Design And Analysis of Transceiver Using Co-Operative Diversity to Reduce Fading Over FSO Links
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
In this paper, To combat against the atmospheric turbulence induced fading over FSO link a spatial diversity technique is used to design the transceiver. Cooperative diversity is proposed and analyzed in noncoherent FSO communications with intensity modulation and direct detection (IM/DD). The error performance is derived in semi analytical and closed form expressions in the presence and absence of background radiation respectively. Performance analysis is carried out in the four strategies over both Rayleigh and lognormal fading models. This analysis may recommend the usage of the FSO links in the higher layers. After depth analysis, a technique is adopted from the possible solutions to mitigate building sway and atmospheric effects at the network layer.
Authors and Affiliations
R. Somasundaram*
Cloud Computing: Threats and Security Issues
assigned over the internet by on-demand and pay on utilization basics. Most organizations are not willing to accept the cloud computing concept due to some security issues, even though some potential gain is there in cl...
CONDITION MONITORING AND DYNAMIC BALANCING OF A HOT AIR CIRCULATION BLOWER BY VIBRATION TOOL
Over the years machinery health management has become vital part of the plant operation. Earlier day’s machinery maintenance is only focused on reactive maintenance. In later stages, Vibration Monitoring is a crit...
WEB SERVICE DISCOVERY USING FUNCTIONAL LEVEL SERVICE CATEGORIZATION APPROACH
The Web services set of standards is aimed at facilitating and improving the quality of component-based applications on the web. Web services have become a new wave of Internet technology development. A vast major...
Improve Virtualization Technique Using Packet Aggregation Mechanism
Virtualization is a key technology for cloud based data centers to implement the vision of infrastructure as a service (IaaS) and to promote effective server consolidation and application consolidation. A new meth...
A Study to Find Attacks using Restrictive Fields in Networks
Attacks Recognition countenances numerous challenges. An attack recognition system should dependably recognize spiteful tricks within a network or net setups and should carry out operations proficiently to cope up...