Add to Cart
GPON OLT Optical Line Terminal For ONU With 8 PON 8 Gigabit
Ethernet Ports
How OLT To Distinguish Uplink Data From Different ONT ?
The downlink data is simple for ONT because they are broadcast down
from OLT, ONT only need to apart the information for itself from
all information. However, the upstream flow is different, because
the upstream flow will meet problem of information conflict .
The former PON technology adopted TDMA for uplink , the time have
to be divided then ONT can distinguish the uploaded data. So how
ONT know to send the data? And how it know how long will it take to
send the data? This requires an agreement between OLT and ONT to
achieve the above functions. What will happen if the OLT assign a
long time for the ONT? If the amount of data sent by ONT is
relatively large, that is to say, the bandwidth of ONT is
relatively large. And the ONT start to send data on the allocated
time. However, it will waste the bandwidth when the ONT do not have
data to send during the allocate time so other ONT which has large
data to send can not use the same time . This situation will
inevitably bring rising costs. So GPON allocate bandwidth based on
T-CONT.
With T-CONT, OLT is able to allocate bandwidth based on T-CONT. Of
course, one ONT has multiple T-CONT, the benefits is it is able to
allocate different type of T-CONT according to the different
requirements of the business bandwidth. So T-CONT should have
different types, currently there are four basic types of T-CONT:
Fix, Assure, Not Assure and Best Effort (Max). They are used to
represent different bandwidth allocation policies. What is the
difference between them? To describe the difference, DBA has to be
mentioned and please refer to another article in our website,
Dynamically Bandwidth Assignment of OLT.
Business Features
| FA-GOLT8608 | |
PON features | GPON | Satisfy ITU -T standard |
L2 features | MAC | MAC Black Hole |
VLAN | 4K VLAN entries | |
Spanning tree protocol | IEEE 802.1D Spanning Tree Protocol (STP) | |
Port | Bi-directional bandwidth control | |
Security features | User security | Anti-ARP-spoofing |
Device security | Anti-DOS attack(such as ARP,Synflood, Smurf, ICMP attack), ARP
detection, worm and Msblaster worm attack | |
Network security | User-based MAC and ARP traffic examination | |
IP routing | IPv4 | ARP Proxy,DHCP Relay,DHCP Server,Static route |
IPv6 | ICMPv6,ICMPv6 redirection,DHCPv6,ACLv6,Configured Tunnel,6to4
tunnel | |
Service features | ACL | Standard and extended ACL |
QoS | Rate-limit to packet sending/receiving speed of port or
self-defined flow and provide general flow monitor and two-speed
tri-color monitor of self-defined flow | |
Multicast | IGMPv1/v2/v3 ,IGMPv1/v2/v3 Snooping | |
MPLS | NPLS LDP | |
Reliability | Loop protection | EAPS and GERP (recover-time <50ms) |
Link protection | FlexLink (recover-time <50ms) | |
Device protection | VRRP host backup | |
Maintenance | Network maintenance | Telnet-based statistics |
Device management | Command-line interface(CLI), Console, Telnet and WEB configuration |
Product Parameters Of FA-GOLT8608
| FA-GOLT8608 |
Switching capacity | 102Gbps |
Throughput (IPv4/IPv6) | 75.88MPPS |
Ports | 4/8*PON port,8*GE FX+8*GE TX,2*10GE SFP+ |
Power redundancy | Dual power supply. Can be double AC, double DC or AC+DC |
Power supply | AC:Input 100~240V,47~63Hz; |
Power consumption | ≤85W |
Outline dimensions | 440mm×44mm×380mm |
Weight (in maximum configuration) | ≤3kg |
Environmental | Working temperature:-15°C~55°C |