LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX.
The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.
Telecom/ Engineering professionals, Network and Networking management professionals
Part 1. Overview of FTTx
Chapter 1. Introduction
Chapter 2. Deciding to Build an FTTx Network
Part 2. FTTx Technologies
Chapter 3. EPON
Chapter 4. GPON
Chapter 5. Other Network Standards
Chapter 6. Optical Layer Issues
Chapter 7. Choosing an FTTx Technology
Part 3. FTTx Network Implementation
Chapter 8. Planning to Implement the Network
Chapter 9. Outside Plant
Chapter 10. Data Services Architecture
Chapter 11. Video Overview and Broadcast Video Architecture
Chapter 12. IPTV Architecture
Chapter 13. VoIP Architecture
Chapter 14. Network Management Architecture and Design
Part 4. FTTx Network Operation
Chapter 15. Production Operations
Chapter 16. Performance Management
Chapter 17. Identifying Network Threats and Security Vulnerabilities
Appendix A. Data Flow in a PON
Appendix B. Introduction to Encryption
Appendix C. Forward Error Correction
Appendix D. Motivation for Quality of Service
JF
BL
KB
WW