CN113852883B - Optical network equipment authentication and configuration management method and system in FTTR scene - Google Patents
Optical network equipment authentication and configuration management method and system in FTTR scene Download PDFInfo
- Publication number
- CN113852883B CN113852883B CN202110961387.7A CN202110961387A CN113852883B CN 113852883 B CN113852883 B CN 113852883B CN 202110961387 A CN202110961387 A CN 202110961387A CN 113852883 B CN113852883 B CN 113852883B
- Authority
- CN
- China
- Prior art keywords
- ont
- edge
- loid
- class
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/0001—Selecting arrangements for multiplex systems using optical switching
- H04Q11/0062—Network aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a method and a system for optical network equipment authentication and configuration management in an FTTR (fiber to the television) scene, wherein the method comprises the following steps: allocating an LOID indicating a device type for each optical network device, wherein the LOID at least comprises a type A LOID, a type B1 LOID and a type B2 LOID, wherein the type A LOID indicates that the optical network device is a main ONT device, the type B1 LOID indicates that the optical network device is a type B1 edge ONT device managed by an automatic configuration server ACS, and the type B2 LOID indicates that the optical network device is a type B2 edge ONT device not managed by the ACS; configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management; configuring the B1 type edge ONT equipment to register and authenticate with the OLT equipment and accept ACS management through the coupled main ONT equipment; and configuring the class B2 edge ONT device to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
Description
Technical Field
The present invention relates to the field of network technology and security, and more particularly, to a method and system for authentication and configuration management of optical network devices in FTTR scenarios.
Background
FTTR (Fiber to the Room) means that on the basis of FTTH (Fiber to the Home), an all-Optical gateway and a sub-device are deployed in a Home, and Optical Fiber communication coverage is achieved to a user Room through a PON (Passive Optical Network) technology. A typical architecture for FTTH and FTTR is illustrated in fig. 1.
In fig. 1, the upper half of the branch represents an exemplary FTTH scenario. The ordinary home gateway is an Optical Network Terminal (ONT) deployed at a subscriber end, and is connected to an Optical Line Terminal (OLT) through an in-home Optical fiber. According to the current PON protocol, when an ONT device is on line, a legal logical ID (LOID) assigned by an operator needs to be carried to initiate registration authentication to an OLT (optical line terminal) of a local side device. After the authentication is passed, the ONT device initiates account authentication (e.g. PPPoE dialing) to an authentication system Server (e.g. BRAS Server). Inside the home, the gateway is typically connected point-to-point to the next level router via a network cable, and the router is further responsible for network coverage inside the home, for example, further cascading multiple APs.
The lower half of the branch of fig. 1 represents an exemplary FTTR scenario. In FTTR scenarios, the ONT device to which the home optical fiber is first connected is an FTTR home all-optical gateway, which is further connected by an optical fiber to a plurality of FTTR sub-devices (i.e. point-to-multipoint) at the next level, which are typically placed in different rooms, so-called "fiber-in-the-house". According to the current registration authentication and Management mechanism of optical devices, only FTTR home all-optical gateways as ONTs still perform registration authentication to the OLT, initiate account authentication to an authentication System Server, and receive Management of an Auto-Configuration Server ACS (e.g., integrated Terminal Management System ITMS (Integrated Terminal Management System) platform) of an operator, while all FTTR sub-devices only receive Management of home all-optical gateways, and the home all-optical gateways forward related data to FTTR sub-devices. Therefore, when in use, these FTTR sub-devices, similar to the routers in the FTTH scenario, belong to the local area network internal devices and are not perceived by the access network.
However, in some practical application scenarios, for example, in an FTTR scenario where one user has multiple rooms and multiple users in a school dormitory building, an office building, a residence, etc., it is desirable to have a more flexible management method for the existing FTTR architecture. Taking a one-house four-room house as an example, typically one FTTR sub-device is set in each room, connected together to an FTTR home all-optical gateway (primary ONT device), for which the home owner pays for the FTTR, and four rooms share the total bandwidth of this home FTTR service, e.g. 1000Mbps. However, if the users in each room wish to use independently of each other (FTTR primary user), for example, wish to purchase different network access services (e.g., different bandwidth, different activation/deactivation times), the current management approach does not support.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The invention aims to solve the problem that the equipment access authentication and management process of the current PON technology cannot be well compatible with FTTR scene. Therefore, a method for classified access authentication and configuration management of home all-optical network devices based on FTTR scene is provided, wherein the home all-optical gateway and the sub-devices perform registration authentication and management to the OLT respectively, and the sub-devices can support two modes of receiving local side access authentication and ACS management or home gateway local management according to different management requirements.
According to an aspect of the present invention, there is provided a method for authentication and configuration management of an optical network device in FTTR scenario, wherein the method comprises:
allocating an LOID indicating a device type for each optical network device, wherein the LOID at least comprises a type A LOID, a type B1 LOID and a type B2 LOID, wherein the type A LOID indicates that the optical network device is a main ONT device, the type B1 LOID indicates that the optical network device is a type B1 edge ONT device managed by an ACS, and the type B2 LOID indicates that the optical network device is a type B2 edge ONT device not managed by the ACS;
configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management;
configuring the B1 type edge ONT equipment to register and authenticate with the OLT equipment and accept ACS management through the coupled main ONT equipment; and
configuring a class B2 edge ONT device to register authentication with a primary ONT device coupled thereto and to accept the primary ONT device management.
According to another aspect of the present invention, there is provided a method for authentication and configuration management of optical network devices in an FTTR scenario, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the primary ONT device and comprises the steps of:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT equipment to the OLT equipment;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending the account and the configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication passes, returning an authentication result to the B2 type edge ONT equipment and issuing configuration, wherein the configuration configures the B2 type edge ONT equipment into a bridge mode.
According to an embodiment of the invention, the method further comprises: and receiving the updated account and configuration information of the edge ONT equipment associated with the main ONT equipment, which are sent by the ACS.
According to yet another aspect of the present invention, there is provided a method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B1 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the primary B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
According to yet another aspect of the present invention, there is provided a method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B2 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the B2 type edge ONT device into a bridge mode according to the received configuration.
According to yet another aspect of the present invention, there is provided a method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by an ACS and comprises the steps of:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
According to yet another aspect of the present invention, there is provided a system for providing FTTR service, wherein the system comprises an ACS, an authentication system, an OLT device, a primary ONT device, and one or more edge ONT devices coupled with the primary ONT device, wherein:
each of the primary ONT device and the edge ONT device has an LOID indicating a device type, wherein the LOID includes at least an a-class LOID, a B1-class LOID, and a B2-class LOID, wherein the a-class LOID indicates that the optical network device is a primary ONT device, the B1-class LOID indicates that the optical network device is a B1-class edge ONT device managed by an ACS, and the B2-class LOID indicates that the optical network device is a B2-class edge ONT device not managed by the ACS;
wherein the primary ONT device is configured to register authentication with the OLT device and accept the ACS management;
the B1 type edge ONT equipment is configured to register authentication with the OLT equipment through the main ONT equipment and accept the ACS management; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
According to an embodiment of the invention, the primary ONT device is further configured to:
initiating a registration authentication request to OLT equipment, wherein the request contains the A-type LOID of the main ONT equipment;
responding to the authentication of the OLT equipment to the main ONT equipment, and requesting configuration information from the ACS;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT equipment to the OLT equipment;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending the account and the configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication passes, returning an authentication result to the B2 type edge ONT equipment and issuing configuration, wherein the configuration configures the B2 type edge ONT equipment into a bridge mode.
According to an embodiment of the invention, the primary ONT device is further configured to: and receiving the updated account and configuration information of the edge ONT equipment associated with the main ONT equipment, which are sent by the ACS.
According to a further embodiment of the invention, the class B1 edge ONT device is further configured to:
initiating a registration authentication request to a main ONT device coupled with the B1 type edge ONT device, wherein the request comprises a B1 type LOID of the main B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
According to a further embodiment of the invention, the class B2 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the primary B1 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the B2 type edge ONT device into a bridge mode according to the received configuration.
According to a further embodiment of the invention, the ACS is configured to:
the account authentication responds to a configuration information request received from a main ONT device, and the account authentication and the configuration information of the main ONT device and the edge ONT device associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
Compared with the existing equipment access authentication and management process, the method and the system can be better suitable for FTTR scenes, and the management of the home gateway and the sub-equipment can be more detailed. The operator can judge the device type according to the registered LOID, thereby achieving classification management and being compatible with multiple management modes of the sub-devices. More specifically, the optical network equipment authentication and configuration management method of the present invention has at least the following advantages:
1. the home gateway and the sub-equipment carry out classification identification through the LOID and carry out registration authentication independently;
2. an operator is allowed to manage the home gateway in an FTTR scene, and meanwhile, automatic network connection management is compatible to the sub-equipment partially connected under the home all-optical gateway;
3. in the FTTR supporting scene, the sub-equipment in the family receives two modes of local management or ACS management.
These and other features and advantages will become apparent upon reading the following detailed description and upon reference to the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Drawings
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this invention and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
A typical architecture of FTTH and FTTR in the prior art is illustrated in fig. 1.
Fig. 2 is a schematic diagram of an FTTR scenario, according to one embodiment of the present invention.
Fig. 3 is an exemplary registration authentication procedure of a class B1 ONT device according to one embodiment of the present invention.
Fig. 4 is an exemplary registration authentication procedure of a class B2 ONT device according to one embodiment of the present invention.
Fig. 5 is an exemplary flow diagram of a method for optical network device authentication and configuration management in FTTR scenarios in accordance with one embodiment of the present invention.
Fig. 6 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by a primary ONT device according to one embodiment of the present invention.
Fig. 7 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by an edge ONT device according to an embodiment of the present invention.
Fig. 8 is an exemplary flowchart of an optical network device authentication and configuration management method implemented by an edge ONT device according to an embodiment of the present invention.
Fig. 9 is an exemplary flowchart of a method for optical network device authentication and configuration management implemented by an ACS, according to an embodiment of the invention.
Fig. 10 is an exemplary architecture diagram of a system for providing FTTR service according to one embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the attached drawings, and the features of the present invention will be further apparent from the following detailed description.
In order to solve the problem mentioned in the background section that it is desirable to manage multiple sub-devices in a home more flexibly, the present invention performs logic optimization and method improvement for FTTR scenarios based on the current ONT access authentication method.
It should be understood by those skilled in the art that references herein to a "home gateway" or a "home all-optical gateway" are not limited to use only for home use, but may refer broadly to a primary ONT device installed on the subscriber side in an FTTR architecture, while the term "primary ONT device" may be used interchangeably with "primary gateway", "primary cat", "primary device", "legacy ONT device" or "conventional ONT device". Similarly, "FTTR sub-device" or "sub-device" refers broadly to an edge ONT device coupled to a master ONT device installed on the subscriber side in an FTTR architecture, while the term "edge ONT device" may be used interchangeably with "sub-device" or "slave ONT device". The primary and edge ONT devices may also be collectively referred to as "optical network devices" or "ONT devices".
Fig. 2 is a schematic diagram of an FTTR scenario according to one embodiment of the present invention. As shown in fig. 2, the FTTR service is applied to a place where one user has four rooms, for example, a house. The house owner applies for handling the FTTR service, and the home-entry optical fiber is connected to the FTTR home all-optical gateway (also called a master optical modem or a master ONT device, hereinafter referred to as a master gateway), and then connected to FTTR sub-devices (also called slave ONT devices or edge ONT devices, hereinafter referred to as sub-devices) arranged in each room through the optical fiber, that is, the sub-device 1 in the room 1, the sub-device 2 in the room 2, the sub-device 3 in the room 3, and the sub-device 4 in the room 4. Therein, tenants 1-3 use sub-devices 1-3, respectively, while the homeowner uses sub-device 4 in room 4.
In this scenario, the sub-device 4 of the homeowner's own room does not need to be charged and managed separately, while the sub-devices 1-3 of each of the remaining rooms require separate charging and management. Thus, the sub-devices can be divided into two categories, with the sub-devices that need to be separately billed and managed (e.g., sub-devices 1-3) being of the first category and the sub-devices that do not need to be separately billed and managed (e.g., sub-device 4) being of the second category.
To this end, a classification is defined for all ONT devices including the main gateway and the sub-devices as follows:
a type: representing that the equipment is conventional ONT equipment, also called main ONT equipment;
class B (divided into B1 and B2): representative of the device is an FTTR sub-device, also called edge ONT device, where
B1 type: representing FTTR sub-equipment managed by an ACS of an operator, performing registration authentication to an OLT when the FTTR sub-equipment is online, and receiving configuration management of the ACS;
b2 type: and the FTTR sub-equipment locally managed by the main gateway registers to the main gateway when the FTTR sub-equipment is on line, and the main gateway does not transmit the FTTR sub-equipment to the OLT but transmits the authentication message by itself and performs network configuration management.
According to this classification, in the scenario of fig. 2, the main gateway is a class a device, the sub devices 1 to 3 used by each tenant are B1 devices, and the sub device 4 used by the owner is a B2 device. Corresponding to this classification, a corresponding class code is set in the device LOID used in the conventional PON protocol for distinguishing whether the device is a class a, B1 or B2, and for this purpose, the PON protocol version may be revised and updated so that the office device can identify the type of the ONT device through the LOID. In one embodiment, since the class a device is consistent with the conventional ONT device, the LOIDs of the class a device may not need to be modified, and the conventional LOIDs thereof are still adopted, only the LOIDs of the class B1 and B2 devices need to be newly added.
The registration authentication flow of the B1 and B2 ONT devices will be described in detail below with reference to fig. 3 and 4, respectively.
FIG. 3 is an exemplary registration authentication flow for a class B1 ONT device according to one embodiment of the invention. As shown in fig. 3, first, a main gateway (e.g., a home all-optical gateway) is powered on and carries a class a LOID (i.e., a normal LOID) to initiate registration authentication to an OLT device at an office end. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment. The primary gateway may then request configuration information from the ACS of the operator. In response, the ACS sends the account and configuration information of the main gateway and the account and configuration information of one or more sub-devices hung under the main gateway registered in the operator to the main gateway. The account number and configuration information of the child device may be cached locally by the primary gateway. . In this example, the number of FTTR sub-devices is 3, so the ACS may issue an account number and configuration information (the account number is a class B account number) for each sub-device. It is understood that the sub-device herein refers to a class B1 sub-device, i.e., a sub-device that is managed by the ACS. The B-type account is an account dedicated to the B1-type sub-device, and the B1-type account and the B2-type account do not need to be further divided, because the B2-type device does not accept ACS management, the account is not needed. And then, the main gateway carries the A-type account to initiate an account authentication request to an authentication system. And after the account authentication is successful, the authentication system returns an authentication result.
And then, the FTTR sub-device is powered on and carries the B1 LOID to initiate registration authentication to the OLT. According to the connection architecture of the FTTR, the registration authentication request message sent by the slave device to the OLT passes through the master gateway first. After receiving the message, the main gateway transmits the request message to the OLT after confirming that the LOID type is the B1 type. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment and issues the configuration, and the main gateway transparently transmits a message returned by the OLT equipment to the sub-equipment.
Then, the main gateway issues the type B account and the configuration information for the sub device, which are provided by the ACS, to the sub device. The sub-equipment initiates an account authentication request to the authentication system through the main gateway by using the B-type account and the configuration information, and the authentication system returns an authentication result after the account authentication is successful. And in the account authentication process of the sub-equipment, the main gateway transparently transmits a request and a return message between the sub-equipment and the authentication system. So far, the authentication and registration of the B1-class child device is completed.
FIG. 4 is an exemplary registration authentication flow for a class B2 ONT device according to one embodiment of the invention. As shown in fig. 4, first, similar to fig. 3, the main gateway initiates registration authentication to the OLT, requests configuration information from the ACS after the authentication is passed, and receives and buffers the account numbers and configuration information of the main gateway and each sub-device. And then, the main gateway carries the A-type account to initiate an account authentication request to an authentication system.
Subsequently, the FTTR sub-device powers up and initiates registration authentication. Unlike the example of fig. 3, in this example, the LOID carried by the FTTR sub-device is a class B2 LOID. After receiving the message, the home gateway confirms that the LOID type is the B2 type, identifies the LOID type as local management equipment, immediately returns an authentication result to the local management equipment, and configures the sub-equipment into a bridge mode, namely the sub-equipment accesses the network through the main gateway. So far, the authentication registration of the B2 type device is completed.
Returning to the example scenario of fig. 2, with the above-described optical network device access authentication and configuration management method, when a householder requests an operator to handle FTTR package service, and the operator has installed the FTTR all-optical gateway and each sub-device, the FTTR all-optical gateway and each sub-device perform OLT registration authentication with class a and class B1 LOIDs, respectively, and then the gateway and each sub-device perform account authentication with an account allocated by the system (for example, through PPPoE dialing). Related information is also registered in the ACS of the operator, and the situation that the home of the FTTR user has an all-optical gateway and a sub-device to be respectively managed is recorded. Therefore, the following various requirements can be flexibly met:
1. when the tenant 1 applies for the broadband rate of 500M, the tenant can apply for speed acceleration, and an operator can flexibly distribute and manage;
2. when the tenant 2 does not renew the lease any more, the operator can also stop providing the internet access service of the sub-equipment 2, and the service is opened after a new tenant enters the network;
3. the child device 4 in the house of the owner does not need to be charged and managed separately, then the child device 4 will carry the class B2 LOIDs to perform registration authentication to the all-optical gateway, after the registration authentication is completed, the child device 4 can normally surf the internet, but the device does not have dialing capability, does not have a separate internet surfing broadband account number, belongs to the broadband service of the all-optical gateway, and receives the local management of the all-optical gateway.
In addition, when the usage requirement of the user changes, for example, a new B1-type sub-device is added, the original B2-type sub-device is changed into a B1-type sub-device or the original B1-type sub-device is changed into a B2-type sub-device or the original B2-type sub-device is changed into the new B2-type sub-device or the new B2-type sub-device to handle speed separately, and the like, the user may request the operator to handle related services. After the transaction is completed, the operator registers the relevant information in the ACS. At this time, the ACS may issue the updated sub device account and configuration information to the main gateway, and the main gateway updates the locally cached sub device account and configuration information accordingly.
Fig. 5 is an exemplary flow diagram of a method 500 for optical network device authentication and configuration management in an FTTR scenario in accordance with one embodiment of the present invention. As shown in fig. 5, the method 500 begins at step 502 with assigning a LOID indicating a device type to each optical network device, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device that is managed by an ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device that is not managed by the ACS.
Next, in step 504, the primary ONT device is configured to register authentication with the OLT device and accept ACS management. As described above, the primary ONT device sends a registration authentication request to the OLT device, and after the authentication is passed, the ACS requests configuration information, and then issues the account and configuration information of the primary ONT device and the B1 class edge ONT device (if any) coupled to the primary ONT device. In addition, the primary ONT device is further configured to perform registration authentication and configuration management for the B2 edge ONT device coupled thereto.
At step 506, the class B1 edge ONT device is configured to register for authentication with the OLT device and to accept ACS management via its coupled primary ONT device. As described above, after the registration authentication request of the B1-class edge ONT device is sent to the primary ONT device, the primary ONT device recognizes that its LOID is B1-class, and the request is passed through to the OLT device, and authentication registration is completed. And then, the primary ONT equipment provides the account and the configuration information sent by the ACS for the primary ONT equipment to authenticate the account of the authentication system.
At step 508, the class B2 edge ONT device is configured to register authentication with the primary ONT device to which it is coupled and to accept the primary ONT device management. As described earlier, the registration authentication request of the class B2 edge ONT device is made by the primary ONT device and directly issues a configuration that will configure the class B2 edge ONT device into a bridge mode to access the network through the bridge of the primary ONT device.
The method by which each device in the FTTR scenario completes authentication and configuration management will be described in further detail below in conjunction with fig. 6-9, respectively.
FIG. 6 is an exemplary flow diagram of a method 600 for optical network device authentication and configuration management implemented by a primary ONT device according to one embodiment of the invention. In this example, the primary ONT device may be a home all-optical gateway, i.e., a class a device, in an FTTR scenario as illustrated in fig. 2. The method 600 begins at step 602 with the primary ONT device initiating a registration authentication request to the OLT device, the request including a LOID of the primary ONT device. After the authentication is passed, the OLT equipment returns an authentication result to the OLT equipment and issues the configuration.
In step 604, the primary ONT device requests configuration information from the ACS in response to the OLT device authenticating itself.
Then, in step 606, the account and configuration information of the primary ONT device and the edge ONT device associated therewith sent by the ACS are received. As described earlier, the account of the primary ONT device is a class a account, and the account of the edge ONT device associated with it (i.e., the B1 class edge ONT device) is a class B account.
At step 608, the primary ONT device initiates an account authentication request with its own account to the authentication system server. And after the account authentication is passed by the authentication system, the account authentication is completed. In step 610, in response to receiving the authentication registration request of the edge ONT device, the primary ONT device determines the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device. As described earlier, the types of edge ONT devices include both types B1 and B2. If it is determined that the edge ONT device is of the B1 type, the method proceeds to step 612.
In step 612, in response to determining that the edge ONT device is of the B1 type, the primary ONT device passes through an authentication registration request message of the edge ONT device to the OLT device. Next, in step 614, the primary ONT device receives the authentication result returned by the OLT device and passes it through to the edge ONT device.
In step 616, the primary ONT device sends the account and the configuration information corresponding to the edge ONT device, which are sent by the ACS, to the edge ONT device. Thereafter, in step 618, when the edge ONT device performs account authentication with its account, the primary ONT device passes through an account authentication request and a return message between the edge ONT device and the authentication system.
Returning to step 610, if it is determined that the edge ONT device is of the B2 type, the method proceeds to step 620. In response to determining that the edge ONT device is of type B2, the primary ONT device authenticates the edge ONT device, in step 620, and if the authentication passes, returns an authentication result to the edge ONT device and issues a configuration in step 622, wherein the configuration configures the edge ONT device in a bridge mode. The method 600 ends at this point.
Optionally, the method 600 may further include receiving update information of the edge ONT device sent by the ACS, where the update information includes the latest account and configuration information of the edge ONT device associated with the primary ONT device, and by using the update information, functions such as adding a B1-class sub device, changing a type of the sub device, and changing configuration information of the sub device may be flexibly implemented, thereby supporting flexible management of each FTTR sub device.
Fig. 7 is an exemplary flow diagram of a method 700 for optical network device authentication and configuration management implemented by an edge ONT device according to one embodiment of the invention. In this example, the edge ONT device may be an edge ONT device that requires separate charging and management, i.e., a class B1 device, in the FTTR scenario as illustrated in fig. 2. The method 700 begins at step 702 where an edge ONT device sends a registration authentication request message to a primary ONT device to which it is coupled, carrying a class B1 LOID. As described earlier, when the primary ONT device identifies that the edge ONT device is B1 type, the registration authentication request message is transmitted to the OLT device for registration authentication, and the authentication result is returned to the edge ONT device.
Accordingly, in step 704, the edge ONT device receives the authentication result from the OLT device returned by the primary ONT device.
Subsequently, in step 706, the edge ONT device receives the account and configuration information from the ACS from the primary ONT device. The account and the configuration information are provided to the primary ONT device by the ACS, and the account is a B-type account specially used by the edge ONT device.
At step 708, the edge ONT device initiates an account authentication request using the received account. The method 700 ends at this point.
Fig. 8 is an exemplary flow diagram of a method 800 for optical network device authentication and configuration management implemented by an edge ONT device according to one embodiment of the invention. In this example, the edge ONT device may be an edge ONT device, i.e., a class B2 device, that does not require separate charging and management in the FTTR scenario as illustrated in fig. 2. The method 800 begins at step 802 where an edge ONT device sends a registration authentication request message to a primary ONT device to which it is coupled, carrying a class B2 LOID. As described earlier, when the primary ONT device identifies that the edge ONT device is of B2 type, the primary ONT device returns the authentication result directly to the edge ONT device and configures the edge ONT device in bridge mode.
Accordingly, in step 804, the authentication result and the delivery configuration from the primary ONT device are received. Then, in step 806, the edge ONT device configures itself into the bridging mode according to the received configuration. The method 800 ends at this point.
Fig. 9 is an exemplary flow diagram of a method 900 for optical network device authentication and configuration management implemented by an ACS, according to an embodiment of the invention. The method 900 begins at step 902 by sending account and configuration information for a primary ONT device and an edge ONT device associated with the primary ONT device to the primary ONT device in response to receiving an account authentication configuration information request from the primary ONT device.
In step 904, in response to the change of the account and configuration information of the edge ONT device associated with the primary ONT device maintained on the ACS, the updated account and configuration information of the edge ONT device are sent to the primary ONT device. The method 900 ends at this point.
Fig. 10 is an exemplary architecture diagram of a system 1000 for providing FTTR service in accordance with one embodiment of the present invention. As shown in FIG. 10, the system 1000 may include an ACS 1002, an authentication system 1004, an OLT device 1006, a primary ONT device 1008, and one or more edge ONT devices 1010 coupled to the primary ONT device 1 -1010 n . As previously described, the primary ONT device 1008 and the edge ONT device 1010 1 -1010 n Each of which has a LOID indicating a device type, wherein the LOIDs include at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by the ACS 1002, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS 1002. The primary ONT device 1008 may be configured to register authentication with the OLT device 1006 and accept ACS 1002 management, the edge ONT device 1010 1 -1010 n The class B1 edge ONT device in (1) may be configured to register authentication with the OLT device 1006 and be managed by the ACS 1002 via the primary ONT device 1008, and the class B2 edge ONT device in (2) may be configured to register authentication with the primary ONT device 1008 and be managed by the primary ONT device 1008.
The method and the system for the classified access authentication and configuration management of the home optical network device of the invention are described above, wherein the gateway and the sub-devices are adopted for step-by-step access, and the devices can be classified and authenticated by carrying different types of LOIDs (a type, B1 type, B2 type) when being registered online, so as to distinguish the device types of the home gateway device and the sub-devices and divide the management configuration rights of the sub-devices in the home.
The above example shows that the invention enables operators to flexibly and unrestrictedly manage all room sub-devices of FTTR users, and is applicable to rich scenes.
What has been described above includes examples of aspects of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.
Claims (10)
1. A method for optical network device authentication and configuration management in FTTR scenarios, the method comprising:
allocating an LOID indicating a device type for each optical network device, wherein the LOID at least comprises a type A LOID, a type B1 LOID and a type B2 LOID, wherein the type A LOID indicates that the optical network device is a main ONT device, the type B1 LOID indicates that the optical network device is a type B1 edge ONT device managed by an automatic configuration server ACS, and the type B2 LOID indicates that the optical network device is a type B2 edge ONT device not managed by the ACS;
configuring the main ONT equipment to register authentication with the OLT equipment and accept ACS management;
configuring the B1 type edge ONT equipment to register and authenticate to the OLT equipment through the coupled main ONT equipment and receive ACS management; and
configuring a class B2 edge ONT device to register authentication with a primary ONT device coupled thereto and to accept the primary ONT device management.
2. A method for authentication and configuration management of optical network devices in FTTR scenario, wherein each optical network device has a LOID indicating a device type, wherein the LOID at least includes a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by the ACS, wherein the method is performed by the primary ONT device and comprises the steps of:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by using an account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT equipment to the OLT equipment;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending the account and the configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication is passed, returning an authentication result to the B2 type edge ONT equipment and issuing configuration, wherein the configuration configures the B2 type edge ONT equipment into a bridge mode.
3. A method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B1 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
4. A method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the class B2 edge ONT device and comprises the steps of:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the B2 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the B2 type edge ONT device into a bridge mode according to the received configuration.
5. A method for authentication and configuration management of optical network devices in FTTR scenarios, wherein each optical network device has a LOID indicating a device type, wherein the LOID includes at least a class a LOID, a class B1 LOID, and a class B2 LOID, wherein the class a LOID indicates that the optical network device is a primary ONT device, the class B1 LOID indicates that the optical network device is a class B1 edge ONT device managed by an auto configuration server, ACS, and the class B2 LOID indicates that the optical network device is a class B2 edge ONT device not managed by an ACS, wherein the method is performed by the ACS and comprises the steps of:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and in response to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, sending the updated account and the updated configuration information of the edge ONT equipment to the main ONT equipment.
6. A system for providing FTTR services, wherein the system comprises an auto configuration server, ACS, an authentication system, an OLT device, a primary ONT device, and one or more edge ONT devices coupled to the primary ONT device, characterized in that:
each of the primary ONT device and the edge ONT device has an LOID indicating a device type, wherein the LOID includes at least an a-class LOID, a B1-class LOID, and a B2-class LOID, wherein the a-class LOID indicates that the optical network device is a primary ONT device, the B1-class LOID indicates that the optical network device is a B1-class edge ONT device managed by an ACS, and the B2-class LOID indicates that the optical network device is a B2-class edge ONT device not managed by the ACS;
wherein the primary ONT device is configured to register authentication with the OLT device and accept the ACS management;
the B1 type edge ONT equipment is configured to register authentication with the OLT equipment through the main ONT equipment and accept the ACS management; and
the class B2 edge ONT device is configured to register authentication with a primary ONT device to which it is coupled and to accept the primary ONT device management.
7. The system of claim 6, wherein the primary ONT device is further configured to:
initiating a registration authentication request to OLT equipment, wherein the request comprises the class A LOID of the main ONT equipment;
requesting configuration information from the ACS in response to the OLT device passing authentication of the primary ONT device;
receiving accounts and configuration information of the primary ONT equipment and the edge ONT equipment associated with the primary ONT equipment, which are sent by an ACS;
initiating an account authentication request to an authentication system by the account of the primary ONT equipment;
in response to receiving an authentication registration request of an edge ONT device, determining the type of the edge ONT device according to the LOID of the edge ONT device contained in the authentication registration request of the edge ONT device;
in response to determining that the edge ONT device is a class B1 edge ONT device:
transmitting the authentication registration request of the B1 type edge ONT equipment to the OLT equipment;
receiving an authentication result returned by the OLT equipment, and transmitting the authentication result to the B1 type edge ONT equipment;
sending the account and the configuration information corresponding to the B1 type edge ONT equipment from the ACS to the B1 type edge ONT equipment; and
transmitting an account authentication request and a return message between the B1 type edge ONT equipment and the authentication system in a transparent mode; and
in response to determining that the edge ONT device is a class B2 edge ONT device:
authenticating the B2 type edge ONT equipment; and
and if the authentication passes, returning an authentication result to the B2 type edge ONT equipment and issuing configuration, wherein the configuration configures the B2 type edge ONT equipment into a bridge mode.
8. The system of claim 6, wherein the class B1 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B1 type edge ONT device, wherein the request includes a B1 type LOID of the B1 type edge ONT device;
receiving an authentication result from the OLT equipment returned by the main ONT equipment;
receiving an account and configuration information which are sent by the main ONT equipment and correspond to the B1 type edge ONT equipment from the ACS; and
and initiating an account authentication request to an authentication system by using the received account.
9. The system of claim 6, wherein the class B2 edge ONT device is further configured to:
initiating a registration authentication request to a primary ONT device coupled with the B2 type edge ONT device, wherein the request includes a B2 type LOID of the B2 type edge ONT device;
receiving an authentication result returned by the primary ONT equipment and a issued configuration; and
configuring the B2 type edge ONT device into a bridge mode according to the received configuration.
10. The system of claim 6, wherein the ACS is configured to:
the account authentication responds to a configuration information request received from a main ONT device, and the account and the configuration information of the main ONT device and edge ONT devices associated with the main ONT device are sent to the main ONT device; and
and responding to the change of the account and the configuration information of the edge ONT equipment which is maintained on the ACS and is associated with the main ONT equipment, and sending the updated account and configuration information of the edge ONT equipment to the main ONT equipment.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110961387.7A CN113852883B (en) | 2021-08-20 | 2021-08-20 | Optical network equipment authentication and configuration management method and system in FTTR scene |
PCT/CN2021/135949 WO2023019816A1 (en) | 2021-08-20 | 2021-12-07 | Optical network device authentication and configuration management method and system in fttr scenario |
BR112023021776A BR112023021776A2 (en) | 2021-08-20 | 2021-12-07 | METHODS FOR AUTHENTICATION AND CONFIGURATION MANAGEMENT FOR OPTICAL NETWORK DEVICES IN FTTR SCENARIOS AND SYSTEM FOR PROVIDING FTTR SERVICES |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110961387.7A CN113852883B (en) | 2021-08-20 | 2021-08-20 | Optical network equipment authentication and configuration management method and system in FTTR scene |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113852883A CN113852883A (en) | 2021-12-28 |
CN113852883B true CN113852883B (en) | 2023-04-07 |
Family
ID=78975754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110961387.7A Active CN113852883B (en) | 2021-08-20 | 2021-08-20 | Optical network equipment authentication and configuration management method and system in FTTR scene |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN113852883B (en) |
BR (1) | BR112023021776A2 (en) |
WO (1) | WO2023019816A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114641030B (en) * | 2022-05-18 | 2022-07-19 | 华中科技大学 | FTTR-based home user hotspot area identification method, system, device and medium |
CN115086061B (en) * | 2022-06-30 | 2024-03-22 | 天翼数字生活科技有限公司 | Authentication and network access control method and system for FTTR |
CN117729249B (en) * | 2024-02-18 | 2024-05-03 | 四川天邑康和通信股份有限公司 | FTTR-based gateway management method, FTTR-based gateway management device, FTTR-based gateway management equipment, FTTR-based gateway management system and medium |
CN118175459B (en) * | 2024-05-13 | 2024-08-06 | 中兴通讯股份有限公司 | Flow control method for fiber-to-room FTTR system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480321A (en) * | 2010-11-29 | 2012-05-30 | 中兴通讯股份有限公司 | Method and system for managing relevant parameters of home gateway in GPON (Gigabit Passive Optical Network) system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2966996A1 (en) * | 2010-10-27 | 2012-05-04 | France Telecom | DATA PROCESSING FOR THE MANAGEMENT OF SLEEP |
WO2015024235A1 (en) * | 2013-08-22 | 2015-02-26 | 华为技术有限公司 | Method, apparatus and system for terminal authentication in passive optical network |
CN107294755B (en) * | 2016-04-13 | 2022-01-25 | 中兴通讯股份有限公司 | Method, device and system for binding user information and equipment |
US10880196B2 (en) * | 2018-01-25 | 2020-12-29 | Charter Communications Operating, Llc | Bi-directional speed test method and system for customer premises equipment (CPE) devices |
CN109495321A (en) * | 2018-12-24 | 2019-03-19 | 深圳市友华通信技术有限公司 | A method of automatically configuring ONU |
CN110430113B (en) * | 2019-06-28 | 2021-07-27 | 广东省广播电视网络股份有限公司 | Automatic service opening system and automatic service opening method |
CN112887851B (en) * | 2021-01-13 | 2021-10-08 | 烽火通信科技股份有限公司 | Household all-optical network system and implementation method thereof |
CN113014324B (en) * | 2021-05-25 | 2021-08-03 | 武汉长光科技有限公司 | Networking method, device, equipment, system and storage medium |
-
2021
- 2021-08-20 CN CN202110961387.7A patent/CN113852883B/en active Active
- 2021-12-07 WO PCT/CN2021/135949 patent/WO2023019816A1/en active Application Filing
- 2021-12-07 BR BR112023021776A patent/BR112023021776A2/en unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480321A (en) * | 2010-11-29 | 2012-05-30 | 中兴通讯股份有限公司 | Method and system for managing relevant parameters of home gateway in GPON (Gigabit Passive Optical Network) system |
Also Published As
Publication number | Publication date |
---|---|
WO2023019816A1 (en) | 2023-02-23 |
CN113852883A (en) | 2021-12-28 |
BR112023021776A2 (en) | 2024-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113852883B (en) | Optical network equipment authentication and configuration management method and system in FTTR scene | |
CN1980195B (en) | Complementary residential gateway management | |
CN103039038B (en) | Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment | |
CN102726069B (en) | The dynamic Service group of dialogue-based attribute | |
EP1628437B1 (en) | Broadband access method with great capacity and the system thereof | |
JP5871916B2 (en) | Method, telecommunications network, and program for efficient management and / or configuration of connections between telecommunications networks and customer premises equipment | |
CN103069750B (en) | The method and system of the connection for being efficiently used between communication network and this communication network and customer rs premise equipment | |
CN106487788A (en) | A kind of user access method, SDN controller, forwarding unit and subscriber access system | |
CN103039040B (en) | For the effectively method of initialization communication network and the communication network | |
CN116996908A (en) | Fusion management method, device, equipment and medium of master-slave gateway and wireless AP | |
CN112448945B (en) | Controlling network access of customer premises equipment | |
CN101442800A (en) | Method, system and terminal for discharging terminal business | |
CN112929387A (en) | Broadband network multiple authentication and encryption method applied to intelligent community | |
KR102560548B1 (en) | Access point, home gateway and home network system, and method for performing ip communication on the home network system | |
KR20070031154A (en) | Method for dynamically acquiring link status information of network sources and system for providing network connection service | |
CN113904939B (en) | Method, device and storage medium for managing target terminal | |
JP7247848B2 (en) | PON system, management server, management method, and installation method | |
EP2887577B1 (en) | Method for establishing and/or configuring an internet protocol network connection between a customer premises equipment and a telecommunications network | |
CN118200773B (en) | FTTR service management system, method, network device, storage medium and program product | |
EP4336777A1 (en) | Method for enabling or setting up to operatively use a customer premises equipment with a broadband access network of a telecommunications network, system or broadband access network, customer premises equipment, access configuration entity or functionality, program and computer-readable medium | |
KR20050000024A (en) | Method for accessing authentication using subscriber ID in the internet access service based on ethernet and method thereof | |
KR101304593B1 (en) | Method for providing services of multiple service providers in an IP-based access network including access node, user gateway | |
KR20120091706A (en) | System and method for controlling network access of user device using internet access line information | |
KR100725131B1 (en) | System and its method for providing dynamic leased line service | |
WO2020036117A1 (en) | Communication system and communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |