Fiber Optic Measurement Techniques 2009
DOI: 10.1016/b978-0-12-373865-3.00005-7
|View full text |Cite
|
Sign up to set email alerts
|

Optical System Performance Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…To date, several fibre surveillance, in-service monitoring or active fibre monitoring methods have been devised [2][3][4][5] to protect channels from physical layer attacks [6][7][8] . There are generally two categories of attack detection techniques, based on their working principles 7,9 : (1) methods that rely on additional statistical analysis of the communications signals (e.g., mean optical power monitoring, bit error rate (BER) measurement and optical spectrum analysis (OSA)) and (2) methods that rely on sending a special signal devoted to investigative purposes (e.g., optical time-domain reflectometry (OTDR) and pilot tones). The parameters that are monitored to ensure security indicate the degree to which security is violated.…”
Section: Current Classical Attack Detection Methodsmentioning
confidence: 99%
“…To date, several fibre surveillance, in-service monitoring or active fibre monitoring methods have been devised [2][3][4][5] to protect channels from physical layer attacks [6][7][8] . There are generally two categories of attack detection techniques, based on their working principles 7,9 : (1) methods that rely on additional statistical analysis of the communications signals (e.g., mean optical power monitoring, bit error rate (BER) measurement and optical spectrum analysis (OSA)) and (2) methods that rely on sending a special signal devoted to investigative purposes (e.g., optical time-domain reflectometry (OTDR) and pilot tones). The parameters that are monitored to ensure security indicate the degree to which security is violated.…”
Section: Current Classical Attack Detection Methodsmentioning
confidence: 99%
“…However, the students will have to note that G.655 cables may be a bit more expensive than the conventional G.652 ones and that as far as the terminal equipment is concerned, the 1550-nm technology may be more expensive than the 1310-nm one. Finally, students will be asked to comment on the BER testing of the above links mainly regarding the measurement arrangements as well as its possible duration for an intended BER of 10 −9 [3,9].…”
Section: General Remarksmentioning
confidence: 99%
“…Optical links that were employed in HEP experiments covered at most distances on the order of hundreds of meters and, in principle, did not need to be optically amplified. To mimic the final application scenario, BER performances were evaluated at a constant optical signal-to-noise ratio (OSNR) by varying the optical power at the receiver [47].…”
Section: Measurement Proceduresmentioning
confidence: 99%