140 likes | 273 Views
Advanced Optical Technologies for Data Intensive Applications. Kim Roberts iGrid 2005. How do I optically switch my Lightpaths?. Need to have each wavelength arriving at a node be able to leave via any of four other optical lines, or drop locally. Must be low cost. Local Add Drop.
E N D
Advanced Optical Technologies for Data Intensive Applications Kim RobertsiGrid 2005
How do I optically switch my Lightpaths? • Need to have each wavelength arriving at a node be able to leave via any of four other optical lines, or drop locally. • Must be low cost Local Add Drop
Wavelength Selective Switch • One fiber in, five fibers out. • Individually cross-connects 80 wavelengths
TWc SMF-28 TWc E-LEAF SMF-28 E-LEAF SMF-28 E-LEAF Hurdle: Fiber Dispersion Management ROADM Photonic Cross-Connect Photonic Cross-Connect Photonic Cross-Connect Bulk dispersion compensation will not suffice
Electronic Dispersion Precompensation OSNR vs. distance (10E-3 BER; 10 Gb/s) Simple Rx BAD 3 bit MLSE 5 bit MLSE Tx pre-comp (IM-DD) Tx pre-comp (DPSK) GOOD Optical Dispersion Compensation is Obsolete
Transmitter Pre-compensation Rx Tx Optical modulator CD-1 D/A Digital data Recovered data D/A 0 laser
How can I eliminate latency?ARQ buffer latency grows with round trip time.
Uncoded BCH-1 G.975 BCH-3 BCH-20 Wraptor Forward Error Correction • FEC eliminates Bit Errors • Lightpaths with no packet loss
Layer 1 Multicast • One layer 1 switch: • 50 Mb/s 70,000 ways, • 240Gb/s streams 15 ways • Demo US110 (hardware capacity) HDX Up to 1.28 Tb/s single shelf 3.84 Tb/s as a hub HDXc Up to 640 Gb/s OME Up to 160 Gb/s
How can I secure my Lightpath? • Prevent interception of valuable IP or secret information. • Movie production, government, healthcare, finance, corporate • Preclude alteration or insertion of false data • Banking, government
Lightpath Encryption Demo US106 • Full OC-192/STM-64 10G throughput. • One to twelve lightpaths with separate keys. • 12 x GigE used to heavily load the OC-192 as 12xSTS-1-16V • 400 ns added latency for AES-256 encryption • Another 400 ns for decryption • Integrated into the Nortel OME-6500 transport shelf. • Packet by packet encryption • No encryption of idle frames • No overhead added to each packet
Your Challenge • Most protocols are designed for lousy connections • How can you exploit Lightpaths that are: • Wavelength switched to your destination • Independent of optical physics • Free of packet loss • Layer 1 multicast • Securely encrypted • 40 Gb/s