Dispersion and nonlinear distortion have an effect on transmission performanc es of optic al fiber transimission systems. The schemes of dispersion compensation and nonli near distortion self-compens ation in telecom-...Dispersion and nonlinear distortion have an effect on transmission performanc es of optic al fiber transimission systems. The schemes of dispersion compensation and nonli near distortion self-compens ation in telecom-CATV co-network transmission systems are reported, followed by investigation on (1) the impact of dispersion compensation fiber (DCF) on fi ber nonlinear effects with a cascade of erbium-doped fiber amplifiers (EDFAs) an d different dispersion compensation schemes, (2) the impact of the complex on th e total nonlinear distortion induced by EDFA gain tilt and the light source. As a result , dispersion compensation optimal scheme and EDFA negative gain tilt are suggest ed as a solution to dispersion compensation and the nonlinear distortion self-c ompensation.展开更多
A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can ...A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can differentiate the priority of all requests and avoid c onflict and collision in the process of distributing channel and timeslot for th e data waiting for transmission. The method in calculating the best wavelength c hannel and the best timeslot number is simply given. The algorithm is carried o ut in a math language. On the basis of the experiment results, the performance a nd feasibility of the algorithm are analyzed, which prove that the allocation me thod can reach the requirements of an algorithm both in space complexity and tim e complexity .展开更多
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the...The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment.展开更多
文摘Dispersion and nonlinear distortion have an effect on transmission performanc es of optic al fiber transimission systems. The schemes of dispersion compensation and nonli near distortion self-compens ation in telecom-CATV co-network transmission systems are reported, followed by investigation on (1) the impact of dispersion compensation fiber (DCF) on fi ber nonlinear effects with a cascade of erbium-doped fiber amplifiers (EDFAs) an d different dispersion compensation schemes, (2) the impact of the complex on th e total nonlinear distortion induced by EDFA gain tilt and the light source. As a result , dispersion compensation optimal scheme and EDFA negative gain tilt are suggest ed as a solution to dispersion compensation and the nonlinear distortion self-c ompensation.
基金Key Projects of Enterprise Foundation from Guangdong Province(D8 -123 -145)
文摘A new effective and reliabl e channel-timeslot allocation algorithm has been proposed, which is applied in WD M optical networks using fiber as their media to allocate the operational reques t. This new algorithm can differentiate the priority of all requests and avoid c onflict and collision in the process of distributing channel and timeslot for th e data waiting for transmission. The method in calculating the best wavelength c hannel and the best timeslot number is simply given. The algorithm is carried o ut in a math language. On the basis of the experiment results, the performance a nd feasibility of the algorithm are analyzed, which prove that the allocation me thod can reach the requirements of an algorithm both in space complexity and tim e complexity .
基金Supported by the National Natural Science Foundation of China under Grant No.61571060Ministry of Science and Technology of China under Grant No.2016YFA0301300
文摘The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment.