2-Telecommunication Systems-principles and Applications
2-Telecommunication Systems-principles and Applications
Contributors
Tomas Horvath, Petr Munster, Josef Vojtech, Kiran Deep Singh, Ojo O. Adedayo, Oluwafemi B.
Ilesanmi, Ogunlade M. Adegoke, Ajibade Adedayo, Ali Hadi Abdulwahid, Juan Manuel Velazquez Arcos,
Ricardo Teodoro Paez Hernandez, Jaime Granados Samaniego, Tomas David Navarrete Gonzalez, Isiaka A.
Alimi, Paulo P. Monteiro, António L. Teixeira, Ana Tavares, Cátia Pinho, Abdelgader M. Abdalla, Teddy
Purnamirza, Toms Salgals, Inna Kurbatska, Sandis Spolitis, Vjaceslavs Bobrovs, Girts Ivanovs, Mário
Lima, Amer Al-Canaan, Iman Almomani, Mamdouh Alenezi
Individual chapters of this publication are distributed under the terms of the Creative Commons
Attribution 3.0 Unported License which permits commercial use, distribution and reproduction of
the individual chapters, provided the original author(s) and source publication are appropriately
acknowledged. If so indicated, certain images may not be included under the Creative Commons
license. In such cases users will need to obtain permission from the license holder to reproduce
the material. More details and guidelines concerning content reuse and adaptation can be found at
http://www.intechopen.com/copyright-policy.html.
Notice
Statements and opinions expressed in the chapters are these of the individual contributors and not
necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of
information contained in the published chapters. The publisher assumes no responsibility for any
damage or injury to persons or property arising out of the use of any materials, instructions, methods
or ideas contained in the book.
151
Countries delivered to
Top 1%
most cited scientists
12.2%
Contributors from top 500 universities
Preface XIII
Acknowledgements XV
Section 1
Telecommunication Protocol, Optimization, and Security Frameworks 1
Chapter 1 3
Telecommunications Protocols Fundamentals
by Amer Al-Canaan
Chapter 2 21
Optimum Efficiency on Broadcasting Communications
by Juan Manuel Velazquez Arcos, Ricardo Teodoro Paez Hernandez,
Tomas David Navarrete Gonzalez and Jaime Granados Samaniego
Chapter 3 41
Android Application Security Scanning Process
by Iman Almomani and Mamdouh Alenezi
Section 2
Next-Generation Optical Access Technologies 65
Chapter 4 67
Deployment of PON in Europe and Deep Data Analysis of GPON
by Tomas Horvath, Petr Munster and Josef Vojtech
Chapter 5 87
Research of M-PAM and Duobinary Modulation Formats for Use in
High-Speed WDM-PON Systems
by Toms Salgals, Inna Kurbatska, Sandis Spolitis, Vjaceslavs Bobrovs
and Girts Ivanovs
Chapter 6 105
Mitigating Turbulence-Induced Fading in Coherent FSO Links: An Adaptive
Space-Time Code Approach
by Ojo O. Adedayo, Oluwafemi B. Ilesanmi, Ogunlade M. Adegoke
and Ajibade Adedayo
Chapter 7 115
Spatial Light Modulation as a Flexible Platform for Optical Systems
by Cátia Pinho, Isiaka Alimi, Mário Lima, Paulo Monteiro and António Teixeira
Section 3
Convergence of Wireless-Optical Networks 135
Chapter 8 137
Enabling Optical Wired and Wireless Technologies for 5G and Beyond
Networks
by Isiaka A. Alimi, Ana Tavares, Cátia Pinho, Abdelgader M. Abdalla,
Paulo P. Monteiro and António L. Teixeira
Chapter 9 169
Role of Optical Network in Cloud/Fog Computing
by Kiran Deep Singh
Section 4
Advanced Relay and Antenna Systems for Smart Networks 183
Chapter 10 185
Radial Line Slot Array (RLSA) Antennas
by Teddy Purnamirza
Chapter 11 203
New High-Speed Directional Relay Based on Wireless Sensor Network for
Smart Grid Protection
by Ali Hadi Abdulwahid
XII
Preface
The exponential growth in bandwidth demand calls for viable means of meeting
system requirements. The advancements in optical communication have been
notable solutions to the current and future networks. With optical devices, both
short and long transmission can be effectively achieved. Part II provides detailed
information on the next-generation optical access technologies. It focuses on differ-
ent passive optical network variants and advanced optical modulation formats that
are vital to telecommunication systems for enhanced spectral efficiency and energy
efficiency (EE). Apart from the presented optical fiber-based schemes, free-space
optical (FSO) is also considered as a cost-effective, flexible and comparatively
easier network deployment. Part II also covers a number of spatial light modulator
technologies, which are viable for different applications such as FSO, multicore
fiber and spatial division multiplexing.
It is remarkable that wireless and optical network convergence is an attractive solu-
tion for leveraging the optical network’s inherent bandwidth as well as the mobility
benefit of wireless connectivity. Apart from being a good approach for realizing
high-network penetration with the anticipated ubiquitous feature, it can facilitate
achievement of the 5G network-envisioned EE and capacity. In Part III, enabling
technologies for effective convergence of wireless-optical networks are presented.
In addition, means of exploiting network convergence in cloud/fog computing are
discussed.
Part IV focuses on advanced relay and antenna systems for smart networks. In this
part, high-gain and miniaturized antennas capable of operating at microwave and
millimeter wave bands are presented. The antennas offer good features such as
low-cost, simplified structure, low footprint and ease of installation. Part IV also
covers high-speed directional relay based on wireless sensor network for smart grid
protection.
In general, this book presents not only the fundamental features, concepts and
the associated evolutions of telecommunication, but also explains the underlying
technical principles of state-of-the-art systems with good perceptions into the
expectation of the next-generation telecommunication systems. The information
presented in the book is clear, easy to follow, concise and comprehensible. It covers
both theoretical and practical aspects of system implementation in such a way that
makes it suitable for students, researchers and professional engineers. It is a good
reference for all prospective readers to keep abreast of the current trends in tele-
communication systems and to motivate them towards innovative ideas.
XIV
Acknowledgements
The editors would like acknowledge and appreciate all the collaborators that have
contributed to the compilation and completion of this book with recent discoveries
in different fields of telecommunication systems. Furthermore, we would like to
acknowledge the members of the Optical Communications group at the Instituto
de Telecomunicações, Aveiro, Portugal, who have vastly contributed with valuable
ideas, comments, recommendations and fruitful discussions. In addition, the
editors would like to acknowledge support of the European Regional Development
Fund (FEDER), through the Regional Operational Programme of Lisbon (POR
LISBOA 2020) and the Competitiveness and Internationalization Operational
Programme (COMPETE 2020) of the Portugal 2020 (P2020) framework, under
Project 5G (POCI-01-0247-FEDER-024539). Also, we acknowledge support of the
FEDER through COMPETE 2020 of the P2020, under the Project Virtual Fiber Box
with Nr. 033910 (POCI-01-0247-FEDER-033910)]. The projects have contributed
immensely both technically and financially towards Chapters 7 and 8. Likewise,
we deeply appreciate the technical support being offered under the project
DSPMetroNet (POCI-01- 0145-FEDER-029405). Without the project’s support,
it would have been challenging for this book to come to fruition.
Telecommunication Protocol,
Optimization, and Security
Frameworks
1
Chapter 1
Telecommunications Protocols
Fundamentals
Amer Al-Canaan
Abstract
The need for communication amongst people and electrical systems motivated
the emergence of a large number of telecommunications protocols. The advances in
digital networks and the internet have contributed to the evolution of telecommu-
nications worldwide. The purpose of this chapter is to provide students and
researchers with a clear presentation of telecommunications core protocols that are
utilised in different research domains including telephony, brain-computer inter-
face (BCI) and voice and digital telecommunications. Indeed, BCI involves different
electrical signals, communications concepts and telecommunications protocols.
This chapter introduces the reader to the core concepts in communications includ-
ing analogue and digital telecommunications protocols that are utilised generally in
communications and in particular in BCI systems. The topics covered in this chapter
include telecommunications protocols, communications media, electrical signals,
analogue and digital modulation techniques in digital communications, software-
defined radio, overview on 10-Mbps Ethernet protocol and Session Initiation Pro-
tocol (SIP).
1. Introduction
3
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
which have numerous advantages over circuit switching upon which is based on the
traditional PSTN.
VoIP applications for local area network (LAN), wide area networks (WAN),
wireless local area network (WLAN) and mobile telephone networks offer better
availability, scalability, flexibility, minimum hardware and low cost than PSTN. On
the other hand, Internet-related problems such as delay and congestion causing
jitter and packet loss are inherent in VoIP.
However, circuit switching is compelling in many applications where real-time,
low delay and high QoS are desired, where each customer of modern PSTN profits
from dedicated analogue or digital circuits. This implies that a communication
channel is reserved during a call or a data session. Due to the limited number of
circuits and control units in PSTN, only a fraction of customers can perform
simultaneous calls within a switch.
One of the main protocols that has been developed for IP telephony is SIP, which
is inspired from establishing and ending a call session and for changing parameters
of an established session. The simplicity of SIP and the emergence of Java applica-
tion interfaces for integrated networks (JAIN)-SIP which is a Java-based API for SIP
have reinforced the development and implementation of platform-independent IP
telephony services.
In this chapter, core concepts in telecommunications protocols, as well as other
related topics including communications media, analogue and digital modulation
techniques in digital communications, software-defined radio, overview on
10-Mbps Ethernet protocol and SIP protocol, are presented in an easy and simple
style with a number of figures to explain the basic principles of telecommunications
protocols.
Twisted pairs are utilised to carry analogue and digital signals. Depending on
distance, analogue signals may be limited to 250 kHz, and digital signals are limited
to 10 Mbps for distances around 100 m [3]. At the onset of electrical telecommuni-
cation systems, copper was the main transmission medium because of its electrical
characteristics such as low resistivity to electric current.
The Morse code is a variable-length code, where each character is given a series
of dots and dashes. Some letters have one dot and others have one dash. The code
length varies from 1 to 5, covering 36 symbols. The telegraph signals were carried
using copper twisted pairs. Signal wires are twisted in order to cancel out unwanted
noise and reduce the effective inductance of the transmission line. At the sending
side, a switch is used to open and close the electric circuit in a certain pattern in
order to produce Morse code at the receiving side.
4
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
distances than the twisted pair. Analogue signal frequency can exceed 500 MHz,
and baud rate can reach 500 Mbps depending on distance.
Optical fibre systems consist of a laser diode transmitter and receiver separated
by transparent optical fibre. The signals are transmitted as light pulses that propa-
gate inside the optical fibre. The optical fibre has small diameter and consists of
three components: the core (pure glass or plastic), the cladding and the protective
cover. The cladding material (glass or plastic) is less optically dense, which allows
the light to travel easier through the core. The optical fibre can be used on longer
distances with attenuation.
With shorter wavelengths in the range 4–6 GHz, microwave signals travel in
straight lines and do not penetrate solid objects. They are affected by clouds, rain
and obstacles blocking the line of sight between the transmitter and receiver. Usu-
ally parabolic antennas are used for large systems. The received signal is focused at
the focal point of the parabola.
In the 1980s, the very small aperture terminal devices made it possible to
telecommunicate, utilising small dish dimensions between remote areas by means
of highly directional parabolic antennas [4].
The microphone in a telephone set converts sound into analogue electric signals
that are conveyed traditionally through copper wires and reproduced back at the
receiver into sound waves through the speaker. The first telephone systems were
analogue, while today’s telephone systems are completely digital with tone dialling,
voice and data services. Telephone networks have profited from advancements in
wireless communications by the implementation of the mobile [5, 6] communica-
tions. Old telephone networks were designed mainly to convey voice before the
emergence of digital data networks and the Internet.
Digital signals are characterised by two discrete levels, high and low (1 or 0),
while analogue signals have continuous forms. Digital and analogue signals are both
5
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Return to zero is an improved digital encoding over the NRZ encoding, where
logic one signals return to zero as shown in Figure 2. The RZ encoding is
inconvenient for data transmission when data contain a long series of zeros.
To assure reliable transmission of digital data (such as Ethernet and IP), the
Manchester encoding (refers to Figures 3 and 4 with clock signal) is convenient to
solve the issue of sending a long series of zeros or ones through a data communica-
tion line. The Manchester encoding encodes logic 1 as a transition from level high to
low signal, while a 0 is a transition from low to high. The needed bandwidth is twice
as the original signal, and there is always a change in the middle of each bit.
An improved version of this encoding is called the differential Manchester
encoding, where a 0 causes the signal to change at the start of the interval (refer to
Figure 5). On the other hand, a 1 causes a change at the end of the interval. A 1
keeps the signal level unchanged as in the previous bit and changes to high at the
middle. This is advantageous and permits interchanging the wiring of a differential
pair without any issue.
Figure 1.
Unipolar non-return to zero (NRZ).
6
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
Figure 2.
Unipolar return to zero (RZ).
Figure 3.
Manchester encoding.
Figure 4.
Manchester encoding example.
7
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 5.
Manchester differential encoding example.
Shannon studied noisy channels, and his theory is based upon the fact that
a signal has to have high signal-to-noise (S/N) ratio in order to be
successfully distinguished. This influences the maximum bit rate that can be used
as follows:
To increase the data rate, a channel with high S/N should be used. Other means
that can increase the bit rate is data compression.
To convert a continuous signal x(t) into a digital form [8], it is first sampled at
equal intervals of time. To be able to reconstruct a sampled signal, xδ ðtÞ is defined as
∞
xδ ðtÞ ¼ ∑ xðnT s Þδðt � nT s Þ (2)
n¼�∞
8
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
1.1.16 Multiplexing
Multiplexing occurs when data are collected from different sources and are
transmitted into one common communication channel. Three types of multiplexing
are utilised, namely:
2. Modulation techniques
In the past, digital networks were connected through telephone networks via the
modem (modulation/demodulation). Modern telecommunications systems utilise
optical fibres that carry many digital channels, which can be translated into voice
signals in a telephone by using a codec (coder/decoder). This involves digital-to-
analogue (D/A) and analogue-to-digital
(A/D) conversions. When a signal
mðtÞ ¼ Am cos 2πf m t þ ϕm ðtÞ is transmitted, it is normally modulated using a car-
rier cðtÞ ¼ Ac sin 2πf c t þ ϕc ðtÞ signal, which can be changed or modulated in
amplitude (Ac), phase shift (ϕc ) or frequency
(fc) [9]. The carrier signal can be
generalised as cðtÞ ¼ Ac ðtÞ sin 2πf c t þ ϕc ðtÞ .
Amplitude modulation (AM) takes place when Ac ðtÞ is linearly related to the
modulating signals (message). In this modulation technique, the carrier frequency
is kept constant, and its amplitude is varied according to the amplitude of the
transmitted analogue signal as shown in Figure 6. An AM signal yðtÞ is the result of
multiplying the message mðtÞ and carrier
cðtÞ functions. Assuming a sinusoidal
carrier signal defined as cðtÞ ¼ Ac sin 2πf c t is used to modulate the message signal
mðtÞ ¼ Am cos 2πf m t þ ϕðtÞ :
In the above equation, m is the modulation index, which is the ratio of the
amplitude of the message signal Am to the amplitude Ac of the carrier signal.
9
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 6.
AM modulation.
1
yðtÞ ¼ Ac sin 2πf c t þ mAc sin 2π f c þ f m t þ ϕ þ sin 2π f c � f m t � ϕ
2
(4)
2. The sum of the carrier and modulated frequencies f c þ f m þ ϕ with the same
phase shift of the message signal.
