2,469 research outputs found
On the symbol error probability of regular polytopes
An exact expression for the symbol error probability of the four-dimensional
24-cell in Gaussian noise is derived. Corresponding expressions for other
regular convex polytopes are summarized. Numerically stable versions of these
error probabilities are also obtained
Influence of Behavioral Models on Multiuser Channel Capacity
In order to characterize the channel capacity of a wavelength channel in a
wavelength-division multiplexed (WDM) system, statistical models are needed for
the transmitted signals on the other wavelengths. For example, one could assume
that the transmitters for all wavelengths are configured independently of each
other, that they use the same signal power, or that they use the same
modulation format. In this paper, it is shown that these so-called behavioral
models have a profound impact on the single-wavelength achievable information
rate. This is demonstrated by establishing, for the first time, upper and lower
bounds on the maximum achievable rate under various behavioral models, for a
rudimentary WDM channel model
Performance Metrics for Systems with Soft-Decision FEC and Probabilistic Shaping
High-throughput optical communication systems utilize binary soft-decision
forward error correction (SD-FEC) with bit interleaving over the bit channels.
The generalized mutual information (GMI) is an achievable information rate
(AIR) in such systems and is known to be a good predictor of the bit error rate
after SD-FEC decoding (post-FEC BER) for uniform signaling. However, for
probabilistically shaped (nonuniform) signaling, we find that the normalized
AIR, defined as the AIR divided by the signal entropy, is less correlated with
the post-FEC BER. We show that the information quantity based on the
distribution of the single bit signal, and its asymmetric loglikelihood ratio,
are better predictors of the post-FEC BER. In simulations over the Gaussian
channel, we find that the prediction accuracy, quantified as the peak-to-peak
deviation of the post-FEC BER within a set of different modulation formats and
distributions, can be improved more than 10 times compared with the normalized
AIR.Comment: 4 pages, 3 figure
Transmission systems with low noise phase sensitive parametric amplifiers
We review and present the recent research on phase-sensititve amplifiers, and describe how they can be used in transmission systems
Is there a role for frequency combs in long-haul fiber transmission?
We present and discuss the unique benefits with respect to joint signal processing, of using frequency combs instead of independent lasers in long-haul wavelength-division multiplexed systems
Designing Power-Efficient Modulation Formats for Noncoherent Optical Systems
We optimize modulation formats for the additive white Gaussian noise channel
with a nonnegative input constraint, also known as the intensity-modulated
direct detection channel, with and without confining them to a lattice
structure. Our optimization criteria are the average electrical and optical
power. The nonnegativity input signal constraint is translated into a conical
constraint in signal space, and modulation formats are designed by sphere
packing inside this cone. Some remarkably dense packings are found, which yield
more power-efficient modulation formats than previously known. For example, at
a spectral efficiency of 1 bit/s/Hz, the obtained modulation format offers a
0.86 dB average electrical power gain and 0.43 dB average optical power gain
over the previously best known modulation formats to achieve a symbol error
rate of 10^-6. This modulation turns out to have a lattice-based structure. At
a spectral efficiency of 3/2 bits/s/Hz and to achieve a symbol error rate of
10^-6, the modulation format obtained for optimizing the average electrical
power offers a 0.58 dB average electrical power gain over the best
lattice-based modulation and 2.55 dB gain over the best previously known
format. However, the modulation format optimized for average optical power
offers a 0.46 dB average optical power gain over the best lattice-based
modulation and 1.35 dB gain over the best previously known format.Comment: Submitted to Globecom 201
Capacity of a Nonlinear Optical Channel with Finite Memory
The channel capacity of a nonlinear, dispersive fiber-optic link is
revisited. To this end, the popular Gaussian noise (GN) model is extended with
a parameter to account for the finite memory of realistic fiber channels. This
finite-memory model is harder to analyze mathematically but, in contrast to
previous models, it is valid also for nonstationary or heavy-tailed input
signals. For uncoded transmission and standard modulation formats, the new
model gives the same results as the regular GN model when the memory of the
channel is about 10 symbols or more. These results confirm previous results
that the GN model is accurate for uncoded transmission. However, when coding is
considered, the results obtained using the finite-memory model are very
different from those obtained by previous models, even when the channel memory
is large. In particular, the peaky behavior of the channel capacity, which has
been reported for numerous nonlinear channel models, appears to be an artifact
of applying models derived for independent input in a coded (i.e., dependent)
scenario
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
- …