Method for Planning SAN Based on FTTH Technology

  • Chapter
  • First Online:
Data-Centric Business and Applications

Abstract

Analytical models for determining the length of an optical cable based on symmetric graphical models with one-way and two-way cable laying topology in an urban area with a base of potential customers of a subscriber access network uniformly distributed over the square area are considered, which allow optimizing the economic costs of deploying an access network. An access network model has been developed, which allows to consider the selection of access technology, operating and capital costs. An optimization procedure has been developed that is aimed at minimizing the objective function according to the criterion of the cost of an FTTH network deploying, taking into account the costs of purchasing network elements and deploying street optical cable infrastructure. An optimization problem has been formulated and solved that allows minimizing the cost of a passive optical (PON) access network, considering the number of optical splitters, floor splitters, and ONU subscriber units. The solution to this problem is presented in general form, which allows to adapt it for any set of these network elements. The developed methodology for calculating the cost of the designed access network includes the total capital and operating expenditures for the purchasing, installation and maintenance of network elements presented in approximate prices. The calculation of expenditures on a typical cable structure is shown on a specific example. The presented methodology also allows to take into account the costs of deploying cable infrastructure and linear structures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 139.09
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ageyev, D., et al.: Method of self-similar load balancing in network intrusion detection system. In: 2018 28th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 1–4. IEEE (2018). https://doi.org/10.1109/radioelek.2018.8376406

  2. Ageyev, D., et al.: Classification of existing virtualization methods used in telecommunication networks. In: Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), pp. 83–86 (2018)

    Google Scholar 

  3. Ageyev, D.V., Ignatenko, A.A., Wehbe, F.: Design of information and telecommunication systems with the usage of the multi-layer graph model. In: Proceedings of the XIIth International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 1–4. Lviv Polytechnic National University, Lviv-Polyana, Ukraine (2013)

    Google Scholar 

  4. Kryvinska, N.: Converged network service architecture: a platform for integrated services delivery and interworking. In: Electronic Business Series, vol. 2. International Academic Publishers, Peter Lang Publishing Group (2010)

    Google Scholar 

  5. Kryvinska N (2008) An analytical approach for the modeling of real-time services over IP network. Math. Comput. Simul. 79(4):980–990. https://doi.org/10.1016/j.matcom.2008.02.016

    Article  MathSciNet  MATH  Google Scholar 

  6. Barabash, O.V., Open’ko, P.V., Kopiika, O.V., Shevchenko, H.V., Dakhno, N.B.: Target programming with multicriterial restrictions application to the defense budget optimization. Adv. Military Technol. 14(2), 213–229 (2019). https://doi.org/10.3849/aimt.01291

  7. Radivilova, T., Kirichenko, L., Ageiev, D., Bulakh, V.: The methods to improve quality of service by accounting secure parameters. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham (2020)

    Google Scholar 

  8. Ageyev, D., et al.: Provision security in SDN/NFV. In 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), pp. 506–509. IEEE (2018). https://doi.org/10.1109/tcset.2018.8336252

  9. Kirichenko, L., Radivilova, T., Bulakh, V.: Classification of fractal time series using recurrence plots. In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), pp. 719–724. IEEE (2018). https://doi.org/10.1109/infocommst.2018.8632010

  10. Ivanisenko, I., Kirichenko, L., Radivilova, T.: Investigation of self-similar properties of additive data traffic. In: Proceedings of the International Conference on Computer Sciences and Information Technologies, CSIT 2015, pp. 169–171. IEEE, Lviv, Ukraine (2015). https://doi.org/10.1109/STC-CSIT.2015.7325459

  11. Radivilova, T., Hassan, H.A.: Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-enterprise. In: 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), pp. 1–4. IEEE (2017)

    Google Scholar 

  12. Geilhardt, F.: Migration guidelines for DSL from operator’s view. MUSE, Deliverable DB2.3 version 2.0., p. 64 (2005)

    Google Scholar 

  13. EURESCOM Project P-709: Planning of Optical Network. EURESCOM, Deliverable 3, p. 38 (2000)

    Google Scholar 

  14. EURESCOM Project P-614: Evaluation of broadband home networks for residential and small business users. EURESCOM, Deliverable 11, p. 94 (1998)

    Google Scholar 

  15. Prat, J.: Next-Generation FTTH Passive Optical Networks, p. 224 (2008)

    Google Scholar 

  16. Ims, L.A., Myhre, D., Olsen, B.T.: Investment costs of broadband capacity upgrade strategies in residential areas. In: Proceedings of GLOBECOM 98, vol. 6, pp. 3153–3158 (1998)

    Google Scholar 

  17. Ims, L.A., et al.: Key factors influencing investment strategies of broadband access network upgrades. In: Proceedings of ISSLS’98, Venice, p. 246 (1998)

    Google Scholar 

  18. Stordahl, K. et al.: Evaluating broadband strategies in a competitive market using risk analysis. In: Proceedings of Networks, Sorrento, p. 567 (1998)

    Google Scholar 

  19. Minoux M (1999) Network synthesis and optimum network design problems: models, solution methods and applications. Networks 19:313–360

    Article  MathSciNet  Google Scholar 

  20. Monath, T.: Towards multi-service business models. MUSE, Deliverable DA1.1, version 1.0., p. 76 (2004)

    Google Scholar 

  21. Monath, T.: Techno-economics for fixed access network evolution scenarios. MUSE, Deliverable DA3.2p version 1.0., p. 87 (2005)

    Google Scholar 

  22. Kind M (2008) Economical guidelines and decisions in BB access (results of use cases). MUSE, Deliverable DA3.3 version 1.0., p 123

    Google Scholar 

  23. Olsen, B.T.: OPTIMUM—a techno-economic tool. Telektronikk (2/3), 239–250 (1999)

    Google Scholar 

  24. Claunir, P.: Dimensioning of multilayer optical networks (2009)

    Google Scholar 

  25. Barabash, O.V., Musienko, A.P., Sobchuk, V.V., Lukova-Chuiko, N.V., Svynchuk, O.V.: Distribution of values of cantor type fractal functions with specified restrictions. In: Sadovnichiy, V.A., Zgurovsky, M.Z. (eds.) Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics. Understanding Complex Systems. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-50302-4_21

  26. Matuszewski, J.: Application of clustering methods in radar signals recognition. In Proceeding of 2018 International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 745–751. https://doi.org/10.1109/infocommst.2018.8632057

  27. Osadchuk, V.S., et al.: Experimental research and simulation of microwave oscillator based on structure of static inductance transistor with negative resistance. In: 2010 20th International Crimean Conference “Microwave and Telecommunication Technology”, Sevastopol, Ukraine, pp. 13–17 (2010). https://doi.org/10.1109/crmico.2010.5632543

  28. Toliupa, S., Nakonechnyi, V., Tereikovskyi, I., Tereikovska, L., Korystin, O.: One-periodic template marks model of normal behavior of the safety parameters of information systems networking resources. In: 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), pp. 764–768. IEEE (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iskandar Saif Ahmed Al-Vandavi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Vandavi, I.S.A., Moskalets, M., Popovska, K., Ageyev, D., Krasnozheniuk, Y. (2021). Method for Planning SAN Based on FTTH Technology. In: Ageyev, D., Radivilova, T., Kryvinska, N. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-030-71892-3_14

Download citation

Publish with us

Policies and ethics

Navigation