And if you study the issue more deeply, then it is also the only possible one from the point of view of modern technology and logic.


Indeed, what, in essence, is the difference between the protection of wells on a cable route and the protection of "passive" cabinets in the entrances of residential buildings? By and large, nothing, with the only caveat that it is perhaps even easier to guard the cabinets in the entrances than to guard the KKS. Hence, it is cheaper. This is due to less wire consumption, and the absence of the need for sealing, and the ease of installation and commissioning of the system.

The only question is how to link the sensors, even if they are included in a common loop inside a residential building, with a control unit installed on an automatic telephone exchange, which can be located several kilometers away? This is where it becomes clear why the operators of Svyazinvest and other operators with traditional networks like this solution the most. Such operators, as a rule, have an impressive amount of installed capacity of wired fixed communication subscriber lines - copper pairs going from the station through distribution cabinets and boxes directly to subscribers' apartments. Among these pairs, in most cases, it was possible to find free ones before, and in recent years, when there is a transition of subscribers from fixed-line to other types of communication, this resource is freed up even more. In a word, there are practically no problems with the allocation of free copper pairs in subscriber cables from automatic telephone exchanges to residential buildings. This is just such a pair that can be used to organize a loop for protecting cabinets in a residential building. It is enough to apply this pair directly in the junction box of the KRTP to the signaling loop, and at the station from the cross-connect to bring it to the control unit and that's it, the system is ready!

It turns out that instead of active security equipment for monitoring openings in PON cabinets, addressable DAK sensors of the SOKOL subsystem are used, operating via a two-wire loop. The loop carries out the transmission of signals from the sensors, and at the same time their power supply. Sealing of sensors is not required, electrical insulation of the spliced ​​ends of the wire is sufficient. The sensors themselves are made in such a way that they do not require any complex operations at the stage of installation and connection. The loop inside the building is laid with a single-pair copper wire, for example, KSPV 2x0.5 or PRPPM 2x0.9, or even ordinary telephone "noodles". Wires can be laid through the internal communications of the building in places convenient for this (in mines, risers, cable channels, suspended ceilings, etc.), as well as outdoors. It is possible that just "noodles" will be the most convenient wire for this. And what? The wire is strong, nailed to ordinary nails, has suitable characteristics and section, and most importantly - the minimum price. Yes, and operators have such a wire almost always available.

In the distribution box of the KRTP, the loop is connected to a dedicated pair, and that, in turn, to the BOKS equipment installed on the PBX.

The capabilities of the BOKS block to implement the functions of the SOKOL subsystem make it possible to control 60 addressable sensors on one two-wire loop up to 20 km long with any number of branches and various topologies (ring, star, tree, linear, mixed). There can be from 1 to 4 such loops, depending on the configuration of the BOX, on one block. Those. up to 60, 120, 180, 240 address control points on one device. The device is also full-fledged in terms of data transfer functions, because the BOX has a standard Ethernet port with the TCP / IP protocol on board, which can be included in the operator's multiservice network for data transfer to the Server and workstations.

We get an address-parallel system for protecting PON cabinets, operating on one two-wire loop at a distance of 20 km from the PBX to the cabinet, having protection against short circuits and breaks. Moreover, the system meets the most stringent modern criteria and requirements set by operators for suppliers:

the solution is highly effective: instead of abandoning protection and saving "on matches" (from the often encountered position in the spirit of "first we'll see, and if there is vandalism, then we will protect"), it is now easier and more profitable for the operator to initially include in the package at minimal one-time costs cabinets with the appropriate sensors, having received a ready-made solution with a standard alarm, and then not to tear off their specialists from their main work during the operation to install non-standard protective equipment.

the solution is easy to install and unpretentious in maintenance: maximum technological operations are performed at the stage of manufacturing sensors and cabinets, and the user can easily assemble the finished system using the simplest tools and materials, like a radio designer, and then just as easy to maintain it.

the solution is inexpensive: the presence of a security system and sensors does not significantly affect the cost of the cabinet, which operators and manufacturers strive to reduce to a minimum due to high competition in the broadband services market, in addition, the existing resources of the telecom operator are used to the maximum - copper wires that receive "second life”, thus eliminating any additional costs.