Frequency modulation (FM) takes place when the time derivative of ϕðtÞ is
linearly related to the modulating signal. In this modulation technique, the ampli-
tude of the carrier signal is kept constant, and its frequency is varied according to
the amplitude of the transmitted analogue signal as shown in Figure 7. Frequency
and phase modulations
are
considered as special cases of angle modulation
sðtÞ ¼ Ac cos 2πf c t þ ϕðtÞ . The carrier frequency is changed such that the fre-
quency fc depends on the message signal. Since the frequency is the derivative of the
phase, the relation between the input signal and frequency can be written as [9]
ϕ0 ðtÞ ¼ mf mðtÞ. The FM signal yðtÞ can be written as
10
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
Am f Δ
yðtÞ ¼ Ac cos 2πf c t þ sin 2πf m t (5)
fm
fΔ
mf ¼ (6)
fm
The frequency modulation index can be less than 1 (for narrowband FM) or
much greater than 1 (for wideband FM).
Phase modulation (PM) takes place when ϕðtÞ is linearly related to the modulat-
ing signal. In this modulation technique, the amplitude of the carrier signal is kept
constant, and its phase is varied according to the amplitude of the transmitted
analogue signal as shown in Figure 8. The phase of the PM signal can be written in
terms of the phase modulation index mp as ϕðtÞ ¼ mp mðtÞ.
Figure 7.
FM modulation.
11
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 8.
PM modulation.
In the equation above, k is a constant shift in frequency. Obviously, the FSK uses
two frequencies ( f c þ k and f c � k) for logic 0 and 1, respectively. This type of FSK
is called binary FSK (BFSK).
In case k and 3k are used to shift the carrier frequency, the resulting FSK signal
has four different frequencies and can be utilised to encode the binary codes
00, 01, 10 and 11, as follows:
8 � � ��
> Ac cos 2π f c þ 3k t , if bits ¼ 00
>
< A cos �2π � f � k�t�,
>
if bits ¼ 01
c
sðtÞ ¼ � � c �� (8)
> Ac cos 2π f c þ k t ,
> if bits ¼ 10
>
: � � ��
Ac cos 2π f c � 3k t , if bits ¼ 11
12
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
Figure 9.
FSK modulation.
Figure 10.
ASK modulation.
13
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
are considered, the following bit code sequences can be defined as 00, 01, 10 and 11.
A ASK signal s(t) can be written as
� � �
Ac cos 2πf c t , if bit ¼ 1
sð tÞ ¼ (9)
0, if bit ¼ 0
Phase-shift keying (PSK) is also called phase modulation (PM). The signal can have
a variable phase as shown in Figure 11. If the signal is compared with its predecessor,
this technique is called differential phase-shift keying (DPSK). Each phase shift can be
assigned to a given binary code [11]. A PSK signal sðtÞ can be written as
( � �
Ac cos 2πf c t þ π , if bit ¼ 1
sð tÞ ¼ � � (10)
Ac cos 2πf c t if bit ¼ 0
Since the above equation contains two distinct phases, this type is called binary
phase-shift keying (BPSK). If the number of phase variations is increased to 4, the
quadrature PSK (QPSK) ca be defined as follows:
8 � π�
>
> Ac cos 2πf c t þ , if bits ¼ 00
>
> 4
>
> � �
>
> 3π
>
>
> A cos 2πf t þ , if bits ¼ 01
< c
> c
4
sðtÞ ¼ �
5π
� (11)
>
>
> Ac cos 2πf c t þ
> , if bits ¼ 10
>
> 4
>
> � �
>
>
>
> 7π
: Ac cos 2πf c t þ , if bits ¼ 11
4
Though the above three approaches can be used with any number of signals,
they tend to be difficult to implement due to the fact that special hardware will
be needed to distinguish between adjacent amplitudes, phases and frequencies. To
overcome this limitation, a combination of bits can be assigned to groups of
signals that can be different in amplitude and phase, for example. For example,
using signals with two amplitudes and two phase shifts produces four
different signals.
• Pulse amplitude modulation (PAM): The PAM signal (as shown in Figure 12)
is similar to the sampled signal. The pulses in PAM can have a finite width
unlike the sampling delta pulses. The PAM-modulated signal yðtÞ can be
written as
þ∞
yðtÞ ¼ ∑ xðkÞδðt � kÞ (12)
k¼�∞
14
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
Figure 11.
PSK modulation.
• Pulse width modulation (PWM): In PWM as shown in Figure 13, the width of
each pulse is related to the modulating signal. This type of modulation is used
in DC motor control applications.
• Pulse position modulation (PPM): In PPM as shown in Figure 14, the position
of each pulse is related to the modulating signal.
þ∞
yðtÞ ¼ ΔðtÞ ∑ δðt � nT s Þ (13)
n¼�∞
15
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 12.
PAM modulation.
Figure 13.
PWM modulation.
In Figure 15, the reference signal ms ðtÞ is the signal with rectangular edges
superimposed on the smooth sine wave message signal. The reference signal is
obtained by integrating yðtÞ as follows [8]:
þ∞
ðt
ms ðtÞ ¼ ∑ ΔðnT s Þ δðt � nT s Þdτ (14)
n¼�∞
The difference value ΔðnT s Þ is calculated at the nth sampling instant. The refer-
ence signal ms ðtÞ is a stair-step approximation of mðtÞ as shown in Figure 15.
16
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
Figure 14.
PPM modulation.
Figure 15.
Delta modulation.
Modern telephony systems are based upon the Voice over IP (VoIP) protocols,
such as SIP, which is a call control and signalling protocol adopted by the 3GPP in
17
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
order to deliver IP multimedia services [12] to the mobile network [6]. The design
of SIP was inspired from HTTP protocol and standardised by the Internet Engi-
neering Task Force (IETF). The purpose of SIP is to enable initiating, terminating
interactive call sessions and changing parameters of ongoing sessions. The simplic-
ity of SIP and the emergence of JAIN-SIP [13] have facilitated the development and
implementation of platform-independent IP telephony services. Multimedia ses-
sions enable communicating via voice, video and text. SIP messages are either
requests or responses and use Session Description Protocol (SDP) in order to deter-
mine and negotiate session parameters at either endpoint. SIP supports name map-
ping and redirection functionalities and, thus, permits user mobility. A typical SIP
architecture consists of SIP user agents (UAs) and servers.
The core protocol of the Internet is the Ethernet protocol, which is based upon
serial digital communications. This section provides an overview on the 10-Mbps
Ethernet standard. The composition of Ethernet frames (at the MAC sub-layer) and
the generation of differential signals at the physical interface (Phy) layer can be
implemented on different hardware types as well as FPGA through hardware
description language (HDL) code. For 10-Mbps Ethernet, Manchester encoding is
utilised, where every bit of information is encoded as a transition from 1 to 0 or
from 0 to 1.This is advantageous for the synchronisation between the sender and
the receiver and for the recovery of the transmission clock. This encoding method
prohibits sending consecutive zeros or ones, which appear as constant DC signal in a
conventional RZ encoding. Since every bit of information is composed of two
voltage levels, the reference clock is at 20 MHz (double the baud rate).
To identify the beginning of an Ethernet frame, a special pattern of bits is sent,
which consists of preamble and a start of frame delimiter (SFD). The preamble and
SFD are sent prior to the actual data. The pattern ‘10’ is repeatedly sent, such that a
total of 62 bits of 101010 are followed by 11. The last byte (SFD) is 10101011. In
hexadecimal, the preamble is 7 bytes of 0x55 followed by a single SFD byte of 0xD5.
The first byte that is sent is 0x55, whereas the byte 0xD5 is sent last. The leftmost
bytes are sent first, of which the rightmost bits (LSB) are sent first. This is why the
first byte in the preamble 10101010 is sent from right to left, as 0x55, i.e., the first
bit to be transmitted, is 0. Data are usually transferred from an FPGA to the
Ethernet port through a physical interface. Taking into consideration the media-
independent interface (MII) standard, where the Phy interface communicates
nibbles (4 bits) at a time, the SFD 10101011 byte is sent as 0xD and 0x5, since the
18
Telecommunications Protocols Fundamentals
DOI: http://dx.doi.org/10.5772/intechopen.86338
lower nibble 0xD (in binary, 1011) is sent first starting by 1 (rightmost bit). The
reference clocks are 2.5 and 25 MHz for 10-Mbps and 100-Mbps Ethernet, respec-
tively. Reduced MII (RMII) and serial MII (SMII) are two reduced versions of MII,
where 2-bit and 1-bit bus widths are used for the Phy, respectively. Compared to the
10-Mbps MII, the gigabit MII (GMII) communicates through 8-bit width bus with a
reference clock of 125 MHz. However, the 10-Gbit MII (XGMII) standard deals
with 32 bits of data at a time.
Some implementations of Ethernet on FPGA depend upon finite state machines
(FSM) programmed in HDL, such as VHDL. Several open-source codes [13] offer
Ethernet implementations in VHDL or Verilog.
6. Conclusion
Author details
Amer Al-Canaan
Department of Electrical Engineering, Islamic University of Al-Madinah,
Al-Madinah Al-Munnawara, KSA
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
19
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
20
Chapter 2
Optimum Efficiency on
Broadcasting Communications
Juan Manuel Velazquez Arcos,
Ricardo Teodoro Paez Hernandez,
Tomas David Navarrete Gonzalez
and Jaime Granados Samaniego
Abstract
This chapter is devoted to review a set of new technologies that we have devel-
oped and to show how they can improve the process of broadcasting in two princi-
pal ways: that is, one of these avoiding the loss of transmission signals due to abrupt
changes in sign of the diffraction index and the other, preventing the mutual
perturbation between signals generating information leak. In this manner, we pro-
pose the join of several of the mentioned technologies to get an optimum efficiency
on the process of broadcasting communications showing the theoretical foundations
and discussing some experiments that bring us to create the plasma sandwich model
and others. Despite our very innovative technology, we underline that a complete
recipe must include other currently in use like multiple-input multiple-output
(MIMO) simultaneously. We include some mathematical proofs and also give an
academic example.
1. Introduction
21
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
ð1Þ
We now describe the quantities appearing in Eq. (1), represents the mass
density and the compressibility of the propagation medium, while is
the acoustic signal.
Because the wave equation is of second order in time, we can talk about time
reversibility, and then allows solutions, which travel toward the future or the past.
An efficient time reversal requires to ensure that the system be ergodic, making
possible that the signal may travel both senses in time. To improve focusing, we
must describe the signal propagation towards the future or past by means of equa-
tions of the same type [18, 22, 27] that is both directions inhomogeneous or both
homogeneous. Linearity permits that a signal traveling toward the past can be
written with the aid of the integral equation:
ð ∞
ð
ð∘Þ
f ðr; T � tÞ ¼ f ðr; T � tÞ þ U ∗ ðr0 ÞGð∘Þ ∗ ðr0 ; r; T � t0 ; tÞf ðr0 ; T � t0 Þdt0 dV 0 (2)
V �∞
In Eq. (2), Gð∘Þ ∗ ðr0 ; r; T � t0 ; tÞ is the free Green function, U ∗ ðr0 Þ depicts the
complex dispersion coefficients, and f ðr; T � tÞ is the returning signal that has
traveled toward the past. The inhomogeneous term f ð∘Þ ðr; T � tÞ is known as a sink
term and makes both the outgoing and returning equations inhomogeneous integral
equations. In Eq. (2), the parameter represents the time during which the outgo-
ing signal (the one traveling toward the future) is being considered and recording.
It is observed experimentally [9] that the time-reversed signal has a definition of a
14th of , the wavelength of the used signal for acoustic signals but this is also true
for electromagnetic waves. On several experiments [9, 10], Lerosey, de Rosny,
Tourin, and Fink have shown that when such a source term is included, the appar-
ent cross section is increased in two ways: first, the multiple scattering also multi-
plies the available phase space so when the time is reversed, the information is
increased, and second, in the electromagnetic case, the sink term stimulates and
triggers the braking of the confinement of the evanescent waves that also raise the
information and in consequence the definition to level of about λ=14 . In acoustics,
22
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
the sink term consists in the operation of the source in reverse order; in the elec-
tromagnetic case, the sink term can be implemented with a crest of fine wires
around the antennas.
As we have said above and considering that from a strictly mathematical point of
view, both the acoustic and electromagnetic waves achieve the same wave equation
type (with a vector version in the electromagnetic case). Then, we can regain,
without further ado, the vector matrix formalism [1–7, 11–14] which generalizes the
discrete scalar time reversal acoustic model and includes an original model for
discrete broadcasting systems that we have called the plasma sandwich model
(PSM) [8, 16–18] and we put some associated parameters appeared on it into the
named vector matrix formalism (VMF) [8, 20, 24]. But we must underline that is
the resonant behavior the one must be considered for increasing efficiency on
communications and to achieve extraordinary resolution. To this end, we remember
that a three-dimensional version of Eq. (1) can be written as the Fourier transform
of an integral generalized homogeneous Fredholm’s equation (GHFE) [21–24] for
resonances, and does not matter if for acoustic or electromagnetic ones. To analyze
the resonant behavior, we must eliminate the inhomogeneous term so we can write
the following algebraic equation satisfied by the Fourier transform of the resonant
waves:
ð3Þ
where the kernel is the product of the Fourier transform of the free
Green function with the interaction U (without loss of generality we can
suppose that U does not depend on ), so this can be written explicitly as:
h im
1 � ηR ðωÞGð∘Þ ðωÞU wnR ðωÞ ¼ 0 (4)
n
At this point, we must say that we could obtain a transfer matrix description
[16–18] instead Eq. (4), but our last equation represents the core of the VMF
version. The fact is there are important differences between the two formalisms;
for example, VMF makes the time-reversal process easy. Of course, we are moving
over a frequency domain and not over a time-dependent one, the former the
appropriate in agreement with information theory applications. And certainly, the
most important difference is that VMF formalism includes the concept of the
resonant solutions.
the plasma sandwich model for the behavior of the propagation media. Depending
on the particular conditions of the propagation media, that is, depending of the
values of the plasma sandwich parameters, and for particular conditions of the
external electric potential, the propagation media may behave like the plasma
sandwich and acquire a negative refraction index. In this section, we introduce the
PSM parameters and find the resonant frequencies for a specific problem, underly-
ing that resonant frequencies can be used only to associate an interval of frequencies
of a real signal to a device that could be an antenna and not to a single emitted
frequency by them; this is because resonant waves are released evanescent waves
that vanish in the resource sites and not precisely information carriers. The fre-
quency bands we can build from the resonant frequencies can be considered as
convenient highways for the transit of information. Every kernel depends on the
response of the media in circumstances that can vary for different time intervals. In
this manner, we present an example very easy to work but in which is not relevant
the particular behavior of the signal we used to get it. Next, we can find the
resonant frequencies for an academic example. First, we choose an appropriate
discrete kernel , for convenience; in this particular kernel, we do not take
into account the three components of the electromagnetic field (usually represented
for the indices n and m). However, we propose a system constituted by two emit-
ting antennas. One possible may be written [1, 3–7]:
ð5Þ
In kernel (5), we have introduced the plasma sandwich model (PSM) parameter
, which is defined as:
ð6Þ
Definition (6) involves with the physical meaning of the wave number of an
incident beam that interacts with the magnetic and electric fields in a way that the
whole kernel is the expressed in Eq. (5); is the average thickness of a plasma-
magnetized layer that generates this interaction; parameter is the average value
for the plasma frequency in the magnetized plasma layer which can be written in
terms of the local electron concentration in the layer as:
ð7Þ
24
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
The last two ubiquitous conditions to achieve resonance are the vanishing of
Fredholm’s determinant for Eq. (4), and that Fredholm’s eigenvalue λ equals to 1
[6, 11, 22, 23]. The last two conditions give us the expected resonant frequencies for
the system constituted by two antennas dependent on the PSM parameters. Now,
we must remember that resonances have a special behavior that can be represented
by a complex frequency:
ð9Þ
The transformation of the evanescent waves for traveling ones is due precisely
to the imaginary part In addition, the relation between and the wave
number is:
ð10Þ
Substituting expressions (9) and (10) into Eq. (3), we can write the resonance
condition as:
ð11Þ
ð12Þ
and
ð13Þ
ð14Þ
ð15Þ
ð16Þ
ð17Þ
To have an image of the solutions of Eq. (11) (see Figure 1), we can make
and those are the real and imaginary parts of , and fix the value for the
plasma frequency so we have the following image:
25
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
ð18Þ
ð19Þ
ð20Þ
ð21Þ
In this case only, is properly a resonance and has not physical meaning but
maintain their orthogonality properties.
