Open access peer-reviewed chapter

Impact of Fiber Duplication on Protection Architectures Feasibility for Passive Optical Networks

Written By

Waqas Ahmed Imtiaz, Javed Iqbal, Affaq Qamar, Haider Ali and Sevia M. Idrus

Reviewed: 02 March 2017 Published: 21 June 2017

DOI: 10.5772/intechopen.68237

From the Edited Volume

Optical Fiber and Wireless Communications

Edited by Rastislav Roka

Chapter metrics overview

1,601 Chapter Downloads

View Full Metrics

Abstract

Adaptability of high capacity passive optical network (PON) requires the provision of an efficient fault detection and restoration mechanism throughout the network at an acceptable cost. The readily adapted pre-planned protection strategy relies on component duplication, which significantly increases the cost of deployment for PON. Therefore, it is imperative to determine a suitable component that requires high redundancy and determine the impact of protection for that component on feasibility of PON. Five protection architecture including ITU-T 983.1 Type C, single ring, dual ring, tree- and ring-based architectures with hybrid star-ring topology at the optical distribution network (ODN), are considered to evaluate the impact of fiber duplication in terms of capital expenditure (CAPEX), operation expenditure (OPEX), reliability, and support for maximum number of subscribers. Reliability block diagram (RBD) based analysis shows that desirable 5 nines connection availability is provided by each protection architecture and utilization of ring topology avoids duplication of the fiber but effects the number of subscribers. Furthermore, it is observed that OF duplication at ODN is the main contributor to CAPEX. Collectively hybrid protection architectures provide efficient performance and proves to be a feasible solution for the deployment of survivable PONs at the access domain.

Keywords

  • passive optical network
  • protection
  • network topology
  • reliability
  • CAPEX
  • OPEX

1. Introduction

Exponential growth in Internet traffic has significantly increased the demand for high bandwidth connectivity at both business and residential premises. Internet service providers are deploying passive optical network (PON) at the access domain to provide the required capacity in terms of reach, bandwidth, and the number of subscribers. In PON, all services are originated from an optical line terminal (OLT) at the central office (CO). End‐face of the OLT is connected to a 15–20 km feeder fiber (FF) that extends the network toward the subscriber premises called optical distribution network (ODN). Remote node (RN) receives the FF at ODN, which houses a 1:N bidirectional passive optical coupler (POC). N output ports from the POC are fed into short‐branched distribution fibers (DFs) that connect the RN to individual optical network unit (ONU) transceiver modules [1].

PON has emerged as a promising candidate to resolve the last‐mile bottle, owing to its significant advantages like:

  • Support for high network capacity in terms of reach, bandwidth, and the number of subscribers due to a complete optical fiber (OF) path between OLT and ONU modules.

  • Minimum capital expenditure (CAPEX) by sharing FF between OLT and multiple ONUs.

  • Reduced operational expenditure (OPEX) through passive components at RN, which requires no power, minimum maintenance and planning.

  • Smooth service upgradability with existing infrastructures.

  • Highly scalable as new subscribers can easily join the network.

  • High degree of flexibility, owing to the use of FF between OLT and multiple subscribers.

With the rapid increase in PONs capacity, fault detection and restoration at satisfactory costs have turned the network reliability to a new challenge for Internet service providers. Each subscriber is interested in seamless reception of maximum bandwidth at minimum possible cost. However, the conventional PON architecture has limited protection, which results in significant data loss at the event of failure in optical components including OF medium. Therefore, it is imperative to devise an architecture, which is capable of maintaining a seamless flow of upstream and downstream traffic at required capacity and acceptable costs for a common end subscriber [1, 2].

Two techniques are readily adapted to provide fault detection and restoration in PON, namely pre‐planned and dynamic protection. The latter relies on fault detection and restoration through diagnosis at the higher levels and dynamically allocates resources at the event of failure. Such technique requires more time for traffic restoration between OLT and ONU modules, as upper layer recovery techniques usually utilize routing tables, topology recalculations, and slow convergence time. Yet there is no guarantee for fault restoration at the physical layer [13]. Therefore, for the facilitation of an effective and prompt fault detection and restoration, it is highly desirable to provide protection measures at the optical layer.

Pre‐planned protection utilize an optical‐layer approach by providing dedicated backup paths for components including OF medium. This type of protection is planned at the network design phase, owing to the fact that topology of PON remains same, and the proposed solution can address fault restoration at both feeder and ODN. This type of protection provides high reliability at minimum recovery time in the event of failures at both optical components and OF medium. However, path and resources duplication significantly elevates the CAPEX at the network deployment phase [4, 5]. Therefore, it is imperative to encompass the following considerations while designing a pre‐planned protection architecture.

