FTTx

Fiber optics is the infrastructure of choice in FTTx

The challenge of managing Fiber Optic Infrastructure in FTTx

Challenging Access fiber deployment ROI prompts a variety of operator actions, addressing both cost and revenue. Operators strive to reduce initial deployment and ongoing operation costs. Network sharing models are implemented to boost revenue. Access fiber may be shared by service providers, by fixed access and backhaul, by business and residential, or by some combination of these. TeliSwitch AODF modularity is a prime network-sharing enabler.

AODF could be managed by a single organization providing dark fiber to various service providers. AODF could be also managed by few organizations, such as fixed and mobile operations which have not converged. To this end, TeliSwitch EMS supports network segmentation, where every organization controls exclusively resources allocated to it.

Residential service take rate by service providers is uncertain and varies over time. Therefore, resources allocated to any provider need not be fixed. Instead, TeliSwitch recommends a two-stage solution, where a CO-deployed AODF serves the first stage, equipped with point-to-point or low split ratio plates. This stage will effectively re-allocate remote AODF resources between service providers, as respective take rates vary. The two-stage solution allows service differentiation by oversubscription and rapid response to bandwidth consumption changes.

TeliSwitch AODF & EMS reduce both deployment and operation costs. Fiber links established with AODF can be tested at a single location, utilizing AODF loopback capability. This contrasts with present practices engaging teams at few locations. Fiber link integrity can be verified by an automated session, where OTDR is switched to various ports in sequence, relieving technicians of this tedious end error-prone job.

Once deployed, AODF need not ever be visited, unless a major fault occurs. Connections are configured remotely as needed. This allows less accessible and safer deployment, protecting the assets from unintended or malicious harm.

Key Features