Residential data center): the cost of the OLT device is allocated based on the scale of 500 users, and a total of 16 OLT ports are required.
FTTC + EPON + LAN
We also consider placing an OLT on the local terminal, a single optical fiber (4 km) to the center data center of the residential area, and a Optical Splitter (0.8 km) to the building in the center data center of the residential area, each corridor uses a Optical Splitter (0.2 km) to access each floor, and then uses five types of lines to
permanent virtual circuit (PVC) ATM connection between the client device Atu-r and the service access point, such as the broadband Access server, through its Dslam device. For example, for access to IP services, the IP packet of the user's computer is transmitted to the ATU-R,ATU-R via the Ethernet interface on the computer. The Protocol conversion technology is used to convert the packets received from the Ethernet interface to ATM, and is mapped to
, metropolitan area, gathering, The core to the application of End-to-end fixed broadband network solutions.
The ideal technology of constructing full-service broadband
As an important part of the whole business broadband network, the broadband access network is undergoing profound changes. On the one hand, xDSL technology gradually from adsladsl2adsl2+ to provide a higher bandwidth VDSL2 upgrades, which also requires vdsl2dslam closer to the user side. With the increase of the number of VDSL2
address ZZZ
Hello ip zzz! I have IP XXX and my MAC is YYY.
5. Fake middlemen
Enable packet forwarding on a spoofing host (MMM for MAC)
Send a counterfeit ARP Reply to the host AAA:
AAA, I have IP BBB and my MAC is MMM,
Send a counterfeit ARP Reply to the host BBB:
BBB, I have IP AAA and my MAC is MMM
Due to the aging mechanism of ARP Cache, periodic continuous spoofing is also required.
Iv. Prevention of ARP Spoofing
1. carriers can use Super VLAN or PVLAN Technology
The so-called Super VLAN is
Some devices of a certain type of infrastructure used by China Unicom in a certain province can be controlled (directly leading to network disconnection [reset/reboot])
Network disconnection in minutesIt also makes it difficult for people to take a good look at the film!
This problem is the same as that of Huawei devices.I'm curious. The two companies are supposed to be competitive.Why is the system used by the device almost identical?Except for weak passwords, commands are the same.Alas, you ha
The Training Unit in Zhengzhou cannot work less, alas ~ Destiny
The Training Unit in Zhengzhou cannot work less, alas ~ Destiny
The Training Unit in Zhengzhou cannot work less, alas ~ Destiny. To activate oneHuaweiSmall DSLAM, E100, 96-line DSLAM device. Data needs to be done on BAS, but when adding data error: [a-b1] portvlan ethernet 4 vlan 500 100 [a-b1-ethernet4-4-vlan500-599] access-type layer2% Onl
platform, give users more choices, and make full use of broadband resources to further increase the user's APRU value.
Ii. Bandwidth bottleneck of IPTV applications
IPTV can use existing copper resources to transmit interactive TV programs. At present, most broadband users in China use ADSL as the access method. However, using the ADSL Access Mode to watch IPTV faces the following two challenges:
1. distance problem: the user line ring resistance suitable for activating ADSL service should be l
Currently, ADSL2 + access technology is widely used. We believe that with the development of the communication industry, ADSL2 + access technology will be more comprehensive and stable, bringing users a good network environment. The ADSL2 + Access Technology and 4bandVDSL access method launched by Huawei have the following features:
1. Unified broadband access platform. The ADSL2 + Access Technology and 4bandVDSL access method are directly introduced on the original
This article analyzes the reasons why the ADSL2 standard has become a new favorite of the network. There are many problems with the ADSL2 standard on the network. For various ADSL2 standards, the following is a question and answer topic, hoping to cover all questions about the use of ADSL2 standards by netizens.
Enhanced interoperability
In the ADSL2 standard, more parameters will be transmitted during the training phase. In addition, many parameters are determined by the receiver end rather tha
bandwidth and reduce the number of Ethernet ports on the center/station, it meets the requirements for the LAN broadband access service and the upstream service of the adsl dslam ip.
6) ads ldslam atm upstream aggregation service MSTP supports atm vp/VC exchange, which can be used for business aggregation and further improve the utilization rate of transmission channels. If the adsl dslam upstream uses
establishment of the multicast group, when there is a user request to submit, proxy first will check the local multicast group, if the local already has this multicast group exists, then it will be added to the multicast group members, and do not need to send to the upper router to join the request Conversely, if the corresponding multicast group is not found locally, then proxy will send the request to the router on the upper end and establish the multicast group locally. When the multicast me
Huawei's new adsl2+, 4bandVDSL access mode has the following characteristics:
1. Unified Broadband Access platform. In the original Dslam equipment directly to achieve the introduction of adsl2+, 4bandVDSL access mode, that is, in the original Smartaxdslam equipment and other business Board slot compatible interface Board, the original equipment can be based on user needs to achieve flexible configuration options.
2. Unified management Platform. Sim
different. I have different opinions on this statement. I am afraid it is difficult for bras to be competent and it does not need to be a pe. First, most of the connected devices of bras are dslam, while most of the users of dslam are public customers. This part of users do not have vpn requirements. Second, as a way to improve management efficiency and reduce... I feel that bras can also become a pe. If t
accordance with the mechanism specified in IGMP V2, including the queryers' election mechanism, regularly sending General query information, and sending specific queries when receiving the exit package. IGMP Proxy implements different functions on two ports, with a relatively large workload. The advantage is that when there is no router in the network, the IGMP Proxy device can act as the queryer, in addition, if you want to extend the multicast routing function, Proxy is more convenient than S
In network attack defense, we must be vigilant against both security protection and various attack forms and vulnerabilities. In this regard, it is well known that the attack and defense of the ARP Protocol has become a battle. We have introduced a lot of related content and topics. So here we will give a brief summary.
Prevention of ARP Spoofing
1. carriers can use Super VLAN or PVLAN Technology
The so-called Super VLAN is also called VLAN aggregation. This technology creates multiple Sub VLANs
①. 1483B: refers to the 1483 bridging protocol. This function is implemented based on the Basic bridging protocol and on the first layer of the network physical layer, when this solution is used, the MODEM only acts as a bridge device and does not provide any protocol conversion or address filtering functions. Generally, after the MODEM can be synchronized with DSLAM and the VPI/VCI is set, basically, users can access the Internet. In short, MODEM ser
establishment of multicast groups. When a user request is submitted, the proxy will first check the local multicast group, if this multicast group already exists locally, it adds the user to the multicast group member without sending an application to the upstream router. Otherwise, if no corresponding multicast group is found locally, the proxy will send an application to the upstream router and create a multicast group locally. When a multicast member exits, the proxy also checks whether othe
Ethernet switching and transmission is provided in the metropolitan area, and the DSLAM network with Ethernet uplink interface is very adaptable. In the provision of ADSL Internet services, through the Metropolitan Ethernet Exchange or MSTP Ethernet transmission system, the decentralized set up at each end of the DSLAM through the long-distance Ethernet transmission channel converge to the relative set of
business support capability, while ensuring business QoS, this is unmatched by any other access technology, and of course the identification depends on the operator's attitude towards broadband access and the specific application environment.
Typical applications
1. The system as a distributed DSLAM equipment
2. Transmission platform,
3. Various Dslam equipment
4. With ONU equipment
5. Connected,
6.
ADSL Cat LED Description
ADSL Cat indicator is an important tool to judge ADSL faults. Different brands of different models of cat led numbers vary. But they all have link lights, LAN lights and power lights.
Link Light Status Description
Link lamp for the cat and the local Dslam device connection indicator, usually link lights have a rhythm flashing, indicating ADSL data link is trying to sync, at this time the link is not connected. Under normal
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.