The cost of the equipment is indicated directly in the figure, and if we take the average figures, then the cost of the system per one protected PON cabinet is within 1000 rubles, which is two to three times more economical than the simplest solution for protecting active FTTB cabinets. And this cannot but rejoice, because the affordability of all components in the construction of PON networks is the main economic factor for the competitiveness of broadband access services and the operator's success in the market.

Unique technology for protecting copper subscriber cables in FTTx broadband networks

FTTx technology in the construction of broadband access networks (BBA) is as common as mass theft of copper-core cables in the entrances of residential buildings. Mass cuts of copper cables cause not only material damage associated with restoration work, network downtime, unprovided traffic, but also damage to the reputation, image, and prestige of the operator. And what does a good telecom operator want and should do? Drawing a free analogy with sports, where you need to “faster, higher, stronger”, the operator wants to develop and improve the quality of services, increase the client base. Nevertheless, he has to spend energy, time and money on "treatment of injuries" - on the restoration of damage.

CJSC SPC "Computer Technologies" - the first developer in Russia of specialized systems for monitoring and security of communication networks - has always been at the forefront of equipment manufacturers for the protection of cable facilities and LKS. We have proposed and patented technologies for the protection of trunk and distribution cables with the determination of the breakage location by free and busy subscriber pairs as part of the CENSOR APK we produce - the first professional Russian solution for the integrated monitoring and protection of communication cables and LKS.

Again and again, taking care of the interests of our Clients - telecom operators and broadband access services, confirming the status of a pioneer in our field, we have developed an innovative and unique technology "CRAB" to control distribution subscriber cables in FTTx broadband networks.

A feature of FTTx broadband access networks is the presence of cabinets with equipment installed inside or near residential buildings and office buildings. From the operator's side, a fiber-optic cable enters the cabinet, and copper-core cables go from the cabinet to the subscribers. Often one cabinet is installed for the whole house or for several entrances, therefore inter-entrance and inter-floor connections are laid with a high-capacity multi-pair cable, which, on intermediate passive switches (cross-connectors) installed in the entrances, is distributed to four-pair twisted-pair Ethernet cables (UTP cat. 5e 4x2x0.53 or similar).


The new development of CJSC SPC "Computer Technologies" is aimed at protecting copper distribution subscriber cables of the "twisted pair" type in FTTx broadband access networks with a subscriber access speed of 100 Mbps or 1 Gbps.

The CRAB subsystem consists of (highlighted in green in the figure): a special patch panel installed in the FTTx cabinet, a matching module made in the form of a network socket and installed at the subscriber, and an information collection device USI APK CENSOR. In this case, this is USI-8F "MAYAK", designed just for monitoring and protecting broadband access cabinets.

Thus, the "CRAB" subsystem suits both new Clients planning to purchase USI-8F, and all Clients who already use these devices on their networks. In general, the CRAB technology is supported by all devices of our line.

For the protection of subscriber cables USI-8F must have the required number of free general-purpose inputs (according to the number of protected cables). There are 8 of them on each USI, so even when connecting a door reed switch and a temperature sensor, there are still 6 inputs that can be used to protect communication lines. At the same time, one must understand that it is not necessary to protect each subscriber line, but it is necessary to protect at least one such line in each inter-access multi-pair cable, which most often becomes the subject of theft. Then, according to approximate calculations, we get a solution for protecting cables in 6-8 entrances of a residential building with one USI-8F device, which is very economical both in terms of cost and labor costs.

The ACD inputs are connected to the patch panel according to the diagram attached to the equipment. The protected cable is also connected to the same patch panel. The uniqueness of the technology is also in the fact that it is the busy subscriber line that is used for protection, and this allows you to save communication lines.

The subscriber and his equipment do not feel such a connection. The line is monitored without interfering with the data transmission process, and only at the physical level, and the control equipment is completely “transparent” for end-to-end traffic. For this purpose, a unique switching circuit, specially developed by CJSC SPC "Computer Technologies", integrated into the patch panel and the matching module, is used.

The CRAB matching module, made in the form of a regular network socket, is installed at the end of the protected cable section directly in the subscriber's apartment or office. A network cable from the subscriber equipment is connected to it. At the same time, the "advanced" connection scheme "CRAB" allows you to protect the cable even when the subscriber equipment is disconnected from the network, i.e. the remote port is not connected.

