2019
DOI: 10.1515/joc-2017-0112
|View full text |Cite
|
Sign up to set email alerts
|

Performance Investigation of 2-D Optical Orthogonal Codes for OCDMA

Abstract: In this paper, comparative analysis of code performance of dissimilar optical 2-D codes from Optical Orthogonal code family has been studied. Optical 2-D codes considered from OOC family are (n,w,1,2) OOC, SPS/OOC, OCFHC/OOC, EPC/OCS and VWOOC. By utilizing hard limiting error probability (HEP) equations and combinatorial method, code performance of each considered code is evaluated in detail. On the basis of detailed comparative performance analysis, EPC/OCS is concluded as best performing codes among all oth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…OCDMA codes with zero cross correlation (ZCC) to eliminate MAI and variable cross correlation are reported in [5], and in [10] code design without mapping for reducing code complexity is presented. For improving the prevailing network security by protecting sensitive information from spurious users, different studies have been conducted such as using all optical logic operation [11], multi code keying [12], data scrambling [13], hybrid codes [14], code switching [15], code shift keying and temporal phase coding [16], 2dimensional/3-dimensional codes [17], and 2-D modulation format [15]. To achieve all these features, different codes have been developed with certain trade-offs between code length, cross correlation and security [15,18].…”
Section: Introductionmentioning
confidence: 99%
“…OCDMA codes with zero cross correlation (ZCC) to eliminate MAI and variable cross correlation are reported in [5], and in [10] code design without mapping for reducing code complexity is presented. For improving the prevailing network security by protecting sensitive information from spurious users, different studies have been conducted such as using all optical logic operation [11], multi code keying [12], data scrambling [13], hybrid codes [14], code switching [15], code shift keying and temporal phase coding [16], 2dimensional/3-dimensional codes [17], and 2-D modulation format [15]. To achieve all these features, different codes have been developed with certain trade-offs between code length, cross correlation and security [15,18].…”
Section: Introductionmentioning
confidence: 99%