commit | ff35fb3bc5cf942db95e64bc0eeb57724602aded | [log] [tgz] |
---|---|---|
author | Nikolay Titov <nikolay.titov@nokia.com> | Sun Sep 24 13:33:29 2017 -0400 |
committer | Sergio Slobodrian <sslobodr@ciena.com> | Thu Sep 28 09:11:41 2017 -0700 |
tree | 9f8f4e69c9ed853360d478b48d32f3bd4749cf59 | |
parent | db61c6ac7bd8e8d734bdeaa03e0365c5100d8434 [diff] |
VOL-465: Creation of duplicate OLT devices based on address information should not be allowed. Creation of duplicated OLT devices identified based on address information (e.g. MAC, IPv4, IPv6, Host-Port) must be prevented and command creating the duplicate OLT device must be rejected. For example, running two following commands in CLI for creation of ponsim OLT with Host-Port address information: preprovision_olt -t ponsim_olt -H 172.17.0.1:50060 preprovision_olt -t ponsim_olt -H 172.17.0.1:50060 The second command must be rejected and should not create second OLT device. Change-Id: I0ce9fc12a95607bf2e1c4f27c55ace6806481100
Voltha aims to provide a layer of abstraction on top of legacy and next generation access network equipment for the purpose of control and management. Its initial focus is on PON (GPON, EPON, NG PON 2), but it aims to go beyond to eventually cover other access technologies (xDSL, Docsis, G.FAST, dedicated Ethernet, fixed wireless).
Key concepts of Voltha:
Control and management in the access network space is a mess. Each access technology brings its own bag of protocols, and on top of that vendors have their own interpretation/extension of the same standards. Compounding the problem is that these vendor- and technology specific differences ooze way up into the centralized OSS systems of the service provider, creating a lot of inefficiencies.
Ideally, all vendor equipment for the same access technology should provide an identical interface for control and management. Moreover, there shall be much higher synergies across technologies. While we wait for vendors to unite, Voltha provides an increment to that direction, by confining the differences to the locality of access and hiding them from the upper layers of the OSS stack.
While we are still at the early phase of development, you can check out the BUILD.md file to see how you can build it, run it, test it, etc.
Contributions, small and large, are welcome. Minor contributions and bug fixes are always welcome in form of pull requests. For larger work, the best is to check in with the existing developers to see where help is most needed and to make sure your solution is compatible with the general philosophy of Voltha.