Handbook of Fiber Optic Data Communication: A Practical Guide to Optical Networking

Handbook of Fiber Optic Data Communication: A Practical Guide to Optical Networking

Language: English

Pages: 468

ISBN: B00EQ762YG

Format: PDF / Kindle (mobi) / ePub


The 4th edition of this popular Handbook continues to provide an easy-to-use guide to the many exciting new developments in the field of optical fiber data communications. With 90% new content, this edition contains all new material describing the transformation of the modern data communications network, both within the data center and over extended distances between data centers, along with best practices for the design of highly virtualized, converged, energy efficient, secure, and flattened network infrastructures.

Key topics include networks for cloud computing, software defined networking, integrated and embedded networking appliances, and low latency networks for financial trading or other time-sensitive applications. Network architectures from the leading vendors are outlined (including Smart Analytic Solutions, Qfabric, FabricPath, and Exadata) as well as the latest revisions to industry standards for interoperable networks, including lossless Ethernet, 16G Fiber Channel, RoCE, FCoE, TRILL, IEEE 802.1Qbg, and more.

  • Written by experts from IBM, HP, Dell, Cisco, Ciena, and Sun/ Oracle
  • Case studies and ‘How to...’ demonstrations on a wide range of topics, including Optical Ethernet, next generation Internet, RDMA and Fiber Channel over Ethernet
  • Quick reference tables of all the key optical network parameters for protocols like ESCON, FICON, and SONET/ATM and a glossary of technical terms and acronyms

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

the available network bandwidth. The physical network must be manually rewired to handle changes in the application workloads, and the need to manually configure features such as security access makes these processes prone to operator error. Further, conventional networks are not optimized for new features and functions. There are unique problems associated with network virtualization (significantly more servers can be dynamically created, modified, or destroyed, which is difficult to manage with

reference target application for bigger players. A variety of transceivers for such applications, ranging from 25 up to 300 Mb/s, exist, but the distances are logically limited to less than 20 m. To name a few companies active in the field, Avago and Melexis are playing important roles. 3.3.7 Latest research results for communications over PMMA-SI-POF As previously analyzed, depending on the desired bit rate and on the transmission wavelength, PMMA-SI-POF systems suffer from several limitations

directors). This includes the WDM system and the transmission fibers. Resilience can be split into protection and restoration [11]. For protection, the required resilience capacity is preassigned or at least (in the case of shared protection) precalculated. For restoration, the restored path is only calculated after a failure. Hence, protection is simpler and faster but may lead to lower network utilization. Protection is often implemented in WDM rings. Restoration can be implemented in

peak around 1400 nm and the wavelength region above 1625 nm, which is typically reserved in FSAN PON for OTDR measurements. 6.2 Relevant PON variants and standards GPON EPON Higher layer ATM adapter GTC layer GEM adapter GTC framing sublayer Physical layer Higher layer MAC layer MAC client Multipoint MAC control MAC Physical layer GTC – GPON transmission convergence layer FIGURE 6.9 EPON layers compared to GPON. The DS/US wavelength assignment for TWDM and WDM overlay is still under

segregated VLANs, web filtering, and more. Traffic policing on the control plane helps prevent certain attacks such as denial of service. Layer 2 authentication of users, endpoint integrity, and network information is part of this approach. Further, the network architecture should be designed to prevent rogue switches from being attached to a trusted network (either accidentally or maliciously). This should be part of a unified access control policy that is designed to 17 18 CHAPTER 1

Download sample

Download