Thursday, May 12, 2016

What’s the Line Encryption of GPON

Context

In the PON system, downstream data is broadcast to all ONUs. As a result, downstream data destined for certain ONUs or all ONUs may be intercepted by illegal users.
Figure 1 Downstream data transmit process 

Working Principle

Line encryption technologies are required to eliminate the data theft risk, Figure 2 shows line encryption process.
Figure 2 Line encryption process 
· The encryption algorithm to be used is the advanced encryption standard (AES).
· The 10G GPON systems use the AES-128 encryption algorithm.

Highlight and Application

· The line encryption algorithms neither increase overhead nor decrease bandwidth usages.
· The line encryption algorithms will not prolong transmission delays.
· Enable line encryption if the usage scenarios promote high security requirements

More related:

How to Control Board Failure After an MxU Service Port Is Bound to a Rate Unlimited


No comments:

Post a Comment