Automation of fiber to the home network design with different types of network elements

Kaltham Al Romaithi, Kin Fai Poon, Anis Ouali, Peng Yong Kong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the increase in popularity of bandwidth intensive applications, the telecommunication companies have been driven to find alternatives for the existing digital subscriber line (DSL) infrastructure to meet the requirements of the subscribers. Fiber To The Home (FTTH) networks, based on the Giga Passive Optical Network (GPON) topology, have been proven to be a cost effective solution for a large scale deployment. In this paper, a one-level problem of a typical FTTH network with different types of network elements is presented. A mathematical model using the Binary Integer Programming (BIP) approach is detailed. The model with all the required constraints is solved by an open source solver. Results are provided at the end of the paper demonstrating the feasibility of such approach.

Original languageBritish English
Title of host publication2015 International Conference on Information and Communication Technology Research, ICTRC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages128-131
Number of pages4
ISBN (Electronic)9781479989669
DOIs
StatePublished - 14 Jul 2015
Event1st International Conference on Information and Communication Technology Research, ICTRC 2015 - Abu Dhabi, United Arab Emirates
Duration: 17 May 201519 May 2015

Publication series

Name2015 International Conference on Information and Communication Technology Research, ICTRC 2015

Conference

Conference1st International Conference on Information and Communication Technology Research, ICTRC 2015
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period17/05/1519/05/15

Keywords

  • BIP
  • FTTH
  • network planning
  • optimization

Fingerprint

Dive into the research topics of 'Automation of fiber to the home network design with different types of network elements'. Together they form a unique fingerprint.

Cite this