Kartalopoulos | Next Generation Intelligent Optical Networks | E-Book | www.sack.de
E-Book

E-Book, Englisch, 284 Seiten

Kartalopoulos Next Generation Intelligent Optical Networks

From Access to Backbone
1. Auflage 2007
ISBN: 978-0-387-71756-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

From Access to Backbone

E-Book, Englisch, 284 Seiten

ISBN: 978-0-387-71756-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica ?ber with a single wavelength modulated at low data rates, it was quickly demonstrated that ?ber can deliver much more bandwidth than any other transmission medium, twisted pair wire, coaxial cable, or wireless. Since then, the optical network evolved to include more exciting technologies, gratings, optical ?lters, optical multiplexers, and optical ampli?ers so that today a single ?ber can transport an unprecedented aggregate data rate that exceeds Tbps, and this is not the upper limit yet. Thus, the ?ber optic network has been the network of choice, and it is expected to remain so for many generationsto come, for both synchronousand asynchronouspayloads; voice, data, video, interactive video, games, music, text, and more. In the last few years, we have also witnessed an increase in network attacks as a result of store andforwardcomputer-basednodes. These attackshave manymaliciousobjectives:harvestsomeone else's data, impersonate another user, cause denial of service, destroy ?les, and more. As a result, a new ?eld in communicationis becomingimportant,communicationnetworksand informationse- rity. In fact, the network architect and system designer is currently challenged to include enhanced features such as intruder detection, service restoration and countermeasures, intruder avoidance, and so on. In all, the next generation optical network is intelligent and able to detect and outsmart malicious intruders.

Kartalopoulos Next Generation Intelligent Optical Networks jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Introduction;13
2;Communication Networks;15
2.1;1.1 Analog and Digital Transmission;15
2.2;1.2 Breaking the Traffic Barrier;17
2.3;1.3 Voice and Data Networks;19
2.4;References;27
3;Digital Networks;29
3.1;2.1 Synchronous Optical Networks: SONET/SDH;29
3.2;2.2 Asynchronous Data/Packet Networks;38
3.3;2.3 Review of Data Networks;42
3.3.1;2.3.1 Asynchronous Transfer Mode;42
3.3.2;2.3.2 Ethernet;46
3.3.3;2.3.3 Gigabit Ethernet;47
3.3.4;2.3.4 10 Gigabit Ethernet;50
3.3.5;2.3.5 FDDI;51
3.3.6;2.3.6 Switched Multi-megabit Data Services;53
3.3.7;2.3.7 Frame Relay;53
3.3.8;2.3.8 The Transmission Control Protocol;53
3.3.9;2.3.9 The User Datagram Protocol;54
3.3.10;2.3.10 The Real-Time Transport Protocol;55
3.3.11;2.3.11 Internet Protocol;55
3.3.12;2.3.12 The Point-to-Point Protocol;57
3.3.13;2.3.13 4B/5B and 8B/10B Block Coding;60
3.3.14;2.3.14 Fiber Channel;61
3.3.15;2.3.15 ESCON protocol;64
3.4;2.3.16 FICON Protocol;65
3.5;2.4 Resilient Packet Ring;66
3.6;References;67
4;WDM Technology and Networks;69
4.1;3.1 Introduction;69
4.2;3.2 The Optical Fiber in Communications;69
4.2.1;3.2.1 Propagation of Light in Matter;70
4.2.2;3.2.2 Effects That Affect the Propagation of Light in Fiber;71
4.3;3.3 The Optical Communications Spectrum;77
4.4;3.4 Types of Fiber;79
4.4.1;3.4.1 Optical Power Limit;80
4.4.2;3.4.2 Fiber Birefringence;81
4.4.3;3.4.3 Fiber Dispersion;81
4.4.4;3.4.4 Non-linear Phenomena Cause Positive and Negative Effects;83
4.5;3.5 Optical Amplifiers;83
4.5.1;3.5.1 Raman Amplification;84
4.5.2;3.5.2 EDFA Amplification;85
4.5.3;3.5.3 SOA Amplification;87
4.6;3.6 Optical Add-Drop Multiplexers;87
4.7;3.7 DWDM Networks;87
4.7.1;3.7.1 DWDM Network Topologies;88
4.7.2;3.7.2 Optical Network Interfaces;89
4.7.3;3.7.3 Network Switching;92
4.7.4;3.7.4 Timing and Synchronization;95
4.7.5;3.7.5 Channel and Link Protection;95
4.7.6;3.7.6 Routing;96
4.8;3.8 Access WDM Systems;97
4.8.1;3.8.1 The General PON;98
4.8.2;3.8.2 CWDM-PON;101
4.8.3;3.8.3 TDM-PON;101
4.8.4;3.8.4 TDM-PON Versus WDM-PON;103
4.8.5;3.8.5 Hierarchical CWDM/TDM-PON;103
4.8.6;3.8.6 How Real Is PON?;108
4.8.7;3.8.7 Free Space Optical;109
4.9;References;111
5;Next Generation SONET/SDH;114
5.1;4.1 Traffic and Service Convergence;114
5.2;4.2 Next Generation SONET/SDH Networks;117
5.2.1;4.2.1 Next Generation Ring Networks;117
5.2.2;4.2.2 Next Generation Mesh Networks;118
5.3;4.3 Next Generation Protocols;123
5.3.1;4.3.1 Concatenation;124
5.3.2;4.3.2 Generic Multi-protocol Label Switching;125
5.3.3;4.3.3 The Generic Framing Procedure;127
5.3.4;4.3.4 LCAS;133
5.3.5;4.3.5 LAPS;136
5.4;4.4 Concatenation Efficiency;140
5.5;References;141
6;The Optical Transport Network;142
6.1;5.1 Introduction;142
6.2;5.2 OTN Network Layers;142
6.3;5.3 FEC in OTN;144
6.4;5.4 OTN Frame Structure;145
6.5;5.5 OTN and DWDM;151
6.6;5.6 OTN Management;152
6.7;References;153
7;Network Synchronization;154
7.1;6.1 Introduction;154
7.2;6.2 Synchronization;154
7.2.1;6.2.1 The Primary Reference Source;155
7.2.2;6.2.2 The Node Timing Unit and the Phase Lock Loop;156
7.2.3;6.2.3 Synchronization Impairments;158
7.3;6.3 The Timing Signal;159
7.4;6.4 Signal Quality;160
7.4.1;6.4.1 Noise Sources;161
7.4.2;6.4.2 Quantization Noise;162
7.5;6.5 Transmission Factors;162
7.5.1;6.5.1 Phase Distortion and Dispersion;163
7.5.2;6.5.2 Frequency Distortion;163
7.5.3;6.5.3 Polarization Distortion;163
7.5.4;6.5.4 Noise due to Nonlinearity of the Medium;163
7.5.5;6.5.5 ASE;163
7.6;6.6 Jitter and Wander;163
7.6.1;6.6.1 Intersymbol Interference;166
7.6.2;6.6.2 Data-Dependent Jitter;166
7.6.3;6.6.3 Pulse-Width Distortion Jitter;167
7.6.4;6.6.4 Sinusoidal Jitter;167
7.6.5;6.6.5 Uncorrelated Bounded Jitter;167
7.6.6;6.6.6 Stokes Noise, Chromatic Jitter, and FWM noise;167
7.6.7;6.6.7 Sources of Jitter;168
7.6.8;6.6.8 Jitter Generation, Tolerance, and Transfer;169
7.7;6.7 Photodetector Responsivity and Noise Contributors;169
7.8;References;170
8;Network Performance;172
8.1;7.1 Introduction;172
8.2;7.2 Channel Performance;174
8.3;7.3 Carrier to Noise Ratio and Power–Bandwidth Ratio;175
8.4;7.4 Shannon’s Limit;176
8.5;7.5 Optical Signal to Noise Ratio;176
8.6;7.6 Factors That Affect Channel Performance;177
8.7;7.7 Analysis of BER and SNR Related to Channel Performance;178
8.8;7.8 BER and SNR Statistical Estimation Method;181
8.9;7.9 Circuit for In-Service and Real-Time Performance Estimation;183
8.10;References;184
9;Traffic Management and Control;185
9.1;8.1 Introduction;185
9.2;8.2 Client Bandwidth Management;187
9.3;8.3 Wavelength Management;187
9.4;8.4 Traffic Management;189
9.5;8.5 Congestion Management;190
9.6;8.6 Routing Algorithms;190
9.7;8.7 Discovery of Optical Network Topology;191
9.8;8.8 Node and Network Provisioning;192
9.9;8.9 Wavelength Management Strategies;192
9.10;References;193
10;Network Protection and Fault Management;195
10.1;9.1 Introduction;195
10.2;9.2 Fault Detection and Isolation;196
10.3;9.3 Fault and Service Protection;196
10.4;9.4 Point-to-Point Networks;198
10.5;9.5 Mesh Network Protection;199
10.6;9.6 Ring-Network Protection;200
10.7;9.7 Ring-to-Ring Protection;201
10.8;9.8 Multi-ring Shared Protection;202
10.9;References;202
11;Network Security;203
11.1;10.1 An Old Concern;203
11.2;10.2 Network Security Issues;207
11.3;10.3 Definitions;208
11.4;10.4 Security Levels;212
11.5;10.5 Security Layers in Communication Networks;213
11.5.1;10.5.1 Security on the Information Layer;213
11.5.2;10.5.2 Security on the MAC/Network Layer;214
11.5.3;10.5.3 Security on the Link Layer;215
11.6;10.6 Mathematical Foundations for Security Coding;215
11.7;10.7 Ciphers;220
11.8;10.8 Quantum Cryptography;225
11.9;10.9 Key Distribution;227
11.9.1;10.9.1 Merkley’s Algorithm;227
11.9.2;10.9.2 Shamir’s Key Distribution Method;227
11.9.3;10.9.3 Diffie–Hellman Key Exchange;227
11.9.4;10.9.4 Elliptic Curve Cryptography;229
11.9.5;10.9.5 Digital Signature;236
11.9.6;10.9.6 The Trusted Third Party or Key Escrow Encryption System;237
11.10;10.10 Quantum Key Distribution;237
11.10.1;10.10.1 Polarization-Based Quantum Key Distribution;238
11.10.2;10.10.2 Entangled States and Quantum Teleportation;241
11.10.3;10.10.3 Quantum Teleportation and Quantum Key Distribution;244
11.10.4;10.10.4 A Trivialized Example;245
11.10.5;10.10.5 Current Issues;245
11.11;10.11 Current Vulnerabilities in Quantum Cryptography;246
11.12;10.12 Countermeasures in Optical Networks;248
11.13;10.13 Biometrics and Communication Networks;253
11.14;10.14 Security in the Next Generation Optical Networks;254
11.15;References;258
12;Concluding Remarks;264
12.1;11.1 Bandwidth Evolution;264
12.2;11.2 Convergence;264
12.3;11.3 Why Do Not I Have Fiber to My Home?;265
12.4;11.4 What About Traditional Services?;265
12.5;11.5 How About Security of Information and of the Network?;265
12.6;11.6 Number Portability;266
12.7;11.7 How Is the Network Managed?;266
12.8;11.8 The Bottom Line;266
13;VPIsystems—Demonstration Examples;267
13.1;Introduction;267
13.2;Application Example 1;267
13.3;Application Example 2;267
13.4;Application Example 3;268
13.5;Application Example 4;268
13.6;Application Example 5;268
13.7;Application Example 6;268
13.8;Application Example 7;269
13.9;Application Example 8;269
13.10;Application Example 9;269
13.11;Application Example 10;270
13.12;Application Example 11;270
13.13;Application Example 12;270
14;Acronyms;271
15;Short Bio;283



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.