preview

Fi-Wi Technology

Better Essays

Fi-Wi TECHNOLOGY

(Fiber Wireless Network Architecture)

Gande Kiran Kumar,
IT Department,
MallaReddy Inst of Eng& Tech(MRIET) ,
Maisammaguda, Secunderabad. kirangande92@gmail.com 8099225308.

,Gajula Vijay Kumar ,
IT Department,
MallaReddy Inst of Eng& Tech(MRIET) Maisammaguda, Secunderabad
Shivavijay06@gmail.com
8125746522.

Abstract— The ultimate goal of Fiber Wireless (FI-WI) networks is to convergence of various optical and wireless technologies under a single infrastructure in order to take advantage of their complementary features and therefore providing a network capable of supporting bandwidth hungry emerging applications for both fixed and mobile clients. The Fi-Wi architecture is based on radio …show more content…

This means that traffic generated from users communicating only in the wireless network does not have to be propagated towards the optical network as happens with RoF technology. Thus, distributed MAC protocols, e.g. IEEE 802.11b, avoid the fiber’s extra propagation delays that degrade their performance. This feature removes a possible limitation regarding the length of the deployed fiber while it adds a degree of resiliency to the system since local wireless traffic can be served even when connectivity with the optical segment is lost.
[pic]

OPTICAL ACCESS NETWORKS A growing number of providers worldwide are adopting optical technologies in the access network and towards the client’s premises (Fiber-to-the-Home or FTTH) due to optical fiber’s ability to provide huge amounts of bandwidth in longer distances than copper, immunity to electromagnetic interference and inherent security. Fiber generally should be installed underground for safety reasons and therefore its deployment is an expensive procedure. This is mitigated by deploying a tree like network topology where a part of it is being shared by many clients. Each client is connected via a dedicated fiber to a Remote Node (RN) which in turn is connected via a single fiber to a CO. In general two technologies can be used for this implementation •

Get Access