Next Generation Access Network (in)security
|
|
|
- Darcy Wilcox
- 10 years ago
- Views:
Transcription
1 P0 Next Generation Access Network (in)security Security proposal for NGN standardization 4 th ETSI Security Workshop Sophia Antipolis, France January 2009 Paolo DE LUTIIS, Roberta D AMICO, Luciana COSTA Telecom Italia SpA Via Reiss Romoli 274, Turin Italy 0
2 P1 Next Generation Access Network (in)security Summary: Background: GPON-based NGA Networks (ITU-T G.984.x) GPON-based NGA main security threats Profiling a complete security mechanism for GPON Conclusions 1
3 P2 Background: ITU-T G.984.x Passive Optical Network (PON) In order to fully deploy the potentiality of the NGN and related services (e.g. Video-On- Demand, interactive gaming, video conferencing), telco Operators are migrating their broadband access network (copper based) to the ultrabroadband fiber-based access networks. Passive Optical Networks (PON) appear to be the best candidate for the Next Generation Access (NGA) network. GPON is an International Telecommunication Union (ITU)-backed standard, supported by the Full Service Access Network (FSAN) group, a forum comprising mostly carriers. GPON can support to 2.5 Gbps downstream and 1.25 Gbps upstream data transmissions Like all PON standards, GPON uses a point-to-multipoint access architecture downstream (to the user) and a point-to-point architecture upstream. 2
4 P3 Background: (G)PON deployment scenarios FTTCab cabinet CO Cabinet ONU DSL OLT S Underground FTTB FTTH Street Aerial CPE CPE ONT ONT CPE ONT ONU DSL S 3
5 P4 Background: currently defined ITU.T G security mechanisms Currently G defines two identification/activation mechanisms Method A: pre-provision of ONU/ONT serial number to an OLT Method B: the serial number is not known in advance and the OLT activates the ONT/ONU on the fly There are currently 2 security mechanisms, both specified as optional: Authentication of the ONU/ONT by means of (PLOAM) password; Encryption of the downstream traffic only (from the CO to the customer side) by means of AES (128 bit) The upstream traffic is not considered at risk because the high directionality of the PON components (it is assumed that the traffic sent from one ONT to the OLT cannot be sniffed by other ONTs). 4
6 P5 Background: currently defined ITU.T G security mechanisms (optional) OLT Splitter ONT/ONU RANGING Request_Password Password Cleartext Request_Key Encryption_Key AES (128bit) encrypted communication (downstream only) 5
7 P6 GPON main security threats The security mechanisms already defined are based on the assumption that all the GPON elements will be strongly physically protected. GPON communication are vulnerable to severe security issues, such as: Fake/Forged OLT: currently no OLT identification and authentication mechanisms have been specified Man In The Middle (MITM) attacks Passive attacks: password and keys sent as cleartext Active attack: sensitive PLOAM messages are not authenticated (e.g. PASSWORD, encryption KEY) Several kind of DOS (Denial of Service) at GPON level e.g. during the activation phases. 6
8 P7 Main Security Threats: Fake OLT scenario (1/3) The ONT/ONU have no means to detect the fake OLT OLT Fake OLT ONT/ONU RANGING PROCEDURE Request_Password Password Request_Key Encryption_Key AES encrypted communication 7
9 P8 Main Security Threats: Passive MITM (2/3) The attacker can intercept data traffic and sensitive (unencrypted) information: authentication passwords and encryption keys (to be used later for e.g. unlawful interception) OLT ONT/ONU attacker Request_Password Password Request_Key Encryption_Key 8
10 P9 Main Security Threats: Active MITM (3/3) The attacker can modify sensitive (unencrypted) information: authentication passwords and encryption keys (in order to cause e.g. denial of service) OLT ONT/ONU attacker Request_Password Modified Password Request_Password Password Request_Key Modified Encryption_Key Request_Key Encryption_Key 9
11 P10 Main Security Threats: A robust security mechanism is missing Although some of these security threats could be addressed with security mechanisms implemented at the physical layer or at higher layer (e.g. IPSec), the GPON-based NGA remains vulnerable to several security attacks. It is important that the GPON infrastructure provides the missing security mechanisms in order to follow the layered security principle and to minimize OPEX and CAPEX of the Operators All the currently defined mechanisms cannot provide an adequate security level to the Operator needs. Moreover the described security gap in the standard could cause the definition of proprietary solutions. 10
12 P11 Profiling a complete security mechanism for GPON In order to face the listed security threats it is needed to add a new, complete, security mechanism. Such a mechanism should provide the following features: Strong authentication: the password used for the authentication should not be sent as cleartext (to avoid a passive MITM attacks) Mutual authentication: also the OLT should be authenticated by the ONT/ONU (to prevent fake OLT) Message authentication: the most sensitive messages should be authenticated (to prevent packet injection during active MITM attacks). Key management: the keys used for the encryption of the downstream traffic should be generated and exchanged in a secure way (to avoid privacy violations). 11
13 P12 How to enhance the current security mechanism: a proposal The enhanced security mechanism could be based on the following: The mutual authentication could be based on a challenge and response mechanisms (e.g. RFC2617) and a pre-shared secret provisioned on both, the OLT and the ONT, never sent as clear text. For example the current GPON Request_Password and Password messages can be used to convey the challenge and response values instead of the actual password The AES encryption keys could be generated independently by the OLT and the ONT/ONU. For example the current Request_key and Encryption_key messages can be used to convey parameters to be used in conjunction with the shared secret for the generation of the encryption keys, without the need to send any sensitive information as clear text. The preshared secret permits also the authentication of the exchanged messages in order to protect them from security attacks (messages forging). 12
14 P13 Conclusions The current specification cannot address properly several severe security issues: Fake/Forged OLT, passive and active MITM, DOS during GPON activation procedures At present, in order to cope with these security threats, the operator should adopt additional security mechanisms (e.g. at physical layer) and then increase its OPEX and CAPEX There is a need to increase the security of the current GPON systems, by means of a new security mechanism. Such a mechanism should fill in the security gap by adding the following features: Mutual and strong authentication between the OLT and ONT/ONU Secure key management for the generation and exchange of the (AES) encryption keys Low impact on the current GPON technology and Standards 13
Gigabit-capable Passive Optical Networks (GPON): General characteristics
Gigabit-capable Passive Optical Networks (GPON): General characteristics SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and digital line system Optical line systems
Passive Optical Networks: Recent Developments and Issues
Passive Optical Networks: Recent Developments and Issues CTO and Co-Founder Nayna Networks, Inc. 180 Rose Orchard Way San Jose, CA 95134 USA www.nayna.com Raj Jain Adjunct Professor Ohio State University
Prospects and Problems GPON Technology over Ethernet Technology
Prospects and Problems GPON Technology over Ethernet Technology Md. Hayder Ali [email protected] SANOG 23 Conference Thimpu, Bhutam Bangladesh : Name: People's Republic of Bangladesh Population: 164.4
Operator s Requirements for G-PON:
Operator s Requirements for G-PON: Summary Of Work In ITU-T SG15/Q2 GSR Brian Ford BellSouth BellSouth, British Telecom, Deutsche Telekom, France Telecom, NTT, Telecom Italia and SBC Introduction This
PON Technology A Shift in Building Network Infrastructure. Bob Matthews Technical Manager CommScope Canada
PON Technology A Shift in Building Network Infrastructure Bob Matthews Technical Manager CommScope Canada The Evolution to PON In 1980s -1990s, we had: Dial up modems The best data rate we could get from
BT and The Developing Optical Access Network Malcolm Campbell BT Design
BT and The Developing Optical Access Network Malcolm Campbell BT Design Introduction FTTP Past, Present and Future The Past 1990 s system PON versus point-to-point TPON BPON GPON The Present BT and Openreach
BroadbandSoHo. Verizon MDU FTTP Overview. Document Description:
BroadbandSoHo Verizon MDU FTTP Overview Document Description: The enclosed document was created to give a basic overview of Verizon s FTTP PON, and technology terms behind there Fios product in regards
Broadband Forum G-PON ONU Certification Program. 2012 Update
Broadband Forum G-PON ONU Certification Program 2012 Update Broadband Forum Engineering smarter & faster connections Architecting a connected lifestyle Defining best practices for global networks Enabling
Energy efficiency in TLC Networks: the Operator and the User perspective
GTTI - Parma June, 23-2009 Energy efficiency in TLC Networks: the Operator and the User perspective Telecom Italia Technology & Energy: Where are we going? 2010 2020 Gbps Interc. F. 100s Gbps Interc. F.
Next Generation Access Glossary. 21CN: BT s upgrade of their core network (the backbone of the network).
Next Generation Access Glossary 21CN: BT s upgrade of their core network (the backbone of the network). Access network: The part of the network that connects directly to customers from the local telephone
GPON - EPON Comparison
White Paper GPON - EPON Comparison CommScope Solutions Marketing October 2013 Contents Introduction 3 Protocol fundamentals 4 Framing/service adaption 4 Basic operation 5 Service hierarchy 7 Bandwidth
Ethernet Passive Optical Networks EPON
Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email [email protected]
Planning for Universal Broadband Solving for x
Planning for Universal Broadband Solving for x Kermit L. Ross President, NDDI Broadband Is the New Universal For most of the last century, telephone companies built networks designed for voice services,
The battle for the residential customer
Fiber, Coax or DSL? Meeting Customer Demand for Bandwidth Only fiber will deliver the kinds of content customers will crave in a few years By David R. Kozischek Corning Cable Systems The battle for the
Alcatel 7342 Intelligent Service Access Manager (ISAM) Fiber to the User (FTTU)
Alcatel 7342 Intelligent Service Access Manager (ISAM) Fiber to the User (FTTU) OPTICAL ACCESS AT ITS BEST AN IP-BASED GPON SYSTEM WITH GIGABIT SPEEDS FOR TRIPLE PLAY B R O A D E N Y O U R L I F E The
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
FTTH Explained: Delivering efficient customer bandwidth and enhanced services Michael Kunigonis Product Line Manager Access Corning Cable Systems
FTTH Explained: Delivering efficient customer bandwidth and enhanced services Michael Kunigonis Product Line Manager Access Corning Cable Systems Overview: Telecommunication carriers worldwide have come
FTTH Technology Developments and Trends. Stephen Hardy Editorial Director & Associate Publisher Lightwave
FTTH Technology Developments and Trends Stephen Hardy Editorial Director & Associate Publisher Lightwave Agenda Where we are now The next generation of FTTH Cable operators and FTTH Residential gateways
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Connect & Go with WDM PON Ea 1100 WDM PON
Connect & Go with WDM PON Ea 1100 WDM PON ericsson deep Fiber access Connectivity Begins in the Access Speed, connectivity, Efficiency In much the same way the worldwide web changed the traditional voice
CommScope GPON. The End-to-End PON Solution. GPON Solution
CommScope GPON The End-to-End PON Solution GPON Solution The smarter way to add PON to your legacy network. Today s competitive telecom environment demands intelligent solutions; technology that protects
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Analysis of the threshold between GPON and EP2P
Analysis of the threshold between GPON and EP2P Germán Santos-Boada, José García-Torres, Jordi Domingo-Pascual Department of Computer Architecture Technical University of Catalonia Barcelona, Spain [email protected]
Economic issues of (broadband) access networks. C. Courcoubetis
Economic issues of (broadband) access networks Topics Broadband access networks* Economics of deployment* Municipal access networks * WIK Consult: The economics of NGA Economics of access - 2 The importance
FTTH ARCHITECTURE WHITE PAPER SERIES
Not all FTTH networks are built the same. Since construction and outside plant account for the majority of total network costs, getting the architecture right has a major impact on the business case. The
EPON Technology White Paper
EPON Technology White Paper Content 1.Overview...4 2.Network Architecture...4 3.Principles...5 4.Architecture...6 5.Key Technologies...8 5.1 ONU s Autodiscovery...8 5.2 Synchronization and Ranging...9
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Deep-fiber broadband access networks
Deep-fiber broadband access networks Joe Baker, Torbjörn Cagenius, Colin Goodwin, Mats Hansson and Martin Hatas Millions of subscribers around the world are today connected via deepfiber broadband (FTTx)
Revisiting Access and Aggregation Network Architecture
Revisiting Access and Aggregation Network Architecture Moufida Feknous 1, 2, Bertrand Le Guyader 1, Annie Gravey 2, 1 Orange Labs, Lannion 22300, France 2 Telecom Bretagne, Technopole Brest-Iroise, CS83818,
Green Wireline Networks home networks sensors networks
GRUPPO TELECOM ITALIA Green Wireline Networks home networks sensors networks Flavio CUCCHIETTI Telecom Italia Innovation Telecom Italia numbers 17M NB users 8 Data Centres 4 Service Centr. 49.ooo battery
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Healthcare ICT Trends & Innovation: Passive Optical LAN (GPON) for the New Era
Healthcare ICT Trends & Innovation: Passive Optical LAN (GPON) for the New Era Michael Wilson, RCDD Solutions Engineering Manager, Tellabs Access Darren Vican, RCDD, OSP Vice President, RTKL 3/17/2015
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
GPON INNOVATION ABOUT PT INOVAÇÃO OPEN YOUR NETWORK TO THE FUTURE BEYOND PT INOVAÇÃO GPON IN-A-BOX
INNOVATION All specifications subject to change without notice PT Inovação BR_GPON_IN-A-BOX_PTIN_EN_v18 BEYOND GPON GPON IN-A-BOX PT INOVAÇÃO www.ptinovacao.pt ABOUT PT INOVAÇÃO PT Inovação has been for
Security for 802 Access Networks: A Problem Statement
Security for 802 Access Networks: A Problem Statement Norman Finn, Cisco Systems Session Number 1 Why bother with Link Layer security? Why not just use IPSEC? There are many protocols that are not securable
How Enterprises Are Solving Evolving Network Challenges with Optical LAN
APPLICATION NOTE How Enterprises Are Solving Evolving Challenges with Optical LAN Executive Summary Enterprise businesses that need to upgrade or replace existing telecommunications networks are looking
GPON- Gigabit Passive Optical Network
GPON- Gigabit Passive Optical Network Chelsea Mosser Mississippi State University Bagley College of Engineering, ECE Department Mississippi State, Mississippi 39762 [email protected] Abstract Gigabit
FTTH solutions for providing broadband services to end-users
FTTH solutions for providing broadband services to end-users Thomas Pfeiffer, Alcatel SEL ITG workshop Zukunft der Netze Kaiserslautern, 1.10.2004 New life for FTTH? > FTTH has been proposed and discussed
GIGABIT PASSIVE OPTICAL NETWORK
GIGABIT PASSIVE OPTICAL NETWORK ABOUT US Key element of modern internet-based content delivery systems (Data, Voice, Video) is interaction with a subscriber. Time when classic TV broadcasting of identical
Genexis FTTH Network Architecture
Genexis FTTH Network Architecture An introduction to the Genexis FTTH Network Architecture This document contains general information about the Genexis FTTH Network Architecture. Contents 1. Introduction...2
GEPON & GPON Comparison. James Young, Technical Director, APAC
GEPON & GPON Comparison James Young, Technical Director, APAC PON History Initial PON (1990s) were based on ATM framing (APON, BPON) ATM-based BPON were inefficient, majority of traffic through the access
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Overview of the BBF access-network solution
Overview of the BBF access-network solution BBF/SIEPON Joint Workshop Christophe Alter Chair BBF Technical Committee Broadband Forum Scope PARTNER APPLICATION FUNCTION PARTNER CONTROL FUNCTION Network
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
TROUBLESHOOTING AT THE SPEED OF LIGHT EMBEDDED OTDR FOR OPERATIONAL EXCELLENCE IN PASSIVE OPTICAL NETWORKS
TROUBLESHOOTING AT THE SPEED OF LIGHT EMBEDDED OTDR FOR OPERATIONAL EXCELLENCE IN PASSIVE OPTICAL NETWORKS Application Note Abstract With our increasing dependence on broadband, service disruptions are
The Economics of Broadband Access Platform Evolution
The Economics of Broadband Access Platform Evolution The EU's ACTS (Advanced Communications Technologies and Services) research programme has tested a number of approaches to delivering broadband services
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE WORKING GROUP ON COMMON CONNECTION STANDARDS (CCS)
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE WORKING GROUP ON COMMON CONNECTION STANDARDS (CCS) Overview of Very High Speed Digital Subscriber Line 2 (VDSL2) 甚 高 速 數 碼 用 戶 線 路 2 的 概 覽 Introduction ADSL
OPTICAL NETWORKS. Optical Access Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Optical Access Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Outline Broadband access network architectures employing Passive (PONs). The potential of PONs to deliver high bandwidths
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Deutsche Telekom Super Vectoring @ FTTC. The Hague, June 2015
Deutsche Telekom Super Vectoring @ FTTC The Hague, June 2015 Fixed access network strategy long term goal: FTTH. Access Network Evolution ADSL2+ ( 16 Mbps) FTTC: Vectoring (100 Mbps) FTTdp* (> 500 Mbps)
Construction of High-speed and High-reliability Optical Networks for Social Infrastructure
Hitachi Review Vol. 59 (Feb. 2010) 1 Construction of High-speed and High-reliability Optical Networks for Social Infrastructure Ryosuke Nishino Hideaki Tsushima, Dr. Eng. Eisuke Sato Shinsuke Tanaka OVERVIEW:
GPON in Mobile Backhaul
GPON in Mobile Backhaul Ram Krishna, DDG (FLA), Mrs. Laxmi Director (FLA), Naveen Kumar ADG(FLA-II), N.P.Vadher, ADG(FLA-I) and Divya Sharma ADET (FLA) Telecommunication Engineering Centre, Department
Making Communities Better with Broadband
* Making Communities Better with Broadband So Many Choices!!!!!! Where Do I Even Start? *Where to Begin *Start With Your Community *Demographics *Current Needs *Vision for the Future *Strengths and Challenges
White Paper: Broadband Access Technologies A White Paper by the Deployment & Operations Committee
White Paper: Broadband Access Technologies A White Paper by the Deployment & Operations Committee Contributors: Rong Zhao (Detecon International) Wolfgang Fischer (Cisco) Edgar Aker (Prysmian Group) Pauline
The Infrastructure of Tomorrow, Available Today. Luca Rozzoni RCDD Business Line Manager TE Connectivity
Optical LAN Solutions The Infrastructure of Tomorrow, Available Today Luca Rozzoni RCDD Business Line Manager TE Connectivity Key Terms PON - Passive Optical Network - (Carrier) Between Central Office
Appendix C. Glossary of Broadband Terms
Appendix C Glossary of Broadband Terms Glossary 3G Third Generation: Intended to be the nest great wireless technology, wideband mobile services and applications offering users faster access to the web.
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
TWDM PON Is on the Horizon. Facilitating fast FTTx network monetization
TWDM PON Is on the Horizon Facilitating fast FTTx network monetization Summary Catalyst With the completion of lab trials this year, commercial trials expected in 2015, and initial deployments forecast
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
TR-156 Using GPON Access in the context of TR-101
TECHNICAL REPORT TR-156 Using GPON Access in the context of TR-101 Issue: 1 Issue Date: December 2008 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
PN8600 Serials. Product Specification. Topvision Technology Co., Ltd
PN8600 Serials Product Specification (V1.2) Topvision Technology Co., Ltd Catalogue Chapter1 Product Introduction... 3 1.1 Product overview... 3 1.2 PN8600 serials OLT Product characteristic... 3 1.3 PN8600
Telecom Italia technology enablers for new markets
MILAN, 18 OCTOBER 2007 Telecom Italia technology enablers for new markets TI MANAGING DIRECTOR TECHNOLOGY 1 Convergent TLC Market and the new Telecom 2.0 approach CAGR 06-09 3,7% 0,8% 1,8% 2,3% 1,6% ICT
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
HST-3000 Handheld Services Tester. Platform Overview
HST-3000 Handheld Services Tester Platform Overview Experience the Power of One Industry-leading access network tester with the leading range of copper-to-cutting-edge functionality Customizable applications
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi
Progress on Super Fast Fibre Access
Progress on Super Fast Fibre Access NICC Open Forum 23 rd November 2009 George Williamson Director, Strategic Network Design Openreach Overview Openreach and the UK supply chain Meeting the challenges
NOWADAYS one can observe increasing demand for. How to build a flexible and cost-effective high-speed access network based on FTTB+LAN architecture
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 655 662 ISBN 978-83-60810-51-4 How to build a flexible and cost-effective high-speed access network based on FTTB+LAN
Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling
, pp. 27-216 http://dx.doi.org/1.14257/ijseia.215.9.8.19 Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling Man Soo Han Optical Engineering
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
MR-229 Leveraging Standards for Next Generation Wholesale Access
MARKETING REPORT MR-229 Leveraging Standards for Next Generation Wholesale Access Issue: 1 Issue Date: December 2010 The Broadband Forum. All rights reserved. Issue History Issue Number Issue Date Issue
1550 Video Overlay for FTTH
1550 Video Overlay for FTTH The New Old Reliable Fernando Villarruel Leonard Ray John McKeon Service Provider Video Technology Group 1 Presentation Overview Background of Overlay in PON Deployment Architecture
How GPON Deployment Drives the Evolution of the Packet-Based Network
How GPON Deployment Drives the Evolution of the Packet-Based Network Introduction The rollout of PON systems in the access market is bringing triple-play services voice, video, and data to the residential
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
FTTH Deployment Options for Telecom Operators
FTTH Deployment Options for Telecom Operators Jani Saheb Shaik, [email protected] N R Patil, [email protected] Sterlite Optical Technologies Ltd Abstract To realize the Government of India s goal
4G: Fourth generation mobile phone standards and technology. Provides faster mobile data speeds than the 3G standards that it succeeds.
Department for Culture, Media & Sport 1 Annex B: Glossary 2G: Second generation of mobile telephony systems. Uses digital transmission to support voice, low-speed data communications, and short messaging
National Broadband Infrastructure Plan for Next Generation Access
Decree 435/ 26.06. 2014 National Broadband Infrastructure Plan for Next Generation Access Sofia, 2014 TABLE OF CONTENTS I. INTRODUCTION... 5 II. TECHNOLOGICAL SOLUTIONS FOR BUILDING NGA INFRASTRUCTURE...
Fiber to the Home. Definition. Overview. Topics
Fiber to the Home Definition Fiber to the home (FTTH) is the ideal fiber-optics architecture. In this architecture, fiber deployment is carried all the way to the customer s home (premises). Overview Today
WDM-PON: A VIABLE ALTERNATIVE FOR NEXT GENERATION FTTP
WDM-PON: A VIABLE ALTERNATIVE FOR NEXT GENERATION FTTP AN ENABLENCE ARTICLE WRITTEN BY DR. MATT PEARSON, VP TECHNOLOGY PUBLISHED IN FTTH PRISIM MAGAZINE March, 2010 www.enablence.com Most of the Fiber-to-the-Home
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. Verizon FiOS FTTP Deployment and NG PON Perspectives
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems Verizon FiOS FTTP Deployment and NG PON Perspectives Martin Carroll DMTS Network and Technology Verizon FTTP: Future Proofing Upstream
Cincinnati Bell Wireline Broadband Network Policies November 20, 2011
1.0 Principles for Cincinnati Bell Broadband Network Management Cincinnati Bell strives to provide its customers with non-discriminatory broadband Internet access at high speeds and at a reasonable price.
White Paper Testing Ethernet Passive Optical Networks
White Paper Testing Ethernet Passive Optical Networks This white paper discusses the different types of Passive Optical Networks with a particular focus on the technology and testing of Ethernet Passive
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
INTERNATIONAL TELECOMMUNICATION UNION SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT
INTERNATIONAL TELECOMMUNICATION UNION ITU-T L.52 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (05/2003) SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT
Strategic White Paper
EPON and DPoE: Helping North American cable MSOs move up-market in business services Strategic White Paper For several years, North American multiple-service operators (MSOs) have been focused on the commercial
Tutor: Orawan Tipmongkolsilp
IPTV Services and Technologies Jan Laskowski s Tutor: Orawan Tipmongkolsilp Contents 1. Overview 2. Headend / Data Center 3. IPTV Technologies IPTV Backbone or core network The Last Mile 4. Consumer devices
GPON 984.3. Section 12-14 Reporter: 王 依 盈 94.10.26
GPON 984.3 Section 12-14 Reporter: 王 依 盈 94.10.26 Outline Security Forward Error Correction OMCI Transport Mechanism Security Basic Threat Model Encryption System Key exchange and switch-over Forward Error
PMD Burst Mode Dynamic Performance Requirement
PMD Burst Mode Dynamic Performance Requirement List of Supporters: Eyal Shraga Frank Effenberger Glen Koziuk Hernando Valencia Meir Bartur Raanan Ivry Rob Carlisle Ron Rundquist Tony Anderson Walt Soto
Power Saving Modes for GPON and VDSL2
Power Saving Modes for GPON and VDSL2 Elmar Trojer 1, Per Erik Eriksson 2 1 Ericsson AB, Broadband Access and Transport Networks, EAB/TLL, Färjögatan 6, SE-164 83 Kista, Sweden, Tel: +46 87193424, [email protected]
Towards networks of the future: SDN paradigm introduction to PON networking for business applications
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems pp. 829 836 Towards networks of the future: SDN paradigm introduction to PON networking for business applications