Advertisement

2. Consideration for PON protection planning

2.1. Network topology

Network topology significantly effects the design, redundancy, and deployment cost for the PON. Two common network topologies are used for the deployment of PON, namely tree and ring [1]. In tree topology, the optical signal sent from OLT is divided into N equal parts and delivered to designated ONU modules through respective DFs. Such deployment can provide the required bandwidth at desired number of subscribers; however, a single cut or failure at the feeder level can cripple the entire network by disconnecting the working OLT from ONU modules. Moreover, failure at the DF can also result in significant data loss and high customer dissatisfaction. Therefore, such topology requires the provision of redundancy at both levels of PON, which is achieved by duplicating the network components.

Ring topology is adapted to minimize the cost incurred by the provision of redundant paths in the conventional PON. It utilizes a single ring‐based fiber that connects the OLT directly to all ONU transceiver modules. This significantly reduces the effect of fiber cuts or failures [6, 7]. Ring topology provides the required reliability at acceptable costs; however, use of the POC between OLT and individual ONU module introduces serious power budget issues, which effects network capacity in terms of the number of subscribers [4, 8, 9]. Besides the commonly used ring‐ and tree‐based network architectures, hybrid topologies are readily adapted for the implementation of survivable PON at the access domain. These architectures utilize a combination of tree‐ and ring‐based architectures with subsequent topologies such as tree‐ring, tree‐star, ring‐star, and bus. Hybrid architectures have proved as a promising candidate to provide the required redundancy at desirable network capacity [1014].

2.2. Resources to be protected

A typical PON primarily comprises two types of resources that require protection for efficient delivery of information between OLT and ONU modules, namely OF medium and optical components. Both significantly effect the flow of upstream and downstream traffic throughout the network. Figure 1 shows connection availability for PON components based on Table 1 [15]. It is observed that active and passive devices, such as OLT, ONU, POC, X:NPOC, and so on, provide desirable (5 nines) connection availability over the network lifetime, since the rate of failure for these components is significantly low. Furthermore, the mean time to repair (MTTR) for the in‐house optical components is minuscule as compared to the on‐field components like OF medium that constitutes a major portion of PON architecture and is more prone to failures as shown in Figure 1.

Figure 1.

Connection availability of basic optical components in PON.

System componentsUnavailabilityCost ($)Energy consumption
OLT5.12e71210020 W, 25 W (with EDFA), 2 W (standby)
ONU1.54e63501 W, 0.25 W (standby)
Optical circulator3e750
Optical switch1.2e650
1:2, 2:2 POC3e750
1:N, 2:N POC7.2e7800
Fiber ($/Km)1.3e5160

Table 1.

Components description, connection availability, and cost.

Therefore, OF paths require more attention as compared to other components of the networks, in order to ensure seamless transmission of information, minimize the loss of data, service interruption penalty cost, and PON downtime per year [4].

2.3. Number of subscribers

Number of subscribers refer to the amount of users that a PON can accommodate without compromising the reach and provision of nominal bandwidth. It is an important parameter since it is directly associated with the extent and cost of the network. Number of subscribers is primarily effected by the type of topology at both feeder and ODN along with devices at the CO and RN. For example, a typical tree‐star topology can accommodate more subscribers as compared to a conventional ring‐based architecture due to the use of 1:N POC. Whereas, the latter utilizes symmetric Y, 1:2 or 2:2, POC per subscriber, which introduces a power‐budget loss of 3dBm in each symmetric POC, PPOC=10Log10(12) [6, 16]. This significantly effects capacity of the network since nominal received power is required for high bandwidth communication. Therefore, it is imperative to consider these features at the network planning phase, so that the proposed PON can accommodate maximum number of subscribers at desirable capacity and cost.

2.4. Cost and complexity

Deployment/operational costs and feasibility of PONs primarily depend on complexity of the network architecture. For example, some protection mechanics utilize redundant transceivers at both OLT and ONUs, like ITU‐T type C and D, in order to avoid 1:1 or 1+1 switching [17]. Although such techniques provide an abrupt recovery to maintain a smooth flow of information between OLT and ONU modules, they significantly elevate the deployment cost of the network. Since more CAPEX is spent on OLT duplication as compared to the 1:1 or 1+1 switching, a trade‐off must be made between the cost and recovery time at the event of failure. Therefore, it is desirable to minimize the overall system complexity, without compromising the fault detection and restoration time.

Advertisement

3. Protection architectures for PON

Different protection architectures are proposed to facilitate fault detection and restoration in PON. This section discusses five pre‐planned protection architectures, which vary in terms of topology, fiber duplication, and devices at both feeder level and ODN.

3.1. ITU‐T 983.1 type C architecture

ITU‐T 983.1 type C is a pre‐planned protection architecture, which provides fault detection and restoration throughout the network with redundant components at both feeder and the distribution levels [17]. The basic type C PON is shown in Figure 2, where each component of the network is duplicated to ensure high connection availability and fast restoration time. OLT is placed at the CO and consists of two transceiver modules, where one acts as primary (OLTp) and another is set as a secondary (OLTs) module. Under normal mode of operation, OLTp is responsible for originating and managing services across the network, whereas OLTs activates in the event of failure at OLTp module.

Figure 2.

Type C protection architecture.

Each transceiver module at OLT is connected to a corresponding FF, namely primary (FFp) and secondary (FFs). Both fibers extend the network toward the subscribers’ premises. Under normal mode of operation, OLTp is connected to the FFp. Two FFs are used to provide maximum connection availability and fast restoration time, such that FFp is immediately replaced with FFs in the event of failure. The span of each fiber is about 20km for a standard PON. Both FFs terminate into RN, which serves as chases for two 1:N POC modules connected with the corresponding FF at the input port and N DFs at the output port, respectively, where N represents the number of subscribers.

Consequently, a total of 2N DFs are utilized to provide the required protection at the ODN. DFs terminate into ONU with two transceiver modules, (ONUp,ONUs), in order to facilitate abrupt fault detection and restoration. Type C protection architecture duplicates every component including OFs to provide abrupt fault detection and restoration. Furthermore, a two‐fiber tree‐based topology is laid at the feeder level, whereas a star‐based topology is adapted to implement the 2N DFs at the ODN.

Number of subscribers in type C protection architecture can be determined through power budget analysis from OLT toward ONU module. Power budgeting in PON ensures an efficient communication between the transmitting and receiving modules. Moreover, it also determines the POC splitting ratio, which translates the number of subscribers in PON, respectively. If Pi represents the power loss across each component i, α is attenuation/km in the OF medium, and Rsen represents the receiver sensitivity, then the number of subscribers for type C protection architecture can be determined as:

PTPOLTαPFFPPOCαPDFPONUPmisRsenE1

Equation (1) shows that major power loss occurs across the POC, which is determined by POPC=10Log10(N), where N represents the number of subscribers or splitting ration of 1:N POC. Therefore, to maintain received power PreRsen, the value of N must be adjusted to facilitate extended reach, fault detection, and restoration along with high bandwidth connectivity. For example, when the transmitter power is 10dBm, α=0.25dBkm, N=128, 25km fiber, and Pmis=3dBm, the approximate power received at the PIN photo‐diode will be Pre=20dBm. Consequently, for Rsen=25dBm, type C architecture can efficiently support 128 subscribers simultaneously accessing the medium.

3.2. Single ring architecture

In order to avoid extensive duplication of the OF medium at both feeder and ODN, ring‐based topology is utilized to implement PON with desired connection availability and fault detection/restoration between OLT and ONU modules [16]. The basic ring‐based PON is shown in Figure 3, which contains OLT module at the CO. In order to avoid the high deployment cost of OLT module, this architecture employs a single unit, owing to the fact that failure per year of OLT module is minuscule [4, 18]. End‐face of the OLT module is connected to a switching arrangement (SAco) that extends the OF medium in both clockwise (CW) and counter clockwise (CCW) directions. SAco serves as chases for a 1:2 POCsa, and 1:2 OSsa. POCsa sends and receives the traffic for OLT module. Port 1 splits the optical signal toward the clockwise feeder ring (FRcw), whereas port 2 extends the flow of traffic toward the counter clockwise FR (FRccw) through a 1:2 OSsa. This arrangement recovers the flow of information in case of failures at the FR. Under normal working conditions, OSsa is at port a and both upstream and downstream traffic are carried on the FRcw.

Figure 3.

Single ring protection architecture.

FR contains multiple ONU modules {ONUn;n=1,2,3…N}, which are placed directly over the FR through individual RNs (RNx) housing a 2:2 POCx,1 and a 1:2 POCx,2, respectively. Consequently, the total number of ONU modules is equal to RNs on the FR X=N. POCx,1 is used to extend the FR to the neighboring ONU modules. Furthermore, it also connects individual ONUn with FR through POCx,2 and controls the flow of traffic in and out of the ONU module.

Network capacity in single ring‐based architecture is significantly effected by the utilization of a single POC per subscriber. If N represents the number of RNs, then the total subscribers accessing the medium simultaneously can be determined by:

PTPOLTPPOCsaPOSsa2XPPOConuPONUPmisRsenE2

X represents the number of RNs in Eq. (2), which is equal to ONUs N that can access the medium simultaneously. Consequently, for the transmitter power of 10, 3dBm loss across the POC, Pmis=3dBm, 25km fiber, and Rsen=25dBm, this architecture can scarcely support 16 subscribers simultaneously accessing the medium [6]. It is observed that fiber duplication is avoided at both levels through a ring‐based structure; however, power drop across each POC introduces serious power budget issues. Consequently, capacity of the PON is effected. It is therefore imperative to utilize a topology that is capable of providing fault detection and restoration without compromising the network capacity and total cost.

