Effect of Optical Pulse Shape on the Performance of OCDMA in Presence of GVD and Pulse Linear Chirp
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
In this paper, the effect of optical pulse shape on the performance of direct sequence optical code division multiple access in presence of fiber group velocity dispersion (GVD) and pulse linear chirp is analyzed. In our analysis, chirp-Gaussian shape and chirp-Hyperbolic-Secant shape optical orthogonal codes are employed as address sequence. Avalanche photodiode (APD) is used in an optical correlator receiver. The signal to noise power for the proposed system is evaluated on account of APD short noise, bulk dark current, surface leakage current, thermal noise current, and multiuser access nterference oises. The system BER performance is etermined as a unction of received signal power, number of imultaneous sers, fiber length, pulse linear chirp, and pulse-shape. The power penalty suffered by the system is evaluated at BER of 10-9. The numerical results show that the BER performance of the roposed system is highly dependent on the number of imultaneous user, fiber length, pulse linear chirp, and pulse- hape. It is found that, if the effect of GVD is considered, the proposed system rformance i.e., BER is degraded. The BER performance of the proposed system also aggravated due to presence of pulse linear chirp. It is also found that the proposed system suffers minimum enalty when chirp-Hyperbolic-Secant shape optical pulse is used nstead of chirp-Gaussian shape pulse.
Authors and Affiliations
Md. Jahedul Islam , Kalyan Kumar Halder , Md. Rafiqul Islam
Human Gait Recognition Using Bezier Curves
Gait recognition refers to automatic identification of an individual based on the style of walking. It is a new biometrics recognition technology. It has accomplished a series of achievements in scientific research in re...
Enhanced Matrix Model for Finding Sequence Motif
This paper presents a probabilistic approach to locate motifs in a given set of molecular sequences. Motif is a short sequence of DNA or RNA (or amino acids) which often consists of 5- 16 nucleotides. The methodology pre...
A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems
Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws enco...
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...
Detection of threats in Honeynet using Honeywall
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subjec...