In the event of a cable break in the section from the patch panel to the matching module, the USI will issue a corresponding signal to the system, and this signal will be immediately transmitted to the dispatcher.

Thus, the operator has an effective and budgetary solution to prevent mass theft of communication cables in the entrances of residential buildings, and hence the losses associated with this.

Needless to say, how important an indicator in the implementation of FTTx projects is their profitability and economic efficiency. These performance can be compromised if the cable is cut, which will require the operator to pay additional costs for its restoration. Now there is a real tool to eliminate these risks and increase the profitability of projects for the construction of broadband access networks - this is the CRAB subsystem of the CENSOR hardware and software complex.

New USI-4x4 device:

The construction of broadband access networks based on FTTB telecommunication cabinets (optics to the building) opens up new opportunities for the operator and new services for the subscriber. At the same time, the operator has a complex and expensive network economy, the stability and profitability of which depend on the quality of control and management, and the reliability of its protection from external threats.

For mass monitoring and control on broadband networks, a simple and reliable solution is needed that provides control over the parameters of life support and protection of FTTB active broadband cabinets over an Ethernet network with management and resource accounting functions, support for the open SNMP protocol and proprietary software. It should have the advantages of leading existing solutions, and be at least half the price of the closest Russian analogues.

CJSC SPC "Computer Technologies" successfully coped with this task, and presents to the attention of Users a super-new product - an economical data collection device USI-4x4 for monitoring active cabinets FTTB!

The new monitoring device USI-4x4 as part of the hardware-software complex "CENSOR" is designed for integrated technological control and protection, management and accounting of resources in broadband access cabinets (FTTB) with active equipment.

The "off-road" formula "4x4" characterizes the main feature of the new USI-4x4: the device has four universal general-purpose input/output ports configured by the User for existing tasks. Each port can operate in the "Input" mode - control of any sensor, or in the "Output" mode - control of external equipment. Thus, USI-4x4 is suitable for any tasks and requirements for monitoring and protecting Internet cabinets of various Users - a real "all-terrain vehicle"!

Monitoring of active broadband cabinets (FTTV). Subsystem MAYAK-FTTx

The subsystem is intended for monitoring and protection of active cabinets of broadband optical networks. MAYAK-FTTx provides compatibility with existing monitoring systems of telecom operators, including those of other manufacturers.



The new object device USI-8F "MAYAK" (F - Fiber) is designed for collection, temporary storage and transmission to the center via Ethernet networks with TCP / IP and SNMP protocols of discrete information from small-sized FTTx telecommunication cabinets.

5.3 Security system against unauthorized access SIP telephony

SIP telephony is a modern alternative to traditional telephony.

The main advantage of SIP telephony is the ability to install telephones with a direct city number and save significant amounts on long-distance and international calls.

Any subscriber with access to the Internet at a speed of 64 Kb/s and higher can connect to SIP-telephony services. To do this, it is enough to install one of the standard soft phones on your computer, laptop or PDA, or buy any IP phone that looks very similar to traditional telephone sets, and is also convenient and easy to use, or an IP gateway (for connecting a regular phone, fax or PBX integration).

Connectivity becomes independent of a person's location, which can be compared to the process of receiving email.

The SIP protocol provides a high degree of protection of telephone conversations from eavesdropping and unauthorized access.

IP telephony standards and their security mechanisms

The lack of uniform accepted standards in this area does not allow the development of universal recommendations for the protection of IP-telephony devices. Each work group or manufacturer has its own way of addressing the security needs of gateways and controllers, carefully studying them before choosing adequate protection measures.

SIP Security

This protocol, similar to HTTP and used by subscriber stations to establish a connection (not necessarily a telephone connection, but also, say, for games), does not have serious protection and is focused on the use of third-party solutions (for example, PGP). As an authentication mechanism, RFC 2543 offers several options, such as basic authentication (as in HTTP) and PGP-based authentication. In an attempt to improve the security of this protocol, Michael Thomas of Cisco Systems developed an IETF draft standard called "SIP securityframework" that describes external and internal threats to the SIP protocol and how to protect against them. These methods include protection at the transport level using TLS or IPSec.

6. Conclusion

Conclusion: In this course project, we implemented the construction of FOCL using FTTB / FTTH technology.

Loading...Loading...