Because we have now a wide vision of the loss of information and we know that
this is the reason that the images are not perfect, we can use the results of Shannon,
Nyquist, Wiener, Hartley, Hopf [25–29], and other authors that have formulated a
measure of the loss of information in communication systems. We support our
mathematical results on related works [6, 11, 24, 26, 28], which give us a solid
theoretical frame to our present and future papers. Indeed, because the capacity of a
channel and entropy are very close concepts, we can use some of the results we have
cited above to answer the problem for TRT and LHM.
Basically, we recall two theorems:
Theorem I.
If the signal and noise are independent and the received signal is the sum of the
transmitted signal and the noise, then the rate of transmission is:
ð22Þ
This means that the rate of transmission is the entropy of the received signal less
the entropy of the noise. The channel capacity is:
ð23Þ
Theorem II.
The capacity of a channel of band Θ perturbed by white thermal noise power
when the average transmitter power is limited to is given by:
PþN
C ¼ Θ log (24)
N
In this expression, P is the average power of the transmitted signal and N is the
average noise power.
From these two theorems, we make our proposal for a channel where we have
lost information in three ways. That is, we have limitations on the maximum
frequency Θ (band), the presence of different classes of noise, and on a limited time
26
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
T available for a time-reversal process. Then, defining a joint average for the power
, the channel capacity is:
P þ Q ðn; T Þ
CT ¼ Θ log (25)
Q ðn; T Þ
This remains equal to zero when . The very significant feature of this
proposal is the explicit dependence on , in both the joint average power and the
channel capacity, as opposed to the conventional treatment of the signal time
duration that is considered as a limit process which tends to infinity. This is a
consequence of the explicit form of the Fourier transform of the time-reversed
Green function that changes with a factor , so even if we are not forced to do so,
we can think of it as a parameter that defines the channel. We can think of an
arbitrary channel but, when we use it to reverse any signal in time, we follow a
different process depending on the time we decide to fit. Then, we can label the
channel with each as a different one and of course with a different capacity with
those corresponding to other values of . Because of the arguments expressed
previously in this work, we can use this measure to the same extent on LHM, ATR,
and TRT. For a related discussion of the equivalence of the time-reversal methods
and the employment of left-hand materials, we can see ref. [30], and for the use of
time reversal on antennas, we can see also ref. [16].
5. An academic example
sin ð2πΘtÞ
(26)
2πΘt
And, that we have instead of the incoming signal in Eq. (15) another like [10]
1 sin 2 ðπΘtÞ
(27)
2 ðπΘtÞ2
The input function Eq. (26) is a sample of a more general function generated by
the sum of a series of shifted functions
sin ð2πΘtÞ
a (28)
2πΘt
In the time-reversal process, we have shown that for each Fourier component,
we should add a complex exponential factor dependent on T. But we know now that
the tool is the same and that only the numerical value of channel capacity CT
27
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
The fact that we are using the same band but different cutting limits
also suggests that we can design an appropriate filter that can distinguish between
signals according to the recording time that is we can superpose signals with the
same frequency range but with different recording times. In a previous work, we
have sketched a filter, but now we give a better-defined device, so we propose (see
Figure 2) as a hint to get the filter, the following steps for both the transmitter and
the receiver:
5.1 Transmitter
5.2 Receiver
The traveling signals enter the mirror band amplifier, so called because it
knows that there are resonant frequencies and then can create (or separate the
signal in Q resonant bands) sub-bands and amplify the signal in each band (at
this moment, each band carries a piece of the original n different signals); after this,
Figure 1.
Image of the solutions of Eq. (11) when the related equation is 987.93(x2-y2–106) = y (106-2x).
28
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
Figure 2.
Flow chart for a proposal device. This can emit and read the blended messages with recording times
beneath to the unique band .
the signals are blended and then sending to a secondary mirror band generator
which knows that there are n recording times and because of that it can
create n bands with the higher central frequencies (these last signals
could be amplitude-modulated signals) and distribute the blended signal among
them. Then, every signal on each band enters a frequency dimmer (the inverse
operation performed by the frequency elevators in the transmitter), so we retrieve
the n original signals corresponding to the unique band . For example, in
Section 3, we have that the total number of resonances is , and the two
resonant frequencies are and .
At this point, it is important to say that the key point on the use of the proposed
device is the build of information packs described in another place in order to
diminish mutual interference between different signals.
Based on the equivalence of the TRT and the properties of the Green function,
we can trust that any discussion about the interaction of metamaterials with elec-
tromagnetic field can be done through this function and simultaneously observe the
effect of a time reversal. For this reason, we can now describe the error in terms of
the Green function by the hypothesis that LHM can be put to test by forward and
backward in time signals and read the results with two points of view: first, the
direct effect of the loss of information because of the limited record time T or
second, how the negative refraction index helps to preserve information. Now, we
can review our previous results and generalize using the kernels, so we can charac-
terize the capacity of a channel in many different circumstances. So, we have made
29
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
use of the analogies [30] between the TRT and the employment of LHM to propose
that we can express the capacity of any of these negative refraction index materials
in the same terms or procedures as those of TRT. Also, we can propose an identical
description for the channel capacity that is Eq. (24) and its generalization Eqs. (25)
and (30). Then, the matrix formalism for discrete systems can be used to charac-
terize the channel capacity of transmission of information in a process of time
reversibility using the Fourier transforms of the Green functions (properly we use
the kernels with the interaction matrix ) forward and backward. That is, by
the first step, the signal transforms like (in the following equations I and F stand for
initial and final places):
ð31Þ
then in the second step, it returns to the initial place by means of the operation.
ð32Þ
ð33Þ
ð34Þ
ð35Þ
or
ð36Þ
Eq. (36) is a corollary that shows explicitly the role of both the forward and
backward Fourier transforms of the Green function (we have done on
Eq. (8) for convenience and also for the complete kernels and ).
Eq. (36) is very clear about the origin of the errors because we can see, for example,
that in the case that the forward and backward Green functions are mathematically
one the transpose conjugated of the other for a perfect time reversal (when acting
the first on a column vector and on a row vector the other), we get that the error is
zero and that the error increases as the differences of both functions also increase.
In a very special case, we can then propose that and only differ by the
factor or when the only source of error is the recording time , so that we
obtain from Eq. (36) that:
ð37Þ
30
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
In Eq. (37), the function has the form of the Fourier transform of
the Green function but with the argument translated by an amount equal to the
recording time that appears explicitly in Eq. (19) that is the Fourier transform of:
ð38Þ
But with the time running backward, so, as we will show in a moment, if T is
very short, the error will be very huge. On the contrary, if the time goes to infinity,
the error will go to zero. Resuming, the new Eqs. (33)–(38), make possible a
characterization of the lost information in left-hand materials not only for micro-
wave range, but also for visible frequencies because we have extended recently the
time-reversal techniques (see ref. [3, 12]).
Now, we can define:
ð39Þ
ð40Þ
and because the kernel of the Fourier transform of the generalized inhomoge-
neous Fredholm’s equation (GIFE) satisfies the following integral equations:
ð41Þ
ð42Þ
While Eq. (41) exactly represents the problem with a finite recording time T,
Eq. (42) represents a hypothetical problem in which the recording time is infinite.
Substituting Eq. (41) into Eq. (40), we have:
ð43Þ
Then, we can suppose that the two kernels in Eq. (40) represent the real and the
hypothetical problem described above. Of course, we see that if real conditions
approximate the ideal ones, the error is clearly zero. But we can factorize the
interaction matrix in Eq. (43):
ð44Þ
But Eq. (44) says clearly that the error does not depend on the form of the
interaction, only depends on the recording time T. Even we have supposed that the
only source of error was the recording time, we do not suppose any particular
behavior for the interaction. So, we have enunciated and proved a theorem:
Theorem III.
In the time-reversal problem and for left-hand material conditions, the normal-
ized error:
31
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
ð45Þ
is independent of the explicit form of the interaction provided the last is isotropic.
ð46Þ
ð47Þ
That is the recording time appears explicitly in the advanced Green function and
we can show that its value makes possible to blend many signals on the same
channel without interference. It is important to note that for resonances, the rele-
vant Green functions are precisely the free ones and not the complete ones as we
can see in Eqs. (5) and (6).
7. Information packs
In this section, we present the support and the definition of the information
packs that are required for the adequate performance of the device shown in Section
6 and that by him constitute a method to improve the broadcasting efficiency. To
this end, we must remember that on communication theory [9, 10] are defined the
so-called ensembles of functions dependent on time. One of their properties is really
a group one from the mathematical point of view and lies in that any ensemble
transforms into another member of the same ensemble when we change the func-
tion at any certain amount of time. To illustrate this property, we shift by an
amount t1 the argument of all the members of the ensemble defined as follows:
ð49Þ
32
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
Then, each function has changed individually, but the ensemble as a whole is
invariant under the transformation. Also, if we apply the operator T which gives for
each member
It implies that
Sα ðt þ t1 Þ ¼ TFα ðt þ t1 Þ (51)
∞ sin π ð2Θt � nÞ
where, F ð tÞ ¼ ∑ X n (52)
�∞ π ð2Θt � nÞ
n
Xn ¼ F (53)
2W
In this expansion, F ðtÞ is represented as a sum of orthogonal (basis) functions.
The coefficients X n of the various terms can be considered as coordinates in an
infinite dimensional “functions space.” We will take the last theorem (Eqs. (52) and
(53)) as a very suggestive rule to consider the recently obtained resonant frequen-
cies. If we use physical arguments about the reasons of the presence of a resonance,
we can be sure that channels available for broadcasting are also limited in number.
Indeed, in a recent paper, we have generalized the procedure for electromagnetic
scalar and vector potentials [30] and we have established that we can use either the
electromagnetic field or the potentials for obtaining the resonances and also for the
use of the recording time as a resource to optimize communications. And now, we
can build information packs (IP) that are functions, which represent a part of the
signal we want to send with the minimum loss of information. The resultant
expression is:
where,
n
X n, e ¼ F e (55)
2ωe
Every ωe allows us to build a decomposition like (54) but we expect that only a
few terms are necessary for a well representation of Fe ðtÞ. Next, we send separately
each F e ðtÞ by its own device and it is all we need for broadcasting. To receive the
signal, we need a separate device for each ωe .
33
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
π
ω1 ¼ þ ω0 (56)
4d
and
3π
ω2 ¼ þ ω0 (57)
4d
Suppose that SðtÞ is the signal
sin ½π ð2ΘtÞ�
SðtÞ ¼ (58)
π ð2ΘtÞ
with
n
X n, 2 ¼S (62)
2ω2
34
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
Figure 3.
The former radio broadcasting procedure: modulated amplitude. Image given by Pérez-Martinez [31].
It implies that
Hβ ðt þ t1 Þ ¼ ΩSβ ðt þ t1 Þ (64)
Now, the operator Ω is a generic operator like T but acting over the ensemble
Sβ ðtÞ. Some care must be taken when reading the WS information, because the
translations stated in Eqs. (63) and (64) were multiples of the periods of the carrier,
and then as we said above, the modulation will be invariant. The resonant frequen-
cies will be obtained by the same procedure.
In order to complete the methodology, we recall the concept of group velocity
cg ðtÞ and construct this inherent quotient between them and the enveloping fre-
quency ωg which results in the wave number κ g , so we associate them with the
resonance frequencies in a similar form as we styled with microwaves, but now
these last signals come from the measured properties of the Green’s function asso-
ciated with the modulated signal. In this way, in Eq. (54), we put directly the WS
first for a non modulated beam:
The signal Se0 ðtÞ in (65) can be viewed as the representation of some element of
0
the new basis functions or as the e component of an arbitrary amplitude-modulated
signal He0 ðtÞ. Now, we can give an example where we use the same values for the
resonances on Eqs. (56) and (57) and where we propose an arbitrary amplitude
modulated or WS (for a modulated visible light beam) signal given as follows:
35
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
in which
� �
n
X n, 2 ¼ H (72)
2ω2
As we said above, the resonances must come also for the WS. By this procedure,
we have enlarged the scope of the formalism we named vector-matrix or VMF
[1–3].
In order to complete our example, we put explicit values of the resonances for
the two visible light IP:
� � �π � ��
∞ sin π 2 4d þ ω0 t � n
H1 ðtÞ ¼ ∑ X n, 1 � �π � � (74)
�∞ π 2 4d þ ω0 t � n
And explicitly
" ! #
n
X n, 1 ¼ a cos ΘA �π � þδ (75)
2 4d þ ω0
in which
" ! #
n
X n, 2 ¼ a cos ΘA �3π � þδ (77)
2 4d þ ω0
36
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
8. Conclusions
In Eqs. (25), (29), (30), (34)–(40), we have shown that it is possible to use an
operator language and the properties of the Green function to define the capacity of
a channel, the loss of information, and finally, the error in the time-reversal process.
Therefore, we can use our results to describe the behavior of LHM interacting with
electromagnetic field whether forward or backward in time. Thanks to our inter-
pretation of a resonance in the broadcasting problem with the left-hand material
conditions, and the application of the model PSM, we make up a broadcasting
system that has the power for distinguishes between signals according to their
recording time, and allows to superpose signals in the same frequency range having
different recording times with the minor loss because of resonance technology; to
this end, we have presented a detailed support and definition of the information
packs (IP) and the possibility of application for visible light. In addition, we have
enunciated and proved a theorem (theorem III) that establishes: for the TRT and
LHM, the normalized error is independent of the particular behavior of the inter-
action. Summarizing, we give a complete recipe for optimizing communications
efficiency.
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
37
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
38
Optimum Efficiency on Broadcasting Communications
DOI: http://dx.doi.org/10.5772/intechopen.84954
recording time detection on time reversal [22] Velázquez-Arcos JM, Vargas CA,
signals. International Journal on Recent Fernández-Chapou JL, Salas-Brito AL.
and Innovation Trends in Computing On computing the trace of the kernel of
and Communication. 2014;2(11): the homogeneous Fredholm’s equation.
3447-3950 Journal of Mathematical Physics. 2008;
49:103508. DOI: 10.1063/1.3003062
[15] Grbic A, Eleftheriades GV. Negative
refraction, growing evanescent waves, [23] de la Madrid R. The rigged Hilbert
and sub-diffraction imaging in loaded space approach to the Gamow states.
transmission-line Metamaterials. IEEE Journal of Mathematical Physics. 2012;
Transactions on Microwave Theory and 53(10):102113. DOI: 10.1063/1.4758925
Techniques. 2003;51(12):2297-20305
[24] Velázquez-Arcos JM. Fredholm’s
[16] Xu H-X, Wang G-M, Lv Y-Y, Qi M- equation and Fourier transform on
Q, Gao X, Ge S. Multyfrequency discrete electromagnetic systems.
monopole antennas by loading IJRRAS. 2012;11(3):456-469. Available
metamaterial transmission lines with from: www.arpapress.com/Volumes/
dual-shunt branch circuit. Progress In Vol11Issue3/IJRRAS_11_3_11.pdf
Electromagnetics Research. 2013;137:
[25] Shannon CE. A mathematical theory
703-725
of communication. The Bell System
Technical Journal. 1948;27:379-423,
[17] Kato H, Inoue M. Reflection-mode
623-656
operation of one-dimensional
magnetophotonic crystals for use in [26] Nyquist H. Certain factors affecting
film-based magneto-optical isolator telegraph speed. Bell System Technical
devices. Journal of Applied Physics. Journal. 1924:324. Certain Topics in
2002;91:7017-7019 Telegraph Transmission Theory, A.I.E.
E. Trans., vol. 47, April 1928, pp. 617
[18] Kato H, Matsushita T, Takayama A,
Egawa M, Nishimura K, Inoue M. [27] Hartley RVL. The Interpolation,
Theoretical analysis of optical and Extrapolation and Smoothing of
magneto-optical properties of one- Stationary Time Series, NDRC Report.
dimensional magnetophotonic crystals. New York-London: Wiley; 1949
Journal of Applied Physics. 2003;93:
3906 [28] Wiener N. The Ergodic theorem.
Duke Mathematical Journal. 1939;5:1-18
[19] Hernández-Bautista F, Vargas CA,
Velázquez-Arcos JM. Negative [29] Hopf E. On causality statistics and
refractive index in split ring resonators. probability. Journal of Mathematical
Revista Mexicana de Fisica. 2013;59(1): Physics. 1934;13(1):51-102
139-144. ISSN: 0035-00IX
[30] Velázquez-Arcos JM, Granados-
[20] Velázquez-Arcos JM. Samaniego J, Vargas CA. Resonances
Nanotechnology can be helped by a new and different recording times on
Technology for Electromagnetic Waves. electromagnetic scalar and vector
Nanoscience and Nanotechnology. 2012; potentials. In: 2017 Progress in
2(5):139-143. DOI: 10.5923/j. Electromagnetics Research Symposium-
nn.20120205.02 Fall (PIERS-Fall), Singapore; 2017.
pp. 229-235
[21] de la Madrid R. The decay widths,
the decay constants, and the branching [31] Pérez-Martinez F. Fundamentos de
fractions of a resonant state. Nuclear Sistemas de Televisión. México, D.F.:
Physics A. 2015;940:297-310 Universidad Autónoma Metropolitana;
2009
39
Chapter 3
Abstract
This chapter presents the security scanning process for Android applications.
The aim is to guide researchers and developers to the core phases/steps required to
analyze Android applications, check their trustworthiness, and protect Android
users and their devices from being victims to different malware attacks. The
scanning process is comprehensive, explaining the main phases and how they are
conducted including (a) the download of the apps themselves; (b) Android applica-
tion package (APK) reverse engineering; (c) app feature extraction, considering
both static and dynamic analysis; (d) dataset creation and/or utilization; and
(e) data analysis and data mining that result in producing detection systems, classi-
fication systems, and ranking systems. Furthermore, this chapter highlights the app
features, evaluation metrics, mechanisms and tools, and datasets that are frequently
used during the app’s security scanning process.
1. Introduction
This section introduces the Android operation system and its applications.
Moreover, it defines Android malware and shares its recent statistics. Android
permissions and security model are also presented. This section ends with discuss-
ing the security scanning framework for Android applications.
Android is one of the most popular operating systems that provide open-source
development environment based on Linux. It allows the development for mobile,
tablets, smartwatches, and smart TVs. Android was established by Open Handset
Alliance that started working in 2003, while Google released its first Software
Development Kit (SDK) in 2007, but the first commercial version was released in
September 2008 called as Android 1.0 [1] with the first device executed being HTC
Dream. The sale of the Android phone was increased from 75% in 2013 [2] to 88%
in 2018 [3]. Table 1 lists the sales of smartphones from 2011 to 2018 which show
a clear capture of the market over the years. This market penetration reveals the
successful implementation of features as well as cheap price.
The Android system is composed of five important layers:
41
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
• Application framework manages and runs the applications using the services
such as activity manager, content providers, telephony manager, package
manager, location manager, etc.
• Android kernel is based on the Linux 2.6 kernel and is used to provide abstrac-
tion between device hardware and other software layers [4, 5].
The efforts for making each of the component secure have been made. However,
still there are issues due to open-source development, and every vendor and com-
pany following their own standards has led to serious security issues [6].
The Android application contains four types of components shown in Figure 1 [7]:
• Dalvik executable or classes.dex file: the Java classes and methods defined in
the application code are grouped into one single file (classes.dex).
• .xml files: which are used to define the user interface of the application.
• Resources: the external resources that are associated with the application (e.g.,
images).
42
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Table 1.
The detail of the Android phone compared to iOS and other smartphone sales shares from 2011 to 2018 retrieved
from Statista.com [3].
Figure 1.
The Android application components.
from other apps. Although the applications are isolated, still they can interact with
the system and other applications through APIs. Meanwhile, Android assigns Linux
user ID for each application.
API stands for application programming interface that refers to the set of tools
providing interfaces for communication between different software components. APIs
are used to access data and key features within Android devices. API framework con-
sists of a set of API packages that include specific classes and methods. Additionally, it
contains a set of XML elements and attributes for declaring a manifest file and access-
ing resources besides permissions and intents. Looking into API component calls in the
executable file may allow exploring the behavior of an app and reporting its capabili-
ties. However, in many cases, the attackers hide the API calls using cryptography,
reflection, or dynamic code loading techniques to increase the difficulty of analysis.
Presently, mobile device apps are distributed through online marketplaces such
as Google Play Store. Such marketplaces are considered hubs to allow developers
43
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
to publish their apps and distribute them as well. Today, there are more than 2.5
million applications available in the Google Play Store [8].
When downloading apps from unofficial markets, the user is usually at risk
because there is no centralized control like official markets. As more users shift to
Android devices, cybercriminals are also turning to Android to inflate their gain.
However, many Android apps turn out to be malicious. The number of malicious
software (malware) samples in the Android market has surged to an alarming
number reaching over 5.49 million by the end of 2018 [9, 10].
A recent report from F-Secure [11] showed that over 99% of all malware pro-
grams that target mobile devices are designed for Android devices. Another report
from the security firm G DATA shows that a new instance of Android malware
pops up nearly every 10 seconds. Another report from AV-TEST [12] states very
clearly that anyone seeking to make money by attacking mobile devices will choose
Android devices as targets.
Malware is an umbrella term used to stand for an assortment of types of hos-
tile or intrusive software, including viruses, worms, Trojan horses, ransomware,
spyware, adware, and different malicious programs [13].
Ransomware is considered one of the most threating malwares nowadays.
There are two types of ransomware: crypto ransomware and lock screen ransom-
ware. The crypto ransomware encrypts the information, while the locker ransom-
ware hinders users from gaining access to their data by locking the device’s screen.
For both types, the attack demands a payment (ransom) to recover the files or
access to the device. It is worth mentioning that paying the ransom money does not
guarantee that the files will be back or that the ransomware will be removed from
the device [14, 15].
According to Kaspersky, ransomware has taken place in most of the majority of
notorious security attacks for the past decade. Also, 116.5 million attacks were noted
in 2018, compared to 66.4 million in 2017, an increase of twofold in just 1 year [16].
Malicious apps, in general, are distributed mostly through phishing, drive-by
attacks, and app stores. Phishing messages might comprise links to malicious apps
and are sent over SMS or WhatsApp. Drive-by attacks are carried out by Web page
exploits. When the user has a vulnerable browser, the exploit is able to execute a
code. To infect users through app stores, malwares are submitted to them hiding
as some legitimate app. In fact, in some cases some popular apps are modified to
include malicious actions while keeping the app’s main functionalities [17].
Therefore, a reliable tool is needed to test the trustworthiness of these apps
before being installed. App risk scoring or rating should be empirically calculated
according to different risk scoring techniques. The visualization of these risks
should be easy enough for a normal user to recognize the risk associated with a
specific app.
Android platform is very popular due to its available and comprehensive API
framework [18]. Android API offers the developers of mobile apps the ability to
gain access to hardware information, accessing user’s data, knowing phone state,
changing phone settings, etc. The developers are impacted by the permission model
while developing mobile applications. To develop a mobile app, the engineers are
required to determine, for each API functionality, what permissions are needed and
how they are correctly activated. Android asks the developers to list publicly what
permissions are used by the app; however, there are no mechanisms to know the
exact purpose of such permissions and what kind of sensitive data they could use.
Android permissions mainly fall under four categories [19]:
44
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
• Dangerous: the permission to private data, system process, and other hard-
ware is referred to as dangerous and should be assigned explicitly at the time of
installation or usage of the application.
• Signature: the applications get the same ID and the same access rights if the
two application certificates are the same.
• SignatureOrSystem: the applications that are signed with the same certificate
will get the same permission as the base system automatically.
45
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
kernel-level application sandbox that uses Linux user identifiers (UIDs) and UNIX-
style file permissions. Since version 4.3, Security-Enhanced Linux (SELinux) was
introduced, and from version 4.4 it started being deployed in enforcing mode.
Android security has seen other improvements as well. In version 5.0, Google
introduced smart lock, which allows users to unlock the phone using a trusted
device, such as Bluetooth/NFC beacon, smartwatch, or facial recognition. In ver-
sion 6.0, they introduced a fingerprint API. All these features are an extra step to
make security easier for the average user. However, Android’s security model is still
based on a set of coarse-grained permissions.
Android builds its security basis on multiuser capabilities of Linux by assigning
a unique ID to each application that will manage its own processes [24]. The run-
time manager runs the applications in its sandbox that provides security as it does
not allow:
• Inter-process communication
• Access to local data of the phone such as media libraries and contacts
46
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Figure 2.
Android application security scanning model [29].
47
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
2. Android application
The app’s source and how they are downloaded are presented in this section, in
addition to the source code generation for Android applications.
After downloading the apps, they need to be analyzed. In order to do that, APK
reverse engineering process is required to decompile, rebuild, and convert the
Android executable code (.apk file) into an intermediate language such as Smali,
Jimple, and Jasmin [33]. The aim of reverse engineering is to retrieve the source
file from the executable files in order to apply program analysis. Unzipping the
APK files generates .dex files. By reassembling the dex files using an APK reverse
engineering tool, the Java files can be retrieved. Three of the most popular tools
that have been used in Android APK reverse engineering are Apktool, Dex2jar, and
Soot. A comparison of Android reverse engineering tools was conducted in [33].
The results showed that Apktool which uses Smali reassembled 97% of the original
code, whereas Soot which uses Jimple and Dex2jar which uses Jasmin preserve 73%
and 69% of the app’s original code, respectively.
The process of analyzing Android apps to detect different types of malwares and
the result of such analysis in terms of datasets are illustrated in this section.
Once the app’s source code is retrieved, the feature extraction process starts. The
features that are usually extracted depend on the type of malware and the analysis
mode whether static or dynamic. This will be explained in the following two sub-
sections. Table 2 lists the most commonly used static and dynamic features [34].
The static analysis aims to check the existence of malware by disassembling the
source code without executing the application. Tools which perform static analysis
are mainly categorized into three approaches as shown in Figure 3: (1) signature-
based detection, (2) permission-based detection, and (3) Dalvik Bytecode detec-
tion. There is some limitation which is related to each static detection approach. The
48
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Permission Network, SMS, power usage, CPU, process info, native and Dalvik memory
API calls Data packets being sent, IP address, no. of active communications, system calls
String extracted Process ID, system calls collected by strace, returned values, times between
consecutive calls
Meta data Data collected by logger, Internet traffic, battery percentage, temperature collected
every minute
Opcodes from .dex
file
Task intents
Table 2.
Most commonly used features in static and dynamic analyses [34].
Figure 3.
Existing malware detection techniques.
49
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Tam [55] applied dynamic analysis method and machine language to detect
malware. They capture real-time system calls performed by the application as key
information to discriminate between ransomware, malware, and trusted files and
50
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Unfortunately, there were very few researches studying ransomware where the
malicious app blocks access to the Android device or/and its data. In [61] the authors
presented a tool called Cryptolock that focuses on detecting ransomware by tracking
the changes in real-time user data. They have implemented the tool on Windows
platform. However, Cryptolock may send a false-positive alert because it cannot
differentiate whether the user or the ransomware is encrypting a set of files [62].
They focus on changes on user’s data rather than trying to discover ransomware by
investigating its execution (e.g., API call monitoring and access permissions).
HelDroid tool [63] was developed to analyze Android ransomware and to detect
both crypto and locking ransomwares. The tool includes a text classifier that uses
natural language processing (NLP) features, a lightweight Smali emulation technique
to detect the locking scheme, and the application of taint tracking for detecting file-
encrypting flows. The primary disadvantage of this approach is that it highly depends
on a text classifier as it assumes the availability of text. Also, it cannot be applied
to some languages that have no specific phase structure like Chinese, Korean, and
Japanese. This approach can be easily avoided by ransomware by applying techniques
such as encryption and code obfuscation [63]. Moreover, like whatever machine
learning approach, HelDroid trains the classifier in order to label an app as a ransom-
ware. The detection capability of the model depends on the training dataset [64–66].
Another work in literature exploring the ransomware detection in Android
mobiles was presented in [67]. The authors presented R-PackDroid as a static
analysis approach that classifies Android applications into ransomware, malware,
or benign using random forest classifier. The classification employed was based on
information taken from the system API packages. An advantage over the previous
approach (HelDroid) is its ability to detect ransomware regardless of the applica-
tion language. Also, it flags the applications that were recognized as ransomware
with very low confidence by the VirusTotal service. However, R-PackDroid cannot
analyze applications with a feature code that is dynamically loaded at runtime or
classes that are fully encrypted because it relies on static analysis.
51
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Datasets are mainly in two types. The first type is the Android application
datasets. These include both benign apps and malicious apps. For the benign apps,
the majority of researchers are collecting them from the app stores like Google
Play Store [30, 37, 60]. For malicious apps, it depends on malicious behavior under
study. For example, for malware Android apps, VirusTotal was one of the main
sources for many researchers [38, 60]. For ransomware apps, HelDroid project [63]
and RansomProper project [38] were also used.
The second type is the datasets generated after extracting the app’s features. The
researchers can either use existing constructed datasets considering the features
under study or build new ones by screening the apps and extracting their features.
The main concerns regarding the use of existed datasets are (1) absence of up-to-
date apps and operating system version (2) including many duplicate samples
(3) and not being accessible. These reasons could motivate researchers to build their
own up-to-date and labeled datasets.
Many previous works have considered the problem of ranking Android apps
and classify them to either malware or benign apps. The majority of these solutions
have relied mainly only on the permission model and what types of permissions are
requested/used by the application. They used different ways and depth of analysis
in this regard.
The work presented in [72] studied the permission occurrences in the market
apps and the malware apps. Also, the authors analyzed the rules (a combination of
permissions) defined in Kirin [73] in order to calculate the risk signals and to reduce
the warning rates. Gates et al. in [74] have compared work presented in [72, 73],
naïve-based algorithms and two proposed methods for risk scoring. These methods
52
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
consider the rarity of permissions as the primary indicator that contributes to rais-
ing a warning. The performance comparison was in terms of the detection rate.
The authors in [75] used similar hypotheses of listing the permissions in each
app and count occurrences of permissions in similar apps (a game category in their
case) excluding the user-defined permissions that are not affecting the privacy. In
their solution, they gave the user the choice to turn off the permission(s). In [76],
the authors used the combination of features (permissions) to compare the clean
app values with the malware values to come up with thresholds that will be used to
classify new Android apps. Within the same context, the idea presented in [77] was to
construct a standard permission vector model for each category, which can be used as
a baseline to measure and assess the risk of applications within the same category. For
each downloaded app, the permission vector will be extracted and compared with the
standard one; the amount of deviation from the baseline will calculate the app’s risk.
While discussing the approaches in the existing risk scoring systems and their
main dependency on the Android permissions, it is worth asking how many of them
have considered the involvement of the user with the scoring results and, if they
decided to involve the user, how the risk was displayed and communicated to the
user. The empirical study conducted in [78], which implemented an intensive study
on top, used permissions with a high-risk level. They calculated the risk level based
on the type of permissions and the probability they will be requested by the app.
