Next Article in Journal
Experimental Validation of Shifted Position-Diffuse Reflectance Imaging (SP-DRI) on Optical Phantoms
Next Article in Special Issue
Brillouin Interaction between Two Optical Modes Selectively Excited in Weakly Guiding Multimode Optical Fibers
Previous Article in Journal
Towards Building a Distributed Virtual Flow Meter via Compressed Continual Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Protection Schemes in HPON Networks Based on the PWFBA Algorithm

1
Institute of Multimedia Information and Communication Technologies, Slovak University of Technology, Ilkovicova 3, 812 19 Bratislava, Slovakia
2
Department of Telecommunications, Faculty of Electrical Engineering and Communications, Brno University of Technology, Technicka 12, 616 00 Brno, Czech Republic
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(24), 9885; https://doi.org/10.3390/s22249885
Submission received: 10 November 2022 / Revised: 9 December 2022 / Accepted: 13 December 2022 / Published: 15 December 2022
(This article belongs to the Special Issue Fiber-Optic Transmission and Networking)

Abstract

:
In this paper, possibilities for network traffic protection in future hybrid passive optical networks are presented, and reasons for realizing and utilizing advanced network traffic protection schemes for various network traffic classes in these networks are analyzed. Next, principles of the Prediction-based Fair Wavelength and Bandwidth Allocation (PFWBA) algorithm are introduced in detail, focusing on the Prediction-based Fair Excessive Bandwidth Reallocation (PFEBR) algorithm with the Early Dynamic Bandwidth Allocation (E-DBA) mechanism and subsequent Dynamic Wavelength Allocation (DWA) scheme. For analyzing various wavelength allocation possibilities in Hybrid Passive Optical Networks (HPON) networks, a simulation program with the enhancement of the PFWBA algorithm is realized. Finally, a comparison of different methods of the wavelength allocation in conjunction with specific network traffic classes is executed for future HPON networks with considered protection schemes. Subsequently, three methods are presented from the viewpoint of HPON network traffic protection possibilities, including a new approach for the wavelength allocation based on network traffic protection assumptions.

1. Introduction

Passive Optical Network (PON) is a fiber-based point-to-multipoint optical network communication technology with no active elements in the signals path from source to destination (single optical fiber serves multiple endpoints by using unpowered/passive fiber optic splitters, which divides the fiber bandwidth to them), with main advantages such as [1] longer distances (i.e., as the last mile technology between internet provider and customer—approx. 20 km) [2], higher bandwidth (futuristic view up to 25G-PON to 50G-PON [3]), downstream video broadcasting, eliminated need for additional electronic devices in the network (thanks to its passive characteristic), and easy upgrades to higher bit rates (or additional wavelengths).
Future access technologies utilized in passive optical networks must be able to provide high sustainable bandwidths on a per-user basis while keeping capital and operational expenditures as low as possible. Therefore, Next-Generation Passive Optical Networks (NG-PON) need to provide survivability schemes in a cost-efficient way, whereas the growing importance of uninterrupted internet access makes fault management an important challenge [4]. The reliability requirements may depend on user profiles. Thus, NG-PON networks should also support the end-to-end protection for selected users when requested [5]. Within this context, it is significant to discover an effective way to analyze network traffic protection schemes for utilization in future passive optical networks [6].
We introduce new possibilities for network traffic protection in future Hybrid Passive Optical Networks (HPON) [7], including reasons for using the advanced traffic protection schemes for various network traffic classes in those passive networks. Furthermore, principles of the Prediction-based Fair Wavelength and Bandwidth Allocation (PFWBA) algorithm are explained in detail, with a close focus on a Prediction-based Fair Excessive Bandwidth Reallocation (PFEBR) algorithm, with an Early Dynamic Bandwidth Allocation (E-DBA) mechanism and Dynamic Wavelength Allocation (DWA) scheme. Subsequently, three methods are analyzed and evaluated from the viewpoint of HPON network traffic protection possibilities. The first method presents an original approach to the PFEBR algorithm adapted to network traffic protection schemes. The second method introduces our newly developed approach to wavelength allocation based on network traffic protection assumptions. The third method, based on fixed wavelength priority bandwidth allocation, we accommodated directly to specific network traffic classes.
The paper is structured as follows. Section 2 introduces the finer details of HPON networks and the importance of network traffic protection in such networks. Section 3 provides a detailed description of PFWBA, PFEBR and E-DBA algorithm principles. Section 4 provides details about our simulation for HPON, including the results. Last but not least, Section 5 provides conclusions of our findings.

2. Network Traffic Protection in HPON Networks

The HPON presents an intermediate stage in the migration scenario to the fully operational Wavelength Division Multiplexing-Passive Optical Network (WDM-PON) networks, which have a positive future thanks to their ability to satisfy the growing bandwidth demands [8]. Hybrid passive optical networks, except for other characteristics, can utilize both Time Division Multiplex (TDM) and Wavelength-Division Multiplexing (WDM) techniques. It means that various wavelengths can be considered for the network traffic. Thanks to WDM technology, we can efficiently utilize the optical transmission medium, which is very important from the viewpoint of growing bandwidth demands and cheap services. In the present day, there are different standardized passive optical technologies with various dedicated wavelengths able to cooperate. Moreover, the availability of various wavelengths transmission channels leads to the extension of advanced network traffic protection schemes. Therefore, new wavelength allocation methods must be considered in addition to effective bandwidth capacity utilization in HPON networks [9,10].
Future HPON architectures can be proposed without or with network traffic protection schemes. Therefore, they can be designed keeping in mind different possible paths for network deployment and protection upgrades and can be proposed with different levels of network traffic protection. The proposed survivable architectures can also be applied to Time-Division Multiplexing-Passive Optical Networks (TDM-PON) with more than one stage of remote nodes based on power splitters [11,12]. A benefit of the network traffic protection deployed in HPON networks can be obtained as a consequence of the reliability performance improvement and the service interruption decrements experienced by users [13,14,15,16]. It can be beneficial to either provide protection functionalities at the time of the HPON network deployment or at least install a sufficient amount of optical fibers in advance. Furthermore, reasons for network traffic protection are very substantial from the viewpoint of signal transmission. A clear benefit can be shown when network planning is completed with a possible protection upgrade, which leads to a decrease in investment costs. This confirms the importance of the right deployment plan for future hybrid passive optical networks.
HPON networks present a base for converged Fibre-Wireless Passive Optical Networks (Fi-Wi PON) [17]. For that reason, it is necessary to provide a certain level of network traffic protection and restoration [8,11,12]. Different protection schemes can be proposed, starting from a no-protection scenario towards proposed architectures with the protection. However, in a case that no hardware protection is utilized at the network creation, appropriate network traffic protection schemes can be realized. Thus, transmission channels provided with various wavelengths can be involved in providing protection paths for high-priority network traffic classes.
Except for optimization of the optical power budget for passive optical network designs [18], the network traffic protection securing and the system recovery in the case of failures is one of the most important issues in HPON networks. As future passive optical networks transmit aggregated high-speed data from up to hundreds of customers, network units and/or distribution failures represent a serious problem. Research on fault-tolerant HPON topologies recommends the utilization of duplicated optical fibers between the Optical Line Terminal (OLT) and Optical Network Units (ONU), duplicated optical components and the supplementary circuit included in the Remote Node (RN) in one common entity [16] even though these schemes are non-adequate due to their high redundancy with significant expenses [13,19,20]. Except for hardware realization, costlier effective solutions that focus on dynamic wavelength and bandwidth allocation algorithms can be utilized for enhancing differentiated network traffic protection schemes for different traffic classes [21,22].
In this paper, the attention is focused on possible advanced network traffic protection in HPON networks utilizing an appropriate enhancement of the PFWBA activity. In Section 3, principles of the PFWBA algorithm are introduced in detail, focusing on the Prediction-based Fair Excessive Bandwidth Reallocation (PFEBR) algorithm with the Early Dynamic Bandwidth Allocation (E-DBA) mechanism and the related Dynamic Wavelength Allocation (DWA) scheme. This PFWBA algorithm includes the PFEBR and the DWA scheme. These two algorithms are not executed simultaneously, but first, the OLT terminal calculates the time intervals for individual ONU units, and subsequently, working and/or protection wavelengths can be assigned to these calculated time intervals. To analyze various network traffic protection schemes utilizing the wavelength allocation cases possible in HPON networks, a simulation program with the enhancement of the PWFBA algorithm is realized, and an evaluation of different network traffic protection types available for future HPON networks is executed in Section 4. Particular requirements are more or less important for the selected HPON network topology and are satisfied by the presented enhancement of the PFWBA algorithm.

3. PFWBA Algorithm Principles

3.1. E-DBA and PFEBR Principles

The robust PFWBA contains DWA schemes and the E-DBA mechanism for the PFEBR. In the standard Dynamic Bandwidth Allocation (DBA) scheme, the OLT unit starts a process of bandwidth allocation based on time intervals after receiving REPORT messages from all ONU units. The early DBA mechanism (E-DBA) ensures the sequence of transmitting REPORT messages into the OLT by delaying ONU units with unstable network traffic based on the BV, which is represented as the ONU group with a higher variance than the mean variance.
The E-DBA mechanism consists of two operations. In the first step, the OLT executes the DBA scheme after receiving REPORT messages received at the end of ONUi−1. This operation reduces the idle period in the standard DBA algorithm and obtains actual information for ONU units with the unstable network traffic, leading to improving the prediction accuracy in the next service cycle. In the second step, a time interval is assigned to each ONU unit based on the network traffic variance of all ONU units in decreasing order, and at the same time, the BV group is updated by adding some unstable network traffic ONU units with higher variances. This operation mitigates a variance by shortening the waiting time before transmitting data from unstable network traffic ONU units [19].
The PFEBR algorithm calculates a variance of each ONU unit based on previous network traffic information and sorts variances in decreasing order. In this way, an unstable degree list is acquired. A calculation of the variance Vi for the ONUi unit can be expressed as:
V i = 1 N H n P C ( B i , n T o t a l B i M e a n ) 2
where BTotal represents the sum of differentiated network traffic classes (Assured Forwarding (AF), Best Effort (BE) and Expedited Forwarding (EF)) of the ONUi unit in the given (n) cycle ∈ PC (Previous Cycle), BMean is the mean of BTotal values and NH presents the number of historical REPORT messages. The BV group contains ONU units with a higher variance than the mean variance VMean calculated as:
V M e a n = 1 N i = 1 N V i
where N represents a number of ONU units in the system. The E-DBA mechanism moves REPORT messages from the BV group between previous and current ONU units. The PFEBR algorithm requests actual information from the unstable network traffic ONU list to avoid prediction inexactness.
After sending data from all ONU units based on the unstable degree list (UDL), the PFEBR predicts the future network traffic requirement based on the bandwidth request according to this UDL. Predicted requests RC based on differentiated network traffic classes for all ONU units are defined as follows:
R i , n E F = B i , n E F
R i , n + 1 C = ( 1 + α ) · B i , n C
where BC presents the requested bandwidth of the ONUi in the given (n) cycle for differentiated network traffic classes C  { A F , B E } and α means the linear estimated credit [19].
The PFEBR algorithm executes the Excessive Bandwidth Reallocation (EBR) process after finishing the bandwidth prediction needed for each ONU unit. The PFEBR scheme can provide a fairness approach to the EBR in accordance with the guaranteed bandwidth. First, the fair EBR operation in the PFEBR must calculate the RTotal for each ONU unit. The size of the available bandwidth can be expressed as:
B A v a i l a b l e = C c a p · ( T c y c l e N · g N V · g ) N · L C M
where Ccap is the OLT line capacity in bit/s, Tcycle presents the maximum cycle interval, g is the guard time, N is the number of ONU units, NV is the number of ONU units in the BV group, and the control message length LCM is 512 bits (64 octets). The ONUi unit with the maximum residual bandwidth is then selected from unallocated ONU units. The granted bandwidth allocated for the ONUi unit G i , n T o t a l in the next cycle is defined as:
G i , n T o t a l = m i n ( B A v a i l a b l e · S i k U N S k , R i , n T o t a l )
where RTotal is the sum of differentiated network traffic loading after prediction from the ONUi unit in the given (n) cycle, Si/∑ Sk, where kUN (unallocated) is the ratio of the available bandwidth BAvailable assigned to the ONUi unit. The granted bandwidth for particular differentiated (EF, AF and BE) network traffic classes is as follows:
G i , n + 1 E F = R i , n E F
G i , n + 1 A F = m i n ( G i , n + 1 T o t a l G i , n + 1 E F , R i , n A F )
G i , n + 1 B E = G i , n + 1 T o t a l G i , n + 1 E F G i , n + 1 A F
This process continues until the bandwidth for each ONU unit is allocated. Finally, the PFEBR organizes a broadcasting sequence and a report time for each ONU unit based on the unstable degree list [19].

3.2. PFWBA Principles

Cooperation between the DWA algorithm and the PFEBR scheme for enhancement of the system performance can be considered in this way. Before wavelengths are allocated, the PFEBR based on requests from all ONU units determines the transmitting time for the given ONU unit in the current cycle. The PFWBA considers the unstable degree list and enhances the prediction accuracy when scheduling the transmitting sequence after collecting REPORT messages from all ONU units. First, the PFWBA scheme divides all ONU units into three groups based on the variance of all ONU units:
  • group 1: if ONUi  B V
  • group 2: Vi > VMean and ONUi  B V
  • group 3: otherwise
Then, the PFWBA scheme assigns the wavelength for each ONU unit gradually group by group. The PFWBA defines two basic variables—the Channel Available Time (CAT) presents the wavelength availability for broadcasting after the time expiration t, and the Round Trip Time (RTT) presents the time needed for signal transmission from the OLT terminal to ONU units and back. The PFWBA selects requested time intervals in the same group with a minimum transmission time. This scheduling process representing the DWA is concretely described in [19].

4. Simulation Program of the Advanced HPON Network Traffic Protection

We prepared and realized a simulation program in the Java Runtime Environment (JRE) programming software using the Eclipse Integrated Development Environment (IDE) framework that can simulate stochastic network traffic in the HPON network and can be utilized for providing traffic protection paths for different network traffic classes [23]. This program presents activities of the basic PFWBA algorithm and its modifications from the viewpoint of network traffic protection schemes. Specifically, the program presents the dynamic bandwidth and wavelength allocation process in each service cycle managed by the OLT unit. The program also incorporates a generator of the stochastic network traffic with a generation of particular requests for differentiated network traffic classes that are present in the REPORT message for individual ONU units. The simulation program works in cooperation with the Adobe Integrated Runtime (Adobe AIR) multiplatform runtime system due to simpler programming of the graphical interface in the program, where many input parameters can be predetermined, for example, the cycle duration, the guard time, the OLT capacity, the number of ONU units, the number of ONU units entering the unstable degree list, the number of wavelengths and the selected method for the wavelength allocation. There is a possibility for step-by-step operation during the bandwidth and wavelength allocation process. Default input parameters at the program initialization are presented in Table 1.
First three values of input parameters are determined by the OLT terminal at the beginning of the network traffic transmission. They allow for the distribution of time slots without network collisions. They are also unchanged until the HPON network architecture is changed. In this case, these values must be recalculated. As an example, if the specific 1 Gbps line capacity per 1 wavelength is supposed, a value of the available bandwidth after subtraction of guard times and REPORT messages can be calculated by using Equation (5). BAvailable is the maximum number of bytes that can be assigned in one cycle. If this number is multiplied by the number of cycles per second, then the maximum available capacity can be determined. In the next step, the variance (the difference between the current and previous requests) according to Equation (1) must be considered.
Therefore, the median for all ONU units is compared with the mean variance VMean. The first group of ONU units with the largest variance are entered into the unstable degree list, which means that the PFEBR algorithm predicts their large request changes and accommodates them first. The second group of elements is created by ONU units with variance larger than the median, but they are not included in the unstable degree list. The third group is created with ONU units with variance smaller than the median, and thus, the PFEBR algorithm supposes that these units will have no large change in requests. Therefore, data are assigned last to this group in decreasing order. In addition, the PFEBR algorithm ensures fair bandwidth allocations. If more ONU units are included in the UDL, the PFEBR will be less fair.
Because the PFEBR algorithm belongs to the one-level prediction techniques, it predicts the bandwidth allocated for particular ONU units. The prediction is based on the linear credit as a ratio of the request in the given (n) cycle to the total transmitting time of all ONU units in the previous (n − 1) cycle. Therefore, the prediction for a given network traffic class is larger than the requested transmission for each ONU unit. In the final step, the bandwidth for ONU units is allocated based on Equations (7)–(9).
The bandwidth allocation is realized in groups, i.e., first time intervals are allocated to ONU units from the BV group and, finally, up to ONU units with a smaller variance. When the OLT unit assigns time intervals to ONU units, it must also assign wavelengths. Without knowing assigned time intervals, an allocation of wavelengths could be very ineffective. Therefore, the PFEBR algorithm is performed before the DWA algorithm. Three methods for the wavelength allocation are analyzed.

4.1. Method 1—Uniform Utilization of Wavelengths

The first method for advanced network traffic protection is characterized by a uniform utilization of all possible wavelengths. Its disadvantage is the fact that transmitters and receivers paired with considered wavelengths must be turned on in all ONU units utilized in the HPON network. On the contrary, its advantage is the computing simplicity. For specific network traffic classes, two wavelengths are simultaneously utilized for network traffic protection. In this case, both wavelengths are utilized as working and protection paths. In addition, only half of the transmission capacity can be practically utilized. The measurement data based on method 1 are shown in Table 2. The wavelength allocation using method 1 is shown in Figure 1 (Number of Wavelengths: 2; Available Bandwidth: 972,952 Mbps; 243,238 Bytes/cycle; Total Grant: 192,361 Bytes; Throughput: 39%).

4.2. Method 2—Non-Uniform Utilization of Wavelengths

The second method for advanced network traffic protection is trying to utilize only one wavelength, and the second one is not activated until network traffic exceeds the line capacity for the wavelength. This is carried out by a subtraction of transmitting times of particular ONU units from the CAT parameter. A disadvantage of our proposed method is higher computing intensity than in method 1. The measurement data based on method 2 are shown in Table 3. The wavelength allocation using method 2 is shown in Figure 2 (Number of Wavelengths: 2; Available Bandwidth: 972,952 Mbps; 243,238 Bytes/cycle; Total Grant: 138,226 Bytes; Throughput: 28%). For specific network traffic classes, the first wavelength is realized as the working path; the second one is considered as the protection path. Its great advantage is the power saving if the second wavelength is not utilized at that moment. Therefore, except from realizing advanced network traffic protection, possible power savings in ONU units can be seriously considered. In praxis, this power saving can be increased with a higher number of ONU units in HPON networks.

4.3. Method 3—Fixed Wavelength Priority Bandwidth Allocation FWBPA

This method can be applied in applications very sensitive to delay. Because the third method for advanced network traffic protection is working with three different wavelengths, each network traffic class has its own dedicated wavelength. In this way, a small total delay is ensured. A disadvantage is the data stream separation from the ONU unit, whereby this data stream is commonly transmitted in methods 1 and 2. Moreover, method 3 uses the RTT parameter for each network traffic class separately, which means three more times. Then, the method FWBPA is not so effective as method 2, but it allows for the optimization of packet losses and the delay in the AF network traffic dominating in access networks in the present day [20]. The wavelength allocation using method 3 is shown in Figure 3 (Number of Wavelengths: 3; Available Bandwidth: 972,952 Mbps; 243,238 Bytes/cycle; Total Grant: 459,012 Bytes; Throughput: 62%).
For specific network traffic classes, three wavelengths are simultaneously utilized. Each wavelength is realized as the working path for a specific network traffic class and simultaneously as the protection path for the other two network traffic classes in the case of wavelength failure. If the channel capacity is sufficient, the allocated bandwidth is always higher than the requested bandwidth. This is caused by the linear credit that is always positive. As the PFWBA algorithm supports Quality of Service (QoS) requirements, the EF and AF network traffic classes sensitive to delay are preferred to the non-sensitive BE network traffic class. Data not transmitted in the current cycle will be included in the next cycle and will be transmitted if the channel capacity is sufficient. Generally, this BE network traffic does not require any specifications for the bandwidth guarantee and transmission delay.

5. Conclusions

In this paper, the enhancement of HPON network traffic protection schemes based on basic features of the PFWBA algorithm is analyzed. The PFWBA algorithm based on prediction allows for a dynamic and effective utilization of network transmission capacities. Therefore, our selected PFWBA algorithm belongs to algorithms that could possibly be implemented for network traffic protection in hybrid passive optical networks. Using a realized simulation program, three methods were analyzed and evaluated from the viewpoint of traffic protection possibilities. The first method presents an original approach of the PFEBR algorithm adapted to network traffic protection schemes. The second method introduces a new approach for the wavelength allocation based on network traffic protection assumptions. The third method based on fixed wavelength priority bandwidth allocation is accommodated directly to specific network traffic classes.
For advanced network traffic protection schemes in HPON networks, two or three wavelengths can be simultaneously utilized. There exist two basic approaches to utilizing wavelength allocation. In the first approach, the same wavelength can be realized as the working and protection path for specific network traffic classes (a method with uniform utilization of wavelengths and the FWBPA method). In the second approach, different wavelengths are utilized as the working and protection paths for all network traffic classes (a method with the non-uniform utilization of wavelengths). Results from the simulation program show that our proposed method with the non-uniform utilization of wavelengths seems to be more effective from the viewpoint of network traffic protection compared with other considered methods.
Based on the simulation results obtained, we intend to implement the presented methods of wavelength allocation in real HPON systems with considered traffic protection schemes. In some scenarios, each ONU can also process differentiated network traffic classes by varying the number of resources for a defined number of wavelengths. Therefore, the effect of using a different number of resources requested by different traffic classes will be considered in future works.

Author Contributions

Conceptualization, R.R., R.F., E.H., K.K., M.O. and J.M.; methodology, R.R., R.F., E.H., K.K., M.O. and J.M.; validation, R.R., R.F., E.H., K.K., M.O. and J.M.; formal analysis, R.R., R.F., E.H., K.K., M.O. and J.M.; investigation, R.R., R.F., E.H., K.K., M.O. and J.M.; resources, R.R., R.F., E.H. and K.K.; data curation, R.R., R.F., E.H., K.K., M.O. and J.M.; writing—original draft preparation, R.R., R.F., E.H., K.K., M.O. and J.M.; writing—review and editing, R.R., R.F., E.H., K.K., M.O. and J.M.; visualization, E.H. and K.K.; supervision, R.R., R.F., M.O. and J.M.; project administration, R.R.; funding acquisition, R.R. and R.F. All authors have read and agreed to the published version of the manuscript.

