CN102130825A - Data processing method for passive optical network system, optical line terminal and system - Google Patents

Data processing method for passive optical network system, optical line terminal and system Download PDF

Info

Publication number
CN102130825A
CN102130825A CN2010105398178A CN201010539817A CN102130825A CN 102130825 A CN102130825 A CN 102130825A CN 2010105398178 A CN2010105398178 A CN 2010105398178A CN 201010539817 A CN201010539817 A CN 201010539817A CN 102130825 A CN102130825 A CN 102130825A
Authority
CN
China
Prior art keywords
address
mac
llid
downlink data
data message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105398178A
Other languages
Chinese (zh)
Other versions
CN102130825B (en
Inventor
陈武茂
董英华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201010539817.8A priority Critical patent/CN102130825B/en
Publication of CN102130825A publication Critical patent/CN102130825A/en
Application granted granted Critical
Publication of CN102130825B publication Critical patent/CN102130825B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a data processing method for a passive optical network (PON) system, which comprises the following steps of: receiving a downlink data message to acquire a logical link identifier (LLID) or gigabit encapsulation method port identifier (GEM PORT ID) of the downlink data message; replacing a first source medium access control (MAC) address of the downlink data message into a second source MAC address according to the LLID or GEM PORT ID of the downlink data message, wherein different LLIDs or GEM PORT IDs correspond to different second source MAC addresses; and encrypting the downlink data message comprising the second source MAC address, and transmitting the encrypted downlink data message to an optical network unit (ONU). The embodiment of the invention provides an optical line terminal and a data processing system for the PON system. The problem of relatively PON interface data security in the conventional passive optical network system is solved, thereby improving the security of PON interface data and increasing the degree of satisfaction of a user.

