A Study on the Protection of EPON 


Vol. 29,  No. 11, pp. 1231-1236, Nov.  2004


PDF
  Abstract

Network protection has been mainly applied to trunk networks. PTP, ring, linear, mesh topologies of SONET/SDH system and 565 Mbps PDH systems are among those examples. But, as larger capacity PON system is introduced, protection in access network system also becomes necessary. In this paper, an efficient EPON protection scheme utilizing the EPON's frame and protocol is proposed and the implementation results showing protection within 1 msec are provided.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

B. Koo, J. Hur, S. Kim, S. Cho, Y. Park, "A Study on the Protection of EPON," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 11, pp. 1231-1236, 2004. DOI: .

[ACM Style]

Bon-Jeong Koo, Jeong Hur, Sunghwi Kim, Seong-Dae Cho, and Youngil Park. 2004. A Study on the Protection of EPON. The Journal of Korean Institute of Communications and Information Sciences, 29, 11, (2004), 1231-1236. DOI: .

[KICS Style]

Bon-Jeong Koo, Jeong Hur, Sunghwi Kim, Seong-Dae Cho, Youngil Park, "A Study on the Protection of EPON," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 11, pp. 1231-1236, 11. 2004.