Beruflich Dokumente
Kultur Dokumente
Developed by
By
Taiwo-Jalupon Iman
Introduction
Name:Field
Taiwo-Jalupon Iman
of Education Reg. No.:R073004500609
Field of Health Care
Field of Business
Conclusion
NIIT
1
Table of Contents
OPTICAL TECHNOLOGY………………………………………1
Table of Contents………………………………………………….2
Introduction……………………………………………………4
Chapter 1
Chapter 2………………………………………………………6
Optical Cable…………………………………………6
Fiber Buffers………………………………………..6
Chapter 3
Interoperability………………………………………………..12
Synchronous Communication………………………12
Telephone Standards…………………………………..13
2
The Local Subscriber Loop ………………………15
Chapter 4
Promise of MPLS…………………………………22
Chapter 5
Network Management………………………………………24
A Historical Perspective………………………….24
Performance Management……………......26
Configuration Management………………27
Accounting Management………………….27
Fault Management…………………………28
Security Management………………………28
Conclusion
References
3
Introduction
An optical fiber (or fibre) is a glass or plastic fiber designed to guide light
along its length. Fiber optics is the overlap of applied science and
engineering concerned with the design and application of optical fibers.
Optical fibers are widely used in fiber-optic communication, which permits
transmission over longer distances and at higher data rates than other forms
of communications. Fibers are used instead of metal wires because signals
travel along them with less loss, and they are immune to electromagnetic
interference. Optical fibers are also used to form sensors, and in a variety of
other applications.
Two main categories of optical fiber used in fiber optic communications are
multi-mode optical fiber and single-mode optical fiber. Multimode fiber has
a larger core (≥ 50 micrometres), allowing less precise, cheaper transmitters
and receivers to connect to it as well as cheaper connectors. However, multi-
mode fiber introduces multimode distortion which often limits the
bandwidth and length of the link. Furthermore, because of its higher dopant
content, multimode fiber is usually more expensive and exhibits higher
attenuation. Single-mode fiber’s smaller core (<10 micrometres) necessitates
more expensive components and interconnection methods, but allows much
longer, higher-performance links.
4
Chapter 1
5
Chapter 2
Optical Cables
Optical fibers have small cross sectional areas. Without protection, optical
fibers are fragile and can be broken. The optical cable structure protects
optical fibers from environmental damage. Cable structure includes buffers,
strength members, and jackets. Many factors influence the design of fiber
optic cables. The cable design relates to the cable's intended application.
Properly designed optical cables perform the following functions: Protect
optical fibers from damage and breakage during installation and over the
fiber's lifetime.
Fiber Buffers
Coatings and buffers protect the optical fiber from breakage and loss caused
by microbends. During the fiber drawing process, the addition of a primary
coating protects the bare glass from abrasions and other surface
contaminants. For additional protection, manufacturers add a layer of buffer
material. The buffer material provides additional mechanical protection for
the fiber and helps preserve the fiber's inherent strength.
6
The types of fiber buffers include tight-buffered, loose-tube, and gel-filled
loose-tube. Figure 3-13 shows each type of fiber buffer. The choice of
buffering techniques depends on the intended application.
7
Mechanical and fusion splicing are two broad categories that describe the
techniques used for fiber splicing. A mechanical splice is a fiber splice
where mechanical fixtures and materials perform fiber alignment and
connection. A fusion splice is a fiber splice where localized heat fuses or
melts the ends of two optical fibers together. Each splicing technique seeks
to optimize splice performance and reduce splice loss. Low-loss fiber
splicing results from proper fiber end preparation and alignment.
8
transmitting fiber into the receiving fiber. Single fiber butt-jointed and
expanded beam connectors normally consist of two plugs and an
adapter (coupling device).
Some fiber optic data links require more than simple point-to-point
connections. These data links may be of a much more complex design that
requires multi-port or other types of connections. Figure 4-23 shows some
example system architectures that use more complex link designs. In many
cases these types of systems require fiber optic components that can
redistribute (combine or split) optical signals throughout the system.
One type of fiber optic component that allows for the redistribution of
optical signals is a fiber optic coupler. A fiber optic coupler is a device that
can distribute the optical signal (power) from one fiber among two or more
fibers. A fiber optic coupler can also combine the optical signal from two or
more fibers into a single fiber. Fiber optic couplers attenuate the signal much
more than a connector or splice because the input signal is divided among
9
the output ports. For example, with a 1 X 2 fiber optic coupler, each output
is less than one-half the power of the input signal (over a 3 dB loss).
Fiber optic couplers can be either active or passive devices. The difference
between active and passive couplers is that a passive coupler redistributes
the optical signal without optical-to-electrical conversion. Active couplers
are electronic devices that split or combine the signal electrically and use
fiber optic detectors and sources for input and output.
In fiber optic communications systems, optical signals that reach fiber optic
receivers are generally attenuated and distorted (see figure 7-5). The fiber
optic receiver must convert the input and amplify the resulting electrical
signal without distorting it to a point that other circuitry cannot use it.
10
amplification required to raise the detector's electrical signal to a level
suitable for further signal processing. The preamplifier is the dominant
contributor of electrical noise in the receiver. Because of this, its design has
a significant influence in determining the sensitivity of the receiver.
The output circuitry processes the amplified signal into a form suitable for
the interfacing circuitry. For digital receivers, this circuitry may include low-
pass filters and comparators. For analog receivers, this circuitry may also
include low-pass filters.
11
Chapter 3
Interoperability
Synchronous Communication
Most voice systems use synchronous (or clocked) technology, while most
data networks use asynchronous technology.
In a synchronous network (also called a synchronized network or
isochronous network):
• Data is moved at a precise rate
• The network does not slow down as the traffic increases
• Data emerges from the network at exactly the same rate it enters
In voice systems, clocked transmission is important for maintain
low delay, low loss, and low variance of delay.Digital Circuits
and DSU/CSUs
It is possible to lease digital point-to-point circuits from common carriers for
use in long-distance computer networks.
The fee depends on the circuit capacity and distance.
A specialized piece of hardware called a Data Service Unit/Channel
Service Unit (DSU/CSU) is needed to interface a computer to one of the
telephone companies digital circuits.
The CSU portion of the DSU/CSU device handles line termination and
diagnostics.
For example:
12
• Surges generated by lightning or other interference
• Whether the line is disconnected
• Prohibits excessive 1 bits (preventing excessive current on the line)
The DSU portion of the DSU/CSU device handles the data.
For example:
• Translates between data formats of the carrier and the customer
Telephone Standards
U.S. Standards for digital telephone circuits are called the T-series
standards. (Japan has a modified T-series, Europe has the E-series)
13
Technology called inverse multiplexing can provide intermediate capacity
circuits (e.g. greater than T1 and less than T3).
A device known as an inverse multiplexor (inverse mux) is needed at each
end of the lines.
The STS standards refer to the electrical standards in the digital circuit
interface over copper.
The OC standards refer to the optical signals that propagate across optical
fiber.
The C Suffix
The optional suffix of C is used to designate a concatenated circuit.
For example,
• An OC-3 circuit consists of three OC-1 circuits operating at 51.840
Mbps each
• An OC-3C circuit is a single circuit operating at 155.520 Mbps
14
Synchronous Optical NETwork (SONET)
In addition to STS and OC standards, SONET (Synchronous Optical
NETwork) standards define a broad set of digital transmission standards.
In Europe these standards are known as SDH (Synchronous Digital
Hierarchy).
If you lease an STS-1 circuit, you will probably be required to use SONET
encoding on the circuit.
Each STS-1 frame is 810 octets (9 “rows” with 90 “columns”).
SONET uses time to determine frame size, so higher rate circuits will have
larger frames.
SONET is primarily used on single point-to-point circuits, but it also has
additional possibilities for other high-speed configurations.
15
• B channels: operate at 64 Kbps, intended for digitized voice, data or
compressed video
• D channel: operate at 16 Kbps, intended as a control channel
Note: Both B channels can be bonded to form a single 128 Kbps channel
Note: ISDN sounded promising when it was proposed, but is now an expensive option
that offers moderate thoughput.Digital Subscriber Line Technology
DSL (Digital Subscriber Line) is also a technology for providing digital
services across the local loop.
