2018
DOI: 10.1364/ao.57.001562
|View full text |Cite
|
Sign up to set email alerts
|

Multifunctional all-optical signal processing scheme for wavelength-division-multiplexing multicast, wavelength conversion, format conversion, and all-optical encryption using hybrid modulation format exclusive-OR gates based on four-wave mixing in highly nonlinear fiber

Abstract: A multifunctional optical signal processing scheme for 10-Gbaud quadrature phase shift keying (QPSK) and binary phase shift keying (BPSK) signals based on four-wave mixing (FWM) in highly nonlinear fiber (HNLF) is proposed. Wavelength-division-multiplexing (WDM) multicast, wavelength conversion, modulation format conversion, and hybrid modulation format exclusive-OR (HMF-XOR) logic gates are realized simultaneously by simulation. One-to-three WDM multicast of 20-Gbps QPSK signals are achieved paying the optica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Therefore, new frequency components are generated at the SOA output. The electric field can be expressed as 24 : Eitalicijk=kitalicijkEiEjEk*ejωi+ωjωk+θi+θjθk, where EiEj,Ek, ωiωj,ωk, and θiθj,θk (i,j,kfalse(0,1,2false)) refer to the electric field amplitude, angular frequency, and phase of the input light wave, respectively, and kitalicijk refers to the FWM conversion efficiency. To facilitate the analysis, the newly generated frequency component signal is expressed as Eitalicijk with the frequency ωitalicijkωitalicijk=ωi+ωjωk, and the phase θitalicijkθitalicijk=θi+θjθk.…”
Section: Operation Principlementioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, new frequency components are generated at the SOA output. The electric field can be expressed as 24 : Eitalicijk=kitalicijkEiEjEk*ejωi+ωjωk+θi+θjθk, where EiEj,Ek, ωiωj,ωk, and θiθj,θk (i,j,kfalse(0,1,2false)) refer to the electric field amplitude, angular frequency, and phase of the input light wave, respectively, and kitalicijk refers to the FWM conversion efficiency. To facilitate the analysis, the newly generated frequency component signal is expressed as Eitalicijk with the frequency ωitalicijkωitalicijk=ωi+ωjωk, and the phase θitalicijkθitalicijk=θi+θjθk.…”
Section: Operation Principlementioning
confidence: 99%
“…As mentioned above, in most literature, each all‐optical signal processing function is demonstrated separately. It is necessary for multi‐functional optical processing units to perform multiple optical signal processing functions simultaneously in flexible optical networks, and there have been a few reports 21–25 . Multi‐functional optical processing units have better integration and can enhance the flexibility and scalability of the optical network, and thus attracted much attention from researchers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the optical layer is also vulnerable to attack by tapping [1]- [3], listening to the residual adjacent channel crosstalk [2], in-band jamming, and out-of-band crosstalk [3] without any destruction of the communication systems. For decades, the ceaseless pursuit of balancing the contradiction between large capacity and high security in the optical layer never stops, resulting in plenty of technologies such as encryption using all-optical logic gates [4], optical steganography [5], chaotic laser [6], optoelectronic firewall [7], and other passive or active approaches to cope with the security threats of the optical layer. As an active method to guarantee security, the optoelectronic firewall technology can eliminate some classes of insidious and malicious traffic, only allowing wanted traffic to transmit.…”
Section: Introductionmentioning
confidence: 99%
“…2 The physical layer of an optical network is vulnerable to a variety of attacks, including jamming, physical infrastructure attacks, eavesdropping, and interception. Some examples of specific research directions for securing optical networks at the optical layer include devising all-optical logic for encryption, 3 optical steganography, 4 and chaotic laser. 5 The existing security measures mainly apply to the security of optical transmission channels and signals, without paying attention to the security of the information contained in the optical signals.…”
Section: Introductionmentioning
confidence: 99%