The risk value for each permission in addition to its technical name and description
was transmitted to the users. Although a coloring code was used to indicate the level
of risk, still users are involved in technical details which will not help them to take
proper decisions regarding the apps’ installation. The work presented in [79] has
utilized fuzzy logic to measure the risk score. Also, in addition to the permissions
and their categories, they took input from different antivirus tools to calculate the
score. Their system allowed the user to upload the app’s APK through the browser and
provided them with a risk report. This report showed the risk score, permission usage
rate, and unnecessary permission usage rate in addition to the list of permissions,
their categories, and risk level. On the other hand, the authors in [80] have considered
the statistical distribution of the Android permissions in addition to the probabilistic
functions. The declared but not exploited permissions and vice versa were all consid-
ered in their risk analysis. Machine learning was also utilized to measure risk.
In terms of visualizing the permissions and their risks, the authors in [81] intro-
duced Papilio to visualize Android application permissions graphically. This helped
them to find the relations among the applications and applications’ permissions as
well. Papilio was able to find the permissions requested frequently by applications
and permissions that either never requested or requested infrequently. The authors
in [82] stressed the importance of visualizing the statistical information related to
Android permissions. Having graphical representation for the permissions’ statics
within a specific category encouraged the users to choose more often apps with a
lower number of permissions. A privacy meter was used in [83] to visualize the
permissions’ statistics through a slider bar which outperformed the existing warn-
ing system like Google’s permission screens. Visualizing app activities enhances
user’s awareness and sensitivity to the privacy intrusiveness of mobile applications
[84]. Another attempt to visualize the permissions statistics was also introduced in
[85] using lifelog analysis views in terms of risk history and app’s risk view.
From the above-related work, we can observe that the majority of the previous
solutions have mainly relied on permissions either statistically or based on prob-
ability to analyze Android apps, to classify them as malwares, and to measure their
risk level. Although permissions are important to analyze and classify Android
applications. However, these permissions should be up-to-date. Also, other impor-
tant static and dynamic metrics need to be considered to guarantee a comprehensive
evaluation and consequently an accurate detection of malware apps.
53
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
5. Statistical analysis
This section presents a statistical study to show the frequency of the used
approaches, methods, datasets, and tools in the current systems. Various, related,
recent, published solutions in 2017–2018 were considered in this study.
In regard to reverse engineering tools utilized by researchers, APKtool was heav-
ily used by 54% in comparison with other tools (see Figure 4). Soot was next with
20% of usage.
Figure 4.
Reverse engineering tool usage in 2017–2018 research.
54
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Figure 5.
Static tool frequency in 2017–2018 research work.
Figure 6.
Dynamic tool frequency in 2017–2018 research work.
Figure 5 shows a comparison among the static tools which were utilized by research-
ers. It can be observed that 48% of the static-based systems used FlowDroid tool in their
solutions. PScout was the second most used with percentage reaching around 28%.
Dynamic analysis tool usage is illustrated in Figure 6. The majority of existing
solutions used Droidbox with 27% and TaintDroid with 24% in comparison with
other approaches. The rest of the results are shown in Figure 6.
The results in Figure 7 reveal that AndroZoo was the most used dataset in
2017–2018. The percentage of usage reached 43%. Genome and DREBIN datasets
came next with frequencies 30 and 16%, respectively.
55
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 7.
Dataset frequency in 2017–2018 research work.
6. Conclusions
This chapter highlighted the booming of Android technologies and their appli-
cations which make them more attractive to security attackers. Recent statistics of
Android malwares and their impact were presented. Additionally, this chapter has
provided the main phases required to apply security scanning to Android applica-
tions. The purpose is to protect Android users and their devices from the threats of
different security attacks. These phases include the way of downloading Android
apps, decoding them to generate the source code, and how this code is screened to
extract the required features to apply either static analysis or dynamic analysis or
both. The feature extraction process resulted in constructing different datasets.
Proper data analysis and data mining techniques could be applied to examine the
app and classify it as benign or malware with high accuracy. The malware detection
service could be implemented and provided in terms of a mobile application that
will communicate the scanning results to the user in a friendly way. The chapter
was concluded by presenting a statistical study that showed the most used tools and
datasets throughout the scanning process for the last 2 years 2017 and 2018.
Acknowledgements
Conflict of interest
56
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
57
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
[1] Alliance OH. Android overview. [10] GData. Cyber attacks on Android
Open Handset Alliance. 2011;8:88-91 devices on the rise. 2018. Available
from: https://www.gdatasoftware.com/
[2] Faruki P, Bharmal A, Laxmi V, blog/2018/11/31255-cyber-attacks-on-
Ganmoor GM, Conti M. Android android-devices-on-the-rise [Accessed:
security: A survey of issues, malware 2019-04-15]
penetration, and defenses. IEEE
Communications Surveys & Tutorials. [11] F-Secure State of cyber security.
2015;17(2):998-1022 Available from: https://www.f-secure.
com/documents/996508/1030743/
[3] Global smartphone sales to end users cyber-security-report-2017 [Accessed:
from 1st quarter 2009 to 2nd quarter 2019-04-15]
2018 [Internet]. Available from: https://
www.statista.com/statistics/266219/ [12] Security Report 2016/17 [Internet].
global-smartphone-sales-since-1st- Available from: https://www.avtest.
quarter-2009-by-operating-system/ org/fileadmin/pdf/security_report/
[Accessed: 2019-03-22] AV-TEST_Security_Report_2016-2017.
pdf [Accessed: 2019-04-15]
[4] Nimodia C, Deshmukh HR. Android
operating system. Software [13] Delac G, Silic M, Krolo J. Emerging
Engineering. 2012;3(1):10 security threats for mobile platforms,
MIPRO. In: 2011 Proc. 34th Int. Conv.
[5] Brahler S. Analysis of the android 2011. pp. 1468-1473
architecture. Karlsruhe Institute for
Technology. 2010;7(8):3-64 [14] Savage K, Coogan P, Lau H.
Security Response – The Evolution of
[6] Drake JJ, Lanier Z, Mulliner C, Fora PO, Ransomware. Mountain View (CA):
Ridley SA, Wicherski G. Android Hacker's Symantec Corporation; 2015
Handbook. New Jersey, USA: John Wiley
& Sons; 2014 [15] Liska A, Gallo T. Ransomware:
Defending Against Digital Extortion.
[7] Mithilesh Joshi BlogSpot. What California, USA: O'Reilly Media, Inc;
is android application components 2016
and how we use it? 2015. https://
mithileshjoshi.blogspot.com/2015/06/ [16] (KasperSky) Chebyshev V. Mobile
CITATIONS 74 what-is-android- Malware Evolution 2018 [Internet].
application-components.html [Accessed Available from: https://securelist.com/
November 27, 2017] mobile-malware-evolution-2018/89689/
[Accessed: 2019-04-16]
[8] AppBrain. Number of Android
applications on the Google Play store | [17] Grégio A, Abed R, Afonso V, Filho
AppBrain. 2019. Available from: https:// D, Geus P, Jino M. Toward a taxonomy
www.appbrain.com/stats/number-of- of malware behaviors. The Computer
android-apps [Accessed: 2019-03-02] Journal. 2015;58(10):2758-2777
58
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
59
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
[38] Chen J, Wang C, Zhao Z, Chen K, [45] Zhou Y“H. You, get o_ of my
Du R, Ahn G. Uncovering the face of market: Detecting malicious apps in
android ransomware: Characterization official and alternative android markets.
and real-time detection. IEEE In: Proceedings of the NDSS. 2012.
Transactions on Information Forensics pp. 50-52
and Security. 2018;13(5):1286-1300
[46] Grace M. Riskranker: Scalable and
[39] Arzt S, Rasthofer S, Fritz C, Bodden accurate zero-day android malware
E, Bartel A, Klein J, et al. Flowdroid: detection. In: Proceedings of the 10th
Precise context, flow, field, object- International Conference on Mobile
sensitive and lifecycle-aware taint Systems, Applications, and Services.
analysis for android apps. Acm Sigplan ACM; 2012. pp. 281-294
Notices. 2014;49(6):259-269
[47] Security Affairs. DREBIN
[40] Au K, Zhou Y, Huang Z, Lie D. Android app detects 94 percent of
Pscout: Analyzing the android mobile malware [Internet]. Available
permission specification. In: Proceedings from: http://securityaffairs.co/
of the 2012 ACM Conference on wordpress/29020/malware/drebin-
Computer and Communications android-av.html [Accessed: 2017-12-01]
Security; October 2012. Raleigh, North
Carolina, USA: ACM; 2012. p. 217-228 [48] Arp D. DREBIN: Effective and
explainable detection of android
[41] Mujahid S, Abdalkareem R, Shihab malware in your pocket. Proceedings of
E. Studying permission related issues in the NDSS. 2014
android wearable apps. In: Proceedings
of the IEEE International Conference [49] Yang W. Appcontext:
on Software Maintenance and Evolution Differentiating malicious and benign
(ICSME); September 2018. Madrid, mobile app behaviors using context.
Spain: IEEE; 2018. pp. 345-356 In: Proceedings of the Software
Engineering (ICSE); 2015 IEEE/ACM
[42] Tao G, Zheng Z, Guo Z, Lyu M. 37th IEEE International Conference.
MalPat: Mining patterns of IEEE. 2015. pp. 303-313
60
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
61
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
62
Android Application Security Scanning Process
DOI: http://dx.doi.org/10.5772/intechopen.86661
[78] Wang Y, Zheng Y, Sun C, [85] Yoo S, Ryu H, Yeon H, Kwon T, Jang
Mukkamala S. Quantitative security Y. Personal visual analytics for android
risk assessment of android permissions security risk lifelog. In: Proceedings of
and applications. In: Proceedings the 10th International Symposium on
of the Lecture Notes in Computer Visual Information Communication and
Science, LNCS-7964. Newark, NJ, USA: Interaction. 2017. pp. 29-36
Springer; 2013. pp. 226-241
[86] Dash S, Suarez-Tangil G, Khan S,
[79] Yuksel A, Yuksel E, Sertbasa A, Tam K, Ahmadi M, Kinder J, et al.
Zaim A. Implementation of a web- DroidScribe: Classifying android
based service for mobile application malware based on runtime behavior.
risk assessment. Turkish Journal of In: 2016 IEEE Security and Privacy
Electrical Engineering & Computer Workshops (SPW). 2016. DOI: 10.1109/
Sciences. 2017;25(2):976-994 spw.2016.25
[81] Hosseinkhani M, Fong P, Papilio CS. [88] Hou S. HinDroid. In: Proceedings
Visualizing android application of the 23rd ACM SIGKDD International
permissions. In: Proceedings of Conference on Knowledge Discovery
the Eurographics Conference on and Data Mining—KDD 17. Halifax,
Visualization. 2014. pp. 1-10 NS, Canada: ACM; 2017. DOI:
10.1145/3097983.3098026
[82] Kraus L, Wechsung I, Möller
S. Using statistical information
to communicate android permission
risks to users. Workshop on Socio-
Technical Aspects in Security and Trust
(STAST). Vienna, Austria: Co-located
with 27th ieee computer security
foundations symposium (CSF); 18 July
2014. pp. 1-9
63
Section 2
Next-Generation Optical
Access Technologies
65
Chapter 4
Abstract
Keywords: dying gasp, GPONxpert, OMCI channel analysis, ONU activation process
analysis, PON deployment, transmission convergence layer
1. Introduction
67
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
all end users (in theory, up to 128 customers per port). The available bandwidth
can be operatively changed in time and according to the requirements using
dynamic bandwidth allocation (DBA) algorithms [10–13]. The decreasing cost
of the necessary devices allows GPON optical line termination (OLT) to be used
more often for service providers; on the other hand, the standard in use may
not be sufficient for the future. The cost of the next-generation PON (XG-PON)
terminal units is still quite high, regardless of the OLT unit price. The price of the
technology itself is determined by the price of the optical network unit (ONU)
terminal units. The advantage of deploying next-generation networks would be
the ability to a share the transfer rate of up to 10 Gbit/s. Together with appropri-
ate DBA algorithms, the full bandwidth utilization or its adequate distribution
between endpoints would be efficiently used. GPON networks theoretically allow
us to transfer data up to 19 Mbit/s for each ONU (considered for the maximum
transfer rate and a split ratio of 1:128). XG-PON networks are limited by higher
split ratios but have higher transfer rates available. Theoretically, 39 Mbit/s can
be achieved for each ONU. In other words, the transfer rates are the maximum
possible in both GPON and XG-PON networks. Usually, the guaranteed transfer
rates are several times lower according to the use of a transmission container
(T-CONT) [14].
The Czech Republic has committed itself within the European Union to ensur-
ing a transmission rate of at least 30 Mbit/s toward users by 2018 [15]. In 2020, the
next milestone is going to be to increase the downlink speed up to 100 Mbit/s for
approximately half of all households [15]. Both variables account for asymmetric
transmission rates (usually higher transmission rates in the downstream direction).
Based on [16], this “scarcity” should be eliminated by 2030. At that time, only a
symmetric variant of Internet access will be considered.
Current technologies such as asymmetric digital subscriber line (ADSL) are no
longer able to meet the previously mentioned bandwidth requirements. The plans
of the Czech Republic include a GPON or a variant of an active optical network.
As presented in [17], the formal definition for next-generation networks can be
defined as follows: next-generation networks (NGNs) are networks based on data
packet transfer technologies capable of providing electronic communications
services, allowing for the use of various high technologies that are able to manage
and control the quality of the provided services, and whose functions related to
these services are independent of basic transmission technologies. The network
provides subscribers with unlimited access to various providers of publicly avail-
able electronic communications services and consistently supports the provision of
services to subscribers at any point in the network. Additionally, next-generation
networks can be split into backbone and access networks. This work, however, deals
exclusively with access networks.
On the other hand, the Czech Republic is not entirely prepared to satisfy the
high demands on the connection speed in all locations. Based on [18], the dominant
transmission rates were mostly up to 10 Mbit/s. No significant growth of higher
transmission rates has been recorded.
In 2016, the Czech Telecommunication Office published an annual report sum-
marizing current technologies for Internet access. The associated graph can be seen
in Figure 1. Figure 1 clearly shows that the dominant technology in this area is wire-
less fidelity (WiFi) (26.8%), i.e., wireless transmission of information. The annual
report does not include the frequencies used; however, the basic frequencies in the
68
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
Figure 1.
Access technologies market share in the Czech Republic [15].
license-free band (2.5/5 GHz) can be assumed. The second technology with the
highest penetration is represented by mobile networks (23.2%). The third technol-
ogy combines all types of xDSL technologies. This area is dominated by Telefonica
O2 Czech Republic, a.s., with a penetration of 20.6%. Other xDSL technologies
only reach 3.5%. According to [16], fiber to the x (FTTx) connections at the same
value of penetration (11.9%) as cable operator UPC Czech Republic, s.r.o., currently
offers the fastest connection speed of 500/30 Mbit/s (depending on the location).
Conversely, FTTx connections depend only on the selected standard as with the
fiber to the home (FTTH) variant. FTTx connections can support transmission
rates up to 10/10 Gbit/s (depending on the number of end units connected to the
OLT control unit).
The properties of the next-generation access networks can be summarized as
follows [16]:
3. Household penetration
69
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 2.
Selected EU states with FTTH/B penetration [19].
Figure 3.
Selected global states with FTTH/B penetration [19].
(7% are FTTH connections, and the remaining 10.7% are FTTB connections). This
is mainly because in Slovakia, there is a very strong operator, Orange SK. Orange
SK may test the use of new technologies in this relatively small market, and if this
technology stands, it can be deployed, for example, in Orange home (formally
France Telecom) in France.
Another objective of the current FTTB/H connection analysis is to focus on
the global market (see Figure 3). Globally, the United Arab Emirates (UAE) has
a total penetration of 94.3%. This penetration is completely composed of FTTH
70
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
Figure 4.
Progress in FTTH/B deployments according to IDATE [19].
connections. Strong competitors for the UAE are Qatar and Singapore. Qatar has
a penetration of 81% for FTTH connections and of 9.4% for FTTB connections.
Singapore has a similar total penetration, but in a different ratio, 68% for FTTH
connections and 22.3% for FTTB connections. FTTH-only countries are Mauritius,
New Zealand, Spain, Vietnam, Portugal, Slovenia, Jamaica, Saudi Arabia, Australia,
Macedonia, Switzerland, Oman, Kuwait, Chile, Ecuador, Colombia and Angola.
The total penetration of the last 4 states does not exceed 5% [19].
The total penetration is strongly dependent on the number of individual con-
nections. IDATE focused on the analysis of the global market and the comparison
of the state of connections in buildings in four stages, December 2014, September
2015, September 2016, and September 2017 (see Figure 4). The largest increase
in connections was in Poland, with a total difference of 46%. Italy was the second
country with the largest increase in connections (35%), followed by Great Britain
and France (31%), Spain (24%), and Portugal (22%). Unfortunately, the Czech
Republic was not included in this analysis because the number of connections is
not as significant. In other words, the trend of building connections is greater in
Belarus, Norway, Lithuania, and Hungary.
A detailed view of the number of FTTB/H customers can be seen in report
[20]. The report shows that at the end of 2010, the total number of customers was
balanced across the EU28 and the commonwealth of independent states (CIS).
From a wider perspective, the EU39 reached approximately 8 million customers.
However, this difference must be attributed, in particular, to 11 other countries
that are counted in the EU39. The aligned trend between the EU28 and the CIS
was maintained until 2015. Later, the number of customers increased in the EU28,
and the previous dominance of the CIS was diminished. In September 2017, the
total number of customers was approximately 25 million, while for the CIS “only,”
it was 20.5 million. Most places for customers are connected to the provider’s
network, but there have also been new locations for housing, new towns, and
satellite residences created. During the preparation of the work, developers are
working hard to build a data infrastructure and negotiations are taking place
between Internet services providers (ISPs) and developers. EXFO defines these
connections as home passed: premises to which an operator has the capability to
connect in a service area, but the premises may or may not be connected to the
network [21].
71
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
The primary determination of all technologies for xPON is evident from their
name, a passive optical (access) network. This trend continues from the original
asynchronous transfer mode PON (APON), broadband PON (BPON), GPON,
XG-PON, and the latest approved next-generation PON stage 2 (NG-PON2) recom-
mendations. The latest recommendation has become the pioneer of extending the
passive optical network to mobile customers as well. However, residential customers
with a fixed connection (flat or house) still remain the priority. With the onset of
5G technology in mobile communications, it will be necessary to reduce the area of
cells to ensure coverage of the entire territory by radio signals. This is mainly due
to the increasing permeability and diminishing cell size, so it is necessary to build
more cells that cover the same area. It is possible to divide the area according to its
antenna density into low density (<20 small cells/km2), medium density (<75 small
cells/km2), dense (<200 small cell/km2), and ultrahigh density (>200 small cells/km2).
Current long-term evolution (LTE) technology has been providing broadband data
services; however, these technologies seem to be inadequate for certain services
(virtual reality or generally the most sensitive services for low latency, such as
access to data networks of the Internet of things devices). Current customer needs
may include gigabit transmissions per second, smart home/buildings, self-driving
car, working and playing in the cloud, and 3D or UHD video. Minimal latency
requirements will be determined mainly based on data transmission within the
national network (10–200 km). The transmission delay in the current networks
ranges from 5 to 41 ms, and the delay for the access part of the network (1–10 km)
is approx. 7–12 ms. Another key factor that affects the delay is the time it takes to
process incoming requests from a data center (approximately 8 ms). The round-trip
time (RTT) of current networks is approximately 106 + 8 ms. 5G networks aim to
limit this value to 14 + 8 ms. The major merit of RTT depreciation will be to move
cloud services closer to the user. Then, the RTT will be reduced to 14 ms, which will
primarily generate a delay (7 ms) on the access technology. However, the question
remains how the operators will move the data centers closer to the customer, since
until now, a distance of 200 km a data center from the customer has been enough.
Such a distance is not sufficient for 5G networks.
Among the available technologies covering the 5G signal area, there are
technologies for access networks: G.fast, data over cable service interface specifi-
cation (DOCSIS) and NG-PON2. G.fast technology offers symmetric transmission
speeds of up to 500 Mb/s over a short distance (up to 100 m). This speed can be
increased to 10 Gb/s, but the overall system reach will be shortened. In theory,
G.fast can only be deployed in special cases, such as brownfield scenarios, to
ensure connectivity of very small cells in buildings. The basic prerequisite is the
combination of functions within the baseband unit (BBU) and remote radio unit
(RRU). DOCSIS 3.1 offers bandwidth of 10/1–2 Gb/s share per coaxial segment
(192 MHz orthogonal frequency-division multiplexing (OFDM) channels).
Full-duplex communication (current downstream and upstream) can take up to
10 Gb/s per coaxial segment. However, neither of these methods is capable of fully
serving the 5G network because the available bandwidth is shared and the com-
mon public radio interface (CPRI) does not support the lowest possible latency for
transmission.
The basic idea behind the NG-PON2 network is to provide all end stations with
sufficient bandwidth. The station shares the total bandwidth that the associ-
ated OLT unit is able to handle properly. NG-PON2 network parameters such as
distribution ratios, power levels, transfer rates, etc. are described in [22–25]. In
5G network areas, there is ultradense deployment of basic radio stations required,
72
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
Figure 5.
Coexistence NG-PON2 and GPON scheme with dedicated lambdas for 5G networks.
and their radiations are constrained to prevent intra- and inter-cell interference.
In general, the reach of NG-PON2 (up to 20 km from the OLT) is sufficient for
covering an acceptable number of end users and for effective usage of its coverage
(the division of covered territory into several smaller sectors/cells). The use of
access technologies for data transfers or generally for triple play has already been
noted out by ITU in [26]. Figure 5 defines a possible scheme of the NG-PON2
network for its connection to the 5G network. The connection can be realized by
dedicated wavelengths (λ). By using a coexistence element (CE), such a coexis-
tence scheme for older PON standards under the ITU recommendations can be
established. Regarding the aforementioned dedicated wavelengths, up to 4λ with a
10 Gbit/s transfer rate is considered. One disadvantage of this radio tower connec-
tion method is the custom lock method that is publicly available but is much more
complex than in the case of the IEEE network. As a result, it will be necessary to
use the conversion station to transmit the signal from the radio station toward the
end customers.
At present, GPON is one of the most promising solutions for modern access
networks. Among other useful and important features, it provides us with triple
play services on a single optical fiber, good scalability, DBA, simple topology
management, etc. In comparison with the previous standards that only supported
transmission over asynchronous transfer mode (ATM), GPON is the first standard
that supports transmission over both ATM and ethernet technologies. In the ether-
net mode, the ethernet frames are encapsulated using GPON encapsulation mode
(GEM) and transferred inside GEM frames. As a result, some ethernet structures,
such as interpacket gap, preamble, or start of frame delimiter, are not available. For
more information, see Figure 6.
The basic GPON topology comprises the following three components: OLT,
ONU, and optical distribution network (ODN). Typically, there is/are a single/
more OLT/s in the network (depending on the preferences of the associated Internet
service provider) performing encapsulation and de-encapsulation of downstream
and upstream network traffic, respectively, for multiple end users (up to 128 end
users per port). The ONU is located at the end user’s premises and converts the
signals from the optical to the electrical domain. Finally, an ODN is composed of
the elements placed between OLTs and ONUs such as optical fibers, splitters, and
connectors.
73
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 6.
Ethernet encapsulation into the GEM frame [26].
Figure 7.
Interception of downstream communications.
74
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
attacker would have to disrupt the PON optical line. This situation would, however,
affect the transmission properties of the network in question, which should be
captured by the service provider’s surveillance center. This way of interception is
therefore very unlikely [29].
The abovementioned reason resulted in the fact that no security standard has
been provided for any of the individual PON standards. In the event of encryption
of the downstream transmission, e.g., using advanced encryption standard (AES)
or other secret key-based technology, these keys would have to be sent in an unse-
cured form—plain text in the upstream direction. It was based on the assumption
that upstream communication was safe; therefore, it was not necessary to provide
any additional security [30].
The research described in [31] focused specifically on the possibilities of intercep-
tion of the communication in the upstream direction. The authors tested whether
it was possible to intercept the communication through the back reflections of the
optical signal. These reflections could be caused by a variety of commonly used optical
components, such as passive optical hubs and/or connectors. Moreover, the optical
positive-intrinsic-negative (PIN) detectors and avalanche photodiode (APD), as well as
the preamplifiers, also had an effect on capturing the communications in the upstream
direction. Testing was carried out at various ODN configurations, mainly aimed at
testing the back reflection of the optical signal. The success of the potential attacker
depended primarily on the type of connector used and the photodetector. A polished
connector (PC) was considered inappropriate in terms of network security. The angled
polish connector (APC) reduced signal reflections by virtual vertical grinding. Using an
APD connector, however, increased the probability of a successful interception of the
communicating ONU. Nevertheless, the capability of eavesdropping in the upstream
direction was not dependent on the particular bit rate; it depended mostly on the power
level of the retroreflection and the type of connector in use [31].
The following demonstrates how to intercept communication in both directions
with a specialized tool in hand. Real-time network analysis of the transmitted data
(ONU management and control interface (OMCI) channel and GEM data units for
end units) was performed. For the purpose of the demonstration, the GPONxpert
tool was used. This tool has been developed specifically for passive optical net-
works. The tool allows for the real-time analysis of ONU-ID, performance levels,
and Alloc-ID. However, a detailed analysis of the transmitted data is still necessary
to be implemented in the form of postprocessing. Although the manufacturer,
TraceSpan, also has other modifications to this device, for our purposes, the
most popular measuring device was used. The lite versions contained support for
ONU-ID analysis. The real-time analysis of levels, Alloc-IDs, and other parameters
was stored using field programmable gate array (FPGA) and sent to the device
manufacturer for the postprocessing. The manufacturer then sent the report from
the measurement back to the customer.
This work is focused on the analysis of downstream and upstream transmission
in GPON standard topology. At the start of the measurement, all ONUs search for
their associated network parameters (e.g., serial number, ONU-ID, etc.) that are
stored inside the previously mentioned GEM frames. Since the distance between
the ONUs and the OLT are different, it was also necessary to use an equalization
delay parameter that is assigned by the OLT during the activation process. For more
information, see [31, 32]. Consequently, all ONUs wait for a random period prior
to starting data transmission. In the frame of this work, data are broadcasted in
the downstream direction. In the upstream direction, time slots assigned by the
OLT are used instead. Moreover, in this work, we did not use the DBA algorithm.
Consequently, all ONUs are expected to transfer data in time slots with prespecified
start and stop times.
75
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 8.
GPON activation process with encryption channel establishment messages [29].
To summarize, on the one hand, this work is interested in the analysis of user
data and the activation process. However, on the other hand, the description of the
activation process is omitted, as has already been described in our previous work
[32]. Since the user plane and control plane data are transferred using GEM frames,
it is not possible to use a common packet analyzer such as Wireshark. For this
purpose, we used a GPONxpert analyzer in a standalone mode in which all data are
transferred and saved to a hard drive. Therefore, to perform a deeper inspection or
analysis, all the data must to be postprocessed. In general, the control plane data can
be divided into signaling, OMCI. First, we focused on the signaling data analysis.
When the connection is established, messages such as Assign ONU-ID, Configure
Port-ID, Assign Alloc-ID, Encrypted Port-ID, Encryption_key, key_request_mes-
sage, and Key_switching_time are transmitted three times. This, as well as a com-
plete GPON signalization, can be seen in Figure 8.
It can be seen that a physical layer operations, administrations and maintenance
(PLOAM) message, specifically the “Serial number ONU,” are transferred from the
ONU to the OLT. This message holds information such as the vendor serial number,
a list of supported data profiles, and the value of random delay of 82 μs [28]. The
OLT uses these messages to extract the serial number and allocate the associated
ONU-ID. Moreover, to minimize the impact of unequal distances among the ONUs
and the OLT, it uses unique random delays for each of the ONUs that are based on
the time between two successive “Serial number ONU” messages. As soon as the
76
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
OLT receives the ONU-ID, it sends the PLOAM message: “Assign ONU-ID.” At this
point, even though the OLT is aware of the assigned ONU-ID, it is not able to use
unicast addressing because the ONU itself still cannot recognize the ONU-ID as its
own, and therefore, broadcast addressing needs to be used (the ONU serial number
is taken as the identifier) [29]. This means that every ONU receives this message;
however, based on the comparison of the incoming and internal serial numbers,
only the targeted ONU processes the message. In Table 1, it can also be seen that
ZTE company is the final unit manufacturer. Based on hard-defined bytes in the
MAC address, the manufacturer can be checked directly using its unique label:
“0xC03B4EB4.” GPON networks supported the transfer of ATM cells; however,
in the last review in 2014, this support completely disappeared as these networks
did not find their real application. For this reason, “ATM support Disable” can also
be observed in the captured data. On the other hand, GEM support is necessary
for any GPON data transfer: “GON support Enable.” The captured data also have
a description of the signal’s power level, however, only with the following levels:
low/medium/high power.
After the OLT sends the “Assign ONU-ID” message, it consequently sends
the “Ranging request” message using the specific ONU-ID. Consequently, the
ONU is capable of using a single grant to transmit data. The OLT unit’s response
to the “Serial Number ONU” message is a PLOAM message, “Assign ONU-ID.”
This message already carries a unique identifier for the designated end unit.
From the nature of PON technology, it is clear that each end unit receives all
messages. Using the unique ONU-ID, also called a serial number (if ONU-ID is
not assigned), ONUs decide which messages to process. In this case, the assign-
ment of ONU-ID = 1, i.e., the first end unit has already been replied to. The serial
number of the unit equals “0x5A544547C03B4EB4”, the Psync field is fixed and
does not change throughout the communication. This fact is evidenced by the
other messages listed in Table 1. “Ident Superframe Counter: 499314877” speci-
fies the order of the transmitted frame/s. The ONU endpoint activation process
in the GPON network is based on the sending of specific messages three times
in a row. The second copy of the message is left for the demonstration of the
Superframe counter being incremented by 1. After that, the ONU responds with
the “Serial number ONU” message using the maximum priority T-CONT class
(i.e., urgent data). The OLT computes a new value for the equalization delay using
the “Ranging Time” message sent by the ONU. In the initial ONU report, the unit
generates a random delay of 82 μs. The control unit must virtually ensure the
same distance for all ONU end units. Each unit is located at a different distance,
different customer stores, and/or residential units or streets. Supporting up to
20 km in the distribution part allows for the entire housing estate to be connected.
The OLT sends a “Ranging request” message to specify a unique ranging time for
each ONU. For this particular message, ONUs are required to respond immedi-
ately with their ONU-IDs and serial numbers. The OLT unit repeats the “Ranging
request” message three times in total. It is important to note the second response,
where the ONU specifies the mandatory parameters such as ONU-ID, the serial
number (now omitted), and adds information about the Urgent PLOAM waiting
and Traffic waiting in type 2 T-CONTs. The individual T-CONTs represent the
distribution of traffic according to their classification by importance. T-CONT
1 responds to urgent data, i.e., data with the highest priority (e.g., voice over
Internet protocol—VoIP) and fixed bandwidth. TCONT2 + 3 transfer Internet
protocol television (IPTV) data with guaranteed bandwidth, T-CONT 4 is com-
monly used for best-effort data, and the last T-CONT5 is a mixed type including
all types of bandwidth and services. Based on the received OLT responses, the
OLT unit evaluates the assigned delay for the given ONU and sends the delay value
77
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
1 1 Serial number ONU ID: 1; vendor ID: ZTEG; vendor SN: PLOAM
ONU 0xC03B4EB4; random delay: 0
122 1 Ranging time Path EqD descriptor: main path EqD; BWmap
delay: 265409
Table 1.