There are several variants of DSL which differ by the first word in their
title, so they are collectively, xDSL.
Defn: Downstream service refers to data flowing out to the user.
Defn: Upstream service refers to data flowing from the user.
ADSL (Asymmetric Digital Subscriber Line)
• Most popular xDSL technology
• Asymmetric service (downstream service higher bit rate than
upstream service)
• Maximum downstream rate is 6.144 Mbps
• Maximum upstream rate is 576 Kbps (640 Kbps – 64 Kbps control
channel)
• Does not require any changes in local loop wiring
• Can run simultaneously with standard phone service
16
Researchers noticed that many local loops can support frequencies higher
than those used by the telephone system.
Difficulty: No two local loops have identical electrical characteristics---
the ability to carry signals depends on the distance, gauge of
wiring used, and level of electrical interference.
Designers were unable to pick a particular set of carrier frequencies or
modulation techniques that would work in all cases.
Thus, ADSL is adaptive.
• ADSL modems are powered on.
• They probe the line to find its characteristics.
• They agree to communicate using techniques that are optimal for the
line.
ADSL uses a scheme known as DMT (Discrete Multi Tone modulation)
that combines frequency division multiplexing and inverse multiplexing.
DMT is implemented by Dividing the bandwidth into 286 separate
frequencies or subchannels.
• 255 frequencies used for downstream data
• 31 frequencies used for upstream data
• Conceptually there is a separate “modem” running on each
subchannel which has its own modulated carrier.
• Bandwidth below 4KHz is not used (to avoid interference with analog phone
signals)
17
Cable Modem Technology
Cable modem do not use the telephone local loop, but the CATV (cable
television network), with speeds up to 36 Mbps.
• Uses coaxial cable (immune to electromagnetic interference)
• Broadband signaling (frequency division multiplexing)
In theory, a pair of cable modems (using frequency division multiplexing)
could be used for each subscriber. One at the customer, one at the CATV
center. Unfortunately, the bandwidth is not high enough.
Instead, the cable company uses one frequency for a set of customers, and
time divison multiplexing between the users.
18
Chapter 4
19
The MPLS forwarding component is based on the label-swapping algorithm.
If the Layer 2 technology supports a label field (such as the ATM VPI/VCI
or the Frame Relay DLCI fields), the native label field encapsulates the
MPLS label. However, if the Layer 2 technology does not support a label
field, the MPLS label is encapsulated in a standardized MPLS header that is
inserted between the Layer 2 and IP headers (see Figure 7). The MPLS
header permits any link layer technology to carry an MPLS label so it can
benefit from label-swapping across an LSP.
20
_ MPLS must be compatible with the IETF Integrated Services Model,
including RSVP.
_ MPLS must scale to support constant Internet growth.
_ MPLS must support operations, administration, and maintenance facilities
at least as extensive as those supported in current IP networks.
Common Misconceptions about MPLS
There are a number of misconceptions concerning the role of MPLS in the
core of the Internet.
Some in the Internet community believe that MPLS was developed to
provide a standard that allowed vendors to transform ATM switches into
high-performance Internet backbone routers.
While this might have been one of the original goals of proprietary
multilayer switching solutions in the mid-1990s, recent advances in silicon
technology allow ASIC-based IP route lookup engines to run just as fast as
MPLS or ATM VPI/VCI lookup engines. Although MPLS can enhance the
forwarding performance of processor-based systems, accelerating packet
forwarding performance was not the primary force behind the creation of the
MPLS working group.
Others in the Internet community believe that MPLS was designed to
completely eliminate the need for conventional, longest-match IP routing.
This never was an objective of the MPLS working group because its
members understood that traditional Layer 3 routing would always
be required in the Internet.
21
using conventional routing or assign a label and forward the packet over a
new label switched path.
_ At the last hop before the destination host, the packet must be forwarded
using conventional Layer 3 routing because it is not practical to assign a
separate label to every host on the destination subnetwork.
The Promise of MPLS
The question remains, “Why should an ISP consider deploying MPLS in the
core of its network?” The most important benefit of MPLS is that it provides
a foundation that permits ISPs to deliver new services that cannot be readily
supported by conventional IP routing techniques. ISPs face the challenge of
not only delivering superior baseline service, but also providing new
services that distinguish them from their competition. MPLS allows service
providers to control costs, provide better levels of base service, and offer
new revenue-generating customer services.
Figure 8 illustrates how MPLS provides enhanced routing capabilities by
supporting applications that require more than just destination-based
forwarding. Assume that the routers in the core of the network perform
conventional, longest-match IP forwarding. If either Host A
or Host B transmits a packet to Host C, the packet follows Path 1 across the
core of the network because this is the shortest path computed by the IGP.
Figure 8: MPLS Enhances Routing Functionality
Suppose that the network administrator has been monitoring traffic statistics
and needs to implement a policy to control congestion at Router B. The
policy would reduce congestion at Router B by distributing the traffic load
along different paths across the network. Traffic sourced by Host A and
destined for Host C would follow the IGP shortest path, Path 1.
Traffic sourced by Host B and destined for Host C would follow another
path, Path 2. Using conventional IP routing, this policy cannot be
implemented because all forwarding at Router A is based on the packet’s
22
destination address. Now, if the routers in the core of the network function as
LSRs, it is easy to implement a policy
to reduce congestion at LSR B. The network administer configures LSP 1 to
follow Path 1. The network administer configures LSP 2 to follow Path 2.
Finally, the network administer configures LSR A to put all traffic received
from Host A and destined for Host C into LSP 1.
Likewise, LSR A is configured to place all traffic received from Host B and
destined for Host C into LSP 2. The ability to assign any FEC to a custom-
tailored LSP gives the network administrator precise control of traffic as it
flows through the provider’s network.
With careful planning, MPLS provides ISPs an unprecedented level of
control over traffic,
resulting in a network that is more efficiently operated, supports more
predictable service, and can offer the flexibility required to meet constantly
changing customer expectations. You should note that the remainder of this
section describes the potential for MPLS to assign traffic
to FECs based on an extremely rich set of packet classification capabilities.
Initial MPLS implementations will provide a more restricted set of packet
classification capabilities which should be expected to evolve as the
software implementing the control component matures.
As ISPs are required to roll out new customer services, the MPLS
forwarding infrastructure can remain in place. New services can be deployed
by simply modifying the control component that assigns packets to an FEC
and then maps each FEC to a custom-built LSP (see Figure 9).
For example, packets can be assigned to an FEC based on a combination of
the destination subnetwork and application type, a combination of the source
and destination subnetworks, a specific QoS requirement, an IP multicast
group, or a Virtual Private Network (VPN) identifier.
Similarly, network administrators can provision LSPs to satisfy specific FEC
requirements—
minimize the number of hops, meet specific bandwidth requirements, force
traffic across certain links in the network, and so forth. The final step in
evolving routing functionality is to configure the head-end LSR to place
packets assigned to a particular FEC into an LSP that has been customized to
support the FEC’s requirements.
Figure 9: How MPLS Enhances Routing Functionality
23
Chapter 5
Network Management
24
created a crisis for many organizations. An urgent need arose for automated
network management (including what is typically called network capacity
planning) integrated across diverse environments.
6-2
Network Management Architecture
Most network management architectures use the same basic structure and set
of relationships. End stations (managed devices), such as computer systems
and other network devices, run software that enables them to send alerts
when they recognize problems (for example, when one or more user-
determined thresholds are exceeded). Upon receiving these alerts,
management entities are programmed to react by executing one, several, or a
group of actions, including operator notification, event logging, system
shutdown, and automatic attempts at system repair.
Management entities also can poll end stations to check the values of certain
variables. Polling can be automatic or user-initiated, but agents in the
managed devices respond to all polls. Agents are software modules that first
compile information about the managed devices in which they reside, then
store this information in a management database, and finally provide it
(proactively or reactively) to management entities within network
management systems (NMSs) via a network management protocol. Well-
known network management protocols include the Simple Network
Management Protocol (SNMP) and Common Management Information
Protocol (CMIP). Management proxies are entities that provide management
information on behalf of other entities. Figure 6-1 depicts a typical network
management architecture.
25
Network management system
26
Management entities continually monitor performance variables. When a
performance threshold is exceeded, an alert is generated and sent to the
network management system.
Each of the steps just described is part of the process to set up a reactive
system. When performance becomes unacceptable because of an exceeded
user-defined threshold, the system reacts by sending a message. Performance
management also permits proactive methods: For example, network
simulation can be used to project how network growth will affect
performance metrics. Such simulation can alert administrators to impending
problems so that counteractive measures can be taken.
Configuration Management
The goal of configuration management is to monitor network and system
configuration information so that the effects on network operation of various
versions of hardware and software elements can be tracked and managed.
Each network device has a variety of version information associated with it.
An engineering workstation, for example, may be configured as follows:
• Operating system, Version 3.2
• Ethernet interface, Version 5.4
• TCP/IP software, Version 2.0
• NetWare software, Version 4.1
• NFS software, Version 5.1
• Serial communications controller, Version 1.1
• X.25 software, Version 1.0
• SNMP software, Version 3.1
Configuration management subsystems store this information in a database
for easy access. When a problem occurs, this database can be searched for
clues that may help solve the problem.
Accounting Management
The goal of accounting management is to measure network utilization
parameters so that individual or group uses on the network can be regulated
appropriately. Such regulation minimizes network problems (because
network resources can be apportioned based on resource capacities) and
maximizes the fairness of network access across all users.
As with performance management, the first step toward appropriate
accounting management is to measure utilization of all important network
resources. Analysis of the results provides insight into
current usage patterns, and usage quotas can be set at this point. Some
correction, of course, will be required to reach optimal access practices.
From this point, ongoing measurement of resource use can
27
yield billing information as well as information used to assess continued fair
and optimal resource utilization.
Fault Management
The goal of fault management is to detect, log, notify users of, and (to the
extent possible) automatically fix network problems to keep the network
running effectively. Because faults can cause downtime or unacceptable
network degradation, fault management is perhaps the most widely
implemented of the ISO network management elements.
Fault management involves first determining symptoms and isolating the
problem. Then the problem is fixed and the solution is tested on all-
important subsystems. Finally, the detection and resolution of the problem is
recorded.
Security Management
The goal of security management is to control access to network resources
according to local guidelines so that the network cannot be sabotaged
(intentionally or unintentionally) and sensitive information cannot be
accessed by those without appropriate authorization. A security management
subsystem, for example, can monitor users logging on to a network resource
and can refuse access to those who enter inappropriate access codes.
Security management subsystems work by partitioning network resources
into authorized and unauthorized areas. For some users, access to any
network resource is inappropriate, mostly because such users are usually
company outsiders. For other (internal) network users, access to information
originating from a particular department is inappropriate. Access to Human
Resource files, for example, is inappropriate for most users outside the
Human Resources department. Security management subsystems perform
several functions. They identify sensitive network resources (including
systems, files, and other entities) and determine mappings between sensitive
network resources and user sets. They also monitor access points to sensitive
network resources and log inappropriate access to sensitive network
resources.
Conclusion
28
Modern fiber cables can contain up to a thousand fibers in a single cable, so
the performance of optical networks easily accommodates even today's
demands for bandwidth on a point-to-point basis. However, unused point-to-
point potential bandwidth does not translate to operating profits, and it is
estimated that no more than 1% of the optical fiber buried in recent years is
actually 'lit'.
Modern cables come in a wide variety of sheathings and armor, designed for
applications such as direct burial in trenches, dual use as power lines [3],
installation in conduit, lashing to aerial telephone poles, submarine
installation, or insertion in paved streets. In recent years the cost of small
fiber-count pole-mounted cables has greatly decreased due to the high
Japanese and South Korean demand for fiber to the home (FTTH)
installations.
Referencecs
Textbooks
Davie, B., P. Doolan, and Y. Rekhter, Switching in IP Networks: IP Switching, Tag Switching, and
Related Technologies, Morgan Kaufmann, 1998, ISBN 1-55860-505-3.
Metz, Christopher, IP Switching: Protocols and Architectures, McGraw-Hill, New York, 1999,
ISBN 0-07-041953-1.
URLs
29