Description

The method of data processing, optical line terminal and system in the passive optical network
Technical field
The present invention relates to communication technical field, method, optical line terminal and the system of data processing in the particularly a kind of passive optical network PON system.
Background technology
(Passive Optical Network, PON) technology is at present most widely used Fiber to the home (Fiber To The Home, FTTH) one of technology to EPON.Existing P ON comprises broadband passive optical network (Broadband Passive Optical Network, BPON), gigabit passive optical network (Gigabit-capable Passive Optical Network, GPON) and ethernet passive optical network (EthernetPassive Optical Network, EPON).
Traditional PON system mainly comprises: optical line terminal (Optical Line Terminal, OLT), optical network unit (Optical Network Unit, ONU) and optical distribution network (Optical DistributionNetwork, part such as ODN), wherein, optical distribution network comprises trunk optical fiber, passive optical splitter and branch optical fiber.Connect by trunk optical fiber between OLT and the passive optical splitter, optical branching device is realized the luminous power distribution of point-to-multipoint, and is connected to a plurality of ONU by a plurality of branch optical fibers.Wherein, the direction from OLT to ONU is called down direction, and the direction from ONU to OLT is called up direction.
The up direction of PON system adopts time division multiple access usually, and (each ONU sends uplink data messages at the time slot of OLT appointment for Time Division Multiple Address, TDMA) multiplex mode; And down direction OLT adopts time division multiplexing (Time Division Multiplexing, TDM) broadcast mode sends downlink data message to each ONU, the light signal that carries the downlink data message of all ONU is divided into some parts at the optical branching device place of ODN, arrive each ONU through each branch optical fiber.
In realizing process of the present invention, the inventor finds that there are the following problems at least in the prior art: at present in the PON system, adopt broadcast mode to transmit data message at down direction (from OLT to ONU) OLT, after each ONU receives downlink data message, extract the data message of oneself according to specific identification information, and abandon other data messages.Therefore, concerning some ONU, obtain the data message that OLT issues all ONU and be easy to realize that this just makes malicious user be easy to intercept and capture the data message that OLT issues other ONU, cause user profile to be intercepted and captured, thereby cause the fail safe of existing P ON interface data relatively poor by malice.
Summary of the invention
The purpose of the embodiment of the invention provides method, optical line terminal and the system of data processing in a kind of PON system, being used for solving prior art user profile is intercepted by malice, cause the relatively poor problem of PON interface data fail safe, thereby improve the fail safe of PON interface data in the PON system and user's satisfaction.
For addressing the above problem, the embodiment of the invention provides the method for data processing in a kind of passive optical network PON system, and described method comprises:
The downlink data receiving message obtains the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORT ID of described downlink data message;
LLID or GEM PORT ID according to described downlink data message, the first source medium access control MAC Address of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
The downlink data message that comprises described second source MAC is encrypted, and is sent downlink data message after the described encryption, comprising to a kind of optical line terminal of optical network unit ONU:
Two layers of processing module are used for the downlink data receiving message, obtain the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORTID of described downlink data message;
MAC Address is replaced module, be used for LLID or GEMPORT ID according to described downlink data message, first source MAC of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
Encrypting module is used for the downlink data message that comprises described second source MAC is encrypted, and sends the downlink data message after the described encryption.
The system of data processing in a kind of passive optical network, described system comprises:
Optical line terminal OLT is used for the downlink data receiving message, obtains the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORTID of described downlink data message; According to the LLID or the GEM PORT ID of described downlink data message, first source MAC of described downlink data message is replaced to second source MAC; The downlink data message that comprises described second source MAC is encrypted, and sent downlink data message after the described encryption, second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
Optical network unit is used to receive that described optical line terminal sends through the downlink data message after encrypting.
The method of data processing in a kind of passive optical network PON system that the embodiment of the invention provides, optical line terminal and system by the downlink data receiving message, obtain the LLID or the GEM PORT ID of described downlink data message; LLID or GEMPORT ID according to described downlink data message, the first source medium access control MAC Address of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other; The downlink data message that comprises described second source MAC is encrypted, and send downlink data message after the described encryption to optical network unit ONU, solve the relatively poor problem of PON interface data fail safe in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done to introduce simply in will describing embodiment below.Apparently, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The method flow diagram of data processing in a kind of passive optical network that Fig. 1 provides for the embodiment of the invention;
The concrete grammar flow chart of down direction data processing in a kind of passive optical network that Fig. 2 provides for the embodiment of the invention one;
The concrete grammar flow chart of up direction data processing in a kind of passive optical network that Fig. 3 provides for the embodiment of the invention one;
The concrete grammar flow chart of down direction data processing in a kind of passive optical network PON system that Fig. 4 provides for another embodiment of the present invention;
The concrete grammar flow chart of up direction data processing in a kind of passive optical network PON system that Fig. 5 provides for another embodiment of the present invention;
The structural representation of a kind of optical line terminal that Fig. 6 embodiment of the invention provides;
The structure chart of a kind of passive optical network PON system that Fig. 7 provides for the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The method flow diagram of data processing in a kind of passive optical network PON system that Fig. 1 provides for the embodiment of the invention.As shown in Figure 1, the method for the embodiment of the invention can comprise the steps:
Step S 102, optical line terminal OLT receive the downlink data message that the network equipment sends, and obtain the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORT ID of described downlink data message.
OLT can obtain the LLID or the GEMPORT ID of downlink data message by the mode of study.
Step S104, OLT be according to the LLID or the GEM PORT ID of described downlink data message, and first medium access control (Media Access Control the is called for short MAC) address of described downlink data message is replaced with second MAC Address.Wherein, different LLID or second MAC Address of GEM PORT ID correspondence have nothing in common with each other.
Particularly, LLID or the GEM PORT ID of OLT by downlink data message, realize that first MAC Address with described downlink data message replaces to second MAC Address following two kinds of optional implementations can be arranged:
First kind of mode is: according to first MAC Address of LLID or the GEM PORT ID and the described downlink data message of described downlink data message, search the MAC Address substitution table that is pre-configured in described OLT inside, and obtain and corresponding second MAC Address of described first MAC Address from described MAC Address substitution table.
Described MAC Address substitution table comprises: the corresponding relation of described first MAC Address and described second MAC Address, and in described MAC Address substitution table, described second MAC Address corresponds respectively to different LLID or GEM PORT ID.
Wherein, at down direction, " first MAC Address of described downlink data message " can send to the actual source MAC Address of the downlink data message of ONU for OLT, it can be called " first source MAC " of described downlink data message again corresponding to " first MAC Address in the described MAC Address substitution table "; " described second MAC Address " can be the virtual source MAC Address that described first source MAC is replaced to by described MAC Address substitution table, it can be called " second source MAC " of described downlink data message again corresponding to " second MAC Address in the described MAC Address substitution table ".On the other hand, in specific embodiment, the target MAC (Media Access Control) address of described downlink data message can not handled.
The second way is: LLID or GEM PORT ID according to described downlink data message, search the table of random numbers that is pre-configured in described OLT inside, and obtain and described LLID or GEMPORT ID random number corresponding; First MAC Address of described downlink data message and the random number of being obtained are carried out the logic XOR handle, and with the XOR result as described second MAC Address.
The described table of random numbers is used for the LLID of presentation logic link or the corresponding relation between GEM PORT ID and the described random number, in specific embodiment, the described table of random numbers can comprise: the LLID of described logical links or GEM PORT ID and with the LLID or the GEM PORT ID random number corresponding of described logical links.
Similar ground, " first MAC Address of described downlink data message " can issue the actual source MAC Address of the downlink data message of ONU for OLT, is called " first source MAC " again; Described second MAC Address can be called " second source MAC " again for being used for replacing the virtual source MAC Address of described first source MAC.
Step S 106, OLT encrypt the downlink data message that comprises described second MAC Address, and the downlink data message after the described encryption is sent to ONU.
Above-mentioned steps is the method for down direction data processing, and described method also further comprises the method for up direction data processing, such as, in one embodiment, described method also comprises:
OLT receives the uplink data messages that described ONU sends, and obtains the LLID or the GEM PORT ID of described uplink data messages; According to the LLID or the GEMPORT ID of described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address; According to described second target MAC (Media Access Control) address, described uplink data messages is sent to the network equipment.
Wherein, described first target MAC (Media Access Control) address is corresponding with second source MAC (being described second MAC Address) of described downlink data message, and described second target MAC (Media Access Control) address is corresponding with first source MAC (being described first MAC Address) of described downlink data message.
Described LLID or GEM PORT ID according to uplink data messages, the implementation that first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address also has two kinds:
First kind of mode is: according to the LLID or the GEM PORT ID of described uplink data messages, and first target MAC (Media Access Control) address of described uplink data messages, search described MAC Address substitution table, obtain and corresponding second target MAC (Media Access Control) address of described first target MAC (Media Access Control) address from described MAC Address substitution table.
For up direction, " first target MAC (Media Access Control) address " of described data message is the target MAC (Media Access Control) address that ONU sends to the uplink data messages of OLT, it can be equivalent to " second MAC Address of described downlink data message ", promptly corresponding to " second MAC Address in the described MAC Address substitution table "; " second target MAC (Media Access Control) address " of described data message is the MAC Address that is used for replacing " first target MAC (Media Access Control) address " that obtains behind the described MAC Address substitution table by searching, it can be equivalent to " first MAC Address of described downlink data message ", promptly corresponding to " first MAC Address in the described MAC Address substitution table ".Because when downlink data is handled, source MAC to downlink data message is replaced, and ONU is when sending uplink data messages, directly with the target MAC (Media Access Control) address of the source MAC (being described second source MAC) after replacing in the downlink data message as described uplink data messages, so when upstream data is handled, need this MAC Address is reduced, could realize sending to corresponding network device according to this MAC Address, so through after replacing it, " second target MAC (Media Access Control) address " of described uplink data messages is corresponding to " first source MAC " of downlink data message.
The second way is: LLID or GEM PORT ID according to described uplink data messages, search the described table of random numbers, and obtain and described LLID or GEM PORT ID random number corresponding from the described table of random numbers; According to described random number, first target MAC (Media Access Control) address of described uplink data messages and described random number are carried out the logic XOR handle, and with the XOR result as described second target MAC (Media Access Control) address.
The method of data processing by the downlink data receiving message, is obtained the LLID or the GEM PORTID of described downlink data message in a kind of passive optical network PON system that the embodiment of the invention provides; LLID or GEM PORT ID according to described downlink data message, the first source medium access control MAC Address of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other; The downlink data message that comprises described second source MAC is encrypted, and send downlink data message after the described encryption to optical network unit ONU, solve the relatively poor problem of PON interface data fail safe in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
As shown in Figure 2, the concrete grammar flow chart of down direction data processing in a kind of passive optical network PON system that provides for the embodiment of the invention one of Fig. 2.
Step S202, the network equipment send downlink data message to OLT.
The described network equipment can be the network equipments such as BNG that are connected with OLT.
Step S204, OLT receive the downlink data message that the network equipment sends, and obtain the LLID or the GEM PORT ID of described downlink data message.
OLT can obtain the LLID or the GEM PORT ID of described data message by study.
Step S206, OLT search the table of random numbers according to the LLID or the GEM PORT ID of described data message, judge whether the logical links of described LLID or GEM PORT ID correspondence needs to encrypt; If need to encrypt, then continue execution in step 208, otherwise directly execution in step 214 promptly, directly sends described downlink data message to ONU.
Described OLT inside can store the table of random numbers in advance, and is as shown in table 1 below:
Figure BDA0000031748280000081
Table 1
As shown in table 1, the described table of random numbers comprises a plurality of list items, each list item is used for representing the corresponding relation of LLID or GEM PORT ID and random number respectively, wherein, described list item comprises: " LLID or the GEM PORT ID " of described downlink data message, " random number " and information such as " whether needing to encrypt ".And as can be seen from Table 1, different LLID or the pairing random number of GEM PORT ID have nothing in common with each other, in addition, in configuration during described random table, each random number can be produce at random so that it does not have rule to follow each other.
Wherein, " LLID or GEM PORT ID ": refer to the sign of this logical links, if described method is applied among the EPON, described LLID corresponds to LLID, if described method is applied among the GPON, described LLID corresponds to GEM PORT ID.
Whether " need to encrypt ", whether whether referring to needs this logical links is encrypted, need in other words this logical links corresponding port is encrypted; If "Yes" then can further be obtained and described LLID or GEM PORT ID random number corresponding, and the step below continuing to carry out; Otherwise, directly send this downlink data message.
" random number " refers to this LLID or GEM PORT ID random number corresponding value.
Step S208, OLT obtain from the described table of random numbers and described LLID or GEM PORT ID random number corresponding according to described LLID or GEM PORT ID.
Step S210, OLT carry out the logic XOR with first source MAC (SMAC address) of described downlink data message and described random number to be handled obtaining second source MAC, and first source MAC of described downlink data message is replaced with described second source MAC.
Wherein, first source MAC of described downlink data message is the actual source MAC Address of the OLT downlink data message that sends to ONU; Described second source MAC is for handling the virtual source MAC Address that is used for replacing described first source MAC that obtains through XOR.For example, first source MAC of described downlink data message (being the SMAC address) is " 0x00-00-00-00-00-01 ", wherein, the LLID of described data message is " 0 ", inquire about the described table of random numbers according to described LLID, learn and to encrypt this logical links from first list item, and then acquisition and described LLID random number corresponding are " 0x02-01-02-03-04-05 ", then according to " SMAC xor random number ", with " 0x00-00-00-00-00-01 " xor " 0x02-01-02-03-04-05 ", obtain described the 2nd SMAC address, be: " 0x02-01-02-03-04-04 ".
In addition, in specific embodiment, for down direction, the 2nd SMAC address that is used for replacing a described SMAC address is a unicast address, and the MAC Address of the terminal equipment that inserted of described the 2nd SMAC address and ONU does not clash.In one embodiment, in order to guarantee that described the 2nd SMAC address is clean culture, and the MAC Address with other terminal equipment does not clash, can solve by the following method: because the I/Gbit (minimum bit position) of first byte of MAC Address represented local effective address at 1 o'clock, and the always global effective address (U/Lbit is 0) that various network device uses, therefore, as long as the U/L bit of described the 2nd SMAC address 1 just can avoid occurring address conflict.Perhaps, when generating random number, only need to guarantee that the bit of corresponding I/G is 0 that then with after the SMAC address XOR random number, the bit of the corresponding U/L of the 2nd SMAC after also can guaranteeing to replace is 1, can avoid occurring address conflict thus.
Step S212, OLT encrypt the downlink data message that comprises the 2nd SMAC address.
Step S214, the described downlink data message of transmission are to ONU.
If the judged result of step S206 is for encrypting this logical links, then this step is that downlink data message after OLT will encrypt sends to ONU; If the judged result of step S206 is encrypted this logical links for not needing, then this step is that OLT neither needs first source MAC of this downlink data message is replaced with described second source MAC, do not need described downlink data message is encrypted yet, but directly send this downlink data message to ONU.