Activation process details in captured data in real GPON networks.
78
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
to the “Ranging time” message. GPON networks support so-called backup paths
and link recovery systems when an alternative route is available. The message
contains two fields: “Path EqD Descriptor: Main Path EqD” identifying the pri-
mary path and the backup path (the backup path was not available at the time of
testing; therefore, it is not included in the message). The delay value specifies the
delay for the end unit in “Delay: 265409,” but this value does not match the value
in μs. These steps set the basic communication parameters, the assigned ONU-ID,
and the equalization delay. During the measurement, secure communication was
enabled. The definition of reached states in which communication security can be
performed and the prerequisites for negotiating the key are given in [33–35]. The
entire process is started with the PLOAM message, “request password” contain-
ing “Ident Superframe Counter: 499318309.” This message requires the end unit
to respond with the same message with a password three times in a row. The
captured data contain two fields: “Password (Hex): 0x47433033423445423400”
and “Password (ASCII): GC03B4EB4.” Next, the “Request Key” message is
sent, the content of the message is not fully defined in this case; it is necessary
to respond to this message with the Encryption Key message. The “Encryption
Key” message consists of “Key Index: 0,” “Fragment Index: 0” and “Key Bytes:
0x681A055363E86213.” The sequence of these messages is followed and sent
three times in a row. In our case, a single message is not enough to deliver the
key, so another three messages are used to deliver the remaining part of it. This
fact is illustrated by the following: “Fragment Index entry: 1,” and “Key Bytes:
0x62677982F890BA9C.” The next “Key Switching Time” message should define
the start time when a new key is used that was not reached because the tool did
not detect these fields. It only detected “Superframe Counter field: 499321133.”
The start time field contents must confirm the end unit using the “Acknowledge”
message. The “Acknowledge” message contains the “Downstream Message Id: Key
switching Time” field, confirming the previous message. Next, the OLT sends the
“Configure Port-ID” message to the ONU specified by the ONU-ID. In the context
of data transmission, the ONU-ID is used for the data flow allocation in a GEM
frame. The ONU had to send the acknowledgement (ACK) messages three times
(one for each of the received messages). As visualized in Table 1, the downstream
message identification (DM_ID) contains a “Configure Port-ID” field that holds
the confirmed message’s name, and an ONU ID equaling the ONU-ID of the
end unit (in our case 1). Subsequently, the OLT checks whether the Port-ID is
encrypted. If it is not (i.e., the ONU remains in the registration process), the ONU
sends the ACK message as a response to each correctly received message. Next, the
OLT sends a “BER” (Bit Error Rate) message to specify an accumulation interval
for each of the ONUs (number of downstream frames per ONU) that is used to
count the number of downstream bit errors [29]. At this point, the ONU knows
the Port-ID. However, to establish bidirectional data communication, the Alloc-ID
is required to identify a traffic-bearing entity (e.g., T-CONT), which represents
the recipient of the upstream data allocated during the BWmap procedure [29]. It
is important to note that each ONU requires at least a single Alloc-ID that is equal
to the ONU-ID and that is not transmitted by the OLT in the “Assign Alloc-ID”
message. In this work, the following Alloc-ID was provided by the OLT: 1. The end
unit must always contain at least one ONU-ID identifier, but it may contain sev-
eral Alloc-IDs. Often, the initial Alloc-ID corresponds to the assigned ONU-ID,
which also occurred in this case. The ONU acknowledges each of the PLOAM
messages. After that, the encryption of the Port-IDs is rechecked. Nevertheless, it
should be mentioned that data encryption is optional, and in reality, many ISPs do
not use Port-ID encryption.
79
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
After the signaling phase is over, the operation, administration and maintenance
(OAM) can be transferred using the OMCI channel. In our work, the OMCI pro-
cedures begin when the OLT sends a “Get/Set request” message to the ONU. When
the ONU receives such a message, it responds with its own “Get/Set” message. In
this work, we used a single ONU, see Table 2. At this point, the crucial phase of the
OMCI analysis is the software image entity type inspection, as the ONU is to be
authorized by its own serial number against the database of the OLT (depending
on the particular ISP implementation). In the case that the OLT does not have the
record of the ONU in the database, the ONU is not allowed to download the software
image along with the configuration. On the other hand, if the record is present, the
ONU downloads the data. It is important to stress that because the ISPs may offer
different transmission speeds, functions, etc., to customers, each customer should
have his or her own distinct software image. The software image message responds
to the image data transfer used to set the parameters. The message parameters are
reported as “inactive” as they are in the initial phase of the file download. The next
analyzed message informs about the software image being valid and active. As
soon as the ONU has the software image, it is capable of transferring the customer
service support data as well as the metadata. To support VoIP telephony, which is a
QoS-demanding service, the ONU downloads an additional configuration contain-
ing information such as the type of codec, constant bit rate allocation, and T-CONT
priority. The next step is to set the parameters for VoIP service. This service is a key
service used for the highest priority end units. Their setting corresponds to the
priority operation, i.e., T-CONT1, in which a fixed bandwidth must be assigned. In
the case of most of the service providers, this value is set to 512 kbit/s. This speed
ID Type Entity
368 Get response TCI priority: 1; result reason: command processed successfully; ONU
vendor id: ZTEG
371 Get response Result reason: command processed successfully; version: Software
V3R016C00S917T; is committed: uncommitted; is active: image
inactive; is valid: valid
373 Get response Is committed: committed; is active: active; is valid: valid Software
image
379 Get response VOIP configuration state inactive: configuration retrieval has VOIP config
not been attempted data
401 Get all OMCI alarms received on ME—physical path termination point ONU DATA
alarms ETHERNET UNI, instance—257, LAN-LOS No carrier at the
response Ethernet UNI.
Table 2.
OMCI channel details in the analyzed GPON network.
80
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
Figure 9.
OMCI channel diagram for the analyzed ONU.
must be guaranteed, even though it is considerably higher than the bandwidth of the
G.711 codec (64 kbit/s). Successful reception and setting of the VoIP parameters are
indicated with the message with ID 381 “Profile version: 00000000.” In addition to
the previously mentioned OMCI channel procedures that take place on the side of
the ONU, there are also procedures on the side of the OLT: channel synchronization,
verification, alarm indication, FEC monitoring, and so on, see Table 2. In summary,
by analyzing the OMCI channel data, we performed active monitoring of the alarms
of the distribution network. As seen in the “Get all alarms” message (ID: 400), the
end-point ONU has reported a message signaling a failure on the Ethernet port.
In the case of OMCI channel measurement, it would be possible to summarize
the transferred software image data, ONU data and the VoIP configuration file, see
Figure 9.
A special case of the activation process is the message sequencing that can be
seen in Table 3. This part of the activation is not mandatory for end units but is the
last deactivation process aimed at the previously allocated parameters, most often
the ONU-ID. This occurs when there is an immediate power outage. In the case of
charged capacitors, the end unit sends a “Remote Error Indication” message. The
message indicates that the ONU encountered an error. In the context of our experi-
ments, this particular message was sent six times in total. When detecting a certain
number of errors, most commonly defined by the manufacturer of the control unit,
a “Dying Gasp” message follows. This message is dedicated to informing the control
unit about an end unit failure, i.e., the loss of communication. The critical param-
eter of this message is the ONU-ID. After receiving such a message, the control
unit sends the PLOAM message, “Deactivate ONU-ID,” that causes this identifier to
be released and consequently be reused by another end unit within the activation
process. The PLOAM message is sent three times. Other parameters are discarded
as internal timers have expired and communication/synchronization has not been
restored in the downstream direction.
Table 3.
Dying gasp PLOAM message details after the ONU lost power supply.
81
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
6. Conclusion
Acknowledgements
Conflict of interest
82
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
Notes/thanks/other declarations
Tomas Horvath would like to dedicate his part to his girlfriend (Lucie Baierova)
and his family (Dagmar, Jan, and Petra). They have supported him during his
University study. He also would like to give thanks to Ales Buksa for his support at
the University. Ales has taught and inspired him with many things in his personal
life.
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
83
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
84
Deployment of PON in Europe and Deep Data Analysis of GPON
DOI: http://dx.doi.org/10.5772/intechopen.82679
layer into OPNET modeler. In: 2017 [21] Rigby P. FTTH Handbook
International Workshop on Fiber Optics [Internet]. FTTHCouncil. EU:
in Access Network (FOAN). Munich, FTTHCouncil; 2016. Available from:
Germany: IEEE; 2017. pp. 1-5 http://www.ftthcouncil.eu/documents/
Publications/FTTH_Handbook_V7.pdf
[13] Horvath T, Munster P, Vojtech J, [Accessed: 23-09-2018]
Havlis O. Modified GIANT dynamic
bandwidth allocation algorithm of [22] Asaka K. What will be killer devices
NG-PON. Journal of Communications and components for NG-PON2?. In:
Software and Systems. 2017;13(1):15-22. 2014 The European Conference on
DOI: 10.24138/jcomss.v13i1.243 Optical Communication (ECOC).
Cannes, France: IEEE; 2014. pp. 1-3
[14] Farmer J, Lane BW, Bourg K,
Wang W. FTTx Networks: Technology [23] Nesset D. NG-PON2 technology
Implementation and Operation. and standards. Journal of Lightwave
Singapore: Morgan Kaufmann; 2017 Technology. 2015;33(5):1136-1143. DOI:
10.1109/JLT.2015.2389115
[15] Digital Czech Republic v. 2.0—The
Way to the Digital Economy [Internet]. [24] Khotimsky DA. NG-PON2
Ministry of Industry and Trade. Prague: transmission convergence layer:
Ministry of Industry and Trade; 2014. A tutorial. Journal of Lightwave
Available from: https://goo.gl/J6ynRj Technology. 2016;34(5):1424-1432. DOI:
[Accessed: 21-09-2018] 10.1109/JLT.2016.2523343
[16] National Plan for the Development [25] Horvath T, Munster P, Vojtech
of Next Generation Networks J, Havlis O, Gallo M. Transmission
[Internet]. Ministry of Industry and convergence layer of NG-PON2 in
Trade. Prague: Ministry of Industry and VPIphotonics tool. Journal of
Trade; 2017. Available from: https://goo. Communications Software and Systems.
gl/V3qxUD [Accessed: 21-09-2018] 2017;13(3):141-147. DOI: 10.24138/
jcomss.v13i3.359
[17] Y.2001: General Overview of NGN
[Internet]. 2001: General Overview [26] G.989.3: 40-Gigabit-Capable
of NGN. Switzerland: ITU; 2005. Passive Optical Networks
Available from: https://www.itu. (NG-PON2): Transmission
int/rec/T-REC-Y.2001/en [Accessed: Convergence Layer Specification
21-09-2018] [Internet]. International
Telecommunication Union. Geneva:
[18] Annual Reports 2014 [Internet]. International Telecommunication
Annual Rreports 2014. Prague: Czech Union; 2015. Available from: http://
Telecommunications Office (CTU); www.itu.int/rec/T-REC-G.989.3/
2015. Available from: https://www.ctu. [Accessed: 29-09-2018]
eu/2014-0 [Accessed: 21-09-2018]
[27] Cale I, Salihovic A, Ivekovic
[19] FTTx & Gigabit Society [Internet]. M. Gigabit passive optical network—
EU: IDATE; 2017. Available from: GPON. In: 2007 29th International
https://en.idate.org/categorie-produit/ Conference on Information Technology
fttx-gigabit-en/ [Accessed: 30-09-2018] Interfaces. Cavtat, Croatia: IEEE; 2007.
pp. 679-684
[20] Montagne R. FTTH/B Panorama
[Internet]. Spain; 2018. Available [28] Hood D, Trojer E. Gigabit-Capable
from: http://www.valencia. Passive Optical Networks. Hoboken:
ftthconference.eu Wiley; 2012
85
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
86
Chapter 5
Abstract
The exponential growth of Internet data traffic and progress of Information and
Communication Technology (ICT) sector pushes hard the telecommunication infra-
structure for upgrading the transmission data rate. Wavelength division multiplexed
passive optical networks (WDM-PONs) can be the next generation solution for nowa-
days problems which are related to transmission capacity. Next-generation WDM-PON
systems based on mixed wavelength transmitters are expected to become more cost-
efficient at high per user data rates, e.g., over 10 Gbit/s per channel. Important advan-
tage of this technology is to set various channel spacing and use different modulation
formats to increase spectral efficiency in the same time and provide different trans-
mission speeds for end user, based on pay-as-you-grow approach. Therefore, several
modulation formats like non-return to zero (NRZ) also called 2-level pulse-amplitude
modulation (PAM-2), four level PAM or PAM-4 and Duobinary (DB) are investigated
to understand their limitations, advantages and disadvantages to be further used in
next generation PON systems to increase its capacity and spectral efficiency.
1. Introduction
The exponential growth of Internet data traffic and progress of Information and
Communication Technology (ICT) sector pushes hard the telecommunication infra-
structure for upgrading the transmission data rate [1]. Power and cost-efficient fiber
optical access networks, like passive optical network (PON) and short-range fiber
optical links are one of the key technologies enabling bandwidth hungry services like
video on demand (VoD), high definition TV, and cloud computing supported by large
scale high-performance computers and data centers. Such optical links typically use
direct detection and on-off keying modulation (OOK) with NRZ line code. Today’s
challenge for optical access networks and data centers is to increase the serial line rate
of a NRZ link meeting the requirements to the physical bandwidth of the photonic
and electronic components like optical signal modulators and photodiodes [2].
87
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
88
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
According to ITU-T G.694.1 rec. the minimum step of a fixed channel interval is
12.5 GHz (please see Table 1). The flexible channel step is half of the 12.5 GHz, that
can be used for the inter-channel interval like 6.25 GHz. Reducing the inter-channel
interval leads to increase of crosstalk and non-linear effects (NOE) of transmitted
optical signal [16–18].
For research of spectral efficiency increasing, the experimental 2-channel
NRZ-OOK modulated 10 Gbit/s bit rate per channel transmission system model
was created for Next-generation WDM-PON systems based on tunable wavelength
transmitters, please see in Figure 1. First step of the research is based on various
channel spacing impact on the end user transmitted signal with following fixed
10 Gbit/s transmission speed per channel.
As one can see in Figure 1. transmitter (Tx) part of our investigated transmis-
sion system model consists of two continuous wave (CW) laser sources—Agilent
81949A, with fixed central frequency 193.1 THz or 1552.524 nm in wavelength, and
COBRITE DX-1 laser with tunable central frequency, which can be set the neces-
sary channel spacing. Agilent 81949A continuous wave laser source was connected
Table 1.
Nominal central frequencies grid of the DWDM grid [17].
89
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 1.
2-Channel NRZ-OOK modulated optical transmission system with 10 Gbit/s transmission speed per channel
and flexible channel spacing.
to the 40G intensity Mach-Zehnder (MZM) modulator, COBRITE DX-1 laser light
source was connected to the second MZM intensity modulator. Both laser sources
were used with minimal output power +9 dBm for Agilent 81949A and +6 dBm for
COBRITE DX-1. To provide the same level of optical power for both optical chan-
nels, after the PHOTLINE 40G MZM, an optical attenuator of 3.05 dB insertion loss
was additionally attached to the modulator’s optical output. Pulse Pattern Generator
(PPG) with Pseudo random bit sequence (PRBS9) was used for generation of NRZ
coded electrical signals. The external 10 GHz clock signal generator was used in this
experiment for as a clock signal source for PPGs. Two electrical PPG non-inverted
RF data signal outputs were connected to each of MZMs electrical signal inputs. The
data rate for each of the PPGs was 10 Gbit/s throughout the experiment.
ITU-T G.652 standard single mode fiber (SSMF) with dispersion coefficient of
16 ps/(nm × km), and 0.2 dB/km attenuation coefficient was used in optical distri-
bution network. Depending of SSMF fiber span length (20 or 40 km), an Erbium
doped fiber amplifier (EDFA) with additional gain was used to provide sufficient
optical power level before the PIN photoreceiver.
