The Ethernet Passive Optical Network (EPON) has recently attracted more and more research attention, and is the best
solution of NGN (Next Generation Network) system with predominance of both Ethernet and PON. The outstanding
advantage is great use scope, good extending performance and compatibility, lower cost. The pure data EPON
equipment, which is according with IEEE 802.3ah standard. This paper discusses a QoS scheme in detail. The scheme is
to support muti-service QoS based on multi-LLID technology. Multi-layer classification, multiple LLID to multiple
services and a concrete QoS scheme is discussed. Performing QoS based on multiple services is a hot field of EPON.
This paper brings out a QoS scheme based on multi-LLID technology to support multiple services.
Proc. SPIE. 6784, Network Architectures, Management, and Applications V
KEYWORDS: Switches, Lithium, Information and communication technologies, Detection and tracking algorithms, Networks, Telecommunications, System integration, Broadband telecommunications, Information security, Network security
As telecommunication networks have become bigger and more complex, the need for managing them more effectively,
optimized their capacity and reducing their operation costs has become apparent. To be a adaptive network is becoming
more urgent as the telecommunications market is continuously changing and new services have to be constructed and
provided quickly and cheaply. This paper introduces an adaptive access network device based on ADP(Auto Discovery
Protocol) algorithm, discusses the ADP in detail and give the system software structure.
The security of EPON system means information security, which involves the Confidentiality, integrity, availability, and
controllabitlity. EPON is combined by PON technology and ETHERNET technology. So the analysis of its security
mechanism must aim to the character of PON and ETHERNET. The applying environment and network topology should
also be considered. In this paper we propose the security model of triple churning o support date encryption and
decryption to avoid ONU receiving other ONU's information. We analyze security models in EPON reference model.
This paper introduce the churning and de-Churning scheme, include the single churning and the triple churning, the
detail of the key message mutual process and the key update process.
The Ethernet Passive Optical Network (EPON) has recently attracted more and more research attentions since it could be a perfect candidate for next generation access networks. EPON utilizes pon structure to carry ethernet data, having the both advantages of pon and ethernet devices. From traditional view, EPON is considered to only be a Ethernet services access platform and wake in supporting multi-services especially real-time service. It is obvious that if epon designed only to aim to carrying data service, it is difficult for epon devices to fulfill service provider's command of taking EPON as a integrated service access platform. So discussing the multi-services carrying technology in EPONs is a significative task. This paper deploy a novel method of multi-llid to support multi-services carrying in EPONs.
While the ethernet is applied more and more in public network environment and xdsl service become the most common access mode ,IP kenel DSLAM undertakes some functions such as service distribution and convergence ,security management and customer management.Facing the contradiction of the need of port isolation and the shortage of ip address,VLAN aggregation technology is applied in DSLAM.How to implement the communicatio between the two vlan but share the same ip subnet,proxy arp does this. This paper introduces how to implement proxy arp in the DSLAM. TCP/IP communication detail procedure betweent two host ,the relation of VLAN and network segment are discussed. The proxy arp model and its implementation in IP DSLAM is also expatiated in this paper and a conformance tesing is given.
With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.