The method of down direction data processing in a kind of passive optical network PON system that the embodiment of the invention provides is by LLID or the GEM PORT ID that obtains downlink data message; According to described LLID or GEM PORT ID, first source MAC of described downlink data message is replaced to second source MAC by searching the table of random numbers; The downlink data message that comprises described second source MAC is encrypted, and the downlink data message after the described encryption sent to ONU, solve the problem of PON interface data poor stability in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
On the other hand, the embodiment of the invention also further provides up direction data processing method in a kind of passive optical network, as shown in Figure 3, the concrete grammar flow chart of up direction data processing in its a kind of passive optical network that provides for the embodiment of the invention.
Step 302, optical network unit ONU send uplink data messages to OLT.
Step 304, OLT receive the uplink data messages that described ONU sends, and obtain the LLID or the GEM PORT ID of described uplink data messages.
Step 306, OLT search the table of random numbers according to described LLID or GEM PORT ID, judge whether the logical links of described LLID or GEM PORT ID correspondence needs to encrypt; If need to encrypt, then continue execution in step 308, otherwise, direct execution in step 316, promptly OLT directly sends this uplink data messages to the network equipment.
Step 308, OLT search the table of random numbers according to described LLID or GEM PORT ID, obtain from the described table of random numbers and described LLID or GEM PORT ID random number corresponding.
In specific embodiment, OLT can be according to the table of random numbers of storing in advance, such as the table 1 of the foregoing description description, by LLID or GEM PORT ID, search the described table of random numbers, and from the described table of random numbers, obtain and described LLID or GEM PORT ID random number corresponding.The random number that it should be noted that here to be obtained is consistent with above-mentioned downlink data message random number corresponding.The related content of the concrete table of random numbers sees also the table 1 in the step 206 in the foregoing description.
Step 310, OLT judge whether described uplink data messages is unicast message, if execution in step S312 then, otherwise execution in step 314 promptly sends the network equipment of described uplink data messages to correspondence.
Here step 310 can be carried out after step 308, also can be placed on after the step 302, judge when promptly receiving uplink data messages whether this message is unicast message,, promptly obtain the LLID or the GEM PORT ID of described uplink data messages if then continue to carry out later step; Otherwise execution in step 314 promptly sends the network equipment of described uplink data messages to correspondence.
In specific embodiment, judge whether described uplink data messages is that unicast message can be judged by the multicast bits (I/G position) of judging described uplink data messages, for example, if the multicast bits of described data message i.e. " I/G position " is " 0 ", represent that then this uplink data messages is a unicast message; If be " 1 ", represent that then this uplink data messages is multicast message or broadcasting packet.If described uplink data messages does not then need first destination address (dmac address) of this data message is handled, but directly sends described uplink data messages to the network equipment for broadcasting or multicast message.
Step 312, according to described random number, first target MAC (Media Access Control) address (dmac address) of described uplink data messages and described random number are carried out the logic XOR handle obtaining second target MAC (Media Access Control) address, and first target MAC (Media Access Control) address of data message is replaced with described second target MAC (Media Access Control) address.
Wherein, first target MAC (Media Access Control) address of described uplink data messages can send to the dmac address of the uplink data messages of OLT for ONU, particularly, ONU can be with second source MAC (being above-mentioned virtual source MAC Address) of its described downlink data message that receives from the OLT target MAC (Media Access Control) address as its uplink data messages that sends to described OLT, and promptly described first target MAC (Media Access Control) address is equivalent to second source MAC of described downlink data message.
In addition, the concrete MAC Address replacement process of step 312 can be handled for: OLT carries out the logic XOR with the random number that gets access in first dmac address of described uplink data messages and the step 308, and with the XOR result as second dmac address, with further first dmac address of replacing as described uplink data messages of described second dmac address, make described OLT described uplink data messages to be transmitted to the corresponding network equipment according to this second dmac address.
Because the embodiment of the invention adopts the same table of random numbers to realize the replacement and the reduction of source MAC and target MAC (Media Access Control) address, in step 312, according to the random number that gets access to, first target MAC (Media Access Control) address of described uplink data messages will be replaced by first source MAC of described downlink data message (the actual source MAC Address of the downlink data message that to be OLT provide to ONU).
Step S314, OLT send described uplink data messages to the network equipment.
If judged result is for encrypting this logical links among the step S306, and judge among the step S310 that described uplink data messages is a unicast message, second dmac address of then described OLT after according to described replacement is transmitted to the network equipment with described uplink data messages.If judged result is encrypted this logical links for not needing among the step S306; Perhaps, judge among the step S310 that described uplink data messages is multicast or broadcasting, then OLT does not need the dmac address of described uplink data messages is handled, such as, can directly described uplink data messages be issued the corresponding network equipment according to the dmac address (i.e. first target MAC (Media Access Control) address) of described uplink data messages.
The method of up direction data processing in the passive optical network PON system that the embodiment of the invention provides is by LLID or the GEM PORT ID that obtains uplink data messages; LLID or GEM PORT ID according to described uplink data messages search the table of random numbers, and first dmac address of described uplink data messages is replaced to second dmac address; According to described second dmac address described uplink data messages is sent to the network equipment, solved the problem of PON interface data poor stability in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
As shown in Figure 4, the concrete grammar flow chart of down direction data processing in a kind of passive optical network PON system that provides for another embodiment of the present invention of Fig. 4.
Step 402, the network equipment send downlink data message to OLT.
The described network equipment can be the network equipments such as BNG that are connected with OLT.
Step 404, OLT receive the downlink data message that the network equipment sends, and obtain the LLID or the GEM PORT ID of described downlink data message.
OLT can obtain the LLID or the GEM PORT ID of described downlink data message by study.
Step 406, OLT are searched the MAC Address substitution table according to the LLID or the GEM PORT ID of described downlink data message, judge whether the logical links of described LLID or GEM PORT ID correspondence needs to encrypt; If need to encrypt, then continue execution in step 408, otherwise directly execution in step 412 directly sends described downlink data message to ONU.
Alternatively, described OLT inside can have been stored MAC Address in advance and replaced the pond, described MAC Address is replaced the MAC Address that is obtained by the webmaster Random assignment by a plurality of (at least 2) in the pond, described MAC Address is mainly used in the MAC Address that replacement is provided for up or downlink data message, promptly be used for LLID (such as LLID or GEM PORT ID) according to described data message, for described data message distributes second MAC Address (virtual source MAC Address or virtual target MAC (Media Access Control) address) that is used for replacing first MAC Address (source MAC or target MAC (Media Access Control) address) of described data message, and write down described corresponding relation to the MAC Address substitution table.
Described MAC Address substitution table is as shown in table 2 below:
Table 2
Described MAC Address substitution table can be stored in described OLT inside equally, the corresponding relation whether it is used to represent LLID or GEM PORT ID, the MAC Address fallback relationship of data message and encrypts etc.Described MAC Address substitution table can comprise a plurality of list items, and as can be seen from Table 1, the pairing MAC Address fallback relationship of different LLID or GEM PORT ID has nothing in common with each other, and each MAC Address fallback relationship does not have rule to follow each other.See also Fig. 2, described list item can comprise:
" LLID or GEM PORT ID ": refer to the sign of this logical links, if described method is applied among the EPON, the sign of described logical links corresponds to LLID, if described method is applied among the GPON, described LLID corresponds to GEM PORT ID.
" whether encrypt ": whether need to refer to logical links to encrypt this data message; If this list item is recorded as "Yes", then indication needs described logical links to encrypt; If "No", then indication does not need this logical links is encrypted.
Specifically comprise following option in wherein said " MAC Address fallback relationship " list item: " whether effective ", " first MAC Address " and " second MAC Address ".
" whether effective ": indicate the MAC Address fallback relationship of described data message whether effective, promptly whether have the corresponding relation of first MAC Address and second MAC Address.For down direction, if list item " whether effective " is a "No", and " whether encrypting " option is "Yes", then indication need be encrypted this logical links, but does not also set up the corresponding relation of described MAC Address at present, need set up described corresponding relation, then according to the MAC Address in the MAC Address pond, distribute second MAC Address for first MAC Address of described data message, set up described efficient MAC address corresponding relation after, store described corresponding relation; For up direction, if being "No" and " whether encrypting " item, this list item " whether effective " is "Yes", indicate this logical links to need to encrypt, but in this " MAC Address fallback relationship ", can not find the corresponding relation of this MAC Address, general then OLT abandons described data message after receiving the data message of described ONU transmission.
Down direction, " first MAC Address " sends to the SMAC address of the downlink data message of ONU corresponding to OLT, can be called " a SMAC address " of described downlink data message again; SMAC address after " second MAC Address " sends to the downlink data message of ONU corresponding to OLT process MAC Address is replaced can be called again " the 2nd SMAC address " of this described message.
Accordingly, up direction, " second MAC Address " sends to the dmac address of the uplink data messages of OLT corresponding to ONU, can be called " first dmac address " of this data message again." first MAC Address " send to corresponding to ONU OLT uplink data messages through the dmac address after replacing, can be called " the 2nd DMAC " of described data message again." second MAC Address " in the wherein said MAC Address substitution table can obtain by " first MAC Address " XOR random number, also can obtain by the alternate manner configuration.
In addition, can solve the collision problem that has " second MAC Address " (i.e. the 2nd SMAC address) that may exist in the MAC Address substitution table with reference to the solution in the foregoing description step 210 at present embodiment.
Step 408, OLT are according to described LLID or GEM PORT ID, and first source MAC that reaches described downlink data message is searched described MAC Address substitution table, obtains second source MAC corresponding with described first source MAC.
This step can be specially: OLT is according to described LLID or GEM PORT ID, an and SMAC address of described downlink data message, search described MAC Address substitution table, find " first MAC Address " and the corresponding list item in a described SMAC address, from " second MAC Address " of described list item, obtain second source MAC corresponding with described first source MAC.
Here it should be noted that: if OLT is according to described LLID or GEM PORT ID and first source MAC (being equivalent to " first MAC Address " in the MAC Address substitution table), in described MAC Address substitution table, find corresponding second source MAC (being equivalent to " second MAC Address " in the MAC Address substitution table), a SMAC address that then obtains this second source MAC and described second source MAC is replaced described downlink data message; If do not find, then replace and distribute a MAC Address in the pond in the MAC Address of OLT storage, as with this " first MAC Address " corresponding " second MAC Address ", i.e. the 2nd SMAC address of described downlink data message, and described corresponding relation is recorded in the described MAC Address substitution table.
Step 410, OLT encrypt the downlink data message that comprises second MAC Address.
Step 412, OLT send described downlink data message to ONU.
If the judged result of step S406 needs to encrypt for this logical links, the downlink data message after then OLT will encrypt is transmitted to ONU; If this logical links does not need to encrypt, then OLT neither needs first MAC Address of this downlink data message is replaced with described second MAC Address, does not also need described downlink data message is encrypted, but directly should send to ONU by described downlink message.
The method of down direction data processing in a kind of passive optical network PON system that the embodiment of the invention provides is by LLID or the GEM PORT ID that obtains downlink data message; According to the LLID or the GEM PORT ID of described downlink data message, by searching the MAC Address substitution table, first MAC Address of described data message is replaced to second MAC Address; The data message that comprises described second MAC Address is encrypted, and the downlink data message after the described encryption sent to ONU, solve the relatively poor problem of PON interface data fail safe in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
As shown in Figure 5, the concrete grammar flow chart that upstream data is handled in a kind of passive optical network PON system that provides for another embodiment of the present invention of Fig. 5.
Below the destination address of described data message be abbreviated as dmac address, source MAC is abbreviated as the SMAC address.
Step 502, ONU send uplink data messages to OLT.
Step 504, OLT receive described uplink data messages, obtain the LLID or the GEM PORT ID of described data message.
Step 506, OLT are searched the MAC Address substitution table according to the LLID or the GEM PORT ID of described uplink data messages, judge whether the logical links of described LLID or GEM PORT ID correspondence needs to encrypt; If need to encrypt, then continue execution in step 508, otherwise, execution in step 512, promptly OLT directly is transmitted to the network equipment with described uplink data messages.
Described MAC Address substitution table can adopt the MAC Address substitution table shown in the chart 2, and wherein, the content in the table 2 please refer to the concrete introduction in the foregoing description.
Step 508, OLT judge whether described data message is unicast message, if execution in step S510 then, otherwise execution in step S512 promptly sends described uplink data messages to the network equipment.
Here step 508 can be carried out after step 506, also can be placed on after the step 502, judge when promptly receiving uplink data messages whether this message is unicast message,, promptly obtain the LLID or the GEM PORT ID of described uplink data messages if then continue to carry out later step; Otherwise execution in step 512 promptly sends the network equipment of described uplink data messages to correspondence.
Here OLT can judge whether this uplink data messages is unicast message by the I/G position of described uplink data messages, for example the multicast bits of described uplink data messages is that the I/G position represents that for " 0 " this uplink data messages is a unicast message, and representing this uplink data messages for " 1 " is multicast or broadcasting.If described uplink data messages is a unicast message, then continue execution in step S510; If this uplink data messages is multicast or broadcasting, does not then need the target MAC (Media Access Control) address of this uplink data messages is handled, but directly it is transmitted to the corresponding network equipment.
Step 510, OLT are according to described LLID or GEM PORT ID, first target MAC (Media Access Control) address that reaches described uplink data messages is searched described MAC Address substitution table, obtains second target MAC (Media Access Control) address corresponding with described first target MAC (Media Access Control) address from described MAC Address substitution table.
First target MAC (Media Access Control) address of the described uplink data messages here is the dmac address that ONU sends to the uplink data messages of OLT, it can be equivalent to second MAC Address in the MAC Address substitution table, promptly corresponding to second source MAC of described downlink data message; Described second target MAC (Media Access Control) address is the MAC Address that is used to replace described first target MAC (Media Access Control) address, and it can be equivalent to second MAC Address in the MAC Address substitution table, promptly corresponding to first source MAC of described downlink data message.Described OLT is according to described LLID or GEM PORTID, and this first target MAC (Media Access Control) address (i.e. " second MAC Address "), search described MAC Address substitution table, obtain corresponding second target MAC (Media Access Control) address (" first MAC Address "), and first target MAC (Media Access Control) address of described uplink data messages is replaced with described second target MAC (Media Access Control) address.
Here also comprise a kind of situation: if this moment is according to described LLID or GEM PORT ID, and first target MAC (Media Access Control) address of described uplink data messages is when searching described MAC Address substitution table, do not find " first MAC Address " corresponding with the described first purpose MAC, then can directly abandon described uplink data messages.
Step 512, OLT send described uplink data messages to the network equipment.
If judged result is for encrypting this logical links among the step S506, and judge among the step S508 that described uplink data messages is a unicast message, then described OLT is transmitted to corresponding network device according to described second dmac address with described uplink data messages.If judged result is encrypted this logical links for not needing among the step S506; Perhaps, judge among the step S508 that described uplink data messages is multicast or broadcasting, then OLT does not need first dmac address of described uplink data messages is handled, such as, it can directly directly issue the network equipment according to first dmac address of described uplink data messages with described uplink data messages.
The method of up direction data processing in a kind of passive optical network PON system that the embodiment of the invention provides is by LLID or the GEM PORT ID that obtains uplink data messages; LLID or GEM PORT ID according to described uplink data messages search the MAC Address substitution table, second MAC Address of described uplink data messages are replaced to first MAC Address of described uplink data messages; According to described first MAC Address described uplink data messages is sent to the network equipment, solved the problem of PON interface data poor stability in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
Further, the data processing method of down direction and down direction in the PON system that provides based on each embodiment, the embodiment of the invention also further provides a kind of optical line terminal, as shown in Figure 6, and the structural representation of a kind of optical line terminal that Fig. 6 provides for the embodiment of the invention.
A kind of optical line terminal OLT 60 comprises:
Two layers of processing module 602, promptly the L2 processing module is used to receive the downlink data message that the network equipment sends, and obtains the LLID or the GEM PORT ID of described downlink data message.
MAC Address is replaced module 604, is used for LLID or GEM PORT ID according to described downlink data message, and first source MAC of described downlink data message is replaced to second source MAC.
Encrypting module 606 is used for encrypting according to message the number that comprises described second source MAC is descending, and sends the downlink data message after the described encryption.
At down direction, when the network equipment sends downlink data message to OLT, described MAC Address is replaced module, specifically be used for according to the LLID of described downlink data message or first source MAC of GEM PORT ID and described downlink data message, search the MAC Address substitution table, from described MAC Address substitution table, obtain and corresponding second source MAC of described first source MAC; Perhaps,
Described MAC Address is replaced module, specifically is used for LLID or GEM PORT ID according to described downlink data message, searches the table of random numbers, obtains and described LLID or GEM PORT ID random number corresponding; According to described random number, described first source MAC and described random number are carried out the logic XOR handle, and with the XOR result as described second source MAC.
Wherein, in described MAC Address substitution table, the pairing MAC Address fallback relationship of different LLID or GEM PORT ID has nothing in common with each other, and each MAC Address fallback relationship does not have rule to follow each other; In the described table of random numbers, different LLID or the pairing random number of GEMPORT ID have nothing in common with each other, and each random number can produce at random, there is not rule to follow each other, thus, present embodiment can be so that second source MAC of different LLID or GEM PORT ID correspondence has nothing in common with each other.
Described optical line terminal also comprises:
Passive optical network PON physical layer process module 608 is used to receive the uplink data messages that described ONU sends, and obtains the LLID or the GEM PORT ID of described uplink data messages, and described uplink data messages is sent to described MAC Address replacement module.
Described MAC Address replacement module 604 also is used for LLID or the GEM PORT ID according to described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address, and send the uplink data messages that comprises described second target MAC (Media Access Control) address.
Wherein, in one embodiment, described first target MAC (Media Access Control) address can be corresponding with second source MAC of described downlink data message, and described second target MAC (Media Access Control) address can be corresponding with first source MAC of described downlink data message.
Described MAC Address is replaced module and is used to also judge whether described descending or downlink data message is unicast message, and when described descending or downlink data message is unicast message, just it is carried out MAC Address and replaces and handle.
OLT structure chart in sum, according to the relation between described each module, the flow chart of data processing under simple the introduction between this OLT and the ONU:
Down direction: after the network equipment sends the described downlink data message of 602, two layers of processing module of two layers of processing module, 602 receptions of downlink data message to OLT, obtain the LLID or the GEM PORT ID of described downlink data message; Described LLID or GEM PORT ID are sent to MAC Address replacement module 604, described MAC Address is replaced module 604 according to described LLID or GEMPORT ID, first source MAC of described downlink data message is replaced to second source MAC, and the downlink data message that will have second source MAC after will replacing sends to encrypting module 606 and encrypts, downlink data message after the described encryption is sent to PON physical layer process module 608, and further send to ONU by described PON physical layer process module 608.
Wherein said MAC Address replacement module 604 replaces to the second source MAC with first source MAC dual mode: one, described MAC Address is replaced module 604 by described LLID or GEM PORT ID, search the table of random numbers, obtain and described LLID or GEM PORT ID random number corresponding; According to described random number, described first source MAC and described random number are carried out the XOR processing, obtain described second source MAC; They are two years old, described MAC Address is replaced module 604 according to the LLID of described downlink data message or first source MAC of GEM PORT ID and described downlink data message, search the MAC Address substitution table, obtain and corresponding second source MAC of described first source MAC.
Up direction: ONU sends to uplink data messages the PON physical layer process module 608 of OLT, described PON physical layer process module 608 receives the uplink data messages that described ONU sends, obtain the LLID or the GEM PORT ID of described uplink data messages, and described uplink data messages is sent to MAC Address replace module 604, described MAC Address is replaced LLID or the GEM PORT ID of module 604 according to described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address, and transmission includes the uplink data messages of described second target MAC (Media Access Control) address to two layers of processing module 602, the substitute mode that above-mentioned first target MAC (Media Access Control) address with described data message replaces to second target MAC (Media Access Control) address also has two kinds, can just repeat no more here with reference to the substitute mode of down direction.Two layers of processing module 602 can further send to the network equipment according to second target MAC (Media Access Control) address after replacing with described uplink data messages.
Concrete each module please refer to the description of said method embodiment to the processing procedure of data, has just repeated no more here.
A kind of optical line terminal that the embodiment of the invention discloses, described optical line terminal obtains the LLID or the GEM PORTID of described data message by receiving the downlink data message that the network equipment sends; According to the LLID or the GEM PORT ID of described data message, first source MAC of described data message is replaced to second source MAC of described data message; The data message that comprises described second source MAC is encrypted, and described data encrypted message sent to ONU, solve the relatively poor problem of PON interface data fail safe in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
As shown in Figure 7, the structure chart of a kind of passive optical network PON system that provides for the embodiment of the invention of Fig. 7.
A kind of passive optical network PON system 70 specifically comprises:
Optical line terminal OLT 702 is used to receive the downlink data message that the network equipment 706 sends, and obtains the LLID or the GEM PORT ID of described downlink data message; According to the LLID or the GEM PORT ID of described downlink data message, first source MAC of described downlink data message is replaced to second source MAC; The downlink data message that comprises described second source MAC is encrypted, and sent downlink data message after the described encryption.
Optical network unit ONU 704 is used to receive described through the downlink data message after encrypting that optical line terminal 702 sends.
Be connected by the PON interface between described OLT702 and the ONU704.
Described system also comprises:
Optical distribution network ODN708, trunk optical fiber, passive optical splitter and branch optical fiber between described OLT702 and the described ONU704 are referred to as ODN, and OLT702 sends data encrypted and sends to ONU704 through ODN708.
Above-mentionedly be that OLT702 sends the situation of downlink data message to ONU, at up direction, when described ONU704 sends uplink data messages to OLT, described optical line terminal 702 also is used to receive the uplink data messages that described optical network unit 704 sends, and obtains the LLID or the GEM PORT ID of described uplink data messages; According to the LLID or the GEMPORT ID of described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address; Second target MAC (Media Access Control) address according to described uplink data messages sends to the network equipment 706 with described uplink data messages.
Optical network unit ONU 704 also is used for described uplink data messages is sent to OLT702 by ODN708.
The system of data processing in a kind of passive optical network PON system that the embodiment of the invention discloses, described system comprises: optical line terminal and optical network unit, wherein, described optical line terminal is used to receive the downlink data message that the network equipment sends, and obtains the LLID or the GEMPORT ID of described data message; According to the LLID or the GEM PORT ID of described data message, first source MAC of described data message is replaced to second source MAC of described data message; The data message that comprises described second source MAC is encrypted, and described data encrypted message sent to optical network unit by ODN, solve the relatively poor problem of PON interface data fail safe in the present passive optical network, thereby improved the fail safe of PON interface data and user's satisfaction.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the scope of various embodiments of the present invention technical scheme.

Claims (12)

1. the method for data processing in the passive optical network PON system is characterized in that described method comprises:
The downlink data receiving message obtains the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORT ID of described downlink data message;
LLID or GEM PORT ID according to described downlink data message, the first source medium access control MAC Address of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
The downlink data message that comprises described second source MAC is encrypted, and sent downlink data message after the described encryption to optical network unit ONU.
2. method according to claim 1 is characterized in that, described LLID or GEM PORT ID according to described downlink data message replace to second source MAC with first source MAC of described downlink data message and comprise:
According to the LLID of described downlink data message or first source MAC of GEM PORT ID and described downlink data message, search the MAC Address substitution table, obtain second source MAC corresponding with described first source MAC;
First source MAC of described downlink data message is replaced with described second source MAC that gets access to from described MAC Address substitution table.
3. method according to claim 1 is characterized in that, described LLID or GEM PORT ID according to described downlink data message replace to second source MAC with first source MAC of described downlink data message and comprise:
LLID or GEM PORT ID according to described downlink data message search the table of random numbers, obtain and described LLID or GEM PORT ID random number corresponding;
According to described random number, first source MAC of described downlink data message and described random number are carried out XOR handle, and with the XOR result as second source MAC;
First source MAC of described downlink data message is replaced with described second source MAC.
4. method according to claim 1 is characterized in that, described method also comprises:
Receive the uplink data messages that described ONU sends, obtain the LLID or the GEM PORT ID of described uplink data messages;
According to the LLID or the GEM PORT ID of described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address;
According to described second target MAC (Media Access Control) address, described uplink data messages is sent to the corresponding network equipment.
5. method according to claim 4 is characterized in that, described LLID or GEM PORT ID according to described uplink data messages replace to second target MAC (Media Access Control) address with first target MAC (Media Access Control) address of described uplink data messages and comprise:
According to the LLID or the GEM PORT ID of described uplink data messages, and first target MAC (Media Access Control) address of described uplink data messages, search the MAC Address substitution table, obtain and corresponding second target MAC (Media Access Control) address of described first target MAC (Media Access Control) address;
First target MAC (Media Access Control) address of described uplink data messages is replaced with described second target MAC (Media Access Control) address that gets access to from described MAC Address substitution table.
6. method according to claim 4 is characterized in that, described LLID or GEM PORT ID according to described uplink data messages replace to second target MAC (Media Access Control) address with second MAC Address of described uplink data messages and comprise:
LLID or GEM PORT ID according to described uplink data messages search the described table of random numbers, obtain and described LLID or GEM PORT ID random number corresponding;
According to described random number, first target MAC (Media Access Control) address of described uplink data messages and described random number are carried out XOR handle, and with the XOR result as second target MAC (Media Access Control) address;
First target MAC (Media Access Control) address of described uplink data messages is replaced with described second target MAC (Media Access Control) address.
7. an optical line terminal is characterized in that, described optical line terminal comprises:
Two layers of processing module are used for the downlink data receiving message, obtain the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORTID of described downlink data message;
MAC Address is replaced module, be used for LLID or GEMPORT ID according to described downlink data message, first source MAC of described downlink data message is replaced to second source MAC, and second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
Encrypting module is used for the downlink data message that comprises described second source MAC is encrypted, and sends the downlink data message after the described encryption.
8. optical line terminal according to claim 7, it is characterized in that, described MAC Address is replaced module and specifically is used for according to the LLID of described downlink data message or first source MAC of GEM PORT ID and described downlink data message, search the MAC Address substitution table, obtain second source MAC corresponding with described first source MAC.
9. optical line terminal according to claim 7, it is characterized in that, described MAC Address replacement module specifically is used for LLID or the GEM PORT ID according to described downlink data message, searches the table of random numbers, obtains and described LLID or GEM PORT ID random number corresponding; According to described random number, first source MAC of described downlink data message and described random number are carried out XOR handle, and with the XOR result as second MAC Address.
10. optical line terminal according to claim 7 is characterized in that, described optical line terminal also comprises:
PON physical layer process module is used to receive the uplink data messages that described ONU sends, and obtains the LLID or the GEM PORT ID of described uplink data messages, and described uplink data messages is sent to described MAC Address replacement module;
Described MAC Address is replaced module and also is used for LLID or GEM PORT ID according to described uplink data messages, and first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address.
11. a passive optical network PON system is characterized in that, comprising:
Optical line terminal OLT is used for the downlink data receiving message, obtains the LLID LLID or the gigabit passive optical network encapsulation mode port-mark GEM PORTID of described downlink data message; According to the LLID or the GEM PORT ID of described downlink data message, first source MAC of described downlink data message is replaced to second source MAC; The downlink data message that comprises described second source MAC is encrypted, and sent downlink data message after the described encryption, second source MAC of wherein different LLID or GEM PORT ID correspondence has nothing in common with each other;
Optical network unit is used to receive that described optical line terminal sends through the downlink data message after encrypting.
12. system according to claim 11 is characterized in that, described optical line terminal also is used to receive the uplink data messages that described optical network unit sends, and obtains the LLID or the GEM PORT ID of described uplink data messages; According to the LLID or the GEMPORT ID of described uplink data messages, first target MAC (Media Access Control) address of described uplink data messages is replaced to second target MAC (Media Access Control) address; According to described second target MAC (Media Access Control) address, described uplink data messages is sent to the network equipment.
CN201010539817.8A 2010-11-11 2010-11-11 Data processing method for passive optical network system, optical line terminal and system Active CN102130825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010539817.8A CN102130825B (en) 2010-11-11 2010-11-11 Data processing method for passive optical network system, optical line terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010539817.8A CN102130825B (en) 2010-11-11 2010-11-11 Data processing method for passive optical network system, optical line terminal and system

Publications (2)

Publication Number Publication Date
CN102130825A true CN102130825A (en) 2011-07-20
CN102130825B CN102130825B (en) 2014-01-08

Family

ID=44268719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010539817.8A Active CN102130825B (en) 2010-11-11 2010-11-11 Data processing method for passive optical network system, optical line terminal and system

Country Status (1)

Country Link
CN (1) CN102130825B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014094207A1 (en) * 2012-12-17 2014-06-26 Qualcomm Incorporated Multicast traffic bridging

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040133920A1 (en) * 2002-12-18 2004-07-08 Yongtae Kim Digital broadcast system in passive optical network
CN1874271A (en) * 2005-06-03 2006-12-06 阿尔卡特公司 Protection for wireless devices against false access-point attacks
CN101325460A (en) * 2007-06-12 2008-12-17 中兴通讯股份有限公司 Method for processing downstream broadcast and great-extension business of GPON system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040133920A1 (en) * 2002-12-18 2004-07-08 Yongtae Kim Digital broadcast system in passive optical network
CN1874271A (en) * 2005-06-03 2006-12-06 阿尔卡特公司 Protection for wireless devices against false access-point attacks
CN101325460A (en) * 2007-06-12 2008-12-17 中兴通讯股份有限公司 Method for processing downstream broadcast and great-extension business of GPON system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014094207A1 (en) * 2012-12-17 2014-06-26 Qualcomm Incorporated Multicast traffic bridging

Also Published As

Publication number Publication date
CN102130825B (en) 2014-01-08

Similar Documents

Publication Publication Date Title
US10484098B2 (en) Channel bonding in passive optical networks
CN101998183B (en) Transmission method of PLOAM (Physical Layer Operation Administration and Maintenance) message in passive optical network and assembling method
EP2355374B1 (en) Method, system and optical line terminal for message transmission in an optical communication system
US8442229B2 (en) Method and apparatus for providing security in a passive optical network
CN101552932B (en) Method, devices and system for transmitting and processing optical-fiber network
JP3805329B2 (en) Security data transmission method in Ethernet (registered trademark) passive optical network system
CN101056253B (en) Ethernet data repacking device and method
CN102868943B (en) A kind of method, optical network apparatus and system obtaining PON port association relation
RU2011152853A (en) METHOD AND DEVICE OF AUTHENTICATION IN PASSIVE OPTICAL NETWORK AND PASSIVE OPTICAL NETWORK
CN102714614B (en) Method for transmitting data in passive optical network, user-side equipment, and system
CN101873515B (en) IPV6 message transmission method, system and device of passive optical network
CN101183934A (en) Cipher key updating method in passive optical network
CN1957635A (en) Method for remote access of an optical network device in a passive optical network
CN101677414A (en) Method, system and device for leading user side terminal to obtain password
WO2011131141A1 (en) Ethod for authentication of a wireless backup system for an optical network unit
CN106717017A (en) Communication method, device, and system for wavelength division multiplexing passive optical network
CN101729194B (en) Methods, devices and system for coding and decoding data
CN101119220B (en) Gb passive optical network based multicast service implementing method and apparatus
CN101998193A (en) Key protection method and system for passive optical network
CN102098166A (en) Gigabit passive optical network system and controllable multicast implementation method thereof
CN102388566B (en) Method, device and system for converting identifier of terminal device
CN102130825B (en) Data processing method for passive optical network system, optical line terminal and system
CN101778311A (en) Distribution method of optical network unit marks and optical line terminal
CN106170938A (en) A kind of method, apparatus and system of EPON wavelength configuration
CN103248417B (en) Identity distribution method and device in a kind of passive optical network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant