SlideShare a Scribd company logo
1 of 4
Download to read offline
438 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 2, FEBRUARY 2010
On Efficient Code Acquisition of
Optical Orthogonal Codes in Optical CDMA Systems
Francesco Benedetto, Member, IEEE, and Gaetano Giunta, Member, IEEE
Abstract—This letter presents an efficient method for optical
code division multiple access (OCDMA) code acquisition based
on unipolar optical orthogonal codes. We propose a two-dwell
acquisition procedure and provide closed form expressions to
analyze the system’s error probabilities. Our results match
the Multiple Shift (MS) algorithm, recently introduced in the
literature, and show that our procedure can achieve the same
system performance with a lower computational complexity.
Index Terms—Code acquisition and synchronization, code-
division multiple access (CDMA), optical CDMA, optical orthog-
onal codes (OOCs).
I. INTRODUCTION
IN recent years, there has been an explosive growth in the
use of spread spectrum optical communication systems due
to the high speed, large capacity and high reliability of the use
of the broadband of the fiber optic. The operating principles
of optical networks are well depicted in the fundamental
works of Salehi, et al. [1]–[3]. Optical code acquisition and
synchronization plays a crucial role because the degradation
in the performance of the system will be dramatic when the
synchronization between receiver and transmitter is not ideal
[1]. In the seminal work by Keshavarzian and Salehi, [2], a
new synchronization procedure is proposed, namely multiple
shift (MS) algorithm, which greatly improves the performance
of synchronization process based on optical orthogonal codes
(OOCs). Authors in [2] address the synchronization problem
of an optical network using OOC codes of length 𝐹. The
MS algorithm has two modes and an initializing part: first, 𝐹
different shifts (or cells) in the search space are partitioned
into equal-sized groups each containing 𝑀 different shifts. In
the first mode, the algorithm examines the cells in a group all
at the same time and, when the decision variable exceeds the
threshold, the algorithm enters the second mode to find the
correct shift examining separately each of the 𝑀 shifts [2].
In this letter, we match the MS algorithm proposing a new
code acquisition scheme for OCDMA communications based
on OOCs. We present a two-dwell acquisition procedure stud-
ied for the first time in [6], and whose idea was originally pro-
posed in [4] for spread-spectrum (SS) communications, here
extended and applied to the case of optical code acquisition.
In particular, we provide a closed form to analytically express
the system’s false alarm and detection probabilities in terms of
the 𝐺𝑄 functions, [4], and show that our procedure can obtain
Paper approved by W. C. Kwong, the Editor for Optical Networks of the
IEEE Communications Society. Manuscript received April 18, 2008; revised
July 18, 2008.
The authors are with the Digital Signal Processing and Multimedia Com-
munications Lab, Dept. of Applied Electronics, University of ROMA TRE,
via della Vasca Navale 84, 00146 Rome, Italy (e-mail: fbenedetto@ieee.org;
giunta@ieee.org).
Digital Object Identifier 10.1109/TCOMM.2010.02.080043
(a)
(b)
Fig. 1. a) Block scheme of the OCDMA receiver with OOC codes; b) two
dwell acquisition algorithm.
the same system performances as the MS algorithm but with
lower computational complexity. The remainder of this work
is organized as follows. In Section II, we present the two-
dwell acquisition method expressing its performance in terms
of the 𝐺𝑄 functions. Section III shows the numerical results
matching the MS algorithm and highlights the advantages of
the new scheme while Section IV briefly concludes the work.
II. TWO DWELL ACQUISITION METHOD
The typical block scheme of a conventional incoherent
receiver with unipolar OOC is shown here in Fig. 1 (a).
Each receiver first starts the code acquisition process until
it finds an acceptable estimate of 𝜏 𝑛, i.e. the time offset of
the user’s signal from a selected time origin [2]. Then, data
recovery can start while at the same time the tracking system
is continuously running and updating the value of 𝜏 𝑛 to ensure
that the correct shift of the code is used in the decoding
process. The uncertainty region for 𝜏 𝑛 is [0, 𝑇 𝑏), with 𝑇 𝑏 the
bit period. It is divided into fragments (which are also called
cells), each having a duration of 𝑇 𝑐, with 𝑇 𝑐 the chip period.
Then the system searches these possible cells to find the one
within which the actual value of 𝜏 𝑛 is located. To check each
cell, a simple test is adopted as shown in Fig. 1(a) while Fig.
1(b) shows in detail the two dwell algorithm we propose.
0090-6778/10$25.00 c⃝ 2010 IEEE
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
BENEDETTO and GIUNTA: ON EFFICIENT CODE ACQUISITION OF OPTICAL ORTHOGONAL CODES IN OPTICAL CDMA SYSTEMS 439
Following the same system model adopted in the seminal
work by Keshavarzian and Salehi [2], the received signal
𝑟(𝑡) is first multiplied with a locally generated replica of
the OOC code, then photo-detected and finally its integral
is computed over one bit period, 𝑇 𝑏, to form a decision
variable. This decision variable is passed to the acquisition
device (i.e. a threshold comparator) in order to implement the
decoding process. The threshold is properly pre-determined,
at least equal to the code weight 𝑊 (i.e. number of chips
taking value of “1”), in order to obtain detection probabilities
equal to one [2]. The working principles of the two-dwell
acquisition algorithm are as follows. In the first mode, the
algorithm realizes a simple serial search analyzing only the
first 𝑁 𝑐 = 𝐹/𝑀 chips of the OOC code, where 𝐹 is the code
length, 𝑀 is the same as in [2] and 𝑁 𝑐 is the upper closest
integer to the ratio 𝐹/𝑀. In this way, we can test one cell
examining only a fraction of the chips of the code. Then, if
the test doesn’t reject the current cell, the algorithm enters the
second mode examining the rest of the chips, i.e. (𝐹 − 𝐹/𝑀)
chips, to find the correct shift (see Fig. 1(b)). Otherwise, if
the cell is rejected, the algorithm moves to the next cell.
It can be possible that, for the effect of the multi-access
interference (MAI) and other noise sources, some false alarms
can happen in both the first and second mode. It is the task
of the verification mode to detect false alarms in the second
mode [2]. Following the same notation as in [2], we denote
with 𝑃 𝑓 𝑎 and 𝑃 𝑑 the false alarm and detection probability,
respectively, of the first mode of the algorithm, with 𝑃 𝐹 𝐴
and 𝑃 𝐷 the probabilities of the second mode. According to
[5], considering an ideal optical fiber CDMA system, only
the interference effect should be taken into account while the
shot and thermal noise are assumed to be zero. In this way, the
mean and variance of the MAI, for a number 𝑁 of interfering
users, can be expressed as:
𝑚 = 𝑊 + (𝑁 − 1)
𝑊2
2𝐹
and
𝜎2
= (𝑁 − 1)
𝑊2
2𝐹
(
1 −
𝑊2
2𝐹
)
𝑀2
(1)
In the case of our interest, since in the first dwell we
investigate only the first 𝑁 𝑐 chips of the code the code weight
𝑊 is represented the number of chips “1” in 𝐹/𝑀 chips while
the code length 𝐹 is 𝑁 𝑐; in the second dwell, the code weight
is 𝑊, since we are analyzing codes of 𝐹 chips. In this way,
using the 𝐺𝑄 functions defined in [4], we now can analytically
express in a closed form the error probabilities, due to the
MAI, as follows for the first mode:
𝑃 𝑑 = 𝐺𝑄1
(
𝜎2
1; 𝑉1; 𝑚1
)
= 𝑒−( 𝑚2
1 𝜎2
1 /2)
⋅
+∞∑
𝑘=0
𝑚2𝑘
1 ⋅ 𝜎2𝑘
1
2 𝑘 ⋅ 𝑘!
⋅ Γ1
(
𝑉 2
1
2𝜎2
1
; 𝐾 + 1
)
(2)
𝑃 𝑓 𝑎 = 𝐺𝑄1
(
𝜎2
1; 𝑉1; 0
)
= Γ1
(
𝑉 2
1
2𝜎2
1
; 1
)
= exp
(
−
𝑉 2
1
2𝜎2
1
)
(3)
and as follows for the second mode of the algorithm:
𝑃 𝐷 = 𝐺𝑄2
(
𝜎2
1; 𝜎2
2; 𝑉1; 𝑉2; 𝑚2
)
== 𝑒−( 𝑚2
2( 𝜎2
1 +𝜎2
2 )/2)
⋅
+∞∑
𝑘=0
+∞∑
𝑛=0
(𝑘 + 𝑛)!𝜎2 𝑛
2 𝑚2 𝑛
2
𝑘! (𝑛!)2
2 𝑛
(
1 +
𝜎2
1
𝜎2
2
) (
1 +
𝜎2
2
𝜎2
1
) 𝑘
(4)
𝑃 𝐹 𝐴 = 𝐺𝑄2
(
𝜎2
1; 𝜎2
2; 𝑉1; 𝑉2; 0
)
=
=
+∞∑
𝑘=0
Γ1
[
𝑉 2
1 ( 𝜎2
1 +𝜎2
2 )
2𝜎2
1 +𝜎2
2
, 𝑘 + 1
]
⋅ Γ1
(
𝑉 2
2
2𝜎2
2
, 𝑘 + 1
)
(
1 +
𝜎2
1
𝜎2
2
) (
1 +
𝜎2
2
𝜎2
1
) 𝑘
(5)
where 𝑉1 and 𝑉2 are the threshold values for the first and
second mode, respectively, while (𝑚1, 𝑚2, 𝜎1, 𝜎2) are the
mean values and variances for the two modes and Γ1(∙, ∙)
is the well-known incomplete gamma function [4].
It has to be noted that the proposed scheme performs a
partial correlation for each dwell, and thus, the threshold
should be less than the weight of the code. In fact, for PN
sequences which are used in wireless systems the threshold is
fixed with the criterion of CFAR (constant false alarm rate) [7].
In particular, the CFAR test is accomplished in two successive
parts: first, a threshold is determined to limit the false-alarm
probability at a given reduced value (size of the test); second,
the probability of detection (power of the test) is evaluated
for the threshold previously determined. The probability of
false alarm must be tuned to guarantee a very low number
of possible false alarms, which eventually imply a relevant
penalty time to the acquisition device. Large probabilities of
detection (up to 100%) are typical of well-performing testing
variables.
However, here in order to match the results of the MS
algorithm and as detailed in the next Section, we use threshold
values equal to 𝑊 for the first and second dwell, to obtain
at the end of the acquisition process a detection probability
equal to one [2].
III. NUMERICAL RESULTS
In this section, we devise the validity of the GQ functions to
model the MAI effect, and then we evaluate the performance
of the two-dwell method matching the MS algorithm. Finally,
we highlight the advantages of the new approach versus the
MS in terms of computational complexity. In all the following
graphs we have used according to [2], OOC codes of length
𝐹 = 200, weight 𝑊 = 5, and threshold values equal to 𝑊.
Fig. 2 shows here the performance of the MS algorithm
evaluated for different users, varying 𝑀. Dotted lines represent
simulation results, while solid lines stand for theoretical results
obtained with the GQ functions (red lines) and the binomial
functions (black lines) used in [2]. As it can be easily
seen, simulation results perfectly match the theoretical ones
confirming the validity of the GQ approach in modeling the
MAI effect.
Fig. 3 illustrates the comparison between the receiver op-
erating characteristics (ROC) of the two methods for various
𝑀 and different users (Fig. 3(a) for 𝑁 = 5, Fig. 3(b) for
𝑁 = 8). As we can see, the performance of the two-dwell
approach is almost the same of the MS procedure and again
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
440 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 2, FEBRUARY 2010
Fig. 2. 𝑃 𝑓 𝑎 of the multiple shift versus the number of shift (M) for different
users (N). Solid lines = theor. (black for binomial, gray for GQ), dotted lines
= sim.
(a)
(b)
Fig. 3. Performance comparison between the two methods versus different
shift for: a) 𝑁 = 5 users, b) 𝑁 = 8 users. Solid lines = theor. (black for MS,
gray for Two-Dwell), dotted lines = sim. (black for MS, gray for Two-Dwell).
the simulations well match the theoretical results. It has to be
noted that, the number of curves for the two-dwell approach
is limited to analyze an integer number of 𝑁 𝑐 chips in the first
mode. It has to be underlined that the OOC is a sparse code.
In other word the density of ON pulses is low. So when we
search on only 𝐹/𝑀 chips in the first step, this is probable
that no ON chip exists in the search area. This phenomenon
makes more sense when code weight is low e.g. 𝑊 = 5 as
considered in this work. When 𝑀 increases, this probability
increases and consequently probability of detection decreases.
On the other hand, the probability of false alarm increases
too because, if the algorithm works on the intensity of one
single impulse, there are different noise sources that cannot
be avoided and must be now considered (e.g. shot noise and
Fig. 4. MAT performances of the system versus different values of the
parameter 𝑀 and different numbers (N) of users, (circles for MS scheme,
diamonds for proposed approach).
dark currents). This means that the algorithm always enters
the second dwell for a verification task and, at the end of the
second mode, we have always a true detection. In this case,
the first dwell is performed with the lowest computational
complexity (i.e. it analyzes only one chip) and hence the
system performances (in terms of mean acquisition time) are
the same of the MS algorithm. However in PN sequences
which are used in wireless systems we do not have this effect
since the codes are bipolar. Also in the multiple-shift algorithm
the choice of the parameter 𝑀 could have two different effects
on the performance of the synchronization system [2]. As
𝑀 increases the number of shifts examined simultaneously
increases and, therefore, the search space will be covered in
fewer tries. On the other hand, with the increase of 𝑀, the
number of dwell times required to find the correct shift among
the shifts in the second stage will increase. Another effect of
increasing 𝑀 is that the probability of false alarm of the first
stage will increase since with the use of a larger value for
parameter 𝑀, more interference is introduced in the checking
process.
It is, therefore, expected that an optimum value for 𝑀 exists
for which the performance of the synchronization system is
optimum, or equivalently the synchronization time is min-
imum, as represented in the following Fig. 4. Considering
that the most important performance measure is the mean
acquisition time (MAT) for acquisition process, Fig. 4 shows
here the performance of the two algorithms (the MS and the
double dwell) in terms of needed number of bits for acquisition
purposes (MAT) varying the system performance such as 𝑀
and 𝑁. The curves are obtained with a detection probability
equal to one and for a different number of users (from 2 to 8).
From the graph, we can easily see that the curves referring
to both the algorithms show the same behavior, confirming
that the two acquisition techniques have the same system
performances. Moreover, it has to be noted that increasing
the value of 𝑀, for a fixed detection probability, makes the
two algorithms converge to the same performances (i.e. same
MAT), confirming the assumptions we made before.
It is not be surprisingly that the two acquisition techniques
have the same system performances. This is a consequence
of the fact that both the proposed and MS scheme perform
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
BENEDETTO and GIUNTA: ON EFFICIENT CODE ACQUISITION OF OPTICAL ORTHOGONAL CODES IN OPTICAL CDMA SYSTEMS 441
the same operations (correlation and threshold comparison)
on the same codes but using a different amount of chips. In
fact, while the MS algorithm performs 𝑀 correlations of 𝐹
chips (parallel search), the proposed scheme realizes only one
correlation on 𝐹/𝑀 chips (serial search), in the first dwell.
Then, in the second dwell while the MS searches the correct
shift analyzing the 𝑀 correlations of 𝐹chips one after the
other, the proposed approach realizes the correlation only on
the remaining (𝐹 − 𝐹/𝑀) chips. The advantages of using
the two-dwell approach lie in the fact that it presents a lower
complexity than the MS algorithm. In fact, we can define two
(lower and upper) bounds of the acquisition performance: best
case if the correct shift is the first on 𝐹 chips; 𝑤𝑜𝑟𝑠𝑡 case if
the correct shift is the last chip on 𝐹 chips. We can evaluate
the total number of needed operations as follows:
- Best case: in this case, the correct shift is represented
by the first chip of the first code (on 𝑀) in the search area.
In particular, the multiple shift algorithm must analyze 𝑀
different shifts at the same time in the first dwell, and then
find the correct shift in the second dwell analyzing each shift
separately. This means that during the first dwell the MS
algorithm must perform 𝑀 correlations of codes made of 𝐹
chips, for a total number of operations (sums and products)
of 2∗
𝑀∗
𝐹, while in the second dwell it will find the correct
chip analyzing only the first shift of the first code of 𝐹 chips,
for a total number of operations (sums and products) of 2∗
𝐹.
Hence the total number of operation performed by the MS
algorithm (in the first and second dwell) for the best case is
2𝐹∗
(𝑀 +1). In the first dwell, the proposed method performs
a total number of operations (sums and products) of only
2∗
𝐹/𝑀, because it performs a serial search on 𝐹/𝑀 chips
of the same code. Then in the second dwell, it performs the
correlation on the remaining chips. Hence the total number of
operations performed by the proposed algorithm (in the first
and second dwell) is 2 𝐹.
- Worst case: in this case, the correct shift is represented
by the last chip of the last code (on 𝑀) in the search area.
In particular, the multiple shift must perform 𝑀 correlations
of codes made of 𝐹 chips, for a total number of operations
(sums and products) of 2∗
𝑀∗
𝐹, while in the second dwell it
will find the correct chip analyzing all the 𝐹 chips of all the
𝑀 shifts (the correct chip is the last one of the 𝑀-th code
of length 𝐹). Hence the total number of operations performed
by the MS algorithm (in the first and second dwell) for the
worst case is 2𝐹∗
(𝐹 + 𝑀). On the other hand, the proposed
method performs a serial search on all the 𝐹/𝑀 chips for 𝑀
codes (2∗
𝐹 operations) and then passes to the second dwell,
performing the correlation on the remaining chips of the last
code only, 2∗
(𝐹 − 𝐹/𝑀) operations. Hence, the total number
of operation performed by the proposed algorithm (in the first
and second dwell) is 2𝐹∗
(2𝑀 − 1)/𝑀.
In conclusion, the number of operations required by the two
acquisition methods, in terms of total sums and products, is
as follows:
- MS: best case = 2∗
𝐹∗
(𝑀 +1) operations; worst case
= 2∗
𝐹∗
(𝑀 + 𝐹) operations.
- Two-dwell: best case = 2∗
𝐹 operations; worst case
= 2∗
𝐹∗
(2∗
𝑀 − 1)/𝑀 operations.
We can conclude that with the new algorithm we obtain the
same systems performances of the MS, but saving a number
of operations 𝐺 𝑏 = (𝑀 + 1) in the best operating case and a
number of operations equal to 𝐺 𝑤 = 𝑀∗
(𝑀 + 𝐹)/(2∗
𝑀 −
1) ≈ (𝑀 + 𝐹)/2 in the worst case, that rapidly increases with
𝑀.
IV. CONCLUSIONS
This paper has devised a two-dwell acquisition scheme
for OCDMA communications based on OOCs. We have
provided a closed form to analytically express the system’s
error probabilities and showed that our procedure can obtain
the same system performance as the MS approach but with
lower computational complexity.
REFERENCES
[1] A. Keshavarzian and J. A. Salehi, “Optical orthogonal code acquisition
in fiber-optic CDMA systems via the simple serial-search method,” IEEE
Trans. Commun., vol. 50, no. 3, pp. 473–483, Mar. 2002.
[2] A. Keshavarzian and J. A. Salehi, “Multiple-shift code acquisition of opti-
cal orthogonal codes in optical CDMA systems,” IEEE Trans. Commun.,
vol. 53, no. 4, pp. 687–697, Apr. 2005.
[3] J. A. Salehi, “Code division multiple-access techniques in optical fiber
networks—I: fundamental principles,” IEEE Trans. Commun., vol. 37,
no. 8, pp. 824–833, Aug. 1989.
[4] G. Giunta, “Generalized Q-functions for application to noncoherent serial
detection of spread-spectrum communication signals,” IEEE Trans. Signal
Process., vol. 48, no. 5, pp. 1506–1513, May 2000.
[5] J. A. Salehi and C. A. Brackett, “Code division multiple-access techniques
in optical fiber networks—II: systems performance analysis,” IEEE Trans.
Commun., vol. 37, no. 8, pp. 834–842, Aug. 1989.
[6] D. DiCarlo and C. Weber, “Multiple dwell serial search: performance and
application to direct sequence code acquisition,” IEEE Trans. Commun.,
vol. 31, no. 5, pp. 650–659, May 1983.
[7] H. L. Van Trees, Detection, Estimation, and Modulation Theory. New
York: Wiley, 1971.
Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.

More Related Content

Viewers also liked

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemIAEME Publication
 
Design optimization of optical wireless communication owc focusing on light f...
Design optimization of optical wireless communication owc focusing on light f...Design optimization of optical wireless communication owc focusing on light f...
Design optimization of optical wireless communication owc focusing on light f...IAEME Publication
 
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionPerformance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionIDES Editor
 
Coherent Optical Code Division Multiple Access (OCDMA) Systems Pedro Bertarini
Coherent Optical Code Division Multiple Access (OCDMA) Systems   Pedro BertariniCoherent Optical Code Division Multiple Access (OCDMA) Systems   Pedro Bertarini
Coherent Optical Code Division Multiple Access (OCDMA) Systems Pedro BertariniCPqD
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Numerical suppression of linear effects in a optical
Numerical suppression of linear effects in a opticalNumerical suppression of linear effects in a optical
Numerical suppression of linear effects in a opticaliaemedu
 
Optical code division multiple access using carbon nanotubes system
Optical code division multiple access using carbon nanotubes systemOptical code division multiple access using carbon nanotubes system
Optical code division multiple access using carbon nanotubes systemIAEME Publication
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniqueseSAT Journals
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 

Viewers also liked (15)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma system
 
Design optimization of optical wireless communication owc focusing on light f...
Design optimization of optical wireless communication owc focusing on light f...Design optimization of optical wireless communication owc focusing on light f...
Design optimization of optical wireless communication owc focusing on light f...
 
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionPerformance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic Dispersion
 
40120130405008
4012013040500840120130405008
40120130405008
 
SAE/OCDM System
SAE/OCDM System SAE/OCDM System
SAE/OCDM System
 
Coherent Optical Code Division Multiple Access (OCDMA) Systems Pedro Bertarini
Coherent Optical Code Division Multiple Access (OCDMA) Systems   Pedro BertariniCoherent Optical Code Division Multiple Access (OCDMA) Systems   Pedro Bertarini
Coherent Optical Code Division Multiple Access (OCDMA) Systems Pedro Bertarini
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
Numerical suppression of linear effects in a optical
Numerical suppression of linear effects in a opticalNumerical suppression of linear effects in a optical
Numerical suppression of linear effects in a optical
 
Optical code division multiple access using carbon nanotubes system
Optical code division multiple access using carbon nanotubes systemOptical code division multiple access using carbon nanotubes system
Optical code division multiple access using carbon nanotubes system
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
Effect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniquesEffect of fiber distance on various sac ocdma detection techniques
Effect of fiber distance on various sac ocdma detection techniques
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
Secure communication over fiber optic networks
Secure communication over fiber optic networksSecure communication over fiber optic networks
Secure communication over fiber optic networks
 

Similar to Efficient Code Acquisition of Optical Orthogonal Codes

Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORijsptm
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...IJERA Editor
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsIAEME Publication
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsiaemedu
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsiaemedu
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...ijasuc
 
Project report - Hypergraph states
Project report - Hypergraph statesProject report - Hypergraph states
Project report - Hypergraph statesHenry Costello
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingIOSR Journals
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 

Similar to Efficient Code Acquisition of Optical Orthogonal Codes (20)

Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
MMedia-Lau
MMedia-LauMMedia-Lau
MMedia-Lau
 
Ieee 2013 matlab abstracts part b
Ieee 2013 matlab abstracts part bIeee 2013 matlab abstracts part b
Ieee 2013 matlab abstracts part b
 
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIORANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...
A Novel Alamouti STBC Technique for MIMO System Using 16- QAM Modulation and ...
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modifie...
 
Project report - Hypergraph states
Project report - Hypergraph statesProject report - Hypergraph states
Project report - Hypergraph states
 
H1803064257
H1803064257H1803064257
H1803064257
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol ModelingMobile Networking and Mobile Ad Hoc Routing Protocol Modeling
Mobile Networking and Mobile Ad Hoc Routing Protocol Modeling
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Efficient Code Acquisition of Optical Orthogonal Codes

  • 1. 438 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 2, FEBRUARY 2010 On Efficient Code Acquisition of Optical Orthogonal Codes in Optical CDMA Systems Francesco Benedetto, Member, IEEE, and Gaetano Giunta, Member, IEEE Abstract—This letter presents an efficient method for optical code division multiple access (OCDMA) code acquisition based on unipolar optical orthogonal codes. We propose a two-dwell acquisition procedure and provide closed form expressions to analyze the system’s error probabilities. Our results match the Multiple Shift (MS) algorithm, recently introduced in the literature, and show that our procedure can achieve the same system performance with a lower computational complexity. Index Terms—Code acquisition and synchronization, code- division multiple access (CDMA), optical CDMA, optical orthog- onal codes (OOCs). I. INTRODUCTION IN recent years, there has been an explosive growth in the use of spread spectrum optical communication systems due to the high speed, large capacity and high reliability of the use of the broadband of the fiber optic. The operating principles of optical networks are well depicted in the fundamental works of Salehi, et al. [1]–[3]. Optical code acquisition and synchronization plays a crucial role because the degradation in the performance of the system will be dramatic when the synchronization between receiver and transmitter is not ideal [1]. In the seminal work by Keshavarzian and Salehi, [2], a new synchronization procedure is proposed, namely multiple shift (MS) algorithm, which greatly improves the performance of synchronization process based on optical orthogonal codes (OOCs). Authors in [2] address the synchronization problem of an optical network using OOC codes of length 𝐹. The MS algorithm has two modes and an initializing part: first, 𝐹 different shifts (or cells) in the search space are partitioned into equal-sized groups each containing 𝑀 different shifts. In the first mode, the algorithm examines the cells in a group all at the same time and, when the decision variable exceeds the threshold, the algorithm enters the second mode to find the correct shift examining separately each of the 𝑀 shifts [2]. In this letter, we match the MS algorithm proposing a new code acquisition scheme for OCDMA communications based on OOCs. We present a two-dwell acquisition procedure stud- ied for the first time in [6], and whose idea was originally pro- posed in [4] for spread-spectrum (SS) communications, here extended and applied to the case of optical code acquisition. In particular, we provide a closed form to analytically express the system’s false alarm and detection probabilities in terms of the 𝐺𝑄 functions, [4], and show that our procedure can obtain Paper approved by W. C. Kwong, the Editor for Optical Networks of the IEEE Communications Society. Manuscript received April 18, 2008; revised July 18, 2008. The authors are with the Digital Signal Processing and Multimedia Com- munications Lab, Dept. of Applied Electronics, University of ROMA TRE, via della Vasca Navale 84, 00146 Rome, Italy (e-mail: fbenedetto@ieee.org; giunta@ieee.org). Digital Object Identifier 10.1109/TCOMM.2010.02.080043 (a) (b) Fig. 1. a) Block scheme of the OCDMA receiver with OOC codes; b) two dwell acquisition algorithm. the same system performances as the MS algorithm but with lower computational complexity. The remainder of this work is organized as follows. In Section II, we present the two- dwell acquisition method expressing its performance in terms of the 𝐺𝑄 functions. Section III shows the numerical results matching the MS algorithm and highlights the advantages of the new scheme while Section IV briefly concludes the work. II. TWO DWELL ACQUISITION METHOD The typical block scheme of a conventional incoherent receiver with unipolar OOC is shown here in Fig. 1 (a). Each receiver first starts the code acquisition process until it finds an acceptable estimate of 𝜏 𝑛, i.e. the time offset of the user’s signal from a selected time origin [2]. Then, data recovery can start while at the same time the tracking system is continuously running and updating the value of 𝜏 𝑛 to ensure that the correct shift of the code is used in the decoding process. The uncertainty region for 𝜏 𝑛 is [0, 𝑇 𝑏), with 𝑇 𝑏 the bit period. It is divided into fragments (which are also called cells), each having a duration of 𝑇 𝑐, with 𝑇 𝑐 the chip period. Then the system searches these possible cells to find the one within which the actual value of 𝜏 𝑛 is located. To check each cell, a simple test is adopted as shown in Fig. 1(a) while Fig. 1(b) shows in detail the two dwell algorithm we propose. 0090-6778/10$25.00 c⃝ 2010 IEEE Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
  • 2. BENEDETTO and GIUNTA: ON EFFICIENT CODE ACQUISITION OF OPTICAL ORTHOGONAL CODES IN OPTICAL CDMA SYSTEMS 439 Following the same system model adopted in the seminal work by Keshavarzian and Salehi [2], the received signal 𝑟(𝑡) is first multiplied with a locally generated replica of the OOC code, then photo-detected and finally its integral is computed over one bit period, 𝑇 𝑏, to form a decision variable. This decision variable is passed to the acquisition device (i.e. a threshold comparator) in order to implement the decoding process. The threshold is properly pre-determined, at least equal to the code weight 𝑊 (i.e. number of chips taking value of “1”), in order to obtain detection probabilities equal to one [2]. The working principles of the two-dwell acquisition algorithm are as follows. In the first mode, the algorithm realizes a simple serial search analyzing only the first 𝑁 𝑐 = 𝐹/𝑀 chips of the OOC code, where 𝐹 is the code length, 𝑀 is the same as in [2] and 𝑁 𝑐 is the upper closest integer to the ratio 𝐹/𝑀. In this way, we can test one cell examining only a fraction of the chips of the code. Then, if the test doesn’t reject the current cell, the algorithm enters the second mode examining the rest of the chips, i.e. (𝐹 − 𝐹/𝑀) chips, to find the correct shift (see Fig. 1(b)). Otherwise, if the cell is rejected, the algorithm moves to the next cell. It can be possible that, for the effect of the multi-access interference (MAI) and other noise sources, some false alarms can happen in both the first and second mode. It is the task of the verification mode to detect false alarms in the second mode [2]. Following the same notation as in [2], we denote with 𝑃 𝑓 𝑎 and 𝑃 𝑑 the false alarm and detection probability, respectively, of the first mode of the algorithm, with 𝑃 𝐹 𝐴 and 𝑃 𝐷 the probabilities of the second mode. According to [5], considering an ideal optical fiber CDMA system, only the interference effect should be taken into account while the shot and thermal noise are assumed to be zero. In this way, the mean and variance of the MAI, for a number 𝑁 of interfering users, can be expressed as: 𝑚 = 𝑊 + (𝑁 − 1) 𝑊2 2𝐹 and 𝜎2 = (𝑁 − 1) 𝑊2 2𝐹 ( 1 − 𝑊2 2𝐹 ) 𝑀2 (1) In the case of our interest, since in the first dwell we investigate only the first 𝑁 𝑐 chips of the code the code weight 𝑊 is represented the number of chips “1” in 𝐹/𝑀 chips while the code length 𝐹 is 𝑁 𝑐; in the second dwell, the code weight is 𝑊, since we are analyzing codes of 𝐹 chips. In this way, using the 𝐺𝑄 functions defined in [4], we now can analytically express in a closed form the error probabilities, due to the MAI, as follows for the first mode: 𝑃 𝑑 = 𝐺𝑄1 ( 𝜎2 1; 𝑉1; 𝑚1 ) = 𝑒−( 𝑚2 1 𝜎2 1 /2) ⋅ +∞∑ 𝑘=0 𝑚2𝑘 1 ⋅ 𝜎2𝑘 1 2 𝑘 ⋅ 𝑘! ⋅ Γ1 ( 𝑉 2 1 2𝜎2 1 ; 𝐾 + 1 ) (2) 𝑃 𝑓 𝑎 = 𝐺𝑄1 ( 𝜎2 1; 𝑉1; 0 ) = Γ1 ( 𝑉 2 1 2𝜎2 1 ; 1 ) = exp ( − 𝑉 2 1 2𝜎2 1 ) (3) and as follows for the second mode of the algorithm: 𝑃 𝐷 = 𝐺𝑄2 ( 𝜎2 1; 𝜎2 2; 𝑉1; 𝑉2; 𝑚2 ) == 𝑒−( 𝑚2 2( 𝜎2 1 +𝜎2 2 )/2) ⋅ +∞∑ 𝑘=0 +∞∑ 𝑛=0 (𝑘 + 𝑛)!𝜎2 𝑛 2 𝑚2 𝑛 2 𝑘! (𝑛!)2 2 𝑛 ( 1 + 𝜎2 1 𝜎2 2 ) ( 1 + 𝜎2 2 𝜎2 1 ) 𝑘 (4) 𝑃 𝐹 𝐴 = 𝐺𝑄2 ( 𝜎2 1; 𝜎2 2; 𝑉1; 𝑉2; 0 ) = = +∞∑ 𝑘=0 Γ1 [ 𝑉 2 1 ( 𝜎2 1 +𝜎2 2 ) 2𝜎2 1 +𝜎2 2 , 𝑘 + 1 ] ⋅ Γ1 ( 𝑉 2 2 2𝜎2 2 , 𝑘 + 1 ) ( 1 + 𝜎2 1 𝜎2 2 ) ( 1 + 𝜎2 2 𝜎2 1 ) 𝑘 (5) where 𝑉1 and 𝑉2 are the threshold values for the first and second mode, respectively, while (𝑚1, 𝑚2, 𝜎1, 𝜎2) are the mean values and variances for the two modes and Γ1(∙, ∙) is the well-known incomplete gamma function [4]. It has to be noted that the proposed scheme performs a partial correlation for each dwell, and thus, the threshold should be less than the weight of the code. In fact, for PN sequences which are used in wireless systems the threshold is fixed with the criterion of CFAR (constant false alarm rate) [7]. In particular, the CFAR test is accomplished in two successive parts: first, a threshold is determined to limit the false-alarm probability at a given reduced value (size of the test); second, the probability of detection (power of the test) is evaluated for the threshold previously determined. The probability of false alarm must be tuned to guarantee a very low number of possible false alarms, which eventually imply a relevant penalty time to the acquisition device. Large probabilities of detection (up to 100%) are typical of well-performing testing variables. However, here in order to match the results of the MS algorithm and as detailed in the next Section, we use threshold values equal to 𝑊 for the first and second dwell, to obtain at the end of the acquisition process a detection probability equal to one [2]. III. NUMERICAL RESULTS In this section, we devise the validity of the GQ functions to model the MAI effect, and then we evaluate the performance of the two-dwell method matching the MS algorithm. Finally, we highlight the advantages of the new approach versus the MS in terms of computational complexity. In all the following graphs we have used according to [2], OOC codes of length 𝐹 = 200, weight 𝑊 = 5, and threshold values equal to 𝑊. Fig. 2 shows here the performance of the MS algorithm evaluated for different users, varying 𝑀. Dotted lines represent simulation results, while solid lines stand for theoretical results obtained with the GQ functions (red lines) and the binomial functions (black lines) used in [2]. As it can be easily seen, simulation results perfectly match the theoretical ones confirming the validity of the GQ approach in modeling the MAI effect. Fig. 3 illustrates the comparison between the receiver op- erating characteristics (ROC) of the two methods for various 𝑀 and different users (Fig. 3(a) for 𝑁 = 5, Fig. 3(b) for 𝑁 = 8). As we can see, the performance of the two-dwell approach is almost the same of the MS procedure and again Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
  • 3. 440 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 58, NO. 2, FEBRUARY 2010 Fig. 2. 𝑃 𝑓 𝑎 of the multiple shift versus the number of shift (M) for different users (N). Solid lines = theor. (black for binomial, gray for GQ), dotted lines = sim. (a) (b) Fig. 3. Performance comparison between the two methods versus different shift for: a) 𝑁 = 5 users, b) 𝑁 = 8 users. Solid lines = theor. (black for MS, gray for Two-Dwell), dotted lines = sim. (black for MS, gray for Two-Dwell). the simulations well match the theoretical results. It has to be noted that, the number of curves for the two-dwell approach is limited to analyze an integer number of 𝑁 𝑐 chips in the first mode. It has to be underlined that the OOC is a sparse code. In other word the density of ON pulses is low. So when we search on only 𝐹/𝑀 chips in the first step, this is probable that no ON chip exists in the search area. This phenomenon makes more sense when code weight is low e.g. 𝑊 = 5 as considered in this work. When 𝑀 increases, this probability increases and consequently probability of detection decreases. On the other hand, the probability of false alarm increases too because, if the algorithm works on the intensity of one single impulse, there are different noise sources that cannot be avoided and must be now considered (e.g. shot noise and Fig. 4. MAT performances of the system versus different values of the parameter 𝑀 and different numbers (N) of users, (circles for MS scheme, diamonds for proposed approach). dark currents). This means that the algorithm always enters the second dwell for a verification task and, at the end of the second mode, we have always a true detection. In this case, the first dwell is performed with the lowest computational complexity (i.e. it analyzes only one chip) and hence the system performances (in terms of mean acquisition time) are the same of the MS algorithm. However in PN sequences which are used in wireless systems we do not have this effect since the codes are bipolar. Also in the multiple-shift algorithm the choice of the parameter 𝑀 could have two different effects on the performance of the synchronization system [2]. As 𝑀 increases the number of shifts examined simultaneously increases and, therefore, the search space will be covered in fewer tries. On the other hand, with the increase of 𝑀, the number of dwell times required to find the correct shift among the shifts in the second stage will increase. Another effect of increasing 𝑀 is that the probability of false alarm of the first stage will increase since with the use of a larger value for parameter 𝑀, more interference is introduced in the checking process. It is, therefore, expected that an optimum value for 𝑀 exists for which the performance of the synchronization system is optimum, or equivalently the synchronization time is min- imum, as represented in the following Fig. 4. Considering that the most important performance measure is the mean acquisition time (MAT) for acquisition process, Fig. 4 shows here the performance of the two algorithms (the MS and the double dwell) in terms of needed number of bits for acquisition purposes (MAT) varying the system performance such as 𝑀 and 𝑁. The curves are obtained with a detection probability equal to one and for a different number of users (from 2 to 8). From the graph, we can easily see that the curves referring to both the algorithms show the same behavior, confirming that the two acquisition techniques have the same system performances. Moreover, it has to be noted that increasing the value of 𝑀, for a fixed detection probability, makes the two algorithms converge to the same performances (i.e. same MAT), confirming the assumptions we made before. It is not be surprisingly that the two acquisition techniques have the same system performances. This is a consequence of the fact that both the proposed and MS scheme perform Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.
  • 4. BENEDETTO and GIUNTA: ON EFFICIENT CODE ACQUISITION OF OPTICAL ORTHOGONAL CODES IN OPTICAL CDMA SYSTEMS 441 the same operations (correlation and threshold comparison) on the same codes but using a different amount of chips. In fact, while the MS algorithm performs 𝑀 correlations of 𝐹 chips (parallel search), the proposed scheme realizes only one correlation on 𝐹/𝑀 chips (serial search), in the first dwell. Then, in the second dwell while the MS searches the correct shift analyzing the 𝑀 correlations of 𝐹chips one after the other, the proposed approach realizes the correlation only on the remaining (𝐹 − 𝐹/𝑀) chips. The advantages of using the two-dwell approach lie in the fact that it presents a lower complexity than the MS algorithm. In fact, we can define two (lower and upper) bounds of the acquisition performance: best case if the correct shift is the first on 𝐹 chips; 𝑤𝑜𝑟𝑠𝑡 case if the correct shift is the last chip on 𝐹 chips. We can evaluate the total number of needed operations as follows: - Best case: in this case, the correct shift is represented by the first chip of the first code (on 𝑀) in the search area. In particular, the multiple shift algorithm must analyze 𝑀 different shifts at the same time in the first dwell, and then find the correct shift in the second dwell analyzing each shift separately. This means that during the first dwell the MS algorithm must perform 𝑀 correlations of codes made of 𝐹 chips, for a total number of operations (sums and products) of 2∗ 𝑀∗ 𝐹, while in the second dwell it will find the correct chip analyzing only the first shift of the first code of 𝐹 chips, for a total number of operations (sums and products) of 2∗ 𝐹. Hence the total number of operation performed by the MS algorithm (in the first and second dwell) for the best case is 2𝐹∗ (𝑀 +1). In the first dwell, the proposed method performs a total number of operations (sums and products) of only 2∗ 𝐹/𝑀, because it performs a serial search on 𝐹/𝑀 chips of the same code. Then in the second dwell, it performs the correlation on the remaining chips. Hence the total number of operations performed by the proposed algorithm (in the first and second dwell) is 2 𝐹. - Worst case: in this case, the correct shift is represented by the last chip of the last code (on 𝑀) in the search area. In particular, the multiple shift must perform 𝑀 correlations of codes made of 𝐹 chips, for a total number of operations (sums and products) of 2∗ 𝑀∗ 𝐹, while in the second dwell it will find the correct chip analyzing all the 𝐹 chips of all the 𝑀 shifts (the correct chip is the last one of the 𝑀-th code of length 𝐹). Hence the total number of operations performed by the MS algorithm (in the first and second dwell) for the worst case is 2𝐹∗ (𝐹 + 𝑀). On the other hand, the proposed method performs a serial search on all the 𝐹/𝑀 chips for 𝑀 codes (2∗ 𝐹 operations) and then passes to the second dwell, performing the correlation on the remaining chips of the last code only, 2∗ (𝐹 − 𝐹/𝑀) operations. Hence, the total number of operation performed by the proposed algorithm (in the first and second dwell) is 2𝐹∗ (2𝑀 − 1)/𝑀. In conclusion, the number of operations required by the two acquisition methods, in terms of total sums and products, is as follows: - MS: best case = 2∗ 𝐹∗ (𝑀 +1) operations; worst case = 2∗ 𝐹∗ (𝑀 + 𝐹) operations. - Two-dwell: best case = 2∗ 𝐹 operations; worst case = 2∗ 𝐹∗ (2∗ 𝑀 − 1)/𝑀 operations. We can conclude that with the new algorithm we obtain the same systems performances of the MS, but saving a number of operations 𝐺 𝑏 = (𝑀 + 1) in the best operating case and a number of operations equal to 𝐺 𝑤 = 𝑀∗ (𝑀 + 𝐹)/(2∗ 𝑀 − 1) ≈ (𝑀 + 𝐹)/2 in the worst case, that rapidly increases with 𝑀. IV. CONCLUSIONS This paper has devised a two-dwell acquisition scheme for OCDMA communications based on OOCs. We have provided a closed form to analytically express the system’s error probabilities and showed that our procedure can obtain the same system performance as the MS approach but with lower computational complexity. REFERENCES [1] A. Keshavarzian and J. A. Salehi, “Optical orthogonal code acquisition in fiber-optic CDMA systems via the simple serial-search method,” IEEE Trans. Commun., vol. 50, no. 3, pp. 473–483, Mar. 2002. [2] A. Keshavarzian and J. A. Salehi, “Multiple-shift code acquisition of opti- cal orthogonal codes in optical CDMA systems,” IEEE Trans. Commun., vol. 53, no. 4, pp. 687–697, Apr. 2005. [3] J. A. Salehi, “Code division multiple-access techniques in optical fiber networks—I: fundamental principles,” IEEE Trans. Commun., vol. 37, no. 8, pp. 824–833, Aug. 1989. [4] G. Giunta, “Generalized Q-functions for application to noncoherent serial detection of spread-spectrum communication signals,” IEEE Trans. Signal Process., vol. 48, no. 5, pp. 1506–1513, May 2000. [5] J. A. Salehi and C. A. Brackett, “Code division multiple-access techniques in optical fiber networks—II: systems performance analysis,” IEEE Trans. Commun., vol. 37, no. 8, pp. 834–842, Aug. 1989. [6] D. DiCarlo and C. Weber, “Multiple dwell serial search: performance and application to direct sequence code acquisition,” IEEE Trans. Commun., vol. 31, no. 5, pp. 650–659, May 1983. [7] H. L. Van Trees, Detection, Estimation, and Modulation Theory. New York: Wiley, 1971. Authorized licensed use limited to: Jeppiaar Engineering College. Downloaded on May 01,2010 at 04:06:56 UTC from IEEE Xplore. Restrictions apply.