362 research outputs found

    Joint Probabilistic-Nyquist Pulse Shaping for an LDPC-Coded 8-PAM Signal in DWDM Data Center Communications

    Get PDF
    M-ary pulse-amplitude modulation (PAM) meets the requirements of data center communication because of its simplicity, but coarse entropy granularity cannot meet the dynamic bandwidth demands, and there is a large capacity gap between uniform formats and the Shannon limit. The dense wavelength division multiplexing (DWDM) system is widely used to increase the channel capacity, but low spectral efficiency of the intensity modulation/direct detection (IM/DD) solution restricts the throughput of the modern DWDM data center networks. Probabilistic shaping distribution is a good candidate to offer us a fine entropy granularity and efficiently reduce the gap to the Shannon limit, and Nyquist pulse shaping is widely used to increase the spectral efficiency. We aim toward the joint usage of probabilistic shaping and Nyquist pulse shaping with low-density parity-check (LDPC) coding to improve the bit error rate (BER) performance of 8-PAM signal transmission. We optimized the code rate of the LDPC code and compared different Nyquist pulse shaping parameters using simulations and experiments. We achieved a 0.43 dB gain using Nyquist pulse shaping, and a 1.1 dB gain using probabilistic shaping, while the joint use of probabilistic shaping and Nyquist pulse shaping achieved a 1.27 dB gain, which offers an excellent improvement without upgrading the transceivers.Open access journalThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]

    Secret key distillation across a quantum wiretap channel under restricted eavesdropping

    Full text link
    The theory of quantum cryptography aims to guarantee unconditional information-theoretic security against an omnipotent eavesdropper. In many practical scenarios, however, the assumption of an all-powerful adversary is excessive and can be relaxed considerably. In this paper we study secret key distillation across a lossy and noisy quantum wiretap channel between Alice and Bob, with a separately parameterized realistically lossy quantum channel to the eavesdropper Eve. We show that under such restricted eavesdropping, the key rates achievable can exceed the secret key distillation capacity against an unrestricted eavesdropper in the quantum wiretap channel. Further, we show upper bounds on the key rates based on the relative entropy of entanglement. This simple restricted eavesdropping model is widely applicable, e.g., to free-space quantum optical communication, where realistic collection of light by Eve is limited by the finite size of her optical aperture. Future work will include calculating bounds on the amount of light Eve can collect under various realistic scenarios.Comment: 14 pages, 19 figures. We welcome comments and suggestion
    • …
    corecore