Specifications
Brand Name :
Fiberall or OEM
Model Number :
FA-GOLT8608
Certification :
CE-RED
Place of Origin :
China
MOQ :
1 Unit
Price :
On request
Payment Terms :
L/C, T/T, Western Union, MoneyGram, PayPal
Delivery Time :
4-7 days
Packaging Details :
Cardboard Box/Carton
Product Name :
GPON Optical Line Terminal
Standard :
ITU-T G.984
Switching Capacity :
102G
Size :
440mm×44mm×380mm
Dual power supply :
AC And DC
AC Supply Input :
100~240V,47~63Hz
DC Supply Input :
-36V~-75V
PON Port :
8 ports
Ethernet Port :
8 GE FX and 8xGE TX
SFP Module :
2x10GE SFP+
Description

GPON OLT Optical Line Terminal For ONU With 8 PON 8 Gigabit Ethernet Ports

How OLT To Distinguish Uplink Data From Different ONT ?

The downlink data is simple for ONT because they are broadcast down from OLT, ONT only need to apart the information for itself from all information. However, the upstream flow is different, because the upstream flow will meet problem of information conflict .

The former PON technology adopted TDMA for uplink , the time have to be divided then ONT can distinguish the uploaded data. So how ONT know to send the data? And how it know how long will it take to send the data? This requires an agreement between OLT and ONT to achieve the above functions. What will happen if the OLT assign a long time for the ONT? If the amount of data sent by ONT is relatively large, that is to say, the bandwidth of ONT is relatively large. And the ONT start to send data on the allocated time. However, it will waste the bandwidth when the ONT do not have data to send during the allocate time so other ONT which has large data to send can not use the same time . This situation will inevitably bring rising costs. So GPON allocate bandwidth based on T-CONT.

With T-CONT, OLT is able to allocate bandwidth based on T-CONT. Of course, one ONT has multiple T-CONT, the benefits is it is able to allocate different type of T-CONT according to the different requirements of the business bandwidth. So T-CONT should have different types, currently there are four basic types of T-CONT: Fix, Assure, Not Assure and Best Effort (Max). They are used to represent different bandwidth allocation policies. What is the difference between them? To describe the difference, DBA has to be mentioned and please refer to another article in our website, Dynamically Bandwidth Assignment of OLT.

Business Features

  1. Attributes
FA-GOLT8608

PON features

GPON

Satisfy ITU -T standard
TR-101 compliant solution for FTTx OLT applications
High splitter rate, each PON port supports 128*ONU ,
Maximum transmission distance of 20KM
Support uplink FEC, downlink FEC(Forward Error Correction)
ONU identifier authentication :SN /SN+PASSWD
Bandwidth allocation mechanism
5 types of T-CONT bandwidth
Static Bandwidth Allocation
Dynamic Bandwidth Allocation
GPON feature parameter
4096 port-IDs per GPON MAC (Downstream and Upstream)
1024 Alloc -IDs per GPON MAC (Upstream )

L2 featuresMAC

MAC Black Hole
Port MAC Limit

VLAN

4K VLAN entries
Port-based/MAC-based/IP subnet-based VLAN
Port-based QinQ and Selective QinQ (StackVLAN)
VLAN Swap and VLAN Remark and VLAN Translate
GVRP
Based on ONU service flow VLAN add, delete, replace

Spanning tree protocol

IEEE 802.1D Spanning Tree Protocol (STP)
IEEE 802.1w Rapid Spanning Tree Protocol (RSTP)
IEEE 802.1s Multiple Spanning Tree Protocol instances (MSTP)

Port

Bi-directional bandwidth control
Static link aggregation and LACP(Link Aggregation Control Protocol)
Port mirroring and traffic mirroring

Security featuresUser security

Anti-ARP-spoofing
Anti-ARP-flooding
IP Source Guard create IP+VLAN+MAC+Port binding
Port Isolation
MAC address binds to port and port MAC address filtration
IEEE 802.1x and AAA/Radius authentication
TACACS+ authentification
dhcp anti-attack flood attack automatic suppression
ONU isolation control

Device security

Anti-DOS attack(such as ARP,Synflood, Smurf, ICMP attack), ARP detection, worm and Msblaster worm attack
SSHv2 Secure Shell
SNMP v3 encrypted management
Security IP login through Telnet
Hierarchical management and password protection of users

Network security

User-based MAC and ARP traffic examination
Restrict ARP traffic of each user and force-out user with abnormal ARP traffic
Dynamic ARP table-based binding
Supports IP+VLAN+MAC+Port binding
L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet
Port-based broadcast/multicast suppression and auto-shutdown risk port
URPF to prevent IP address counterfeit and attack
DHCP Option82 and PPPoE+ upload user’s physical location
Plaintext authentication of OSPF,RIPv2 and MD5 cryptograph authentication

IP routingIPv4ARP Proxy,DHCP Relay,DHCP Server,Static route
IPv6

ICMPv6,ICMPv6 redirection,DHCPv6,ACLv6,Configured Tunnel,6to4 tunnel
IPv6 and IPv4 Tunnels

Service featuresACL

Standard and extended ACL
Time Range ACL
Packet filter providing filtering based on source/destination MAC address, source/destination IP address, port, protocol, VLAN, VLAN range, MAC address range, or invalid frame. System supports concurrent identification at most 50 service traffic
Support packet filtration of L2~L7 even deep to 80 bytes of IP packet head

QoS

Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow
Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark
CAR(Committed Access Rate),Traffic Shaping and flow statistics
Packet mirror and redirection of interface and self-defined flow
Super queue scheduler based on port and self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR.
Congestion avoid mechanism,including Tail-Drop and WRED

Multicast

IGMPv1/v2/v3 ,IGMPv1/v2/v3 Snooping
IGMP Filter
MVR and cross VLAN multicast copy
IGMP Fast leave
IGMP Proxy
PIM-SM/PIM-DM/PIM-SSM
PIM-SMv6,PIM-DMv6,PIM-SSMv6
MLDv2/MLDv2 Snooping

MPLSNPLS LDP
ReliabilityLoop protection

EAPS and GERP (recover-time <50ms)
Loopback-detection

Link protection

FlexLink (recover-time <50ms)
RSTP/MSTP (recover-time <1s)
LACP (recover-time <10ms)
BFD

Device protection

VRRP host backup
Double fault-tolerant backup of host program and configuration files
1+1 power hot backup

MaintenanceNetwork maintenance

Telnet-based statistics
RFC3176 sFlow, LLDP
802.3ah Ethernet OAM
RFC 3164 BSD syslog Protocol
Ping and Traceroute

Device management

Command-line interface(CLI), Console, Telnet and WEB configuration
System configuration with SNMPv1/v2/v3
RMON (Remote Monitoring)1/2/3/9 groups of MIB
NTP(Network Time Protocol)


Product Parameters Of FA-GOLT8608

  1. Attributes
FA-GOLT8608
Switching capacity102Gbps
Throughput (IPv4/IPv6)75.88MPPS
Ports4/8*PON port,8*GE FX+8*GE TX,2*10GE SFP+
Power redundancyDual power supply. Can be double AC, double DC or AC+DC
Power supply

AC:Input 100~240V,47~63Hz;
DC:Input -36V~-75V;

Power consumption≤85W

Outline dimensions
(mm) (W*D*H)

440mm×44mm×380mm
Weight (in maximum configuration)≤3kg

Environmental
requirements

Working temperature:-15°C~55°C
Storage temperature:-40°C~70°C
Relative humidity:10%~90%,no condensing






























































































Send your message to this supplier
Send Now

AC / DC Power Supply Optical Line Terminal Equipment , GPON OLT Device For ONU

Ask Latest Price
Brand Name :
Fiberall or OEM
Model Number :
FA-GOLT8608
Certification :
CE-RED
Place of Origin :
China
MOQ :
1 Unit
Price :
On request
Contact Supplier
AC / DC Power Supply Optical Line Terminal Equipment , GPON OLT Device For ONU
AC / DC Power Supply Optical Line Terminal Equipment , GPON OLT Device For ONU
AC / DC Power Supply Optical Line Terminal Equipment , GPON OLT Device For ONU

 Fiberall Technology (Shenzhen) Co., Ltd

Active Member
9 Years
guangdong, shenzhen
Since 2007
Business Type :
Manufacturer
Total Annual :
2000000-3500000
Employee Number :
100~120
Certification Level :
Active Member
Contact Supplier
Submit Requirement