Optimal source matching in optical code division multiple access

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

The capacity of a discrete noisy channel is achieved when the transmission source is properly matched to the channel, in the sense that the distribution of the transmitted bits maximizes the channel's mutual information. Traditional source matching assumes independency between the source and the channel, while the case of source dependent channel is usually ignored. In this article, the source dependant channel of Optical Code Division Multiple Access (OCDMA), dominated by Multiple Access Interference (MAI) is analyzed. It is shown that source dependency of MAI reverses the expected behavior of the OCDMA channel, and also that for a given value of channel condition, or mutual information, the number of concurrent users can be increased when the source is properly matched to the channel. A simple technique, which allows combining source matching with practical bit stream methods such as synchronization, error correction codes and the utilization of different detection methods, is also presented.

Original languageEnglish
Title of host publication2006 IEEE International Conference on Communications, ICC 2006
PublisherInstitute of Electrical and Electronics Engineers
Pages2630-2635
Number of pages6
ISBN (Print)1424403553, 9781424403554
DOIs
StatePublished - 1 Jan 2006
Event2006 IEEE International Conference on Communications, ICC 2006 - Istanbul, Turkey
Duration: 11 Jul 200615 Jul 2006

Publication series

NameIEEE International Conference on Communications
Volume6
ISSN (Print)0536-1486

Conference

Conference2006 IEEE International Conference on Communications, ICC 2006
Country/TerritoryTurkey
CityIstanbul
Period11/07/0615/07/06

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Optimal source matching in optical code division multiple access'. Together they form a unique fingerprint.

Cite this