2018
DOI: 10.1364/jocn.10.000712
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer-Aware Performance Evaluation of SDM Networks Based on SMF Bundles, MCFs, and FMFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 29 publications
(41 citation statements)
references
References 29 publications
0
41
0
Order By: Relevance
“…Ground truth y s was generated by the Q-factor model [1]. Q-threshold was set to a corresponding BER of 10 −3 [1]. As shown in Table 1, 3 datasets D were created, that differ in their size.…”
Section: Dataset Generation Model Training and Accuracymentioning
confidence: 99%
See 1 more Smart Citation
“…Ground truth y s was generated by the Q-factor model [1]. Q-threshold was set to a corresponding BER of 10 −3 [1]. As shown in Table 1, 3 datasets D were created, that differ in their size.…”
Section: Dataset Generation Model Training and Accuracymentioning
confidence: 99%
“…Traditional network planning tools estimate Quality-of-Transmission (QoT) with static Q-factor models [1] which are functions of the physical layer impairments (PLIs). The calculation of these PLIs requires complex computations, timeconsuming measurements, and expensive equipment that take considerable human effort and lack self-adaptivenes.…”
Section: Introductionmentioning
confidence: 99%
“…The single-slice QoT-aware RSA heuristic, integrating only the QoT model of the lowest BER requirement, is used as a benchmark. The reader should note that in the literature, existing QoT-aware RSA algorithms consider only a single BER requirement [28][29][30]. In this work, we show that the multi-slice QoT-aware RSA outperforms the state-of-the-art single-slice QoT-aware RSA approach by avoiding slice/connection overprovisioning, an indicator that the diverse BER requirements must be specifically taken into account during slice/connection provisioning.…”
Section: Research Articlementioning
confidence: 72%
“…Dijkstra's shortest path algorithm [43] was used for the R sub-problem, and the first-fit technique was utilized for the SA sub-problem, while at the same time ensuring that all three SA constraints are met. For each lightpath provisioned, the Q-tool (described in [28]) was used for estimating the ground truth values (i.e., BER n ). In practical implementations, the BER ground truth values can be extracted trough OPM at the receivers [11].…”
Section: Dataset Generation and Model Training And Evaluation A Datamentioning
confidence: 99%
“…This QAN was designed for resource and cost sharing where the most expensive components, the single photon detectors, were placed in the central location to be shared by multiple users.The full capacity of QKD can be unleashed by incorporating the spatial division multiplexing (SDM) domain on top of the existing wavelength division multiplexing (WDM) layer. SDM is now being considered the route towards capacity upgrade for current core optical communication networks [15,16] and will progressively permeate into the access…”
mentioning
confidence: 99%