CN113852883A - Optical network equipment authentication and configuration management method and system under FTTR (fiber to the Home) scene - Google Patents

Optical network equipment authentication and configuration management method and system under FTTR (fiber to the Home) scene Download PDF

Info

Publication number
CN113852883A
CN113852883A CN202110961387.7A CN202110961387A CN113852883A CN 113852883 A CN113852883 A CN 113852883A CN 202110961387 A CN202110961387 A CN 202110961387A CN 113852883 A CN113852883 A CN 113852883A
Authority
CN
China
Prior art keywords
ont
class
edge
loid
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110961387.7A
Other languages
Chinese (zh)
Other versions
CN113852883B (en
Inventor
彭文豪
刘文超
赵伟峰
侍芯蕊
童晟辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
Tianyi Digital Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Digital Life Technology Co Ltd filed Critical Tianyi Digital Life Technology Co Ltd
Priority to CN202110961387.7A priority Critical patent/CN113852883B/en
Priority to PCT/CN2021/135949 priority patent/WO2023019816A1/en
Priority to BR112023021776A priority patent/BR112023021776A2/en
Publication of CN113852883A publication Critical patent/CN113852883A/en
Application granted granted Critical
Publication of CN113852883B publication Critical patent/CN113852883B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a system for optical network equipment authentication and configuration management under an FTTR scene, wherein the method comprises the following steps: assigning a LOID indicating a device type to each optical network device, wherein the LOID at least comprises a class A LOID, a class B1 LOID and a class B2 LOID, wherein the class A LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS; configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management; configuring the B1 type edge ONT device to register and authenticate with the OLT device and accept ACS management through the coupled main ONT device; and configuring the class B2 edge ONT device to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.

Description

Optical network equipment authentication and configuration management method and system under FTTR (fiber to the Home) scene
Technical Field
The present invention relates to the field of network technology and security, and more particularly, to a method and system for authentication and configuration management of optical network devices in FTTR scenarios.
Background
Fttr (fiber to the room) means that on the basis of ftth (fiber to the home), an all-Optical gateway and a sub-device are deployed in a home, and Optical fiber communication coverage is achieved to a user room through a pon (passive Optical network) technology. A typical architecture for FTTH and FTTR is illustrated in fig. 1.
In fig. 1, the upper half represents an exemplary FTTH scenario. The common home gateway is an optical Network terminal equipment ont (optical Network terminal) deployed at a user end, and is connected to a local end equipment olt (optical Line terminal) through an in-home optical fiber. According to the current PON protocol, when an ONT device is on line, it needs to carry a legal logic id (loid) assigned by an operator to initiate registration authentication to an OLT (optical line terminal) of a local side device. After the authentication is passed, the ONT device initiates account authentication (e.g. PPPoE dialing) to an authentication system Server (e.g. BRAS Server). Inside the home, the gateway is typically connected point-to-point to the next level router via a network cable, and the router is further responsible for network coverage inside the home, for example, further cascading multiple APs.
The lower half of the branch of fig. 1 represents an exemplary FTTR scenario. In FTTR scenarios, the ONT device to which the home optical fiber is first connected is an FTTR home all-optical gateway, which is further connected by optical fiber to a plurality of FTTR sub-devices (i.e. point-to-multipoint) of the next level, which are typically placed in different rooms, so-called "fiber-in-houses". According to the current registration authentication and Management mechanism of optical devices, only FTTR home all-optical gateways as ONTs still perform registration authentication with the OLT, initiate account authentication with an authentication system Server, and receive Management of an Auto-Configuration Server ACS (e.g., Terminal integrated Management system (itms) platform) of an operator, while all FTTR sub-devices only receive Management of home all-optical gateways, and the home all-optical gateways forward relevant data to the FTTR sub-devices. Therefore, when in use, these FTTR sub-devices, similar to the routers in the FTTH scenario, belong to the local area network internal devices and are not perceived by the access network.
However, in some practical application scenarios, for example, in an FTTR scenario where there are multiple rooms and multiple users in one user, such as a dormitory building, an office building, a residence, etc., it is desirable to have a more flexible management manner for the existing FTTR architecture. Taking a one-house four-room house as an example, typically one FTTR sub-device is set in each room, connected together to an FTTR home all-optical gateway (primary ONT device), for which the home owner pays for the FTTR, and four rooms share the total bandwidth of this home FTTR service, e.g. 1000 Mbps. However, if the users in each room wish to use independently of each other (FTTR primary user), for example, wish to purchase different network access services (e.g., different bandwidth, different activation/deactivation times), the current management approach does not support.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The invention aims to solve the problem that the equipment access authentication and management process of the current PON technology cannot be well compatible with FTTR scene. Therefore, a method for classified access authentication and configuration management of home all-optical network devices based on FTTR scene is provided, wherein the home all-optical gateway and the sub-devices perform registration authentication and management to the OLT respectively, and the sub-devices can support two modes of receiving local side access authentication and ACS management or home gateway local management according to different management requirements.
According to an aspect of the present invention, there is provided a method for authentication and configuration management of an optical network device in FTTR scenario, wherein the method comprises:
assigning a LOID indicating a device type to each optical network device, wherein the LOID at least comprises a class A LOID, a class B1 LOID and a class B2 LOID, wherein the class A LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS;
configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management;
configuring the B1 type edge ONT device to register and authenticate with the OLT device and accept ACS management through the coupled main ONT device; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
According to another aspect of the present invention, there is provided a method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the primary ONT device and comprises the steps of:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT device to the OLT device;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending account numbers and configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication is passed, returning an authentication result to the B2 type edge ONT device and issuing a configuration, wherein the configuration configures the B2 type edge ONT device into a bridge mode.
According to an embodiment of the invention, the method further comprises: and receiving the updated account and configuration information of the edge ONT equipment associated with the main ONT equipment, which are sent by the ACS.
According to yet another aspect of the present invention, there is provided a method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B1 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the primary B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
According to yet another aspect of the present invention, there is provided a method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B2 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the class B2 edge ONT device into a bridge mode according to the received configuration.
According to yet another aspect of the present invention, there is provided a method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by an ACS and comprises the steps of:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
According to yet another aspect of the present invention, there is provided a system for providing FTTR service, wherein the system comprises an ACS, an authentication system, an OLT device, a primary ONT device, and one or more edge ONT devices coupled with the primary ONT device, wherein:
each of the primary ONT device and the edge ONT device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS;
wherein the primary ONT device is configured to register authentication with the OLT device and accept the ACS management;
the B1 type edge ONT device is configured to register authentication with the OLT device through the main ONT device and accept the ACS management; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
According to an embodiment of the invention, the primary ONT device is further configured to:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT device to the OLT device;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending account numbers and configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication is passed, returning an authentication result to the B2 type edge ONT device and issuing a configuration, wherein the configuration configures the B2 type edge ONT device into a bridge mode.
According to an embodiment of the invention, the primary ONT device is further configured to: and receiving the updated account and configuration information of the edge ONT equipment associated with the main ONT equipment, which are sent by the ACS.
According to a further embodiment of the invention, the class B1 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the primary B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
According to a further embodiment of the invention, the class B2 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the class B2 edge ONT device into a bridge mode according to the received configuration.
According to a further embodiment of the invention, the ACS is configured to:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
Compared with the existing equipment access authentication and management process, the method and the system can be better suitable for FTTR scenes, and the management of the home gateway and the sub-equipment can be more detailed. The operator can judge the device type according to the registered LOID, thereby achieving classification management and being compatible with multiple management modes of the sub-devices. More specifically, the optical network equipment authentication and configuration management method of the present invention has at least the following advantages:
1. the home gateway and the sub-equipment carry out classification identification through the LOID and carry out registration authentication independently;
2. an operator is allowed to manage the home gateway in an FTTR scene, and meanwhile, automatic network connection management is compatible to the sub-equipment partially connected under the home all-optical gateway;
3. in the FTTR supporting scene, the sub-equipment in the family receives two modes of local management or ACS management.
These and other features and advantages will become apparent upon reading the following detailed description and upon reference to the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Drawings
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only some typical aspects of this invention and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
A typical architecture of FTTH and FTTR in the prior art is illustrated in fig. 1.
Fig. 2 is a schematic diagram of an FTTR scenario according to one embodiment of the present invention.
FIG. 3 is an exemplary registration authentication flow for ONT device class B1 according to one embodiment of the invention.
FIG. 4 is an exemplary registration authentication flow for ONT device class B2 according to one embodiment of the invention.
Fig. 5 is an exemplary flow diagram of a method for optical network device authentication and configuration management in FTTR scenarios in accordance with one embodiment of the present invention.
Fig. 6 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by a primary ONT device according to one embodiment of the present invention.
Fig. 7 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by an edge ONT device according to an embodiment of the present invention.
Fig. 8 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by an edge ONT device according to an embodiment of the present invention.
Fig. 9 is an exemplary flowchart of a method for optical network device authentication and configuration management implemented by an ACS, according to an embodiment of the invention.
Fig. 10 is an exemplary architecture diagram of a system for providing FTTR service according to one embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the attached drawings, and the features of the present invention will be further apparent from the following detailed description.
In order to solve the problem mentioned in the background section that it is desirable to manage multiple sub-devices in a home more flexibly, the present invention performs logic optimization and method improvement for FTTR scenarios based on the current ONT access authentication method.
It should be understood by those skilled in the art that references herein to a "home gateway" or "home all-optical gateway" are not limited to use solely by the home, but may refer broadly to a primary ONT device installed on the subscriber side in an FTTR architecture, while the term "primary ONT device" may be used interchangeably with "primary gateway", "primary cat", "primary device", "traditional ONT device" or "conventional ONT device". Similarly, an "FTTR sub-device" or "sub-device" refers broadly to an edge ONT device coupled to a master ONT device installed on the subscriber side in an FTTR architecture, while the term "edge ONT device" may be used interchangeably with "sub-device" or "slave ONT device". The primary and edge ONT devices may also be collectively referred to as "optical network devices" or "ONT devices".
Fig. 2 is a schematic diagram of an FTTR scenario according to one embodiment of the present invention. As shown in fig. 2, the FTTR service is applied to a place where one user has four rooms, for example, a house. The house owner applies for handling the FTTR service, and the home-entry optical fiber is connected to the FTTR home all-optical gateway (also called a master optical modem or a master ONT device, hereinafter referred to as a master gateway), and then connected to FTTR sub-devices (also called slave ONT devices or edge ONT devices, hereinafter referred to as sub-devices) arranged in each room through the optical fiber, that is, the sub-device 1 in the room 1, the sub-device 2 in the room 2, the sub-device 3 in the room 3, and the sub-device 4 in the room 4. Therein, tenants 1-3 use sub-devices 1-3, respectively, and the homeowner uses sub-device 4 in room 4.
In this scenario, the sub-device 4 of the homeowner's own room does not need to be charged and managed separately, while the sub-devices 1-3 of each of the remaining rooms require separate charging and management. Thus, the sub-devices can be divided into two categories, with the sub-devices that need to be separately billed and managed (e.g., sub-devices 1-3) being of the first category and the sub-devices that do not need to be separately billed and managed (e.g., sub-device 4) being of the second category.
To this end, a classification is defined for all ONT devices including the main gateway and the sub-devices as follows:
a type: represents that the device is a conventional ONT device, also called a primary ONT device;
class B (classified as B1 and B2): representative of the device is an FTTR sub-device, also called edge ONT device, where
Class B1: representing FTTR sub-equipment managed by an ACS of an operator, performing registration authentication to an OLT when the FTTR sub-equipment is online, and receiving configuration management of the ACS;
class B2: and the FTTR sub-equipment locally managed by the main gateway registers to the main gateway when the FTTR sub-equipment is on line, the main gateway does not transmit the FTTR sub-equipment to the OLT, but sends an authentication message by itself, and network configuration management is carried out.
According to this classification, in the scenario of fig. 2, the main gateway is a class a device, the child devices 1 to 3 used by each tenant are B1 class devices, and the child device 4 used by the owner is a B2 class device. Corresponding to this classification, a corresponding class code is set in the device LOID used in the conventional PON protocol for distinguishing whether the device is of class a, B1 or B2, and for this purpose, the PON protocol version may be revised and updated so that the office device can identify the type of the ONT device by the LOID. In one embodiment, since the class A device is consistent with the conventional ONT device, the LOID of the class A device may not need to be modified, and the conventional LOID is still adopted, and only the LOIDs of the class B1 and B2 devices need to be newly added.
The registration authentication flow of the ONT devices of type B1 and type B2 is described in detail below with reference to fig. 3 and 4, respectively.
FIG. 3 is an exemplary registration authentication flow for ONT device class B1 according to one embodiment of the invention. As shown in fig. 3, first, a main gateway (e.g., a home all-optical gateway) is powered on and carries a class a LOID (i.e., a normal LOID) to initiate registration authentication to an OLT device at an office end. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment. The primary gateway may then request configuration information from the ACS of the operator. In response, the ACS issues the account and configuration information of the main gateway, and the account and configuration information of one or more sub-devices hung under the main gateway, which are registered at the operator, to the main gateway. The account number and configuration information of the child device may be cached locally by the primary gateway. . In this example, the number of FTTR sub-devices is 3, so the ACS may issue an account and configuration information (the account is a class B account) for each sub-device. It is understood that the sub-device herein refers to a B1 class sub-device, i.e., a sub-device that is managed by the ACS. The class B account is an account dedicated to a class B1 sub-device, and the class B1 account and the class B2 account do not need to be further divided, because the class B2 device does not accept ACS management, the account is not needed. And then, the main gateway carries the A-type account to initiate an account authentication request to an authentication system. And after the account authentication is successful, the authentication system returns an authentication result.
Subsequently, the FTTR sub-device is powered on and carries the class B1 LOID to initiate registration authentication to the OLT. According to the connection architecture of the FTTR, the registration authentication request message sent by the slave device to the OLT passes through the master gateway first. After receiving the message, the primary gateway transmits the request message to the OLT after confirming that the LOID type is B1 type. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment and issues the configuration, and the main gateway transparently transmits a message returned by the OLT equipment to the sub-equipment.
Then, the main gateway issues the type B account and the configuration information for the sub device, which are provided by the ACS, to the sub device. The sub-equipment initiates an account authentication request to the authentication system through the main gateway by using the B-type account and the configuration information, and the authentication system returns an authentication result after the account authentication is successful. And in the account authentication process of the sub-equipment, the main gateway transparently transmits a request and a return message between the sub-equipment and the authentication system. So far, the authentication registration of the class B1 child device is completed.
FIG. 4 is an exemplary registration authentication flow for ONT device class B2 according to one embodiment of the invention. As shown in fig. 4, first, similar to fig. 3, the main gateway initiates registration authentication to the OLT, requests configuration information from the ACS after the authentication is passed, and receives and buffers the account numbers and configuration information of the main gateway and each sub-device. And then, the main gateway carries the A-type account to initiate an account authentication request to an authentication system.
Subsequently, the FTTR sub-device powers up and initiates registration authentication. Unlike the example of fig. 3, in this example, the LOID carried by the FTTR sub-device is a class B2 LOID. After receiving the message, the home gateway confirms that the LOID type is B2 type, identifies it as a local management device, immediately returns an authentication result to it, and configures the child device in a bridge mode, that is, the child device accesses the network through the main gateway. So far, the authentication registration of the class B2 device is completed.
Returning to the example scenario of fig. 2, with the above-described optical network device access authentication and configuration management method, when a householder requests an operator to handle FTTR package service, and the operator has installed the FTTR all-optical gateway and each sub-device, the FTTR all-optical gateway and each sub-device perform OLT registration authentication with class a and class B1 LOIDs, respectively, and then the gateway and each sub-device perform account authentication with an account allocated by the system (for example, through PPPoE dialing). Related information is also registered in the ACS of the operator, and the situation that the home of the FTTR user has an all-optical gateway and a sub-device to be respectively managed is recorded. Therefore, the following various requirements can be flexibly met:
1. when the tenant 1 applies for the broadband rate of 500M, the tenant can apply for speed acceleration, and an operator can flexibly perform allocation and management;
2. when the tenant 2 does not renew the lease any more, the operator can also stop providing the internet access service of the sub-equipment 2, and the service is opened after a new tenant enters the network;
3. the child device 4 in the own room of the landlord does not need to be charged and managed separately, and then the child device 4 carries the class B2 LOIDs to perform registration authentication with the all-optical gateway, and after the registration authentication is completed, the child device 4 can normally surf the internet, but the device does not have dialing capability, does not have a separate internet surfing broadband account number, belongs to the broadband service of the all-optical gateway, and receives the local management of the all-optical gateway.
In addition, when the use requirement of the user changes, for example, a new B1-class sub-device is added, the original B2-class sub-device is changed into a B1-class sub-device or a B1-class sub-device is changed into a B2-class sub-device or a B2-class sub-device, the user may request the operator to handle related services. After the transaction is completed, the operator registers the relevant information in the ACS. At this time, the ACS may send the updated sub-device account and configuration information to the main gateway, and the main gateway updates the locally cached sub-device account and configuration information accordingly.
Fig. 5 is an exemplary flow diagram of a method 500 for optical network device authentication and configuration management in an FTTR scenario in accordance with one embodiment of the present invention. As shown in fig. 5, the method 500 begins at step 502 with assigning a LOID indicating a device type to each optical network device, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device that is managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device that is not managed by an ACS.
Next, in step 504, the primary ONT device is configured to register authentication with the OLT device and accept ACS management. As described above, the primary ONT device sends a registration authentication request to the OLT device, and after the authentication is passed, requests configuration information from the ACS, which then issues account numbers and configuration information of the primary ONT device and the B1 type edge ONT device (if any) coupled to the primary ONT device. In addition, the primary ONT device is further configured to perform registration authentication and configuration management for the B2 edge ONT device coupled thereto.
At step 506, the class B1 edge ONT device is configured to register with the OLT device via its coupled primary ONT device for authentication and to accept ACS management. As described earlier, the registration authentication request of the B1 type edge ONT device is transmitted to the primary ONT device, and then the primary ONT device recognizes that its LOID is B1 type, and then the request is passed through to the OLT device, and authentication registration is completed. And then, the primary ONT equipment provides the account and the configuration information sent by the ACS for the primary ONT equipment to authenticate the account of the authentication system.
At step 508, the class B2 edge ONT device is configured to register authentication with the primary ONT device to which it is coupled and to accept the primary ONT device management. As described earlier, the registration authentication request of the class B2 edge ONT device is made by the primary ONT device and directly issues a configuration that will configure the class B2 edge ONT device into a bridged mode to access the network through the bridge of the primary ONT device.
The method by which each device in the FTTR scenario completes authentication and configuration management will be described in further detail below in conjunction with fig. 6-9, respectively.
FIG. 6 is an exemplary flow diagram of a method 600 for optical network device authentication and configuration management implemented by a primary ONT device according to one embodiment of the invention. In this example, the primary ONT device may be a home all-optical gateway, i.e. a class a device, in an FTTR scenario as illustrated in fig. 2. The method 600 begins at step 602 with the primary ONT device initiating a registration authentication request to the OLT device, the request including the LOID of the primary ONT device. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment and issues the configuration.
In step 604, the primary ONT device requests configuration information from the ACS in response to the OLT device authenticating itself.
Subsequently, in step 606, the account and configuration information of the primary ONT device and the edge ONT device associated therewith sent by the ACS are received. As described earlier, the account number of the primary ONT device is a class a account number, and the account number of the edge ONT device associated with it (i.e., the B1 class edge ONT device) is a class B account number.
At step 608, the primary ONT device initiates an account authentication request with its own account to the authentication system server. And after the account authentication is passed by the authentication system, the account authentication is completed. In step 610, in response to receiving the authentication registration request of the edge ONT device, the primary ONT device determines the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device. As previously described, the types of edge ONT devices include both B1 and B2 types. If it is determined that the edge ONT device is of the B1 type, the method proceeds to step 612.
In response to determining that the edge ONT device is B1 type, the primary ONT device passes through an authentication registration request message of the edge ONT device to the OLT device at step 612. Next, in step 614, the primary ONT device receives the authentication result returned by the OLT device and passes it through to the edge ONT device.
In step 616, the primary ONT device sends the account and the configuration information corresponding to the edge ONT device, which are sent by the ACS, to the edge ONT device. Thereafter, in step 618, when the edge ONT device performs account authentication with its account, the primary ONT device passes through an account authentication request and a return message between the edge ONT device and the authentication system.
Returning to step 610, if it is determined that the edge ONT device is of the B2 type, the method proceeds to step 620. In response to determining that the edge ONT device is of type B2, the primary ONT device authenticates the edge ONT device at step 620, and if the authentication passes, returns an authentication result to the edge ONT device at step 622 and issues a configuration that configures the edge ONT device in bridge mode. The method 600 ends at this point.
Optionally, the method 600 may further include receiving update information of the edge ONT device sent by the ACS, where the update information includes a latest account and configuration information of the edge ONT device associated with the primary ONT device, and by using the update information, functions of adding a new B1 type of sub device, changing a type of the sub device, changing configuration information of the sub device, and the like may be flexibly implemented, so as to support flexible management of each FTTR sub device.
Fig. 7 is an exemplary flow diagram of a method 700 for optical network device authentication and configuration management implemented by an edge ONT device according to one embodiment of the invention. In this example, the edge ONT device may be an edge ONT device that requires separate charging and management, i.e., a class B1 device, in the FTTR scenario as illustrated in fig. 2. The method 700 begins at step 702 where an edge ONT device sends a registration authentication request message to its coupled primary ONT device carrying a class B1 LOID. As described earlier, when the primary ONT device identifies that the edge ONT device is B1 type, the register authentication request message is transmitted to the OLT device for register authentication, and the authentication result is returned to the edge ONT device.
Accordingly, in step 704, the edge ONT device receives the authentication result from the OLT device returned by the primary ONT device.
Subsequently, in step 706, the edge ONT device receives the account and configuration information from the ACS from the primary ONT device. The account and the configuration information are provided to the primary ONT device by the ACS, and the account is a B-type account specially used by the edge ONT device.
At step 708, the edge ONT device initiates an account authentication request using the received account. The method 700 ends at this point.
Fig. 8 is an exemplary flow diagram of a method 800 for optical network device authentication and configuration management implemented by an edge ONT device according to one embodiment of the invention. In this example, the edge ONT device may be an edge ONT device that does not require separate charging and management, i.e., a class B2 device, in the FTTR scenario as illustrated in fig. 2. The method 800 begins at step 802 where an edge ONT device sends a registration authentication request message to its coupled primary ONT device carrying a class B2 LOID. As previously described, when the primary ONT device identifies that the edge ONT device is of the B2 type, the primary ONT device returns an authentication result directly to the edge ONT device and configures the edge ONT device in a bridge mode.
Accordingly, in step 804, the authentication result and the delivery configuration from the primary ONT device are received. Then, in step 806, the edge ONT device configures itself into the bridging mode according to the received configuration. The method 800 ends at this point.
Fig. 9 is an exemplary flow diagram of a method 900 for optical network device authentication and configuration management implemented by an ACS, according to an embodiment of the invention. The method 900 begins at step 902 by sending account and configuration information for a primary ONT device and an edge ONT device associated with the primary ONT device to the primary ONT device in response to receiving an account authentication configuration information request from the primary ONT device.
In step 904, in response to the change of the account and configuration information of the edge ONT device associated with the primary ONT device maintained on the ACS, the updated account and configuration information of the edge ONT device are sent to the primary ONT device. The method 900 ends at this point.
Fig. 10 is an exemplary architecture diagram of a system 1000 for providing FTTR service in accordance with one embodiment of the present invention. As shown in FIG. 10, the system 1000 may include an ACS 1002, an authentication system 1004, an OLT device 1006, a primary ONT device 1008, and one or more edge ONT devices 1010 coupled to the primary ONT device1-1010n. As previously described, the primary ONT device 1008 and the edge ONT device 10101-1010nEach of which has a LOID indicating a device type, wherein the LOIDs include at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by the ACS 1002, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS 1002. The primary ONT device 1008 may be configured to register authentication with the OLT device 1006 andaccepting ACS 1002 management, edge ONT device 10101-1010nThe class B1 edge ONT device in (1) may be configured to register authentication with the OLT device 1006 and be managed by the ACS 1002 via the primary ONT device 1008, and the class B2 edge ONT device in (B) may be configured to register authentication with the primary ONT device 1008 and be managed by the primary ONT device 1008.
The method and system for classified access authentication and configuration management of home optical network devices of the present invention are described above, wherein the gateways and the sub-devices are used for access step by step, and the devices can be classified and authenticated by carrying different types of LOIDs (class a, class B1, class B2) when registered online, so as to distinguish the device types of the home gateway devices and the sub-devices and divide the management configuration rights of the sub-devices in the home.
The above example shows that the invention enables operators to flexibly and unrestrictedly manage all room sub-devices of FTTR users, and is applicable to rich scenes.
What has been described above includes examples of aspects of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.

