This overview explains how GPON optical protection works and defines the features and capabilities of the Tellabs Type B PON protection switching. The GPON system, and type B protection, are further defined in ITU-T G.984.1.
PPG Protection Example

Type B PON protection is a part of the GPON standard and allows the OLT, and OLT connections, to be redundant and allows high reliability connections over the PON.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1MSkucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=D6LGv-Mb4pUW72ovVVvrOV39T3DSTLKiZ5Q4oERHxBfTb7zVOt7Mh7FAs21waibxOLG8DDOqPPRItg1tdgNkpz0~7qQjwGULIg28tH-OTOafknMk2b~D-wq6vm0IdUbtrIjA7gn3jjSYyQG9HK-BGUuIrDzEmkJf0x~-kVcN4yb9VEqgP6q3MdPXiN4gGem3jFtU31-XNlwKPsp~CK2hxNFh2ywV22IyZZrAAusl5h79o66gB76v4BoI9L4YsMV4IJwa4bWfyPLyTc-Mz1MOGCdKsQvnsUgcm5CSThDZdTzp87Kj0OUKBe-tkIY~CTZv7egfDSab9y2-ZU11lT6rRA__&Key-Pair-Id=K2TK3EG287XSFC)
Type B protection makes use of a 2:N splitter that allows two inputs on the OLT side of the circuit. There is a single fiber going to each of the ONTs on the PON. This gives both equipment and facility protection for the OLT side of the PON. With Type B PON Protection one can accomplish fiber path redundancy to the communication closet or zone box (e.g. 2:32 splitter) as well as full path protection to the user work area (using a 2:1 splitter).
The diagram shows the two PON interfaces being within the same OLT, but the protection interface can be configured as:
This allows the user to control what level of redundancy they require based on what makes the most sense in terms of a trade off of cost/benefit, usually driven by the importance of the data flowing over the PON network.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1MikucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=NKIKoByCeZyg2aTGeeqrh118jxx5K5DKRmMYaugvg8jjmiUAcEpN27pgE-Eqksitd2t54-p~CTFTpxkNNt8TeIc~PeEiFz~f5OnCfTwWpp0yiZ7r5QhccVyA4TM~8AZKLyRa3xyAD0nehUEoC7yT0ykR5qtkjVCBDMo9hAhdJ777pG2PJj1FPxjJyBXPQfcnp8xxXSuDlIfhvW2lcqZ~Ns8wfIRXoeYv~sSmT4Y6ap-QcrfJ6bE~F3KDX9iVkoHCJiclnHa49exv3jv7nvVBsdW8YtF2sxm5PLn9IphHs6hax~N9t3zuwiSnoB1tcRc28foDucDi2WKE6ejQM5tXlQ__&Key-Pair-Id=K2TK3EG287XSFC)
Implementing Type B PON Protection on the Tellabs OLAN system extends system availability beyond 99.999%.
Tellabs supports the ITU-T G.984.1 Type B PON protection on all 1100 Series OLTs and ONTs. This allows the user to fully protect the PON side of the network in a cost-effective manner.
The Tellabs product has been enhanced with Tellabs patented technology such that the standby PON link can detect the lack of messaging to or from the ONTs. The standby PON takes over if it detects this condition and starts driving its laser onto the PON. This is all done using the standard Tellabs QOIU7 PON cards without additional equipment other than the 2:N fiber splitter.
The 2:N fiber splitter allows both PONs to have the capability to inject light into the PON network and detect the traffic going to/from the other OLT. The Tellabs solution can support PON protection using two different PON cards within the same OLT, or utilizing two different OLTs.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1MykucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=n~OT0n~3~9VctitUG01yrnGTsirVXhsSnqzdpN7n5x36j8pYE2maJTjtlmK3ZQwqewG1gsjmULNOWGy8f2rF3DJZ8r0RijTbfQ7M5cZwqi1TDOzskUChMo8OfJTQIWUzkDnPfOYJjFPSzaZo8VjbXPtSJ8A8GFI74hKa~GnT2ZM5xeEjUOy1A6rDlvT2D~CpNCM5U2SBMFSrinHTildxkpyRvIf5s0LfqtUbOqiyMEovQokHmnBL4lF-3jtYTdVBjJBt8W0ELU5xwwmSlhWig1tBTCPQ6jVzM~sabsAL6Pq2asQ6Ytfi2xyfhzzLitDPBMPiFeI8q0~PSBw~VWDTKw__&Key-Pair-Id=K2TK3EG287XSFC)
The current Panorama PON release is able to detect the failure of the PON within 500ms and is able to switch traffic in less than 5 seconds for the entire PON.
It should be noted that the protection switching is revertive, meaning when the primary link is returned to service the system switches back after the wait to restore (WTR) timeout has expired. The default WTR time is 60 seconds. The revert time is used to provide hysteresis and avoid thrashing if the Primary PON is transitioning up and down.
The Tellabs 1100 Series Optical LAN uses a simple and effective method for arbitrating control of the PON. This patent-pending technology improves the reliability and responsiveness of the PON Protection while not increasing the cost of the Optical Data Network (ODN). The technology supports standard GPON physical and data link layer signaling characteristics, as defined by ITU G.984.1 and G.984.2.
This solution does not require any specialized, custom, proprietary hardware, software, or other functions in the ONTs and is therefore a solution to maximize compatibility across the entire Tellabs 1100 GPON ONT product portfolio.
This Passive PON Protection technology functions by utilizing the presence, or lack of an optical signal, rather than depending on encoding any specific messages in that signal. In ITU G.984.2, the ONT is a complete slave to the OLT that is commanding the PON and performing the Media Access Control (MAC) function for the ODN. As such, the ONT never transmits an optical signal without first being ordered by an OLT. Furthermore, when told to transmit, the ONT is given a very specific window of time in which it is allowed to transmit. This window, called a burst, is carefully coordinated by the OLT so that every ONT is occupying a non-overlapping period of time in which they are transmitting. This effectively becomes a Time-Division-Multiplexing (TDM) system in which the TDM "slots" or "bursts" are assigned by the OLT to the ONT. This assignment and burst process lasts for a small 125μsec period of time and then is repeated ad infinitum. During each epoch, called a frame, every ONT is assigned a specific allotment of the period in which it can burst. This includes no burst, a complete 125μsec burst, and some fraction therein that starts and stops at some arbitrary point within the frame. It should be emphasized that the resulting ONTs upstream optical signal is split by the passive optical 2:N splitter and received by both OLTs regardless if the OLT was actually transmitting a signal itself.
A second, and equally important, fact is in order for an ONT to receive its allocationed burst window, it must be able to successfully lock-to and recover the complete GPON encoded signal from a single OLT. The laws of optical physics dictate how much interference the ONTs receiver can suppress and continue to effectively decode the OLT's commands. In the presence of both OLTs commanding the ONT, each OLTs signal is destructively interfered with by the other to the extent that a discernible bitstream with valid CRC integrity checks cannot be obtained. As a result, the ONT has received no time slot allocations and therefore does not transmit any burst.
The significance of these two conditions is that the two OLTs can effectively infer the behavior of its peer OLT despite not being able to directly send signals and messages to it. From the perspective of one OLT:
Using these rules, a simple and effective MAC arbitration protocol is realized.
Each OLT follows the essence of the following decision state machine:
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1NCkucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=MKbyOPyRxvg0SgGCjA~M93IFSPgxnyiEmgGx0WM0XDJpxex0mC5JHctPjiwqFDkYlwcXklsjDY3dWiVJ17n0~NBN3aJyl9D-oVDMcBDHH64DEHEILMaE4tqdNE9gcm99o8Fx9~LJQZ5WZJbaLoer8GKbPThM~pKca~c6fOZR3wVBBu0o8s5kEFtc9O2BM7QU02Sz8DlRbzS6vFqUZl8baY-C6GTWu2WOqn8RLc0Sn9p4b~ATmGoDrC492633Alj2jKEUaYwmcGMkoOgINBgkVGPy2ejU~vxomC-Q9rnHyH9Es-9CoJIB6euLcFO03PKiqkpQ6aULNbD6ZwoY1GCzDg__&Key-Pair-Id=K2TK3EG287XSFC)
One other simple and cost-effective method of providing full redundancy end to end is to install two ONTs in a location and place a inexpensive Layer 2 (L2) switch which supports Rapid Spanning Tree Protocol (RSTP). This allows for full end-to-end redundancy for selected users without burdening the entire system with the additional costs of protection.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1NSkucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=d2BzpscKKuy8MlH3iEgnV1nFHPcNEXMr7RNfo-rOtO2z5FGsRA123CIYUJu85Bxx-uoi8Nofef6sUVA1c88JkmUApYLzfo-78J5NqhdoNUpaLedpbInm6432MBo~1~Ahf5SAU2S~Cuc~m4XWDJQA-p99qClGna6k5VjPJ8--iUoCg1E1Dd5KJ5pNN7-dZ65HeSx7XPmpXSUeuCb~zs5p5PdkuJVXKnZke6n5vHZVJBhVPlQGGBg2SzT-xz-PGhMBxj1kIvRjeotEfn35vfIbWLI0dhgXPSfLQpeuqBOJn4BP~Dlv-fv6poMzYPrmRIRR7yaenLLSVgzh-dEmfaRHzA__&Key-Pair-Id=K2TK3EG287XSFC)
Assuming there is a second OLT on site, the only additional equipment required for protection in this diagram is the L2 switch and an additional ONT. All the other equipment is deployed non-redundant and utilized to its full capacity. This method also only requires 1:N splitters rather than 2:N splitters.
One other advantage of this protection method is that it switches within the time period that RSTP can detect and change the topology. The typical convergence time is in the 2-3 second range.
The switching times for RSTP protected ONTs is driven by RSTP and typically would failover in less than 1 second. The GPON system would not be aware of the transition of traffic from one OLT to another and is not involved in the switch.
There are two key points associated with the optical setup of a protected PON network:
This 8dB must be planned for within the optical budget of the system being deployed.
The system relies on the Primary Optical link being able to take over control of the PON. This is accomplished in the optical domain by engineering the optical network such that the Primary PON signal is 5dB above that of the Secondary PON signal. This allows the Primary PON to drive the signal on the PON and take control.
The typical way this is accomplished is via the insertion of a 5dB pad in the Standby PON optical path.
.png?Policy=eyJTdGF0ZW1lbnQiOlt7IlJlc291cmNlIjoiaHR0cHM6Ly9kemY4dnF2MjRlcWhnLmNsb3VkZnJvbnQubmV0L3VzZXJmaWxlcy80MTcwMy81NDk1Mi9ja2ZpbmRlci9pbWFnZXMvcXUvMjAyNS9pbWFnZSg1NikucG5nIiwiQ29uZGl0aW9uIjp7IkRhdGVMZXNzVGhhbiI6eyJBV1M6RXBvY2hUaW1lIjoxNzY3MjA1NjEwfX19XX0_&Signature=Y47xB23E6FLgm3Zu2s~42FrFOqNE4wtgCY5YlKh207pGRBKCTAo8XOSoN~ar26xmG8HMLc4YLoTcY3PkG~4e1Vc9dZKG4MeHxG3HbHXCb4ZuUx9v7Aj9cFREa-ktn6BwFol747iIF~QpEHc9j-ULKyUrjeN5bPMrT5eH2TGIwbuXBHOE~ncr~pTrwbC6NDm477WINUvlrE~khkw-VpREj2pRN6QJZvtYv9LCzO9psff5acWB320RM~81BpJo-pn~J2ceyX5kvGUD3tffk6e0vXXudTY~X9t5~Q8oY0Gd6fk288hz9i8fz1dpID1EL75ElCbwvRGlPL6OppVszHHb7Q__&Key-Pair-Id=K2TK3EG287XSFC)
PON Protection is configured by selecting the Protection Icon (
) from the Tool Bar.

The Create icon (
) allows the creation of a protection group on a PON.

Protection Type: The only supported type for protection going forward will be Type B 2:N splitter protection. This type uses a 2:N splitter to allow a protection PON on the OLT side.
Wait to Restore Time: As noted before the wait to restore time defines the time the Primary and Secondary must be active prior to switching back to the primary.
Sync Channel VLAN ID: Defines the VLAN used for the synchronization of state between the primary and the secondary PON of the protection group. It speeds up protection actions.
OLT TID/PON AID: These two fields define the PON ports that are connected to the 2:N splitter. Any two PONs can be used. The only limitation is that the OLT for both ports must be managed by the same EMS.