Funding

The financial support of the project “Network Service Availability Threat Analysis, Detection and Mitigation” n. FW01010474, was granted by Technology Agency of Czech Republic. The paper was also supported by research activities in the project KEGA 034STU-4/2021.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Kramer, G. What Is Passive Optical Network? McGraw-Hill: New York, NY, USA, 2005; Volume 17. [Google Scholar]
  2. Sen, D.; Kaur, R.; Kaur, K.; Bhamrah, M.S. A Review on passive optical network with colorless onu technology. In Proceedings of the International Conference on Emerging Technologies: AI, IoT, and CPS for Science & Technology Applications, Chandigarh, India, 6–7 September 2021. [Google Scholar]
  3. Rodrigues, C.; Rodrigues, F.; Pinho, C.; Bento, N.; Amorim, M.; Teixeira, A. 25 and 50G optical access network deployment forecasts using bi-logistic curves. In Proceedings of the 2021 Optical Fiber Communications Conference and Exhibition (OFC), San Francisco, CA, USA, 6–10 June 2021; pp. 1–3. [Google Scholar] [CrossRef]
  4. Kumari, M.; Sharma, R.; Sheetal, A. A review of a hybrid IoT-NG-PON system for translational bioinformatics in healthcare. Transl. Bioinform. Healthc. Med. 2021, 13, 59–68. [Google Scholar] [CrossRef]
  5. Róka, R. Performance Analysis of TDM-PON Protection Schemes by Means of the PON Network Availability Evaluator. In Proceedings of the Seventh International Congress on Information and Communication Technology; Springer: Singapore, 2023; pp. 295–303. [Google Scholar] [CrossRef]
  6. Róka, R. Performance Analysis of Wavelength Division Multiplexing-Based Passive Optical Network Protection Schemes by Means of the Network Availability Evaluator. Appl. Sci. 2022, 12, 7911. [Google Scholar] [CrossRef]
  7. Róka, R.; Hudcová, L.; Koval’ová, A. The Performance Analysis of the FSO System Utilization in the Long Reach PON Network using the HPON Network Configurator. In Proceedings of the 2022 45th International Conference on Telecommunications and Signal Processing (TSP), Prague, Czech Republic, 13–15 July 2022; pp. 164–168. [Google Scholar] [CrossRef]
  8. Róka, R. Hybrid PON Networks—Features, Architectures and Configuration; LAP LAMBERT ACADEMIC PUBL: London, UK, 2015. [Google Scholar]
  9. Bosternak, Z.; Róka, R. Bandwidth scheduling methods for the upstream traffic in passive optical networks. Prz. Elektrotechniczny 2018, 94, 1–4. [Google Scholar] [CrossRef]
  10. Bosternak, Z.; Róka, R. Approach of the T-CONT allocation to increase the bandwidth in passive optical networks. Radioengineering 2017, 26, 954–960. [Google Scholar] [CrossRef]
  11. Mahloo, M.; Dixit, A.; Chen, J.; Mas Machuca, C.; Lannoo, B.; Colle, D.; Wosinska, L. Toward reliable hybrid WDM/TDM passive optical networks. IEEE Commun. Mag. 2014, 52. [Google Scholar] [CrossRef] [Green Version]
  12. Mas Machuca, C.; Chen, J.; Wosinska, L. Cost-efficient protection in TDM PONs. IEEE Commun. Mag. 2012, 50, 110–117. [Google Scholar] [CrossRef]
  13. Imtiaz, W.A.; Iqbal, J.; Qamar, A.; Ali, H.; Idrus, S.M. Impact of fiber duplication on protection architectures feasibility for passive optical networks. In Optical Fiber and Wireless Communications; InTechOpen: London, UK, 2017. [Google Scholar] [CrossRef]
  14. Qiu, Y.; Chan, C.K. A novel survivable architecture for hybrid WDM/TDM passive optical networks. Opt. Commun. 2014, 312, 52–56. [Google Scholar] [CrossRef]
  15. Wong, E.; Machuca, C.M.; Wosinska, L. Survivable hybrid passive optical converged network architectures based on reflective monitoring. J. Light. Technol. 2016, 34, 4317–4328. [Google Scholar] [CrossRef]
  16. Róka, R. Optimization of traffic protection schemes for utilization in hybrid passive optical networks. Int. J. Appl. Innov. Eng. Manag. 2016, 5, 107–116. [Google Scholar]
  17. Róka, R. Converged Fi-Wi passive optical networks and their designing using the HPON network configurator. In Paving the Way for 5G Through the Convergence of Wireless Systems; IGI Global: Hershey, PA, USA, 2019; pp. 150–184. [Google Scholar] [CrossRef]
  18. Róka, R. Optimization of the optical power budget for various WDM-PON network designs with traffic protection securing. In Proceedings of the 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 13–15 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
  19. Hwang, I.-S.; Shyu, Z.-D.; Chang, C.-C.; Lee, J.Y. Fault-tolerant architecture with dynamic wavelength and bandwidth allocation scheme in WDM-EPON. Photonic Netw. Commun. 2009, 18, 160–173. [Google Scholar] [CrossRef] [Green Version]
  20. Radivojevic, M.R.; Matavulj, P. Novel wavelength and bandwidth allocation algorithms for WDM EPON with QoS support. Photonic Netw. Commun. 2010, 20, 73–182. [Google Scholar] [CrossRef]
  21. Róka, R. Wavelength allocation and scheduling methods for various WDM-PON network designs with traffic protection securing. In Design, Implementation, and Analysis of Next Generation Optical Networks; IGI Global: Hershey, PA, USA, 2020; pp. 1–39. [Google Scholar] [CrossRef] [Green Version]
  22. Róka, R.; Mokráň, M. Performance analysis and selection of wavelength channels based on the FWM effect influence in optical DWDM systems. Simul. Model. Pract. Theory 2022, 118, 102558. [Google Scholar] [CrossRef]
  23. Róka, R. An effective evaluation of wavelength scheduling for various WDM-PON network designs with traffic protection provision. Symmetry 2021, 13, 1540. [Google Scholar] [CrossRef]
Figure 1. CAT parameter values in s for wavelengths in cycle No. 10 using Method 1.
Figure 1. CAT parameter values in s for wavelengths in cycle No. 10 using Method 1.
Sensors 22 09885 g001
Figure 2. CAT parameter values in s for wavelengths in cycle No. 27 using Method 2.
Figure 2. CAT parameter values in s for wavelengths in cycle No. 27 using Method 2.
Sensors 22 09885 g002
Figure 3. CAT parameter values in s for wavelengths in cycle No. 100 using Method 3.
Figure 3. CAT parameter values in s for wavelengths in cycle No. 100 using Method 3.
Sensors 22 09885 g003
Table 1. Default input parameters in the advanced HPON simulation program.
Table 1. Default input parameters in the advanced HPON simulation program.
ParameterParameter Value
Service cycle duration2 ms
Guard time5 μs
RTT range50–200 μs
OLT capacity per 1 wavelength1 Gbps
Number of ONU units8
Number of units in the UDL2
Number of ONU wavelengths2 (method 1 and 2)
3 (method 3)
Table 2. Example of the wavelength allocation for actual data transmission demands in bytes from 8 ONUs in cycle No. 10 using Method 1.
Table 2. Example of the wavelength allocation for actual data transmission demands in bytes from 8 ONUs in cycle No. 10 using Method 1.
ONU No.MedianEF_pred.AF_pred.BE_pred.EF_grantAF_grantBE_grantTotal GrantedWavelength No.
02,347,02404102999504102999514,0970
18,952,06414513530817214513530817213,1531
219,351,201581517,64510,351581517,64510,35133,8110
355,532,304426516,0297162426516,029716227,4560
433,031,001636810,86926,075636818,06926,07550,5121
5196,077,476159534,1404363159534,140436340,0980
6864,900505204184825052041848211,0281
792,679,129745014617450146122061
Table 3. Example of the wavelength allocation for actual data transmission demands in bytes from 8 ONUs in cycle No. 27 using Method 2.
Table 3. Example of the wavelength allocation for actual data transmission demands in bytes from 8 ONUs in cycle No. 27 using Method 2.
ONU No.MedianEF_pred.AF_pred.BE_pred.EF_grantAF_grantBE_grantTotal GrantedWavelength No.
058,064,40021190550121190550176200
16,948,49651480514151480514110,2890
2274,576880419,9710880419971028,7750
330,140,100503723,5694393503723,569439332,9990
475,012,921022,93410,713022,93410,71333,6470
516,297,36920886729531220886729531214,1290
61,092,02545600204545600204566050
731,32941620041620041620
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Róka, R.; Fujdiak, R.; Holasova, E.; Kuchar, K.; Orgon, M.; Misurec, J. Protection Schemes in HPON Networks Based on the PWFBA Algorithm. Sensors 2022, 22, 9885. https://doi.org/10.3390/s22249885

AMA Style

Róka R, Fujdiak R, Holasova E, Kuchar K, Orgon M, Misurec J. Protection Schemes in HPON Networks Based on the PWFBA Algorithm. Sensors. 2022; 22(24):9885. https://doi.org/10.3390/s22249885

Chicago/Turabian Style

Róka, Rastislav, Radek Fujdiak, Eva Holasova, Karel Kuchar, Milos Orgon, and Jiri Misurec. 2022. "Protection Schemes in HPON Networks Based on the PWFBA Algorithm" Sensors 22, no. 24: 9885. https://doi.org/10.3390/s22249885

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop