Security Monitoring for Optical Networks
A security and monitoring system technology, applied in the field of security monitoring systems, can solve impossible, difficult and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0072] figure 1 A schematic diagram of an arrangement in the form of a node 10 of an optical network with an external safety monitoring system 30 is shown. The node has port 40 occupied by links to other ports. For example, the optical branching section 15 is provided in the form of a splitter or a demultiplexer. Therefore, there are two or more light paths. One of these paths leads to an unused output port 20 . The system monitoring component has a blocking component 50 that occupies the unused output port in order to prevent unauthorized access to the optical path of the unused output port. A light detector 60 is provided, coupled to the blocking member and configured to detect light signals passing through the unused port. It can be integrated in a blocking part, or equipped with an optical path (such as a fiber optic flying lead), so that the photodetector can be several meters away from the port. The monitoring system also has an alarm circuit 70 coupled to the light...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


