PROTECTION ACCESS NETWORK: AN ARCHITECTURE APPROACH TO REMOTE MONITOR AND CONTROL

被引:0
|
作者
Premadi, Aswir [1 ]
Ng, Boonchuan [1 ]
Mastang [1 ]
Ab-Rahman, Mohammad Syuhaimi [1 ]
Jumari, Kasmiran [1 ]
机构
[1] Univ Kebangsaan Malaysia, Spectrum Technol Res Div, Comp & Network Secur Res Grp, Dept Elect Elect & Syst Engn,Fac Engn & Built Env, Ukm Bangi 43600, Selangor, Malaysia
关键词
remote monitor; protection; PON; microcontroller; optical switch; PASSIVE OPTICAL NETWORKS;
D O I
10.1109/ICCTD.2009.185
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presented architecture approach to remote monitor and control for providing protection and self-restoration against fault in the distribution region of fiber-to-the-home passive optical network (FTTH-PON). The devices consist of optical switches and a tnicrocontroller to handle the optical switch routing. It is employed at the customer end, just before the optical network units (ONUs) to ensure the data flow continuously due to breakdown occur in the network and instantly repair operation.
引用
收藏
页码:72 / 75
页数:4
相关论文
共 50 条
  • [31] Exploration of access control mechanisms for service-oriented network architecture
    Rudra, Bhawana
    Vyas, O. P.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2015, 9 (01) : 1 - 11
  • [32] Usage control reference monitor architecture
    Schaefer, Christian
    Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Proceedings, 2007, : 13 - 18
  • [33] Distributed memory access architecture and control for fully disaggregated datacenter network
    Han, Kyeong-Eun
    Youn, Ji Wook
    Song, Jongtae
    Kim, Dae-Ub
    Lee, Joon Ki
    ETRI JOURNAL, 2022, 44 (06) : 1020 - 1033
  • [34] Roaming security agents enabling intelligent access control and network protection
    vanZyl, PWJ
    vonSolms, SH
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 452 - 468
  • [35] A BASIC APPROACH TO REMOTE ACCESS
    HARROP, M
    COMPUTER JOURNAL, 1970, 13 (02): : 131 - &
  • [36] Virtual Laboratory Architecture and Application for Remote Access
    Djordjevic-Kozarov, Jelena
    Arsic, Miodrag
    TELSIKS 2009, VOLS 1 AND 2, 2009, : 522 - 525
  • [37] A New Approach to Monitor Network
    Saini, Hemant Kumar
    Jagetiya, Anurag
    Kumar, Kailash
    Kushwaha, Satpal Singh
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 259 - 266
  • [38] Tiered Architecture for Remote Access to Data Sources
    Cenci, Karina M.
    de Matteis, Leonardo
    Ardenghi, Jorge R.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2014, 14 (02): : 67 - 72
  • [39] TAKE CONTROL OF REMOTE ACCESS
    MCCUSKER, T
    DATAMATION, 1994, 40 (07): : 62 - 64
  • [40] Remote access virtual private network architecture for high-speed wireless internet users
    Elkeelany, O
    Matalgah, MM
    Qaddour, J
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2004, 4 (05): : 567 - 578