Claims (10)

1. A method for optical network device authentication and configuration management in FTTR scenarios, the method comprising:
assigning a LOID indicating a device type to each optical network device, wherein the LOID at least comprises a class A LOID, a class B1 LOID and a class B2 LOID, wherein the class A LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS;
configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management;
configuring the B1 type edge ONT device to register and authenticate with the OLT device and accept ACS management through the coupled main ONT device; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
2. A method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID comprises at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server, ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the primary ONT device and comprises the steps of:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT device to the OLT device;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending account numbers and configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication is passed, returning an authentication result to the B2 type edge ONT device and issuing a configuration, wherein the configuration configures the B2 type edge ONT device into a bridge mode.
3. A method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID comprises at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by a class B1 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the primary B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
4. A method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID comprises at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by a class B2 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the class B2 edge ONT device into a bridge mode according to the received configuration.
5. A method for optical network device authentication and configuration management in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID comprises at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server, ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the ACS and comprises the steps of:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
6. A system for providing FTTR services, wherein the system comprises an auto configuration server, ACS, an authentication system, an OLT device, a primary ONT device, and one or more edge ONT devices coupled to the primary ONT device, characterized by:
each of the primary ONT device and the edge ONT device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS;
wherein the primary ONT device is configured to register authentication with the OLT device and accept the ACS management;
the B1 type edge ONT device is configured to register authentication with the OLT device through the main ONT device and accept the ACS management; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
7. The system of claim 6, wherein the primary ONT device is further configured to:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT device to the OLT device;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending account numbers and configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication is passed, returning an authentication result to the B2 type edge ONT device and issuing a configuration, wherein the configuration configures the B2 type edge ONT device into a bridge mode.
8. The system of claim 6, wherein the class B1 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the primary B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
9. The system of claim 6, wherein the class B2 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the class B2 edge ONT device into a bridge mode according to the received configuration.
10. The system of claim 6, wherein the ACS is configured to:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
CN202110961387.7A 2021-08-20 2021-08-20 Optical network equipment authentication and configuration management method and system in FTTR scene Active CN113852883B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110961387.7A CN113852883B (en) 2021-08-20 2021-08-20 Optical network equipment authentication and configuration management method and system in FTTR scene
PCT/CN2021/135949 WO2023019816A1 (en) 2021-08-20 2021-12-07 Optical network device authentication and configuration management method and system in fttr scenario
BR112023021776A BR112023021776A2 (en) 2021-08-20 2021-12-07 METHODS FOR AUTHENTICATION AND CONFIGURATION MANAGEMENT FOR OPTICAL NETWORK DEVICES IN FTTR SCENARIOS AND SYSTEM FOR PROVIDING FTTR SERVICES

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110961387.7A CN113852883B (en) 2021-08-20 2021-08-20 Optical network equipment authentication and configuration management method and system in FTTR scene

Publications (2)

Publication Number Publication Date
CN113852883A true CN113852883A (en) 2021-12-28
CN113852883B CN113852883B (en) 2023-04-07

Family

ID=78975754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110961387.7A Active CN113852883B (en) 2021-08-20 2021-08-20 Optical network equipment authentication and configuration management method and system in FTTR scene

Country Status (3)

Country Link
CN (1) CN113852883B (en)
BR (1) BR112023021776A2 (en)
WO (1) WO2023019816A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114641030A (en) * 2022-05-18 2022-06-17 华中科技大学 FTTR-based home user hotspot area identification method, system, device and medium
CN115086061A (en) * 2022-06-30 2022-09-20 天翼数字生活科技有限公司 Authentication and network access control method and system for FTTR (fiber to the Home)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117729249B (en) * 2024-02-18 2024-05-03 四川天邑康和通信股份有限公司 FTTR-based gateway management method, FTTR-based gateway management device, FTTR-based gateway management equipment, FTTR-based gateway management system and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480321A (en) * 2010-11-29 2012-05-30 中兴通讯股份有限公司 Method and system for managing relevant parameters of home gateway in GPON (Gigabit Passive Optical Network) system
US20130232265A1 (en) * 2010-10-27 2013-09-05 France Telecom Processing of data for the management of placement on standby
CN107294755A (en) * 2016-04-13 2017-10-24 中兴通讯股份有限公司 Binding method, the apparatus and system of user profile and equipment
US20190230017A1 (en) * 2018-01-25 2019-07-25 Charter Communications Operating, Llc Bi-directional speed test method and system for customer premises equipment (cpe) devices
CN110430113A (en) * 2019-06-28 2019-11-08 广东省广播电视网络股份有限公司 A kind of automatic open system of business and automatic activating method
CN112887851A (en) * 2021-01-13 2021-06-01 烽火通信科技股份有限公司 Household all-optical network system and implementation method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY184439A (en) * 2013-08-22 2021-04-01 Huawei Tech Co Ltd Terminal authentication method, apparatus, and system in passive optical network
CN109495321A (en) * 2018-12-24 2019-03-19 深圳市友华通信技术有限公司 A method of automatically configuring ONU
CN113014324B (en) * 2021-05-25 2021-08-03 武汉长光科技有限公司 Networking method, device, equipment, system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232265A1 (en) * 2010-10-27 2013-09-05 France Telecom Processing of data for the management of placement on standby
CN102480321A (en) * 2010-11-29 2012-05-30 中兴通讯股份有限公司 Method and system for managing relevant parameters of home gateway in GPON (Gigabit Passive Optical Network) system
CN107294755A (en) * 2016-04-13 2017-10-24 中兴通讯股份有限公司 Binding method, the apparatus and system of user profile and equipment
US20190230017A1 (en) * 2018-01-25 2019-07-25 Charter Communications Operating, Llc Bi-directional speed test method and system for customer premises equipment (cpe) devices
CN110430113A (en) * 2019-06-28 2019-11-08 广东省广播电视网络股份有限公司 A kind of automatic open system of business and automatic activating method
CN112887851A (en) * 2021-01-13 2021-06-01 烽火通信科技股份有限公司 Household all-optical network system and implementation method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114641030A (en) * 2022-05-18 2022-06-17 华中科技大学 FTTR-based home user hotspot area identification method, system, device and medium
CN115086061A (en) * 2022-06-30 2022-09-20 天翼数字生活科技有限公司 Authentication and network access control method and system for FTTR (fiber to the Home)
CN115086061B (en) * 2022-06-30 2024-03-22 天翼数字生活科技有限公司 Authentication and network access control method and system for FTTR

Also Published As

Publication number Publication date
BR112023021776A2 (en) 2024-03-12
WO2023019816A1 (en) 2023-02-23
CN113852883B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN113852883B (en) Optical network equipment authentication and configuration management method and system in FTTR scene
CN1980195B (en) Complementary residential gateway management
CN102726069B (en) The dynamic Service group of dialogue-based attribute
EP1628437B1 (en) Broadband access method with great capacity and the system thereof
CN103039038B (en) Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment
JP5871916B2 (en) Method, telecommunications network, and program for efficient management and / or configuration of connections between telecommunications networks and customer premises equipment
EP3285411B1 (en) Method for registering an optical network unit to an optical line terminal, apparatus for processing a registering of an optical network unit, and optical line terminal
CN106487788A (en) A kind of user access method, SDN controller, forwarding unit and subscriber access system
CN103069750B (en) The method and system of the connection for being efficiently used between communication network and this communication network and customer rs premise equipment
CN103039040B (en) For the effectively method of initialization communication network and the communication network
CN107294755B (en) Method, device and system for binding user information and equipment
CN112929387B (en) Broadband network multiple authentication and encryption method applied to intelligent community
JP2008263525A (en) Onu automatic registration method
KR20070088712A (en) Method for setting up connections for access of roaming user terminals to data networks
WO2012100497A1 (en) Method and system for configuring white list in coaxial ethernet system
KR102560548B1 (en) Access point, home gateway and home network system, and method for performing ip communication on the home network system
KR20070031154A (en) Method for dynamically acquiring link status information of network sources and system for providing network connection service
JP7247848B2 (en) PON system, management server, management method, and installation method
EP2887577B1 (en) Method for establishing and/or configuring an internet protocol network connection between a customer premises equipment and a telecommunications network
EP4336777A1 (en) Method for enabling or setting up to operatively use a customer premises equipment with a broadband access network of a telecommunications network, system or broadband access network, customer premises equipment, access configuration entity or functionality, program and computer-readable medium
CN113904939B (en) Method, device and storage medium for managing target terminal
KR101304593B1 (en) Method for providing services of multiple service providers in an IP-based access network including access node, user gateway
KR20050000024A (en) Method for accessing authentication using subscriber ID in the internet access service based on ethernet and method thereof
WO2020036117A1 (en) Communication system and communication method
CN100364259C (en) Identification method for user apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant