Definition And Objection Of The Passive Optical Network

Superior Essays
1. Abstract
The Passive Optical Networks (PON) is the network which is most popular in fiber network access systems. The abstract states the actual concept of Passive optical Network it's importance. It also implies the Definition and explanation of ONT(Optical Network Terminal), ONU, FTTH-BPON and FTTH-GEPON systems in FTTx premises.
2. Objectives
The key objectives of the lab are :
• Learning Fiber to the home - BPON and Fiber to the home - GEPON systems.
• To process the layer 2 internet services in Gigabit passive optical network (GPON) FTTH using OLT CLI command and FTTH U2000 client-server and monitoring the performance of fiber optic media.
• [1] The main motive for this lab is to introduce and investigate the information of
…show more content…
I. If the splitter is the 32-way splitter then the minimum power loss would be 16.5 dB. The reason for this can be done with following ways :

i. For instance, if we are testing a 1x2 power splitter, then there is just one other port to test, but in case of 1 x32 splitter, you have to switch the source 32 times and record the results on the reader or the meter.

ii. And By the calculation method by using the formula given below :
SR = (Pi/Pt) x 100 , IL = -10 x log(SR/100) + Le

Activity 2
After Reading the hardware description document and examining the OLT Rack I had found out the number of components placed in the server room.
I. The OLT Rack consists of :
1. Two Shelves :
Shelf 0 which has the presence of OLT. and Shelf 1 which has nothing inside it.
2. For the cabinet there are two types of external connections :
a. Overhead Cables b. Underflow Cables
3. The FAN over temperature can be found out when the LED glows Red.
4. There are total 23 slots on the service shelf.
5. There are seven types of service boards Found in Board list (1/2) in shelf with slots 1-8 and 11-18 :
• P2P Service
…show more content…
• We can calculate a maximum number of ONT's and ONU's on an Optical Line Terminal (OLT) with the help of splitter. For instance, A 1:8 splitting ratio will have :

a. Number of users: 8
b. Power: 12.50
c. Insertion Loss : -9

Activity 3
To analyze the OLT Unit we were supposed to use putty.exe for the serial console using Telnet as a protocol and U2000 Client as a graphical user interface (GUI).
1. To go to the user mode first we need to login as the following step :
• Username: user04
• Password: user1234


The User Mode

• To enter the privilege mode from user mode type "enable"
• The step to get the global config mode from the privilege mode just type

Related Documents

  • Decent Essays

    Ecet 340 Week 4

    • 1985 Words
    • 8 Pages

    ECET 340 Week 4 HomeWork 4 Purchase here http://devrycourse.com/ecet-340-week-4-homework-4 Product Description Determine the conversion time for an ADC0804 (8-bit), where 66 clocks per bit are required, if its clock frequency is 50 kHz. 2. If an 8-bit SAR has Vref = 10 V, what is the binary value for an input voltage of 7.28 V? 3. What is the percent error for the binary answer found in Problem #2?…

    • 1985 Words
    • 8 Pages
    Decent Essays
  • Superior Essays

    IPv4 and IPv6’s main difference In order to transit the network configuration to IPv6, the company needs to understand the different features and functions between IPv4 and IPv6. Both Internet protocols support the network layer of the OSI model. The main differences of two protocols are provided in the section. The detail functionalities and operations of IPv4 can be found in RFC 791. IPv6 specification is in the RFC 2460.…

    • 771 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    5. (5 points) How does dynamic addressing work? Dynamic addressing allows the IP address to change. So, when you turn on your computer the DHCP will send out a request to a DHCP server. The DHCP server will then respond with an IP address that your computer will utilize for that session.…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ntc300 Unit 1

    • 1895 Words
    • 8 Pages

    Hampshire College for example was able to place layer three capable devices at the head-end wiring closet of every major building and effectively create highly controllable sub networks. This allows the College to route traffic to different ISP’s based on network ID addressing or do things like control access to certain networks with access control lists. This design is possible using public addressing, but the ability to quickly roll out experimental address spaces, for testing is a valuable function made possible by private addresses. NAT If this addressing is private and publicly un-routable, then how do we get traffic across the Internet? We can use a method called Network Address Translation to assign routable addresses to non-routable addressed traffic.…

    • 1895 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    First packets reach at a receiving PIC interface. Then the PIC permits the packets to flow to the input and output administrator on the FPC. The input and output administrator checks the packet headers, splits the packets into 64 byte data cells and permits to flow through the cells over the mid plane to the SSB. A Dispersed buffer administrator on the SSB dispenses the data cells through the memory buffers situated on and pooled by all the FPC. The Internet Processor 2 completes functions on the SSB by a route lookup for every packet then decides in what method to send it.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    TCP/IP And OSI Models

    • 957 Words
    • 4 Pages

    12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the…

    • 957 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Nevertheless to inform about a router is the fact that it is a device that allows you to connect to many networks that goes by each computer also it is made of arrangement same as a computer along with a few differences first is the CPU and then a DRAM of course instead of a motherboard it has a circuit board and this lets a router store info and communicate to the components inside it ("History of the Router| EHow." Subscribe to Our RSS. N.p., n.d. Web. 15 Jan.).…

    • 1350 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    End-Of-Chapter Quiz

    • 680 Words
    • 3 Pages

    (1 point) Correct answer Delimited 9) A function that removes extra blank spaces from a string of characters. (1 point) Correct answer TRIM 10) An Excel feature that predicts how to alter data based upon the pattern you enter into the cell at the beginning of the column. (1 point) Correct answer Flash Fill 11) The values that an Excel function uses to perform calculations or operations. (1 point) Correct answer Arguments 12) A database function that adds a column of values in a database that is limited by criteria set for one or more cells. (1 point) Correct answer DSUM 13) The use of two or more conditions on the same row—all of which must be met for the records to be included in the results.…

    • 680 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    How DHCP works:- Dynamic IP address will be generated and assigned from pool of network. It assigns that IP address which are expired. This is done using DHCP server. The high level working of DHCP has mentioned below: a) The network which is connected to your machine, request for IP address to DHCP server. b) On request, DHCP server allocates an IP address to machine.…

    • 1622 Words
    • 7 Pages
    Great Essays
  • Great Essays

    UUIDs fit the bill here, so each device was identified by a UUID (Leach, Mealling, & Salz, 2005). The value in the dictionary had to be customized to store data for a client. Therefore, I created a class that could hold a variety of information regarding the client. The next step was to create the handlers for each command. I created a “connect” URL that clients visited the first time they connected to the botnet, a “checkin” URL that they check in to every 30 seconds, and a “fileupload” URL where the client sends a file and metadata to the server.…

    • 2049 Words
    • 9 Pages
    Great Essays