Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6488019
Vineeth Bala Sukumaran, U. Mukherji
We consider a discrete time system with packets arriving randomly at rate λ per slot to a fading point-to-point link, for which the transmitter can control the number of packets served in a slot by varying the transmit power. We provide an asymptotic characterization of the minimum average delay of the packets, when average transmitter power is a small positive quantity V more than the minimum average power required for queue stability. We show that the minimum average delay will grow either as log(1/V ) or 1/V when V ↓ 0, for certain sets of values of λ. These sets are determined by the distribution of fading gain, the maximum number of packets which can be transmitted in a slot, and the assumed transmit power function, as a function of the fading gain and the number of packets transmitted. We identify a case where the above behaviour of the tradeoff differs from that obtained from a previously considered model, in which the random queue length process is assumed to evolve on the non-negative real line.
{"title":"Tradeoff of average power and average delay for a point-to-point link with fading","authors":"Vineeth Bala Sukumaran, U. Mukherji","doi":"10.1109/NCC.2013.6488019","DOIUrl":"https://doi.org/10.1109/NCC.2013.6488019","url":null,"abstract":"We consider a discrete time system with packets arriving randomly at rate λ per slot to a fading point-to-point link, for which the transmitter can control the number of packets served in a slot by varying the transmit power. We provide an asymptotic characterization of the minimum average delay of the packets, when average transmitter power is a small positive quantity V more than the minimum average power required for queue stability. We show that the minimum average delay will grow either as log(1/V ) or 1/V when V ↓ 0, for certain sets of values of λ. These sets are determined by the distribution of fading gain, the maximum number of packets which can be transmitted in a slot, and the assumed transmit power function, as a function of the fading gain and the number of packets transmitted. We identify a case where the above behaviour of the tradeoff differs from that obtained from a previously considered model, in which the random queue length process is assumed to evolve on the non-negative real line.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487921
Sanghun Lee, Sunhwan Jang, C. Nguyen
A new ½ dual-injection locked frequency divider (dual-ILFD) with wide locking range and low-power consumption is proposed and developed together with a divide-by-2 current mode logic (CML) divider. ½ CML divider is connected at the output of ½ dual-ILFD for achieving constant output amplitude. The chip was fabricated using a 0.18-µm BiCMOS process. The ½ dual-ILFD enhances the locking range with low-power consumption through optimized load quality factor (QL) and output current amplitude (iOSC) simultaneously, achieving a locking range of 692 MHz between 7.512 and 8.204 GHz, which is almost 10 times larger than a single-injection counterpart. The core of ½ dual-ILFD consumes 2.93 mA with 1.5 V supply.
{"title":"Dual-injection-locked ½ divider with optimized VCO loaded Q and current","authors":"Sanghun Lee, Sunhwan Jang, C. Nguyen","doi":"10.1109/NCC.2013.6487921","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487921","url":null,"abstract":"A new ½ dual-injection locked frequency divider (dual-ILFD) with wide locking range and low-power consumption is proposed and developed together with a divide-by-2 current mode logic (CML) divider. ½ CML divider is connected at the output of ½ dual-ILFD for achieving constant output amplitude. The chip was fabricated using a 0.18-µm BiCMOS process. The ½ dual-ILFD enhances the locking range with low-power consumption through optimized load quality factor (QL) and output current amplitude (iOSC) simultaneously, achieving a locking range of 692 MHz between 7.512 and 8.204 GHz, which is almost 10 times larger than a single-injection counterpart. The core of ½ dual-ILFD consumes 2.93 mA with 1.5 V supply.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"40 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487925
S. Srinu, S. L. Sabat, S. Udgata
Spectrum sensing is a vital phase in Cognitive Radio (CR) to identify the unutilized spectrum for improving the spectrum utilization. Cooperative sensing is being used for spectrum sensing to mitigate the effect of shadowing and fading in the channel. In cooperative sensing, the channels to be sensed by cognitive users are assumed to be noisy. Moreover, channel noise is also presents in between CR users and fusion center which reduces the cooperative sensing detection accuracy. In this paper, we studied the effect of noise in the control channel on detection probability and used forward error correction technique with convolutional encoder to mitigate the effect of control channel noise. Energy detection based on Neyman-Pearson criteria is used in each CR and sensing performance is analyzed using Monte-Carlo methods. The simulations are carried out with different signal-to-noise ratio (SNR) in the control channel with and without convolutional coding. The results reveal that the detection probability of the algorithm improves significantly with convolutional coding.
{"title":"Cooperative spectrum sensing under noisy control channel for Cognitive Radio Network","authors":"S. Srinu, S. L. Sabat, S. Udgata","doi":"10.1109/NCC.2013.6487925","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487925","url":null,"abstract":"Spectrum sensing is a vital phase in Cognitive Radio (CR) to identify the unutilized spectrum for improving the spectrum utilization. Cooperative sensing is being used for spectrum sensing to mitigate the effect of shadowing and fading in the channel. In cooperative sensing, the channels to be sensed by cognitive users are assumed to be noisy. Moreover, channel noise is also presents in between CR users and fusion center which reduces the cooperative sensing detection accuracy. In this paper, we studied the effect of noise in the control channel on detection probability and used forward error correction technique with convolutional encoder to mitigate the effect of control channel noise. Energy detection based on Neyman-Pearson criteria is used in each CR and sensing performance is analyzed using Monte-Carlo methods. The simulations are carried out with different signal-to-noise ratio (SNR) in the control channel with and without convolutional coding. The results reveal that the detection probability of the algorithm improves significantly with convolutional coding.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122349332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487959
P. Sharma, P. Garg
In this paper we analyze the outage behavior of a dual hop cooperative system where the relay is equipped with full duplex relaying (FDR) capabilities that means a relay can simultaneously receive and transmit unlike half duplex relaying (HDR), where the relay cannot receive and transmit simultaneously. We consider, in this analysis, that the reception at destination via any channel other than source-relay-destination is an interference. The interference between the receiving and transmitting antennas at the relay is also taken into account. At relay, the signal received from source is first decoded and then forwarded to destination.We derive the closed form expressions for outage probability considering flat, non-identical and independent Nakagami-m fading channels for both FDR and HDR. The comparison of outage performances reveals that FDR stands better than HDR for lower values of signal-to-noise ratio(SNR).
{"title":"Outage analysis of full duplex decode and forward relaying over Nakagami-m channels","authors":"P. Sharma, P. Garg","doi":"10.1109/NCC.2013.6487959","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487959","url":null,"abstract":"In this paper we analyze the outage behavior of a dual hop cooperative system where the relay is equipped with full duplex relaying (FDR) capabilities that means a relay can simultaneously receive and transmit unlike half duplex relaying (HDR), where the relay cannot receive and transmit simultaneously. We consider, in this analysis, that the reception at destination via any channel other than source-relay-destination is an interference. The interference between the receiving and transmitting antennas at the relay is also taken into account. At relay, the signal received from source is first decoded and then forwarded to destination.We derive the closed form expressions for outage probability considering flat, non-identical and independent Nakagami-m fading channels for both FDR and HDR. The comparison of outage performances reveals that FDR stands better than HDR for lower values of signal-to-noise ratio(SNR).","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487996
R. K, G. Pradhan, S. Prasanna
This work analyzes the glottal signals recorded from different speakers for speaker information and describes some speaker specific cues. The glottal activity (GA) regions are detected by exploiting the strength of excitation and periodic nature of glottal signal. The identified GA regions are further processed to segment into nearly periodic smaller segments by detecting peaks in individual glottal cycles and using them as anchor points. The periodic segments are further divided into four smallest segments by considering the peaks and zero crossings. The speaker information present at the GA region, periodic segment and the four smallest segments are analyzed and illustrated. From the experimental studies the speaker information manifested at the four smallest segments show less intra speaker variability and more inter speaker variability. The four smallest segments of the periodic segments are therefore proposed as the speaker specific cues for the development of speaker recognition systems.
{"title":"Analysis of glottal signals for speaker information","authors":"R. K, G. Pradhan, S. Prasanna","doi":"10.1109/NCC.2013.6487996","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487996","url":null,"abstract":"This work analyzes the glottal signals recorded from different speakers for speaker information and describes some speaker specific cues. The glottal activity (GA) regions are detected by exploiting the strength of excitation and periodic nature of glottal signal. The identified GA regions are further processed to segment into nearly periodic smaller segments by detecting peaks in individual glottal cycles and using them as anchor points. The periodic segments are further divided into four smallest segments by considering the peaks and zero crossings. The speaker information present at the GA region, periodic segment and the four smallest segments are analyzed and illustrated. From the experimental studies the speaker information manifested at the four smallest segments show less intra speaker variability and more inter speaker variability. The four smallest segments of the periodic segments are therefore proposed as the speaker specific cues for the development of speaker recognition systems.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487962
A. Sinha, Mohit Agarwal, A. Chaturvedi
In previous research works, it was established that the post-processing signal-to-interference-and-noise ratio (SINR) distribution of MMSE (Minimum Mean Square Error) detector shows the potential of high reliability in the high-SINR detected symbols. In this paper, a new algorithm with reduced complexity is proposed exploiting the fact that reliability of MMSE estimated symbols increases with increase in post-processing SINR. For high SINR region, MMSE estimated symbols are retained as the final decisions and the remaining symbols are grouped into different regions based on the SINR. Based on the group in which the symbols lie, we restrict the search space and feed it into SD (Sphere Decoder). A SD-SE (Schnorr-Euchner) implementation of SD algorithm is used for comparison of results.
在以往的研究工作中,MMSE (Minimum Mean Square Error,最小均方误差)检测器的后处理信噪比(SINR)分布在高信噪比检测符号中显示出高可靠性的潜力。本文利用MMSE估计符号的可靠性随后处理信噪比的增加而增加的特点,提出了一种降低复杂度的新算法。对于高信噪比区域,保留MMSE估计符号作为最终决策,剩余符号根据信噪比分组到不同区域。根据符号所在的群限制搜索空间,并将其输入到球形解码器(SD)中。SD算法的SD- se (Schnorr-Euchner)实现用于结果比较。
{"title":"Multi-level SINR thresholding for reduced complexity MIMO detection","authors":"A. Sinha, Mohit Agarwal, A. Chaturvedi","doi":"10.1109/NCC.2013.6487962","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487962","url":null,"abstract":"In previous research works, it was established that the post-processing signal-to-interference-and-noise ratio (SINR) distribution of MMSE (Minimum Mean Square Error) detector shows the potential of high reliability in the high-SINR detected symbols. In this paper, a new algorithm with reduced complexity is proposed exploiting the fact that reliability of MMSE estimated symbols increases with increase in post-processing SINR. For high SINR region, MMSE estimated symbols are retained as the final decisions and the remaining symbols are grouped into different regions based on the SINR. Based on the group in which the symbols lie, we restrict the search space and feed it into SD (Sphere Decoder). A SD-SE (Schnorr-Euchner) implementation of SD algorithm is used for comparison of results.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6488046
P. Wadhwa, M. Bhatia
The increasing complexity and emergence of Web 2.0 applications have paved way for threats arising out of the use of social networks by cyber extremists (Radical groups). Radicalization (also called cyber extremism and cyber hate propaganda) is a growing concern to the society and also of great pertinence to governments & law enforcement agencies all across the world. Further, the dynamism of these groups adds another level of complexity in the domain, as with time, one may witness a change in members of the group and hence has motivated many researchers towards this field. This proposal presents an investigative data mining approach for detecting the dynamic behavior of these radical groups in online social networks by textual analysis of the messages posted by the members of these groups along with the application of techniques used in social network analysis. Some of the preliminary results obtained through partial implementation of the approach are also discussed.
Web 2.0应用程序的日益复杂和出现为网络极端分子(激进组织)使用社交网络所产生的威胁铺平了道路。激进化(也被称为网络极端主义和网络仇恨宣传)是一个日益受到社会关注的问题,也是世界各国政府和执法机构的重要关注点。此外,这些群体的活力增加了该领域的另一个层次的复杂性,随着时间的推移,人们可能会看到群体成员的变化,因此激励了许多研究人员进入这个领域。本提案提出了一种调查性数据挖掘方法,通过对这些团体成员发布的消息进行文本分析,以及在社交网络分析中使用的技术的应用,来检测在线社交网络中这些激进团体的动态行为。本文还讨论了通过部分实施该方法所获得的一些初步结果。
{"title":"Tracking on-line radicalization using investigative data mining","authors":"P. Wadhwa, M. Bhatia","doi":"10.1109/NCC.2013.6488046","DOIUrl":"https://doi.org/10.1109/NCC.2013.6488046","url":null,"abstract":"The increasing complexity and emergence of Web 2.0 applications have paved way for threats arising out of the use of social networks by cyber extremists (Radical groups). Radicalization (also called cyber extremism and cyber hate propaganda) is a growing concern to the society and also of great pertinence to governments & law enforcement agencies all across the world. Further, the dynamism of these groups adds another level of complexity in the domain, as with time, one may witness a change in members of the group and hence has motivated many researchers towards this field. This proposal presents an investigative data mining approach for detecting the dynamic behavior of these radical groups in online social networks by textual analysis of the messages posted by the members of these groups along with the application of techniques used in social network analysis. Some of the preliminary results obtained through partial implementation of the approach are also discussed.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487916
A. Goel, M. Agrawal
ICI conjugate cancellation scheme proposed by Yeh et al. is the simplest scheme to mitigate the effect of intercarrier interference (ICI), but its carrier to interference ratio (CIR) performance at high carrier frequency offset (CFO) is worse than conventional OFDM system. Its CIR performance at high CFO can be improved by using phase rotated conjugate cancellation (PRCC) scheme, but it requires CFO estimation. In this paper we have proposed an optimal data combining scheme for ICI conjugate cancellation scheme to improve its performance at high CFO. In order to eliminate the requirement of CFO estimation, we have proposed a suboptimal approach for data combining. The proposed scheme is based on CIR optimization using Golden selection search algorithm and a novel approach to find the suboptimal values of weighting coefficients used at the receiver for data combing. The proposed scheme provides better CIR and BER performances in comparison to conventional ICI conjugate cancellation scheme.
{"title":"Data combining scheme for ICI conjugate cancellation scheme in OFDM systems","authors":"A. Goel, M. Agrawal","doi":"10.1109/NCC.2013.6487916","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487916","url":null,"abstract":"ICI conjugate cancellation scheme proposed by Yeh et al. is the simplest scheme to mitigate the effect of intercarrier interference (ICI), but its carrier to interference ratio (CIR) performance at high carrier frequency offset (CFO) is worse than conventional OFDM system. Its CIR performance at high CFO can be improved by using phase rotated conjugate cancellation (PRCC) scheme, but it requires CFO estimation. In this paper we have proposed an optimal data combining scheme for ICI conjugate cancellation scheme to improve its performance at high CFO. In order to eliminate the requirement of CFO estimation, we have proposed a suboptimal approach for data combining. The proposed scheme is based on CIR optimization using Golden selection search algorithm and a novel approach to find the suboptimal values of weighting coefficients used at the receiver for data combing. The proposed scheme provides better CIR and BER performances in comparison to conventional ICI conjugate cancellation scheme.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116014978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6488009
Bandita Sarma, Kapil Mehrotra, R. Krishna Naik, S. Prasanna, S. Belhe, C. Mahanta
This work describes the development of Assamese online numeral recognition system using Hidden Markov Models (HMM) and Support Vector Machines (SVM). Preprocessed (x, y) coordinates and their first and second derivatives at each point are used as features for both the modeling techniques. The two systems are developed individually using HMM and SVM. The results from both the systems are then combined using two different approaches. In the first approach, the scores from both the classifiers are directly merged and an improvement in performance is observed in the combined system (Comb - 1). In the second approach, the confusion patterns from HMM and SVM classifiers are also analyzed. Based on this, the results are further combined to obtain a final hybrid numeral recognizer with an enhanced performance (Comb - 2). The HMM, SVM, Comb-1 and Comb-2 systems provide average recognition performance of 96.5, 96.8, 98 and 98.3, respectively.
{"title":"Handwritten Assamese numeral recognizer using HMM & SVM classifiers","authors":"Bandita Sarma, Kapil Mehrotra, R. Krishna Naik, S. Prasanna, S. Belhe, C. Mahanta","doi":"10.1109/NCC.2013.6488009","DOIUrl":"https://doi.org/10.1109/NCC.2013.6488009","url":null,"abstract":"This work describes the development of Assamese online numeral recognition system using Hidden Markov Models (HMM) and Support Vector Machines (SVM). Preprocessed (x, y) coordinates and their first and second derivatives at each point are used as features for both the modeling techniques. The two systems are developed individually using HMM and SVM. The results from both the systems are then combined using two different approaches. In the first approach, the scores from both the classifiers are directly merged and an improvement in performance is observed in the combined system (Comb - 1). In the second approach, the confusion patterns from HMM and SVM classifiers are also analyzed. Based on this, the results are further combined to obtain a final hybrid numeral recognizer with an enhanced performance (Comb - 2). The HMM, SVM, Comb-1 and Comb-2 systems provide average recognition performance of 96.5, 96.8, 98 and 98.3, respectively.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132490973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-28DOI: 10.1109/NCC.2013.6487945
G. Mishra, G. Das, Anirban Kanungoe
With the advent of fiber-to-the home (FTTH), fiber-to-the-curb (FTTC) and fiber-to-the-building (FTTB) as part of a access network solutions in recent times, the network service providers have started deploying tree based passive optical networks (PONs). However these PONs might not be enough to satisfy the need of scalability and the survivability of the network. In this paper, we propose the use of “Variable Optical Power Splitter” (VOPS) in the Remote Node of a ring based EPON. The transmitted power entering this passive VOPS can be adjusted depending on the distance from an optical line terminal and the number of users required at a particular remote node which ensures the ease of scalability of the network. On the other hand, the ring architecture provides extra protection to enhance the overall survivability of the network. Finally, we provide a detailed calculation of the network availability for the proposed network while maintaining the user data delivery quality in terms of BER as well as the power budget.
{"title":"The architecture of a ring based TDM PON to improve survivability and robustness","authors":"G. Mishra, G. Das, Anirban Kanungoe","doi":"10.1109/NCC.2013.6487945","DOIUrl":"https://doi.org/10.1109/NCC.2013.6487945","url":null,"abstract":"With the advent of fiber-to-the home (FTTH), fiber-to-the-curb (FTTC) and fiber-to-the-building (FTTB) as part of a access network solutions in recent times, the network service providers have started deploying tree based passive optical networks (PONs). However these PONs might not be enough to satisfy the need of scalability and the survivability of the network. In this paper, we propose the use of “Variable Optical Power Splitter” (VOPS) in the Remote Node of a ring based EPON. The transmitted power entering this passive VOPS can be adjusted depending on the distance from an optical line terminal and the number of users required at a particular remote node which ensures the ease of scalability of the network. On the other hand, the ring architecture provides extra protection to enhance the overall survivability of the network. Finally, we provide a detailed calculation of the network availability for the proposed network while maintaining the user data delivery quality in terms of BER as well as the power budget.","PeriodicalId":202526,"journal":{"name":"2013 National Conference on Communications (NCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}