Wavelength Division Multiplexing Optical Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 10
Abstract
Optical wavelength division multiplexing technology has been deployed at a very rapid rate. In this paper technical review of wavelength division multiplexing (WDM) transmission technique i.e. along with the latest development trends on WDM optical networks is given. Recent trends in WDM optical networks along with the challenges and limitations of the WDM architectures have also been discussed.
Authors and Affiliations
Anuradha Bhasin, Monika Kaushik, Usha Sharma
A Surveillance of Clustering Multi Represented Objects
Recent technological advances have tremendously increased the amount of collected data. Besides the total amount of collected information, the complexity of data objects increases as well. With the growing amount of dat...
Mining Twitter Data of Rural Area Engineering Colleges for Understanding Issues and Problems in Their Educational Experiences
Students’ informal conversations on social media such as Twitter are useful for understand their learning experiences, and feelings. Data from such social media environments can provide valuable information about studen...
Level Based Optimized Workflow Scheduling In Cloud Environment
Cloud computing is a rapidly growing area offering utility-oriented IT services to the users worldwide over the internet. In cloud, service providers managed and provided resources to users. Software or hardware can be...
Adaptive Noise Canceller
Adaptive Noise Cancellation is an alternative technique of estimating signals corrupted by additive noise or interference. Its advantages lies in that, with no prior estimates of signal or noise, levels of noise rejecti...
A Review on Security of Data Using PGP Algorithm along with Steganography
Now a day due to rapid increase in number of internet user’s data security is one of the prime concerns of internetwork communication. Several techniques have been evolved to prevent data from unauthorized access. Two f...