Effect of Crosstalk in Optical Component
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Optical networks have emerged as a solution to the rapidly increasing demands. Now, the optical data is transmitted over long distances without the need for O-E-O conversion as the data is directly transferred in the fiber as an optical signal. Crosstalk is the major limitation with all optical networks, which results from the intermixing/leakage of signals routed in optical switches with the desired signal. Optical components such as cross-connectors, routers, and adddrop multiplexers are prone to crosstalk. Crosstalk is divided into two types Linear and Non linear crosstalk. Intra-channel crosstalk results from the crosslink of signals with the same wavelength as the transmitted signal. Furthermore, depending on the phase noise of the signal and interferers, crosstalk can also be classified as coherent and incoherent. Inter-channel crosstalk occurs when the transmitted signal and interferers have different wavelengths. Routing and adding-dropping signals in optical networks are a key factor to get high flexibility and transparency of the system. The effect of crosstalk in optical components is explained in this paper and, in particular optical crosstalk regarding cross connectors and add-drop multiplexer is presented.
Authors and Affiliations
Manisha, Vikas Malik
Effect of Crosstalk in Optical Component
Optical networks have emerged as a solution to the rapidly increasing demands. Now, the optical data is transmitted over long distances without the need for O-E-O conversion as the data is directly transferred in the fi...
Fixed-Mobile Integration: A Next Generation Networking
EPON and WiMAX are two promising broadband access technologies for new-generation wired and wireless access. Their complementary features motivate interest in using EPON as a backhaul to connect multiple dispersed WiMAX...
Thermal Imaging for Facial Expression– Fatigue Detection
Facial expressions play significant roles in our daily communication. Recognizing these expressions has extensive applications, such as human-computer interface, multimedia, and security. However, as the basis of expres...
FTP Based Honeypot Implementation Model for Network Security
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. I...
Analysis on Location Based Nearest Keyword Search
It is common that the objects in a spatial database (e.g., restaurants) are associated with keywords to indicate their businesses/services. An exciting problem known as Closest Keywords search is to query objects, calle...