Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG

Article


Al Noor, M., Loo, J. and Comley, R. 2011. Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG. International Journal on Advances in Telecommunications. 4 (1&2), pp. 183-193.
TypeArticle
TitleExtended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG
AuthorsAl Noor, M., Loo, J. and Comley, R.
Abstract

The main impediments for long distance signal transmission in the fibre optic system, especially the radio over fibre (RoF) system, are the chromatic dispersion and signal power attenuation. Additionally, the power consumption in the laser diode and optical amplifiers affect the signal transmission costs; however, it is lower than in a wireless system. Therefore, decreasing the power consumption and chromatic dispersion and increasing the data bit rate in RoF are the demands for present and future fibre optic system technology. In order to increase the signal transmission distance and improve the frequency spectrum, we study in this paper a mobile Worldwide Interoperability for Microwave Access (WiMAX) signal transmission over RoF via a triple symmetrical dispersion system. The combination of three different fibres - single mode fibre (SMF), dispersion compensating fibre (DCF) and chirped fibre Bragg grating (CFBG) - is used to transmit a 120Mbps mobile WiMAX scalable Orthogonal Frequency Division Multiple Access (OFDMA) signal with 3.5GHz carrier frequency and 20MHz bandwidth over a RoF system. To compensate the dispersion, the SMF and DCF are employed and specifically the high reflector CFBG is applied to reduce signal power loss. In our study, the WIMAX signal is transmitted through a triple symmetrical dispersion system consisting of 2xDCF (20 km) and 2xSMF (100 km) connected to SMF (24 km) and CFBG. Simulation results clearly indicate that the limited signal transmission length and data bit rate in the RoF system, caused by fibre attenuation and chromatic dispersion, can be overcome by the combination of SMF, DCF and CFBG. The transmission distance in the fibre is extended to 792 Km, SNR and OSNR are highly satisfactory; simultaneously the power consumption is decreased.

Research GroupSensoLab group
PublisherIARIA
JournalInternational Journal on Advances in Telecommunications
ISSN1942-2601
Publication dates
Print15 Aug 2011
Publication process dates
Deposited23 May 2012
Output statusPublished
Web address (URL)http://www.iariajournals.org/telecommunications/tele_v4_n12_2011_paged.pdf
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/83q27

Restricted files

Publisher's version

  • 17
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815
Design of a robotic sensorimotor system for phantom limb pain rehabilitation
Snow, P., Loureiro, R. and Comley, R. 2014. Design of a robotic sensorimotor system for phantom limb pain rehabilitation. 5th IEEE RAS & EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob). São Paulo, Brazil 12 - 15 Aug 2014 IEEE. pp. 120-125 https://doi.org/10.1109/BIOROB.2014.6913763
Optical flow estimation via steered-L1 norm
Zayouna, A., Comley, R. and Shi, D. 2016. Optical flow estimation via steered-L1 norm. Pan, Z. and Skala, V. (ed.) 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision. Plzen, Czech Republic 30 May - 03 Jun 2016 Digital Library University of West Bohemia. pp. 81-90
Parametric tracking across multiple cameras
Sebastian, P., Voon, Y. and Comley, R. 2017. Parametric tracking across multiple cameras. Pertanika Journal of Science & Technology. 25 ((S)Jan), pp. 159-168.
A review of hough transform and line segment detection approaches
Rahmdel, P., Comley, R., Shi, D. and McElduff, S. 2015. A review of hough transform and line segment detection approaches. 10th International Conference on Computer Vision Theory and Applications (VISAPP 2015). Berlin, Germany 11 - 14 Mar 2015 SCITEPRESS - Science and Technology Publications. pp. 411-418 https://doi.org/10.5220/0005268904110418
Comment on "collinear segment detection using HT neighborhoods"
Rahmdel, P., Shi, D. and Comley, R. 2013. Comment on "collinear segment detection using HT neighborhoods". IEEE Transactions on Image Processing. 23 (2), pp. 952-955. https://doi.org/10.1109/TIP.2013.2291329
Colour space effect on tracking in video surveillance
Sebastian, P., Voon, Y. and Comley, R. 2010. Colour space effect on tracking in video surveillance. International Journal on Electrical Engineering and Informatics. 2 (4), pp. 298-312.
Content-based petrieval of 3D medical images
Qian, Y., Gao, X., Loomes, M., Comley, R., Barn, B., Hui, R. and Tian, Z. 2011. Content-based petrieval of 3D medical images. in: Gemert-Pijnen, L., Ossebaard, H. and Hämäläinen, P. (ed.) eTELEMED 2011, The Third International Conference on eHealth, Telemedicine, and Social Medicine IARIA. pp. 7-12
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
The effect of colour space on tracking robustness
Sebastian, P., Voon, Y. and Comley, R. 2008. The effect of colour space on tracking robustness. in: 2008 3rd IEEE Conference on Industrial Electronics and Applications Institute of Electrical and Electronics Engineers (IEEE). pp. 2512-2516
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.
Bridging the abridged – the diffusion of Telemedicine in Europe and China
Gao, X., Loomes, M. and Comley, R. 2012. Bridging the abridged – the diffusion of Telemedicine in Europe and China. in: Rodrigues, J., Díez, I. and Abajo, B. (ed.) Telemedicine and e-health services, policies, and applications: avancements and developments USA IGI Global. pp. 451-495
Local-global optical flow for image registration agents
Zayouna, A., Comley, R. and Shi, D. 2011. Local-global optical flow for image registration agents. iUBICOM ’11: The 6th International Workshop on Ubiquitous and Collaborative Computing. Northumbria University, Newcastle 04 Jul 2011
Wireless mesh network security: a traffic engineering management approach
Muogilim, O., Loo, J. and Comley, R. 2011. Wireless mesh network security: a traffic engineering management approach. Journal of Network and Computer Applications. 34 (2), pp. 478-491. https://doi.org/10.1016/j.jnca.2010.03.027
Towards healthcare based on ubiquitous computing
Shi, D. and Comley, R. 2010. Towards healthcare based on ubiquitous computing. IEEE Transactions on Systems, Man, and Cybernetics eNewsletter. 33.
Heuristic standards for universal design in the face of technological diversity.
Adams, R. and Comley, R. 2009. Heuristic standards for universal design in the face of technological diversity. 2009 IEEE Accessing the Future Conference. Boston: Northeastern University 20 - 21 Jul 2009
The potential of the BCI for accessible and smart e-learning
Adams, R., Comley, R. and Ghoreyshi, M. 2009. The potential of the BCI for accessible and smart e-learning. Lecture Notes in Computer Science. 5615, pp. 467-476. https://doi.org/10.1007/978-3-642-02710-9_51
Texture-based 3d image retrieval for medical applications
Gao, X., Qian, Y., Hui, R., Loomes, M., Comley, R., Barn, B., Chapman, A. and Rix, J. 2010. Texture-based 3d image retrieval for medical applications. Macedo, M. (ed.) IADIS International Conference e-Health 2010. Freiburg, Germany 29 - 31 Jul 2010 IADIS. pp. 101-108
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Attacks on an ISO/IEC 11770-2 key establishment protocol
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
Remove key escrow from the identity-based encryption system.
Comley, R., Vasiu, L. and Cheng, Z. 2004. Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings.. 3 (3), pp. 37-50.
Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach
Anishenko, S., Osimov, V., Shaposhnikov, D., Podladchikova, L., Comley, R. and Gao, X. 2008. Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach. Puuronen, S., Pechenizkiy, M., Tsymbal, A. and Lee, D. (ed.) 21st IEEE International Symposium on Computer-Based Medical Systems. Jyvaskyla, Finland 17 - 19 Jun 2008 IEEE Computer Society. pp. 50-52 https://doi.org/10.1109/CBMS.2008.19
General and efficient Certificateless Public Key Encryption constructions
Comley, R., Cheng, Z., Chen, L. and Ling, L. 2007. General and efficient Certificateless Public Key Encryption constructions. Takagi, T., Okamoto, T., Okamoto. E. and Okamoto, T. (ed.) Pairing-Based Cryptography - Pairing 2007. First International Conference. Tokyo, Japan 02 - 04 Jul 2007 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-540-73489-5_6
Identity-based key agreement with unilateral identity privacy using pairings
Comley, R., Chen, L., Tang, Q. and Cheng, Z. 2006. Identity-based key agreement with unilateral identity privacy using pairings. Chen, K., Deng, R., Lai, X. and Zhou, J. (ed.) Information Security Practice and Experience: Second International Conference, ISPEC 2006. Hangzhou, China 11 - 14 Apr 2006 Berlin, Heidelberg Springer. https://doi.org/10.1007/11689522_19