Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Optical Communication Theory and Techniques

Buy
Since the advent of optical communications, a great technological effort has
been devoted to the exploitation of the huge bandwidth of optical fibers. Starting
from a few Mb/s single channel systems, a fast and constant technological
development has led to the actual 10 Gb/s per channel dense wavelength division
multiplexing (DWDM) systems, with dozens of channels on a single
fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds
of channels can be simultaneously amplified by optical amplifiers.

Nevertheless, despite such a pace in technological progress, optical communications
are still in a primitive stage if compared, for instance, to radio
communications: the widely spread on-off keying (OOK) modulation format
is equivalent to the rough amplitude modulation (AM) format, whereas the
DWDM technique is nothing more than the optical version of the frequency division
multiplexing (FDM) technique. Moreover, adaptive equalization, channel
coding or maximum likelihood detection are still considered something
“exotic” in the optical world. This is mainly due to the favourable characteristics
of the fiber optic channel (large bandwidth, low attenuation, channel
stability, ...), which so far allowed us to use very simple transmission and
detection techniques.

But now we are slightly moving toward the physical limits of the fiber and,
as it was the case for radio communications, more sophisticated techniques
will be needed to increase the spectral efficiency and counteract the transmission
impairments. At the same time, the evolution of the techniques should be
supported, or better preceded, by an analogous evolution of the theory. Looking
at the literature, contradictions are not unlikely to be found among different
theoretical works, and a lack of standards and common theoretical basis can be
observed. As an example, the performance of an optical system is often given
in terms of different, and sometimes misleading, figures of merit, such as the
error probability, the Q-factor, the eye-opening and so on. Under very strict hypotheses,
there is a sort of equivalence among these figures of merit, but things
drastically change when nonlinear effects are present or different modulation
formats considered.
(HTML tags aren't allowed.)

Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Turbo Pascal for Windows Bible/Disk
Turbo Pascal for Windows Bible/Disk

Welcome to Turbo Pascal for Windows Bible, a b o o k that will clear many of the mysteries of Windows programming in Turbo Pascal for Windows style. Windows programming is difficult, but Turbo Pascal for Windows makes the difficulty manageable. In fact, developing Windows applications with Turbo Pascal for Windows is much more fun once y o u...

Learning RStudio for R Statistical Computing
Learning RStudio for R Statistical Computing

If you need to create and manage complex statistical analysis projects, this book could be a catalyst for great things. In clear, practical chapters it teaches you how to employ Rstudio's powerful features to perform R statistical computing.

Overview

  • A complete practical tutorial for RStudio, designed...

Introduction to Discrete Event Systems
Introduction to Discrete Event Systems
As its title suggests, this book is about a special class of systems which in recent decades have become an integral part of our world. Before getting into the details of this particular class of systems, it is reasonable to start out by simply describing what we mean by a “system”, and by presenting the fundamental concepts associated...
Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

Cryptography Demystified
Cryptography Demystified

Works through 35 cryptography modules supported by exercises and answers

This first part comprises thirteen modules. These modules will  familiarize you with some of the important terms and concepts of  cryptography in general and symmetric of one-key cryptography in specific. Symmetric cryptography is the
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy