Speed
Armored Fiber
◦ Loose tube fiber with corrugated steel Armor
◦ Must be grounded
◦ ADSS(All-Dielectric Self-Supporting)
Support and span length engineered into fiber
No grounding requirements
Installed using Pulleys
Example:
V Groove Splicer
• Less Precise
• Lower cost to purchase and maintain
• Must be cleaved
Dome enclosures
• High Capacity enclosure
• Customizable using grommets
• Splice trays separate
• Typically used for butt connections
Tangents
• Supports fiber between dead ends
• Line angle limitation < 20 degrees
• Some models can be used in
pulling short spans
1. Keeper
2. Cushion Inserts (With or Without Grit)
3. Captured Bolt and Washer (Captured with Grommet)
4. Lock Nut
5. Anchor Shackle with Eye-nut (Optional not shown)
6. Structural Reinforcing Rods (optional, not shown)
Lashed Fiber
LC (Lucent/little connector)
• Small high density
• Snap fit
• Used on Lasers(XFP/SFP)
ST (Straight Tip)
• Round
• Twist lock
• Common in Sub Stations
UPC (Ultra Physical Contact) polish style of fiber optic ferrules
• Standard for most applications
APC (Angled Physical Contact)
• Has Lower lightwave reflectance
• Used in RF optical applications
Active
• One Fiber One Customer
• Bandwidth not shared
• Requires high fiber counts
Passive
• One Fiber 32 to 64 Customers
• Requires optical Splitters
• Bandwidth is Shared
Non Powered
Optical splitter
Sonet (Synchronous Optical Network)
Active Path
Reserved path
No activity
Ethernet
◦ Low Cost Deployment
◦ Flexible bandwidth rates
◦ Sub 50ms protection without stranding bandwidth
◦ Mesh and Ring Topologies
◦ Easily Scalable
Active Path
Secondary path
Active Path
DWDM
• Multiplex up to 160 channels of bandwidth on 2 fibers
• Capable of long distance communications
• Wavelength sizes up to 100Gb
• Can use a digital wrapper(OTN) to encapsulate many types of
data and maintain packet quality
• Most systems do not have protection
Standard Ethernet DWDM
TX RCV
RCV TX
Layer 2 (Facts)
1. Switching determined by MAC address database
2. If Packet Collision occurs, packet randomly retries
3. Packet Broadcast transverses all switches on domain
4. Vlans provide segmentation of domain
5. Vlans also allow for security and network traffic flow
management
192.168.30.3/27 192.168.30.2/27
B
C
192.168.30.4/27
A
Layer 3 Router IPs terminated on Router
Vlan 10=192.168.10.1/27
Vlan 20=192.168.20.1/27
Layer 2 Switch Vlan 30=192.168.30.1/27
Vlan 40=192.168.40.1/27
29 usable IPs per Vlan
Ethernet Ring D
Block
G. 803.2
Vlan 10 Sub A
Vlan 20 Sub B
Vlan 30 Sub C
Vlan 40 Sub D
1. ITU G.8032 provides a method of ethernet protection while
preventing loops.
Layer B
2 Ring
C
192.168.50.4/27 MESH
Topology
Layer 3
A
IPs terminated on Router
Switch/Router Vlan 10=192.168.10.1/30
Vlan 20=192.168.20.1/30
Vlan 30=192.168.30.1/30
Vlan 40=192.168.40.1/30
2 usable IPs per segment
Ethernet Ring D
Block
G. 803.2
MPLS packets transverse fiber node based on shortest
path and label
Layer B MPLS
2 Ring
C Restores
Path
Layer 3
A
Switch/Router