China Telecom has been migrating from ADSL to fiber technologies like EPON and GPON to meet increasing broadband subscriber and bandwidth demands, piloting EPON in 2005 and making it a core access technology due to its maturity and interoperability. They aim to accelerate FTTH deployment through projects like "Broadband China, Optical City" to reach 100 million FTTH homes by 2015 using EPON and GPON, while also starting rollout of 10G-EPON to improve bandwidth for multi-dwelling units.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
FiberHome Technologies, the unique telecommunication system supplier that offers both optical fiber and cable as well as optical communication equipment, has over 40 years of experience in optical cable industry and more than 20 years in xPON technology R&D. Currently, FiberHome products are serving more than 20 million subscribers (including China) in Asia Pacific with its FTTH integrated solution. In Asia Pacific, FiberHome is becoming the mainstream provider of FTTH one-stop solutions – FTTH equipment, ODN products and FTTH turnkey services.
ODN construction cost accounts for more than 70% of the overall FTTH network investment. The rationality of ODN network planning and design, the reliability of the products and engineering, the efficiency of network operation and maintenance, and the capability of network evolution have become the key criteria to evaluate whether the FTTH network investment is successful or not.
With many years of experience in the telecom industry and in FTTH network construction, FiberHome is able to provide a smart, flexible, efficient and evolvable FTTH network. This helps save CAPEX and OPEX and raise customer satisfaction.
The proliferation of consumer devices, HDTV and internet based services will continue to drive consumer bandwidth demand and Fiber is the only access technology capable of supporting dedicated gigabit Ethernet bandwidths.
New technologies options include WDM-PON, VDLS2 bonding, G.fast, and more. In addition, there are new compression techniques and noise mitigation that extend the life of existing networks.
Which approaches are practical, necessary and beneficial and what factors determine the best path to take?
Zyxel’s Fiber Access solution provides versatile fiber connectivity for service providers according to the deployment requirements. Service providers can highly optimize and integrate various FTTx applications with the freedom to deploy services easily on GPON, GEPON, Active Fiber solutions with OLT, ONU/ONT and active fiber gateways.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
FiberHome Technologies, the unique telecommunication system supplier that offers both optical fiber and cable as well as optical communication equipment, has over 40 years of experience in optical cable industry and more than 20 years in xPON technology R&D. Currently, FiberHome products are serving more than 20 million subscribers (including China) in Asia Pacific with its FTTH integrated solution. In Asia Pacific, FiberHome is becoming the mainstream provider of FTTH one-stop solutions – FTTH equipment, ODN products and FTTH turnkey services.
ODN construction cost accounts for more than 70% of the overall FTTH network investment. The rationality of ODN network planning and design, the reliability of the products and engineering, the efficiency of network operation and maintenance, and the capability of network evolution have become the key criteria to evaluate whether the FTTH network investment is successful or not.
With many years of experience in the telecom industry and in FTTH network construction, FiberHome is able to provide a smart, flexible, efficient and evolvable FTTH network. This helps save CAPEX and OPEX and raise customer satisfaction.
The proliferation of consumer devices, HDTV and internet based services will continue to drive consumer bandwidth demand and Fiber is the only access technology capable of supporting dedicated gigabit Ethernet bandwidths.
New technologies options include WDM-PON, VDLS2 bonding, G.fast, and more. In addition, there are new compression techniques and noise mitigation that extend the life of existing networks.
Which approaches are practical, necessary and beneficial and what factors determine the best path to take?
Zyxel’s Fiber Access solution provides versatile fiber connectivity for service providers according to the deployment requirements. Service providers can highly optimize and integrate various FTTx applications with the freedom to deploy services easily on GPON, GEPON, Active Fiber solutions with OLT, ONU/ONT and active fiber gateways.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
CNAM course part 2, Introduction to Internet of Things (IoT), and M2M (Machine to Machine)...Long Range Low Power (LRLP) Networks (SigFox, LoRA), 4G LTE, Smart Grids, and Intelligent Transport System (ITS) / SmartCar
Wi Max, A Wireless Solution For Fixed Wireless Access In Emerging MarketsGreen Packet
Emerging markets are hungry for fixed broadband services, however characteristics of ADSL limit the even distribution of fixed broadband services to encompass urban and rural areas. Of late, WiMAX has surfaced to substitute ADSL in these markets and the results are encouraging. This application note discusses why WiMAX is the way forward for fixed broadband and how WiMAX
Operators can use the right end user devices to ensure successful deployment.
De-risking the broadband business model was presented at Informa's Industry Outlook 2012. The starting point summarizes the challenges the incumbent Telco is facing with the emergence of the smartphone, mobile applications and social media. Then it takes you to the Digital Agenda 2020 for Europe and inspects what needs to happen to make it come through.
Webinar: A revolução da Ethernet a um par de caboEmbarcados
Neste webinar iremos apresentar a tecnologia Single Pair Ethernet (SPE). Com a tecnologia SPE implementa uma rede ethernet utilizando apenas um par de cabos para comunicação. O SPE reduz o custo e a complexidade do sistema comparado a redes ethernet tradicionais. As camadas OSI de 2 a 7 permanecem as mesmas, alterando apenas a camada física.
O SPE propicia a convergência de outros protocolos de comunicação para apenas uma.
Iremos apresentar as principais características do SPE como velocidade, distância e topologia. Abordaremos também utilização real desta tecnologia no segmento automotivo, industrial e comercial.
At the American Telemedicine Association 2022 Conference, IEEE SA presented perspectives on where the development of global technical and data standards in remote patient monitoring (RPM) will support the future of innovation while moving the needle in patient-centered care.
This presentation provides an overview of OpenStand (www.open-stand.org), a multifaceted initiative that began with the drafting and joint affirmation of the OpenStand principles in August of 2012. Find out how OpenStand principles do more than align standards organizations – they lay out a new paradigm for technology development that is open, inclusive and market-driven from the bottom up. Find out how open standards benefit people, industry, markets, nations and the world.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
More from IEEE Standards Association (IEEE SA) (20)
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. Increasing BB subs in China and Technology
Evolution
180 45%
160 156 40%
140 35%
126
120 115 30%
103 100
100 25%
83 84
80 20%
66 67
60 52 52 15%
38 37
40 10%
26
20 5%
0 0%
2005 2006 2007 2008 2009 2010 2011
total Subs (DSL+FTTX) ADSL Subs Growth Rate (total) Growth Rate (ADSL)
•The immigration from ADSL2+ to FTTx even to FTTH is accelerated
•The gap between TOTAL and ADSL in earlier years is Ethernet based FTTB
•The gap between TOTAL and ADSL in recent years is PON based FTTX
•China broadband subscriber installed base is estimated to reach 180 million ports by
2014 Page 2
3. China's relative lower BB Penetration
China BB Household Penetration
•Compared with developed coutries, China has lower BB
household penetration (<40%) ;
•Great development potential and market opportunity!
Page 3
5. China Telecom piloted and promoted EPON/GPON
ecosystem in China
in 2004, Both IEEE802.3ah and ITU‐T G.984 were released. As a
fixedline operator, China Telecom pays a lot of attention to any
progress in FTTX technologies
after a comprehensive evaluation, China Telecom considered EPON
as more mature. e.g. EPON began massive deployments in Japan and
South Korea.
in 2005, China Telecom started EPON field trial in 4 provinces to
learn how to deploy EPON
EPON Interoperability is critical for the success and deployment of
EPON widely, so China Telecom started IOP research in 2005.
Some technical issues were solved such as:
MPCP registration Data encryption
ONU authentication: Report manner & DBA implementation
Logical ID Multicast
MAC based
ONU remote management: using CTC Specific OAM extension (MIB,
alarm, performance)
In Q1‐2007 CTC achieved large scale and all‐round chip and system
EPON IOP the first time in the world (3 chip vendors, 10 system
vendors)
6. CTC Broadband Technology Migration
Milestones
All these technologies will co-
Before 2007, ADSL/ADSL2+
exist in CT access network
was the dominant 100M
10G-EPON
technology
In 2007, CTC and other main
GPON
operators started massively
deployment of fiber access
EPON
based on ʺFIBER‐IN &
FIBER‐OUTʺ strategy after 50M
China Telecom achieved the
all‐around and large‐scale
IOP of EPON
GPON and 10G‐EPON
10M ADSL2+
began deployment after
ADSL
EPON
2000 2005 2007 2009 2010
Page 6
7. EPON is used in variant deployment scenarios in China
Telecom
Based on comprehensive analysis on TCO,bandwidth capbility,
technol. Trend, etc., China Telecom adopt different deployment
mode to local conditions:
Residential customer, urban Business buildings, Urban areas
areas
Green field (new area) Cover all the new business
• Stop deploying feeder & •buildings by fiber
•FTTO or FTTB
distribution copper wires
• FTTB (PON) + Ethernet
before 2010 Rural areas
• FTTH since 2010
Brown field (existing area) Principally stop deploying feeder
• (preferred) FTTB (PON)+ copper wires
DSL with copper wire length fiber to the village plus DSL
< 500m before 2010 •EPON (preferred)
• Bandwidth target: 8-20Mb/s •P2P
• some residential cell were Bandwidth target: >4Mb/s
upgraded by FTTH since
2010
8. Fiber‐in & Copper‐out history
from FTTB/N to FTTH
From 2008 to 2010, through EPON
deployment in FTTB/N architecture:
1. Customers’ access bandwidth improved
significantly
2. EPON equipments and ODN
technologies were improved, and China
Telecom completed OLT distribution in key
network points
in 2010, PON is mature enough
and ready for FTTH mass
deploymen:
•equipment price
•engining
•technician
•IT system
•service process
and China Telecom changed to
FTTH leading 8
9. Chinaʹs EPON Ecosystem
ASIC Optics
China Telecom has played key role in China EPON ecosysme
Page 9
10. access network's technology and architecture is being changed
PON FTTH(PON) Ethernet
1% Ethernet 5% 10%
19%
FTTB(PON)
26%
DSL DSL
80% 59%
2007 Q1, 2011
12. FTTx Development Strategy, progress and target
Strategy
Increase FTTH share in FTTx deployment to provide 20M
for urban residential users and 50~100M for HDTV and/or
multi channel IPTV users starting 2010
Speed up FTTO deployment in commercial buildings to
provide 100M~1G bandwidth for business users
Progress and plan
FTTH home pass (new): 2010: 10M; 2011: 30M; 2012: ~25M,
FTTH subscribers (new): 2010: 1M; 2011: 5M; 2012:
maybe>10M
FTTB/N home pass (new): 2009: 7M; 2010: 10M; 2011:
10M;2012:maybe >7M
Page 12
13. China Telecom uses EPON as a multiple-play platform
EPON is used to bear variant services with low cost in
China Telecom's networks
Page 13
14. Development & Application of 10G‐EPON Technol.
2010.11release XG-PON1 standard
Commercial chipset and optical TX:
Q2,2012
Commercial deployment: end fo
10G 2012
GPON
GPON XG-PON1 XG-PON2
Asymmetric Symmetric, no
plan
Asymmetric & WDM
Symmetric PON
EPON 10G-EPON
IEEE802.3av release in Sep, 2009
Commercial chipset and optical TX
will be ok soon
Commercial deployment: Q1,2010
2009 2010 2011 2012
China Telecom deeply involved in 10G‐EPON standardization and industry
improvement. in Apr. 2011, CTC achieved 10G‐EPON interoperability
10G‐EPON or XG‐PON1 will be deployed first to improve MDU’s uplink
bandwidth to achieve FTTH‐like capacity for each subscriber
More than 500 ports 10G‐EPON fed MDU are already in operation in China
Telecom networks
15. China Telecom actively take part in PON
standardization
China Telecom deeply involved in IEEE802.3av and IEEE1904.1
China Telecom promoted EPON in BBF together partners
– TR‐200: Using EPON in the context of TR‐101
– WT‐287: Optical Layer Management
China Telecom contributes also to FSAN and ITU‐T to GPON
standards, and some key contributions were adopted
China Telecom pushes China PON industry in CCSA (China
Communication Standardizaiton Association) to promote China
Telecomʹs specs to be a Chinese industry standards
– EPON interoperability
– 10G‐EPON
– TDM over EPON and GPON
Page 15
16. BTW: China Telecom’s View on GPON
Now, GPON technology and equipment are mature
enough to meet China Telecom FTTH deployment
requirements
Massive GPON deployment in FTTH kicked off from
2010 with volume increasing dramatically
CT will migrate FTTB/N into 10G PON in future (10G
EPON first) as both GPON and EPON do not provide
sufficient bandwidth to meet growing customer
demand
GPON and EPON will co-exist for FTTH deployment in
the next few years.
Page 16