53,865 research outputs found

    On the Use of Factor Graphs in Optical Communications

    Get PDF
    Factor graphs and message passing allow the near-automated development of algorithms in many engineering disciplines, including digital communications. This paper gives an overview of their possible use in optical communications

    Backward particle message passing

    Get PDF
    Particle methods are an established way to represent messages and perform message passing in factor graphs. Despite their common use, there are several cases for which messages are hard to compute, even in linear models. Building on results from Gaussian message passing, we demonstrate how backward particle-based messages can be computed and describe a practical application in the context of fiber-optical communications

    Placing regenerators in optical networks to satisfy multiple sets of requests.

    Get PDF
    The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, regenerators must be placed in such a way that in any lightpath there are no more than d hops without meeting a regenerator. While most of the research has focused on heuristics and simulations, the first theoretical study of the problem has been recently provided in [10], where the considered cost function is the number of locations in the network hosting regenerators. Nevertheless, in many situations a more accurate estimation of the real cost of the network is given by the total number of regenerators placed at the nodes, and this is the cost function we consider. Furthermore, in our model we assume that we are given a finite set of p possible traffic patterns (each given by a set of lightpaths), and our objective is to place the minimum number of regenerators at the nodes so that each of the traffic patterns is satisfied. While this problem can be easily solved when d = 1 or p = 1, we prove that for any fixed d,p ≥ 2 it does not admit a PTASUnknown control sequence '\textsc', even if G has maximum degree at most 3 and the lightpaths have length O(d)(d). We complement this hardness result with a constant-factor approximation algorithm with ratio ln (d ·p). We then study the case where G is a path, proving that the problem is NP-hard for any d,p ≥ 2, even if there are two edges of the path such that any lightpath uses at least one of them. Interestingly, we show that the problem is polynomial-time solvable in paths when all the lightpaths share the first edge of the path, as well as when the number of lightpaths sharing an edge is bounded. Finally, we generalize our model in two natural directions, which allows us to capture the model of [10] as a particular case, and we settle some questions that were left open in [10]

    Improvement of indoor VLC network downlink scheduling and resource allocation

    Get PDF
    Indoor visible light communications (VLC) combines illumination and communication by utilizing the high-modulation-speed of LEDs. VLC is anticipated to be complementary to radio frequency communications and an important part of next generation heterogeneous networks. In order to make the maximum use of VLC technology in a networking environment, we need to expand existing research from studies of traditional point-to-point links to encompass scheduling and resource allocation related to multi-user scenarios. This work aims to maximize the downlink throughput of an indoor VLC network, while taking both user fairness and time latency into consideration. Inter-user interference is eliminated by appropriately allocating LEDs to users with the aid of graph theory. A three-term priority factor model is derived and is shown to improve the throughput performance of the network scheduling scheme over those previously reported. Simulations of VLC downlink scheduling have been performed under proportional fairness scheduling principles where our newly formulated priority factor model has been applied. The downlink throughput is improved by 19.6% compared to previous two-term priority models, while achieving similar fairness and latency performance. When the number of users grows larger, the three-term priority model indicates an improvement in Fairness performance compared to two-term priority model scheduling

    Stochastic Digital Backpropagation with Residual Memory Compensation

    Full text link
    Stochastic digital backpropagation (SDBP) is an extension of digital backpropagation (DBP) and is based on the maximum a posteriori principle. SDBP takes into account noise from the optical amplifiers in addition to handling deterministic linear and nonlinear impairments. The decisions in SDBP are taken on a symbol-by-symbol (SBS) basis, ignoring any residual memory, which may be present due to non-optimal processing in SDBP. In this paper, we extend SDBP to account for memory between symbols. In particular, two different methods are proposed: a Viterbi algorithm (VA) and a decision directed approach. Symbol error rate (SER) for memory-based SDBP is significantly lower than the previously proposed SBS-SDBP. For inline dispersion-managed links, the VA-SDBP has up to 10 and 14 times lower SER than DBP for QPSK and 16-QAM, respectively.Comment: 7 pages, accepted to publication in 'Journal of Lightwave Technology (JLT)

    Ultra-sharp soliton switching in a directional coupler

    Get PDF
    By a numerical investigation it is shown that a directional coupler, described by two linearly coupled non-linear Schro¨dinger equations, can be used to construct a soliton switch with an extremely narrow transition region

    The edge-disjoint path problem on random graphs by message-passing

    Get PDF
    We present a message-passing algorithm to solve the edge disjoint path problem (EDP) on graphs incorporating under a unique framework both traffic optimization and path length minimization. The min-sum equations for this problem present an exponential computational cost in the number of paths. To overcome this obstacle we propose an efficient implementation by mapping the equations onto a weighted combinatorial matching problem over an auxiliary graph. We perform extensive numerical simulations on random graphs of various types to test the performance both in terms of path length minimization and maximization of the number of accommodated paths. In addition, we test the performance on benchmark instances on various graphs by comparison with state-of-the-art algorithms and results found in the literature. Our message-passing algorithm always outperforms the others in terms of the number of accommodated paths when considering non trivial instances (otherwise it gives the same trivial results). Remarkably, the largest improvement in performance with respect to the other methods employed is found in the case of benchmarks with meshes, where the validity hypothesis behind message-passing is expected to worsen. In these cases, even though the exact message-passing equations do not converge, by introducing a reinforcement parameter to force convergence towards a sub optimal solution, we were able to always outperform the other algorithms with a peak of 27% performance improvement in terms of accommodated paths. On random graphs, we numerically observe two separated regimes: one in which all paths can be accommodated and one in which this is not possible. We also investigate the behaviour of both the number of paths to be accommodated and their minimum total length.Comment: 14 pages, 8 figure

    Free-space optical communication employing subcarrier modulation and spatial diversity in atmospheric turbulence channel

    Get PDF
    An expression for the bit error rate of a multiple subcarrier intensity-modulated atmospheric optical communication system employing spatial diversity is derived. Spatial diversity is used to mitigate scintillation caused by atmospheric turbulence, which is assumed to obey lognormal distribution. Optimal but complex maximum ratio, equal gain combining (EGC) and relatively simple selection combining spatial diversity techniques in a clear atmosphere are considered. Each subcarrier is modulated using binary phase shift keying. Laser irradiance is subsequently modulated by a subcarrier signal, and a direct detection PIN receiver is employed (i.e. intensity modulation/direction detection). At a subcarrier level, coherent demodulation is used to extract the transmitted data/information. The performance of on–off-keying is also presented and compared with the subcarrier intensity modulation under the same atmospheric conditions
    • …
    corecore