988 resultados para enhanced delay-bandwidth product
Resumo:
A new method for enhancing the 2.1 VSWR impedance bandwidth of microstrip antennas is presented. Bandwidth enhancement is achieved by loading the microstrip antenna by a ceramic microwave dielectric resonator (DR). The validity of this technique has been established using rectangular and circular radiating geometries. This method improves the bandwidth of a rectangular microstrip antenna to more than 10% (= 5 times that of a conventional rectangular microstrip antenna) with an enhanced gain of I dB
Resumo:
We show experimentally a 57nm gain bandwidth for an ultra-long Raman fiber laser based amplification technique using only a single pump wavelength. The enhanced gain bandwidth and gain flatness is investigated for single and multi-cavity designs. ©2010 IEEE.
Resumo:
Timeliness guarantee is an important feature of the recently standardized IEEE 802.15.4 protocol, turning it quite appealing for Wireless Sensor Network (WSN) applications under timing constraints. When operating in beacon-enabled mode, this protocol allows nodes with real-time requirements to allocate Guaranteed Time Slots (GTS) in the contention-free period. The protocol natively supports explicit GTS allocation, i.e. a node allocates a number of time slots in each superframe for exclusive use. The limitation of this explicit GTS allocation is that GTS resources may quickly disappear, since a maximum of seven GTSs can be allocated in each superframe, preventing other nodes to benefit from guaranteed service. Moreover, the GTS may be underutilized, resulting in wasted bandwidth. To overcome these limitations, this paper proposes i-GAME, an implicit GTS Allocation Mechanism in beacon-enabled IEEE 802.15.4 networks. The allocation is based on implicit GTS allocation requests, taking into account the traffic specifications and the delay requirements of the flows. The i-GAME approach enables the use of one GTS by multiple nodes, still guaranteeing that all their (delay, bandwidth) requirements are satisfied. For that purpose, we propose an admission control algorithm that enables to decide whether to accept a new GTS allocation request or not, based not only on the remaining time slots, but also on the traffic specifications of the flows, their delay requirements and the available bandwidth resources. We show that our approach improves the bandwidth utilization as compared to the native explicit allocation mechanism defined in the IEEE 802.15.4 standard. We also present some practical considerations for the implementation of i-GAME, ensuring backward compatibility with the IEEE 801.5.4 standard with only minor add-ons. Finally, an experimental evaluation on a real system that validates our theoretical analysis and demonstrates the implementation of i-GAME is also presented
Resumo:
The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling technology for time sensitive wireless sensor networks thanks to its Guaranteed-Time Slot (GTS) mechanism in the beacon-enabled mode. However, the protocol only supports explicit GTS allocation, i.e. a node allocates a number of time slots in each superframe for exclusive use. The limitation of this explicit GTS allocation is that GTS resources may quickly disappear, since a maximum of seven GTSs can be allocated in each superframe, preventing other nodes to benefit from guaranteed service. Moreover, the GTSs may be only partially used, resulting in wasted bandwidth. To overcome these limitations, this paper proposes i-GAME, an implicit GTS Allocation Mechanism in beacon-enabled IEEE 802.15.4 networks. The allocation is based on implicit GTS allocation requests, taking into account the traffic specifications and the delay requirements of the flows. The i-GAME approach enables the use of a GTS by multiple nodes, while all their (delay, bandwidth) requirements are still satisfied. For that purpose, we propose an admission control algorithm that enables to decide whether to accept a new GTS allocation request or not, based not only on the remaining time slots, but also on the traffic specifications of the flows, their delay requirements and the available bandwidth resources. We show that our proposal improves the bandwidth utilization compared to the explicit allocation used in the IEEE 802.15.4 protocol standard. We also present some practical considerations for the implementation of i-GAME, ensuring backward compatibility with the IEEE 801.5.4 standard with only minor add-ons.
Resumo:
Vertical-cavity surface-emitting lasers (VCSELs) and microlenses can be used to implement free space optical interconnects (FSOIs) which do not suffer from the bandwidth limitations inherent in metallic interconnects. A comprehensive link equation describing the effects of both optical and electrical noise is introduced. We have evaluated FSOI performance by examining the following metrics: the space-bandwidth product (SBP), describing the density of channels and aggregate bandwidth that can be achieved, and the carrier-to-noise ratio (CNR), which represents the relative strength of the carrier signal. The mode expansion method (MEM) was used to account for the primary cause of optical noise: laser beam diffraction. While the literature commonly assumes an ideal single-mode laser beam, we consider the experimentally determined multimodal structure of a VCSEL beam in our calculations. It was found that maximum achievable interconnect length and density for a given CNR was significantly reduced when the higher order transverse modes were present in Simulations. However, the Simulations demonstrate that free-space optical interconnects are still a suitable solution for the communications bottleneck, despite the adverse effects introduced by transverse modes.
Resumo:
The detection of signals in the presence of noise is one of the most basic and important problems encountered by communication engineers. Although the literature abounds with analyses of communications in Gaussian noise, relatively little work has appeared dealing with communications in non-Gaussian noise. In this thesis several digital communication systems disturbed by non-Gaussian noise are analysed. The thesis is divided into two main parts. In the first part, a filtered-Poisson impulse noise model is utilized to calulate error probability characteristics of a linear receiver operating in additive impulsive noise. Firstly the effect that non-Gaussian interference has on the performance of a receiver that has been optimized for Gaussian noise is determined. The factors affecting the choice of modulation scheme so as to minimize the deterimental effects of non-Gaussian noise are then discussed. In the second part, a new theoretical model of impulsive noise that fits well with the observed statistics of noise in radio channels below 100 MHz has been developed. This empirical noise model is applied to the detection of known signals in the presence of noise to determine the optimal receiver structure. The performance of such a detector has been assessed and is found to depend on the signal shape, the time-bandwidth product, as well as the signal-to-noise ratio. The optimal signal to minimize the probability of error of; the detector is determined. Attention is then turned to the problem of threshold detection. Detector structure, large sample performance and robustness against errors in the detector parameters are examined. Finally, estimators of such parameters as. the occurrence of an impulse and the parameters in an empirical noise model are developed for the case of an adaptive system with slowly varying conditions.
Resumo:
Quantum-dot mode-locked lasers are injection-locked by coherent two-tone master sources. Spectral tuning, significantly improved time-bandwidth product, and low jitter are demonstrated without deterioration of the pulse properties.
Resumo:
We present the dynamics of quantum-dot passively mode-locked semiconductor lasers under optical injection. We discuss the benefits of various configurations of the master source including single, dual, and multiple coherent frequency sources. In particular, we demonstrate that optical injection can improve the properties of the slave laser in terms of time-bandwidth product, optical linewidth, and timing jitter.
Resumo:
We perform characterization of the pulse shape and noise properties of quantum dot passively mode-locked lasers (PMLLs). We propose a novel method to determine the RF linewidth and timing jitter, applicable to high repetition rate PMLLs, through the dependence of modal linewidth on the mode number. Complex electric field measurements show asymmetric pulses with parabolic phase close to threshold, with the appearance of waveform instabilities at higher currents. We demonstrate that the waveform instabilities can be overcome through optical injection-locking to the continues wave (CW) master laser, leading to time-bandwidth product (TBP) improvement, spectral narrowing, and spectral tunability. We discuss the benefits of single- and dual-tone master sources and demonstrate that dual-tone optical injection can additionally improve the noise properties of the slave laser with RF linewidth reduction below instrument limits (1 kHz) and integrated timing jitter values below 300 fs. Dual-tone injection allowed slave laser repetition rate control over a 25 MHz range with reduction of all modal optical linewidths to the master source linewidth, demonstrating phase-locking of all slave modes and coherence improvement.
Resumo:
We perform characterization of the pulse shape and noise properties of quantum dot passively mode-locked lasers (PMLLs). We propose a novel method to determine the RF linewidth and timing jitter, applicable to high repetition rate PMLLs, through the dependence of modal linewidth on the mode number. Complex electric field measurements show asymmetric pulses with parabolic phase close to threshold, with the appearance of waveform instabilities at higher currents. We demonstrate that the waveform instabilities can be overcome through optical injection-locking to the continues wave (CW) master laser, leading to time-bandwidth product (TBP) improvement, spectral narrowing, and spectral tunability. We discuss the benefits of single- and dual-tone master sources and demonstrate that dual-tone optical injection can additionally improve the noise properties of the slave laser with RF linewidth reduction below instrument limits (1 kHz) and integrated timing jitter values below 300 fs. Dual-tone injection allowed slave laser repetition rate control over a 25 MHz range with reduction of all modal optical linewidths to the master source linewidth, demonstrating phase-locking of all slave modes and coherence improvement.
Resumo:
Quantum-dot mode-locked lasers are injection-locked by coherent two-tone master sources. Spectral tuning, significantly improved time-bandwidth product, and low jitter are demonstrated without deterioration of the pulse properties.
Resumo:
We present the first self-mode-locked optically pumped quantum-dot semiconductor disk laser. Our mode-locked device emits sub-picosecond pulses at a wavelength of 1040 nm and features a record peak power of 460 W at a repetition rate of 1.5 GHz. In this work, we also investigate the temperature dependence of the pulse duration as well as the time-bandwidth product for stable mode locking. © 2014 Optical Society of America.
Resumo:
We present the dynamics of quantum-dot passively mode-locked semiconductor lasers under optical injection. We discuss the benefits of various configurations of the master source including single, dual, and multiple coherent frequency sources. In particular, we demonstrate that optical injection can improve the properties of the slave laser in terms of time-bandwidth product, optical linewidth, and timing jitter.
Resumo:
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.