3.3. Dual ring protection architecture

Dual ring PON avoids fiber duplication at the feeder level through a single ring‐based fiber (FR) as shown in Figure 4 [9]. Furthermore, several small rings are deployed at ODN to negate the power budget issue. CO contains a single OLT module, which is fed into an optical circulator (OCco) and erbium‐doped fiber amplifier (EDFA) module. To maintain passive nature of the PON, EDFA is placed inside the CO as shown in Figure 4. Switching arrangement SAco is placed at end‐face of the EDFA, which serves as chases for 1:2 POCsa and 1:2 OSsa. Port 1 of POCsa splits the down‐stream traffic towars FRcw, whereas port 2 extends the flow of traffic towars the FRccw through a 1:2 OSsa. In normal mode of operation, all traffic is carried through the FRcw. However, OLT medium access control (MAC) layer flips the switch position when a failure occurs at the FR. This new position of the switch converts the ring-based fiber in two trees-based fibers carrying traffic in clock- and counter clockwise direction between the PoF.

Figure 4.

Dual ring protection architecture.

Both FRcw and FRccw are fed into multiple remote nodes forming several distribution rings (DRs) at the ODN. Each remote node {RNx;x=1,2,3…X} houses two 2:2 bidirectional POCs, namely (POCx,1,POCx,2) as shown in Figure 4. The former extends the FR from CW toward CCW direction and the latter carries the traffic from feeder toward the ODN and vice versa. End‐face of POCx,2 splits the incoming traffic into clock‐ and counter clockwise DRs (DRcw) and (DRccw), respectively. Both DRcw and DRccw are connected to individual ONU {ONUx,m;m=1,2,3…M} module through two 1:2 POConux,m and OSonux,m. Under normal working conditions, OSonux,m is at position a and all traffic is handled through DRcw.

Dual ring architecture utilizes multiple rings at the distribution level to compensate the excessive power drop. Furthermore, EDFA is also employed at the CO to support high capacity transmission. Consequently, the power budget equation from OLT toward ONU module can be written as:

PTPOLTPOCco+PEDFAPPOCsaPOSsaαPFR2XPPOCRNαPDRMPPOConuPONURsenE3

Where X, in Eq. (3), represents the total number of RNs deployed at the FR and M represents the number ONUs per RN. Consequently, the total ONU modules accessing the medium simultaneously become N=X×M. Now, at PT=10dBm, 25km fiber, and Pedfa=25dB, the maximum value of N that can be achieved is 72 with X=9 and M=8 [9]. It is observed that the dual ring architecture supports more ONU modules in comparison with the single ring architecture. Nevertheless, power drops in the ring topology at the distribution level limits the overall capacity of the network.

3.4. Tree‐based hybrid protection architecture

This architecture employs a hybrid topology through combination of tree and star‐ring architectures at the feeder and ODN, respectively. OLT is placed at the CO, which is fed into an OCco, EDFA, and SAco as shown in Figure 5 [15]. SAco consists of a 1:2 OSsa, with port a connected to the FFp, whereas port b is fed into FFs. In normal working conditions, OSsa is at port a and all upstream and down‐stream traffic is sent and received through the FFp. However, in case of failures or cuts at the FFp, OLT MAC layer flips the switch position and resumes the flow of traffic through the FFs.

Figure 5.

Tree‐based hybrid protection architecture.

Since a tree‐based topology is adapted at the feeder level, the required protection is provided by duplicating the long‐span fiber. End‐face of both FFp and FFs terminates into RN that serves as chases for a 2:N POC. Output of the 2:N POC is connected to a series of dedicated DFs connecting N ONU transceiver modules as shown in Figure 5. In order to avoid extensive duplication of the DFs for protection, a ring‐based topology is adapted by connecting intermediate ONU modules, respectively. Consequently, each ONUn module, where {n=1,2,3…,N}, consists of 1:2 POCn and 1:2 OSn. Port 1 of the POC is connected to respective DF, whereas port 2 is fed into a 1:2 OSn. Port 3 extends the DF toward a DR that provides the necessary protection in case of failure at the DF.

OSn is used to connect OCn and ONUn with transmission media at the distribution level. Port “a” of OSn connects ONUn with the DF, whereas port “b” is used to connect ONUn with the redundant DR in case of failure. Consequently, the required protection is achieved by avoiding the extensive duplication of the DFs. Under normal mode of operation, OSn is at port “a” and all services are delivered through the DF, whereas in case of failure the affected ONUn MAC layer flips the switch position and transfers the flow of traffic to the DR between the adjacent ONU module.

The downstream power budget for tree‐based hybrid protection architecture can be written as:

PTPOLTPOCco+PEDFAPOScoαPFF10Log10NαPDFPPOConuPOSonuPOConuPONURsenE4

It is observed from Eq. (4) that for PT=10dBm, 25km fiber, Pedfa=25dB, and Rsen=25dBm, the tree‐based hybrid protection architecture can efficiently support 128 subscribers simultaneously accessing the medium [15].

3.5. Ring‐based hybrid protection architecture

This architecture is formed by the combination of a single ring topology at the feeder level and a star‐ring architecture at the ODN. A single OLT is placed at the CO, which is connected to an OCco, EDFA, and SAco as shown in Figure 6 [18]. This architecture utilizes a single ring‐based fiber to provide the required high bandwidth connectivity and reliability at the feeder level. Port 1 and 2 of the POCsa extend traffic toward the FRcw and FRccw, respectively. A 1:2 OSsa is connected with port 2 of the POCsa to provide the required fault recovery in the event of failure. Port a of the OSsa is connected to ground, whereas port b is fed into the FRccw. Under normal mode of operation, OSsa is at port a and all traffic is sent and received through the FRcw.

Figure 6.

Ring‐based hybrid protection architecture.

FR is implemented at each RN by combining FRcw and FRccw through a special arrangement. This significantly reduces the power budget penalty and cost of the overall architecture. RN in the ring‐based hybrid network {RNx;x=1,2,3…X} consists of two POCs, namely (POCx,1,POCx,2). Where POCx,1andPOCx,2 are bidirectional couplers with 2 : 2 and 2:M ports respectively. FR is formed by connecting both CW and CCW paths through port 1 and 2 of the POCx,1 as shown in Figure 6. POCx,1 further extends the FR toward the ODN through a 2:M POCx,2, where M is the number of ONUs connected to each POCx,2 through dedicated DFs. If X represents the total number of RNs deployed over the FR and M is the number ONUs per RN, then the proposed system can support a total of N=X×M ONUs.

ONU module, {ONUx,m;m=1,2,3…M}, starts with a 1:2 POCx,m with three ports as shown in Figure 6. Port 1 is used to connect each ONU to its dedicated DF, whereas port 2 is fed into 1:2 OSx,m. Port 3 is used to form a backup DR, which ensures immediate survivability of traffic between ONUs and OLT. Port a of the OSx,m connects ONUx,m with corresponding DF, under normal working conditions, and port “b” is fed into the DR.

The number of subscribers in ring‐based hybrid protection architecture can be determined as:

PTPOLTPOCco+PEDFAPPOCsaPOSsaαPFRXPPOCx,110Log10(M)αPDFPPOConuPOSonuPOConuPONUE5

If N represents the total number of ONUs, then the value of X can be written as:

XPTRsen16.2510Log10M+PEDFA3E6

Analysis of Eq. (6) shows that capacity of the network increases when more ONUs are placed per RN. Furthermore, it is observed that for PT=10dBm, Pedfa=25dB, and Rsen=25dBm, the ring‐based hybrid protection architecture can efficiently support 128 subscribers simultaneously accessing the medium [18].

Advertisement

4. Reliability analysis

Network reliability analysis is an important tool that is used to determine the overall connection availability for a given protection architecture. Reliability block diagrams (RBDs) are commonly used to determine the overall connection availability of PON, owing to its significant advantages like, accuracy, simplicity, visual impact, and flexibility. This section analyzes network reliability in terms of connection availability of the selected protection architectures through RBDs.

RBD represents each component including the OF medium as a functional block connected in series or parallel combination with adjacent blocks. Series and parallel connectivity represent the unprotected and protected components in protection architecture, respectively. The characteristic parameter of each RBD block is the asymptotic unavailability (Ui) of the components that represent their probability of failures. Consequently, if I represents the total number of components in PON, then overall connection availability A is given by:

A=1i=1IUiE7

where Ui is determined by

Ui=1MTBFMTBF + MTTRE8

MTBF in Eq. (8) is the mean time between failures, which is used to represent the number of failures per million hours for an optical component [19]. MTTR represents the mean time to repair, which is the time required for reparation or replacement of faulty hardware modules [5, 20, 21]. In order to determine the overall connection availability for each architecture, RBDs with series and parallel combination of functional blocks are extracted as shown in Figure 7.

Figure 7.

Reliability block diagrams for (a) type C, (b) single ring (SR), (c) dual ring (DR), (d) tree‐based hybrid (HT), and (e) ring‐based hybrid (HR) protection architectures.

If i=1IUi is the summation of i components unavailability in a protection architecture, then connection availability for each survivable PON can be written as:

A[C]=1[(UOLT×UOLTpt)+(UFF×UFFpt)+(U1:NPOC×U1:NPOCpt)+(UDF×UDFpt)+(UONU×UONUpt)]E9
A[SR]=1[UOLT+UPOC+UOS+(UFR×UFRpt)+UPOC+UPOC+UONU]E10
A[DR]=1[UOLT+UPOC+UOS+(UFR×UFRpt)+UPOC+UPOC+(UDR×UDRpt)+(UPOC×UPOCpt)+UOS+UONU]E11
A[HT]=1[UOLT+UOS+(UFF×UFFpt)+U2:NPOC+(UDF×UDRpt)+UPOC+UOS+UONU]E12
A[HR]=1[UOLT+UPOC+UOS+(UFR×UFRpt)+UPOC+U2:NPOC+(UDF×UDRpt)+UPOC+UOS+UONU]E13

Figure 8 shows the overall connection availability of the selected protection architectures based on Table 1. It is observed that maximum 5 nines connection availability is provided by all architectures, owing to the efficient utilization of redundant components and OF medium throughout the network. Maximum connection availability is provided by type C protection architecture, which duplicates entire PON including OLT and ONU modules. Ring‐based architecture at both feeder and ODN, which avoids the duplication of light‐wave path, is also observed to provide the required availability. A single failure at the ring‐based fiber converts the network into two tree‐based architectures with the flow of traffic in both clockwise and counter clockwise directions. Thus, redundancy is achieved without duplicating the entire fiber. Furthermore, it is observed that desirable connection availability can be maintained without duplicating the transceiver modules, which further helps in reducing the overall cost of deployment for such architectures.

Figure 8.

Overall connection availability of selected protection architectures.

Advertisement

5. Cost analysis

Cost figures for protection architectures are an important parameter, showing the economic benefits for a common end user at the access domain. This section determines the overall expenditure for the selected architecture while using component costs in Table 1. Cost figures for PON can be categorized as CAPEX and OPEX. CAPEX includes the investment utilized for the deployment of PON at access domain and is calculated by computing the cost expenditure on network devices along with the OF infrastructure. OPEX includes the cost incurred on the network operations from the time of deployment till replacement by a new technology [4, 15, 22, 23].

OPEX primarily includes the cost required for repairing the faulty, failed equipment (including OF medium), service interruption penalty cost that is commonly applicable for business subscribers, and energy consumed by active components at transceiver modules of OLT and ONU. Reparation cost is determined by multiplying the total downtime/year with resources required to remove the fault, which includes the number of technicians along with their wages and miscellaneous charges. Service interruption penalties include the expenditure that is spent on the fine defined in service level agreement (SLA) between network operators and subscribers. Power consumption by each component is determined by multiplying the unit price of electricity with the sum of energy consumption of all active components over the network life span [15, 23].

Analysis is performed for residential customers only, and life span of each network is taken as 20 years. Furthermore, following specifications are considered for fair analysis of the selected protection architectures

  • OLT can support 16, 32, 64, and 128 subscribers based on the type of adapted topology.

  • Length of FF=20km, DF=5km, and DR=1km between adjacent nodes in selected architectures.

  • EDFA cost is considered in dual ring, tree‐ and ring‐based hybrid architectures.

  • Digging cost for OF medium is ignored due to high variation.

  • No service interruption penalty cost is considered.

  • Repairing cost is 1000 $/h.

  • Per hour cost of electricity is taken to be 0.25 $/kWh.

If N is the total number of ONUs in each PON and X represents the number of RNs in ring‐based topologies at the feeder level, then the CAPEX equations (based on RBDs) for selected protection architectures can be written as:

CC=(OLT + OLT)+(20×FF×FF)+(2×1:NPOC)+(5×N×DF×DF)+(N×ONU×ONU)E14
CSR=OLT+POC+OS+(25×FR)+(2X×POC)+(N×ONU)E15
CDR=OLT+POC+OS+EDFA+(20×FR)+(2X×POC)+(N×DRcw)+(N×DRccw)+(2N×POC)+(N×OS)+(N×ONU)E16
CHT=OLT+OS+EDFA+(20×FF×FF)+(2:NPOC)+(5×N×DF)+(N×DR)+(N×POC)+(N×OS)+(N×ONU)E17
CHR=OLT+POC+ OS +EDFA+(20×FR)+(X×POC)+(X×2:NPOC)+(5×N×DF)+(N×DR)+(N×POC)+(N×OS)+(N×ONU)E18

Figure 9 shows the CAPEX for each protection architecture at different number of subscribers by referring to Table 1. It is observed that ring‐based architecture requires minimum CAPEX when compared to conventional tree and hybrid techniques. However, due to the power budget and capacity limitations of single and dual ring‐based architectures, their analysis is performed till 16 and 64 number of subscribers, respectively. Overall analysis shows that the deployment cost for each architecture decreases as the number of subscriber increases. It is evident from the fact that total cost incurred is distributed among the number of subscribers, which results in reduced CAPEX per user as the network capacity increases. Furthermore, it is shown that type C architecture requires the highest cost, for all subscribers, in comparison with other schemes due to the extensive duplication of optical components and OF medium throughout the network.

Figure 9.

CAPEX at different number of subscribers.

Figure 9 shows that hybrid protection architectures provide nominal performance, for all subscribers, in terms of the deployment cost as they avoid extensive duplication of the OF medium. Figure 10 further elaborates the CAPEX required for the deployment of light wave path in type C, tree‐ and ring‐based hybrid protection architectures for 128 subscribers in the network. It is observed that the main contributor for CAPEX, besides OLT module, is the DF as each subscriber requires a dedicated path for high speed connectivity. Furthermore, it is shown in Figure 10 that type C requires the highest deployment cost for DFs due to the duplication of each fiber between RN and corresponding ONU module. On the other hand, the deployment of star‐ring topology at ODN significantly reduces the CAPEX, on redundancy, for hybrid protection architectures.

Figure 10.

CAPEX for OF infrastructure at 128 subscribers.

It is also observed that the CAPEX in hybrid protection architecture varies with the type of topology at the feeder level. Since ring‐based architecture requires multiple RNs, the cost of deployment increases with the number of subscribers due to increase in RNs. Consequently, tree‐based hybrid architecture requires less cost when compared to ring‐based scheme for 64 and 128 subscribers. However, the difference is minuscule.

Figure 11 shows the total expenditure for protection architectures with high network capacity in terms of the number of subscribers. It is evident from the fact that each architecture provides the desired connection availability, which significantly reduces their downtime/year. Hence, minuscule amount is spent on reparation cost over the network life span. Type C protection architecture requires highest OPEX due to the duplication of transceiver modules at both OLT and ONUs, which consumes more energy as compared to hybrid architectures with single OLT and ONU modules. Consequently, hybrid architecture requires minimum cost, collectively, as compared to the conventional protection scheme.

Figure 11.

Total cost including CAPEX and OPEX at 128 subscribers.

Advertisement

6. Conclusion

This chapter analyzes the effect of fiber duplication, for protection, on feasibility of PON. Increase in the capacity and adaptability of PON demands for an efficient fault detection and restoration mechanism, which is able to provide the required connection availability at minimum cost. Among all components in the PON, OF medium requires significant protection due to its high rate of failure. Furthermore, it is an on‐field component and constitutes a major portion of PON; therefore, it is imperative to provide pre‐planned redundant paths in order to ensure swift recovery of failures at the OF medium throughout the network. Five protection architectures are considered, which mainly emphasize on the type of topology laid through the OF medium at both feeder level and ODN. ITU‐T 983.1 type C and single ring‐based architectures are considered to encompass the conventional tree‐star and ring topology, respectively. For further analysis, dual ring architecture and tree‐ and ring‐based hybrid protection architectures for PON are analyzed to study the effect of hybrid topologies on PON feasibility in terms of the number of subscribers, reliability, and cost. It is observed that ring‐based architectures provide desirable connection availability without duplicating the OF medium; however, the use of multiple POCs to extend the FR significantly elevates the power budget issues. Consequently, the number of subscribers that can access the medium simultaneously is reduced. Hybrid topologies formed by the variation of tree, ring, and star topology provide nominal performance, in terms of all parameters, as compared to the survivable PONs based on conventional topologies. Furthermore, it is shown that duplication of the OF medium at the ODN network is more critical in comparison with the feeder level duplication. Nevertheless, both tree‐ and ring‐based hybrid pre‐planned protection architectures provide desirable network capacity and connection availability at minimum cost.

References

  1. 1. Cedric F Lam. Passive optical networks: principles and practice. Academic Press, 2007. ISBN 978‐0123738530.
  2. 2. Mozhgan Mahloo, Jiajia Chen, Lena Wosinska, Abhishek Dixit, Bart Lannoo, Didier Colle, and Carmen Mas Machuca. Toward reliable hybrid wdm/tdm passive optical networks. IEEE Communications Magazine, 52(2):273–280, 2014. doi: 10.1109/MCOM.2014.6736740.
  3. 3. Hussein T Mouftah and Pin‐Han Ho. Optical networks: architecture and survivability. Springer Science & Business Media, 2012. ISBN 978‐1‐4615‐1169‐4.
  4. 4. Lena Wosinska, CHEN Jiajia, and Claus Pop Larsen. Fiber access networks: reliability analysis and swedish broadband market. IEICE Transactions on Communications, 92(10):3006–3014, 2009. doi: 10.1587/transcom.E92.B.3006.
  5. 5. Mozhgan Mahloo. Reliability versus cost in next generation optical access networks. Doctoral Dissertation, School of Information and Communication Technology, KTH Royal Institute of Technology, 2013, ISSN 1653-6347; 1303.
  6. 6. Pavel Lafata and Jiri Vodrazka. Application of fiber ring for protection of passive optical infrastructure. Radioengineering, 22(1):357–362, 2013, ISSN: 1805-9600.
  7. 7. Chien‐Hung Yeh and Sien Chi. Self‐healing ring‐based time‐sharing passive optical networks. IEEE Photonics Technology Letters, 19(13–16):1139–1141, 2007. doi: 10.1109/LPT.2007.900155.
  8. 8. Byung Tak Lee, Mun Seob Lee, and Ho Young Song. Simple ring‐type passive optical network with two‐fiber protection scheme and performance analysis. Optical Engineering, 46(6), 2007. doi: 10.1117/1.2746929.
  9. 9. Waqas Ahmed Imtiaz, Yousaf Khan, and Khalid Mahmood. Design and analysis of self‐healing dual‐ring spectral amplitude coding optical code division multiple access system. Arabian Journal for Science and Engineering, 41(9):3441–3449, 2016. doi: 10.1007/s13369‐015‐1988‐z.
  10. 10. Haibin Chen, Chaoqin Gan, Maojun Yin, and Cuiping Ni. A single‐star multi‐ring structure of self‐healing wavelength division multiplexing optical access network. Fiber and Integrated Optics, 33(1–2):4–16, 2014. doi: 10.1080/01468030.2013.879435.
  11. 11. Yang Qiu and Chun‐Kit Chan. A novel survivable architecture for hybrid wdm/tdm passive optical networks. Optics Communications, 312:52–56, 2014. doi: 10.1016/j.optcom.2013.09.005.
  12. 12. Yeh C.H., Chow C., and Liu Y.L. Self-protected ring-star-architecture tdm passive optical network with triple-play management. Optics Communications, 284:3248–3250, 2011. doi: 10.1016/j.optcom.2011.03.032.
  13. 13. Rastislav Róka. Optimization of traffic protection schemes for utilization in hybrid passive optical networks. International Journal of Application or Innovation in Engineering and Management, 5(9):107–116, 2016. ISSN 2319‐4847.
  14. 14. Elaine Wong, Carmen Mas Machuca, and Lena Wosinska. Survivable hybrid passive optical converged network architectures based on reflective monitoring. Journal of Lightwave Technology, 34(18):4317–4328, 2016. doi: 10.1109/JLT.2016.2593481.
  15. 15. Waqas Ahmed Imtiaz, Yousaf Khan, and Waqas Shah. Cost versus reliability analysis of tree-based hybrid protection architecture for optical code division multiple access system. Journal of Engineering and Applied Sciences, 35(1):47–53, 2016.
  16. 16. Chen‐Hung Yeh and Sien Chi. Self‐protection against fiber fault for ring‐based power‐splitting passive optical networks. Optical Engineering, 47(2): 020501–020501, 2008. doi: 10.1117/1.2841702.
  17. 17. Rec ITU‐T. G. 983.1. study group 15: broadband optical access systems based on passive optical networks (pon). ITU‐T, Rec. G, 983, 1998.
  18. 18. Waqas A Imtiaz, Pir Mehar, Muhammad Waqas, and Yousaf Khan. Self-healing hybrid protection architecture for passive optical networks. International Journal of Advanced Computer Science and Applications (IJACSA), 6(8):144–148, 2015. doi: 10.14569/IJACSA.2015.060819.
  19. 19. Susan Stanley. Mtbf, mttr, mttf & fit explanation of terms. IMC Network, 1–6, 2011.
  20. 20. Patrick O’Connor and Andre Kleyner. Practical reliability engineering. John Wiley & Sons, 2012. ISBN 978‐0‐470‐97982‐2.
  21. 21. David J Smith. Reliability, maintainability and risk 8e: Practical methods for engineers including reliability centred maintenance and safety‐related systems. Elsevier, 2011. ISBN 978‐0080969022.
  22. 22. Álvaro Fernández and Norvald Stol. Capex and opex simulation study of cost‐efficient protection mechanisms in passive optical networks. Optical Switching and Networking, 17:14–24, 2015. doi: j.osn.2015.01.001.
  23. 23. Jiajia Chen and Lena Wosinska Wosinska. Cost vs. reliability performance study of fiber access network architectures. IEEE Communications Magazine, 48:56–65, 2010. doi: 10.1109/MCOM.2010.5402664.

Written By

Waqas Ahmed Imtiaz, Javed Iqbal, Affaq Qamar, Haider Ali and Sevia M. Idrus

Reviewed: 02 March 2017 Published: 21 June 2017