Professional Documents
Culture Documents
A GENERAL STATISTICS
METHODS OF TAPING
There are various fiber optic tapping methods, but most fall into the
following
main categories:
• Splice
• Splitter or Coupler (Variable)
• Non-touching methods (passive and active)
SPLICE:
(c) (d)
NON-TOUCH METHODS:
PROTECTION METHODS
RFTS
INTRUSION DETECTION SYSTEMS
ENCRYPTION
PHYSICAL-LAYER SECURITY
BREACH LOCALIZATION
OUTPUT OPTIMIZATION
RTFS
ENCRYPTION
PHYSICAL-LAYER SECURITY
BREACH LOCALIZATION
OUTPUT OPTIMIZATION
SOME IMPROVMENTS
STAND-ALONE DEVICE
When implemented as a stand-alone device, interoperability with
any manufacturers’ equipment is ensured. The successful insertion
into multi-vendor networks help protect network operators from
financially troubled vendors and those not pursing optical security
and monitoring functionality in their current or future product lines.
Such devices sit at either end of a given fiber optic segment to
provide security, monitoring, intrusion detection and maintenance
capabilities to that specific route. At either end, each device
optically interfaces with already existing multiplexor
and transceiver card equipment, which otherwise does not support
such optical security and monitoring capabilities. Network
Management and Administration
occurs through a standard SNMP or other similar interface. Multi-
vendor interoperability in particular allows network operators to
incrementally add such required optical security and monitoring
capabilities to their already existing infrastructures .Network
operators are thus not hampered by feature restrictions on current
vendor equipment, limited configurations for security, network
monitoring limitations or other constraints.
TRANSCEIVER CARDS
TABLE OF CONTENTS
1. INTRODUCTION……………………………………………………………. 1
3. METHODS OF TAPING……………………………………………………..4
3.1 SPLICE………………………………………………………………………………..4
5. PROTECTION METHODS………………………………………………….8
5.1RTFS………………………………………………………………………………......8
5.3ENCRYPTION……………………………………………………………………..…9
5.4PHYSICAL-LAYER SECURITY……………………………………………….……10
5.5BREACH LOCALIZATION……………………………………………….…………10
5.6OUTPUT OPTIMIZATION……………………………………………….………….11
7. STAND-ALONE DEVICE…………………………………………...………11
8. TRANSCEIVER CARDS…………………………………………….………12
11. CONCLUSIONS………………………………………………….……….…17