{"title":"无源光网络可靠性研究","authors":"L. Wosinska, Jiajia Chen","doi":"10.1109/ICTON.2007.4296261","DOIUrl":null,"url":null,"abstract":"In this paper reliability performance analysis of some representative protection schemes for Passive Optical Networks PONs is presented. We study three PON architectures defined by ITU-T as well as two architectures that provide reliable connections to business customers and compare connection availability in order to select the most promising protection scheme for the future access solution. Our results show that for the considered architectures a sufficient connection availability level can be obtained only in the scheme with full duplication of network resources.","PeriodicalId":265478,"journal":{"name":"2007 9th International Conference on Transparent Optical Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Reliability Performance of Passive Optical Networks\",\"authors\":\"L. Wosinska, Jiajia Chen\",\"doi\":\"10.1109/ICTON.2007.4296261\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper reliability performance analysis of some representative protection schemes for Passive Optical Networks PONs is presented. We study three PON architectures defined by ITU-T as well as two architectures that provide reliable connections to business customers and compare connection availability in order to select the most promising protection scheme for the future access solution. Our results show that for the considered architectures a sufficient connection availability level can be obtained only in the scheme with full duplication of network resources.\",\"PeriodicalId\":265478,\"journal\":{\"name\":\"2007 9th International Conference on Transparent Optical Networks\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 9th International Conference on Transparent Optical Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTON.2007.4296261\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 9th International Conference on Transparent Optical Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTON.2007.4296261","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reliability Performance of Passive Optical Networks
In this paper reliability performance analysis of some representative protection schemes for Passive Optical Networks PONs is presented. We study three PON architectures defined by ITU-T as well as two architectures that provide reliable connections to business customers and compare connection availability in order to select the most promising protection scheme for the future access solution. Our results show that for the considered architectures a sufficient connection availability level can be obtained only in the scheme with full duplication of network resources.