At the receiver part (Rx), the incoming optical signal was divided by 50% power
splitter with 3.5 dB insertion loss. One output of optical power splitter was con-
nected to the optical spectrum analyzer (OSA). Second output of power splitter
was connected to the optical band pass filter (BPF) OTF-350 with a tuned 35 GHz
3-dB bandwidth. After BPF filter, fiber Bragg grating dispersion compensation
module (FBG DCM), with 3 dB insertion loss was connected for post-compensation
purposes of chromatic dispersion (CD). To avoid the maximum optical input opti-
cal power level rating of +3 dBm before the 10G PIN photoreceiver (PD) a monitor-
ing power splitter with a power ratio of 10–90% and power meter was used. First
channel was filtered out by using optical BPF. As one can see in Figure 2(a), optical
spectrum with central channel frequency 1552.560 nm (193.096 THz in frequency)
90
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
Figure 2.
Central channel spectrum of 2-channel NRZ-OOK modulated optical transmission system with 10 Gbit/s per
channel: (a) after BPF and (b) measured amplited frequency response of BPF.
Figure 3.
Simulation scheme of 2-channel NRZ modulated optical transmission system with 10 Gbit/s transmission speed
per channel with flexible channel interval.
is slightly shifted relative to ITU-T G.694.1 rec. Grid central frequency of 193.1 THz.
By obtained results from the optical spectrum analyzer (OSA), the BPF pass band is
Δλ = 0.280 nm equal to 35 GHz, where λ0 = 1552.564 nm and λ1 = 1552.424 nm.
An eye analyzer was used for measurements of received electrical signal quality.
The eyes of received signals for both channels were open, therefore leading to error
free transmission. As the eye pattern analyzer for quality measurement use special
masks to determine if the signal is above or below necessary quality. We continued
our research in OptSim simulation environment by creating relevant simulation
model and using the previously obtained experimental data.
For more precise expected Bit-error-rate (BER) values of received signal the
simulation model was created in OptSim simulation software environment. The
model used BER estimator based on statistical signal analysis. As one can see in
Figure 3, simulation scheme implemented in OptSim simulation software for BER
measurements has the same setup as experimental system. In the OptSim simula-
tion environment, it is necessary to perform the assembly of used electrical-optical
components in order to repeat the 2-channel NRZ-OOK modulated 10 Gbit/s per
channel transmission system to research impact of various channel spacings.
According to ITU-T G.694.1 rec., see Table 2, during the experiment, the inter-
channel interval for transmission system was changed from 100 GHz to 25 GHz. We
started the experiment at a 20 km long fiber ODN distance with 100 GHz channel
spacing. Firstly, the measurements was carried out without the chromatic disper-
sion (CD) post-compensation, at 20 km fiber link. For transmission over 20 km
fiber span we observed negligible chromatic dispersion impact on 10 Gbit/s signal,
received signal is mainly insignificant impact of dispersion [19].
The 12.5 GHz channel spacing interval was not obtained in this step of research.
The reason for that was too wide filter pass-band, as a result photoreceiver captured
91
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Table 2.
Experimentally used channel interval according to ITU-T G.694.1 rec.
Table 3.
Channel spacing dependence on the channel interval.
both channels simultaneously. They did not appear on the Eye Analyzer because
it was not possible to synchronize between the transmitter and receiver. After
obtaining the results at fixed inter-channel intervals from 100 to 25 GHz, the
smallest inter-channel interval at which transmission is possible was found. The
step used to search for the inter-channel interval is 6.25 GHz and half of the found
step 6.25/2 = 3.125 GHz. Result of channel spacing impact was obtained from chan-
nel with fixed central frequency of 193.1 THz = 1552.524 wavelength corresponding
to the laser source used by Agilent 81949A. Our transmission system has only two
channels, it is not possible to choose a central channel, both channels have mainly
the same effect of crosstalk. The channel interval was changed by changing the
central wavelength of the second CW laser source with 6.25 and 3.125 GHz step.
Instead of experiment for 2-channel NRZ-OOK modulated optical transmission
system with 10 Gbit/s transmission speed per channel previously calculated flexible
channel interval was used in our research, please see Table 3.
Fiber optical transmission system made by the optical components affected by
various factors caused by higher attenuation mentioned in specification insertion
loss. To create same simulation model in OptSim simulation software environment,
it was necessary to adapt model optical elements of the actual loss. In Figure 4. we
can see BER estimated from the data obtained in OptSim simulation according to
different channel intervals.
The BER threshold of 10−9 for our investigated transmission system was used
to evaluate maximal crosstalk impact between the channels. According to the
92
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
Figure 4.
BER dependence on the channel interval for a 20 km long 2-channel NRZ-OOK modulated optical
transmission system with 10 Gbit/s transmission speed per channel.
Figure 5.
Comparison of experimental and simulative results: eye diagrams of 20 km 2-channel NRZ-OOK modulated
optical transmission system with 10 Gbit/s transmission speed per channel without CD post-compensation:
(a) 100 GHz channel spacing, (b) 50 GHz channel spacing, (c) 25 GHz channel spacing, (d) 100 GHz channel
spacing in the environment of OptSim, (e) 50 GHz channel spacing in the environment of OptSim, and
( f) 25 GHz channel spacing in the environment of OptSim.
obtained results channel interval effect up to 30 GHz can be evaluated, higher than
used value of BPF filter. Deterioration of the BER used for channel interval less
than 30 GHz in our research, can be explained by adjacent channel overlapping. At
20 km long SSMF fiber optical link minimal channel spacing was achieved ensuring
BER < 10−3 threshold at 25 GHz. In Figure 5, we can see experimental and theoreti-
cal (simulation data) eye diagrams of received signal for second channel with 100,
50 and 25 GHz channel spacing crosstalk impact, please see Figure 5.
In second part of our research the length of ODN was increased from 20 to
40 km, by adding 20 km SSMF fiber span. The effect of chromatic dispersion was
observed in upgraded transmission system. Fiber Bragg grating dispersion compen-
sation module (FBG DCM) with −640 ps/nm was used for dispersion compensa-
tion. The BER value exceeded our defined BER threshold of 1x10−9 at 31.25 GHz
channel spacing according to the obtained results of OptSim simulation software.
By performing experiment, the 31.25 GHz inter-channel spacing was the last inter-
val at which mask testing with eye diagram analyzer for received eye diagrams was
93
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 6.
Comparison of experimental and simulative results: eye diagrams of 40 km 2-channel NRZ modulated optical
transmission system with 10 Gbit/s transmission speed per channel with CD post-compensation: (a) 50 GHz
channel spacing, (b) 31.25 GHz channel spacing, (c) 25 GHz channel spacing, (d) 50 GHz channel spacing in
the environment of OptSim, (e) 31.25 GHz channel spacing in the environment of OptSim, and ( f) 25 GHz
channel spacing in the environment of OptSim.
Figure 7.
Comparison of experimental and simulative results: eye diagrams of 40 km 2-channel NRZ modulated optical
transmission system with 10 Gbit/s transmission speed per channel without CD post-compensation: (a) 50 GHz
channel spacing, (b) 31.25 GHz channel spacing, (c) 25 GHz channel spacing, (d) 50 GHz channel spacing in
the environment of OptSim, (e) 31.25 GHz channel spacing in the environment of OptSim, and ( f) 25 GHz
channel spacing in the environment of OptSim.
Figure 8.
BER dependence on channel interval for a 40 km 2-channel NRZ-OOK modulated optical transmission system
with 10 Gbit/s transmission speed per channel.
94
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
In our research we investigated the 4-channel 10 Gbaud/s (20 Gbit/s) per chan-
nel PAM-4modulated WDM-PON access system with minimal allowable channel
spacing, which has a direct impact on the utilization of resources like optical spec-
trum. The research was made with and without fiber chromatic dispersion (CD)
fiber Bragg grating compensation module (FBG DCM). We evaluate system per-
formance and found the maximal transmission distance for multichannel PAM-4
modulated WDM-PON transmission system operating at 20 Gbit/s per channel.
In OptSim simulation software we created transmission system model to evaluate
the performance of 4-channel PAM-4 modulated WDM-PON transmission system
operating at 10 Gbaud/s or 20 Gbit/s per channel under the condition with BER
threshold of 10−3, by use of Reed Solomon (RS 255,223) forward error correction
(FEC) code for 10 Gbit/s PONs [21, 22]. The theoretical FEC relationship restores
1.1 × 10−3 pre-FEC BER to a 10−12 post-FEC in the PON standards. As it is shown
in Figure 9, the PAM-4 modulated WDM-PON simulation scheme was created in
OptSim simulation software environment. Here the Matlab software was used for
BER estimation of received PAM-4 signals. WDM-PON simulation model consists
of 4 channels, with central frequency 193.1 THz for second channel and chosen 50
or 100 GHz, according to the previously mentioned ITU G.694.1 rec. According to
our previously channel interval research of flexible channel spacing like 37.5 and
25 GHz also was realized. However, the quality of received signal was low, with
crosstalk impact and error-free transmission was not possible, performance was
above our defined BER threshold 1 × 10−3.
We evaluated the performance of WDM-PON architecture in terms of maximal
transmission reach. Optical line terminal (OLT) is located in central office (CO) and
consists of four transmitters (OLT_Tx). Each OLT_Tx transmitter consists of two
pseudo-random bit sequence (PRBS) generators and NRZ drivers, as a result two
Figure 9.
Simulation scheme of 4-channel PAM-4 modulated WDM-PON transmission system operating at 10 Gbaud/s
per wavelength.
95
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
electrical signals are generated where one of them has twice larger amplitude than
other for each particular electrical signal. An electrical coupler is used to couple
both electrical signals in such a way generating electrical PAM-4 signal. Afterwards,
additional electrical filters were used for ensuring of optimal system performance.
Generated PAM-4 signal was send to external MZM with 3 dB insertion loss and
20 dB extinction ratio. Continuous wavelength (CW) laser with linewidth of
50 MHz and output power of +3 dBm is used as the light source [23].
Optical signals from four transmitters are coupled together by using optical
coupler with 1 dB insertion loss. Chromatic dispersion pre-compensation by FBG
DCM, with additional 3 dB insertion loss is realized for all channels before launch-
ing optical signal in ITU-T G.652 single mode fiber (SMF), used for transmission
in optical distribution network (ODN). After transmission in ODN, all channels
are separated by arrayed waveguide grating (AWG) demultiplexer which insertion
loss is 3.5 dB. Here we applied various channel spacings—50 or 100 GHz (3-dB
bandwidth is 20 GHz) for research of the crosstalk impact. Each receiver of optical
network terminal (ONT) consists of PIN photoreceiver (sensitivity is −19 dBm for
BER of 10−12). An optimal electrical Bessel low-pass filter (LPF) with bandwidth
(3-dB bandwidth is 7.5 GHz), was adopted for more successful system performance.
An electrical scope was used for evaluation of received signal bit patterns quality,
accordingly, eye diagrams.
As it is shown in Figure 10(a) in B2B configuration for first investigated
100 GHz channel spacing, the signal quality is good, eye is open and error-free
transmission can be provided. After 59 km transmission which was the maximum
transmission distance without use of FBG DCM, the BER of received signal was
7.5 × 10−4, please see Figure 10(b). Dispersion compensation FBG DCM module
was implemented to evaluate transmission distance in terms of maximal reach. As
it is shown in Figure 10(c) by using this technique of FBG DCM, the maximum
achievable transmission distance 74 km was reached, where BER of received signal
was 9 × 10−4. Extra 15 km or 25.4% of link length was gained.
Therefore, basis on our research data we can conclude that narrower channel
spacing for 4-channel PAM-4 10 Gbaud/s WDM-PON system is 50 GHz. As it is
shown in Figure 11(a) in B2B configuration for second investigated 50 GHz chan-
nel spacing, the signal quality is good, eye is open and error-free transmission can
be provided. After 58 km transmission, which was the maximum transmission
distance without use of FBG DCM, the BER of received signal was 8 × 10−4, shown
in Figure 11(b). In our research we show the eye diagrams of received signal for
the second channel, the drop in BER performance can be explained by the impact
of crosstalk between channels. Dispersion compensation FBG DCM module was
Figure 10.
Eye diagrams of received signal (a) after B2B transmission, (b) after 59 km transmission without use of CD
pre-compensation, (c) after 74 km transmission with use of CD pre-compensation for 4-channel 20 Gbit/s per
channel PAM-4100 GHz spaced WDM-PON transmission system.
96
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
Figure 11.
Eye diagrams of received signal (a) after B2B transmission, (b) after 58 km transmission without use of CD
pre-compensation (c) after 72 km transmission with use of CD pre-compensation for 4-channel 20 Gbit/s per
channel PAM-4 50 GHz spaced WDM-PON transmission system.
97
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 12.
Simulation scheme of 8-channel 20 Gbit/s transmission speed per channel PAM-4, DB and NRZ modulated
WDM-PON optical transmission system.
98
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
Figure 13.
Eye diagrams of received (a) PAM4, (c) DB and (e) NRZ signals after B2B transmission, and after maximal
reached transmission distance: (b) 50 km with PAM-4, (d) 62 km with DB, ( f) 27 km with NRZ modulated
signals for 8-channel 20 Gbit/s per channel WDM -PON transmission system.
The BER threshold of 10−3 with additional FEC was used for our investigated
WDM-PON transmission system to compare performance in terms of maximal net-
work reach for PAM-4, DB, NRZ modulated optical signals. During the simulations
it was observed that maximal achievable distance has minimal crosstalk impact on
BER for all modulation formats, which was negligible, depending on our chosen
channel spacing.
As it is shown in Figure 13(a, c and e) in B2B configuration for narrowest
investigated 50 GHz channel spacing, the signal quality is good, eye is open
and error-free transmission can be provided. After transmission the BER of
received DB modulated signal with maximum reached distance of 62 km was
3.7 × 10−4. PAM-4 and NRZ modulated signals shows 50 km and 27 km maximal
reached transmission distance, where BER of received signal was 5.8 × 10−4 and
3.1 × 10−4, please see Figure 13(b, d and f ). The largest network reach with BER
below defined threshold, was provided by DB modulation format, extending the
reach of 62 km.
99
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
5. Conclusions
Nowadays the WDM-PON systems rely on fixed wavelength transmitters and are
expected to become more cost-efficient at high per user data rates. It was examined
that different types of optical modulation formats are available for passive WDM
fiber optical access networks. Implementation and research of multilevel modula-
tion formats like PAM-4 and duobinary can dramatically improve the spectral
efficiency and available bitrate by using the bandwidth of already existing optical,
electro-optical or electrical devices. Theoretical simulations and experimental
research methods showed possibility to double the available transmission speed
in optical access networks by using the same bandwidth, e.g., instead of 10 Gbit/s
transmit 20 Gbit/s signal by using 10 GHz electrical and electro-optical equipment,
if PAM-4 modulation method is used. In our research we investigated existing
optical modulation formats—widely used NRZ, DB and PAM-4 for optical access
networks, by experimentally demonstrating and modeling system transmission
in RSOFT OptSim simulation environment and Matlab software. As it shown by
simulation results, narrowest channel spacing provides higher spectral efficiency.
However, better signal quality and system performance are achieved with larger
channel spacing interval, e.g., 100 GHz, mainly due to crosstalk between channels.
From experimental data we can clearly see that the chromatic dispersion limits
transmission capacity when bit rates increase. Implementation of the efficient com-
pensation solution may sufficiently extend the reach of optical link and improve the
transmission quality in our investigated WDM-PON systems.
Acknowledgements
This work has been supported by the European Regional Development Fund
within the Activity 1.1.1.2 “Post-doctoral Research Aid” of the Specific Aid
Objective 1.1.1 “To increase the research and innovative capacity of scientific
institutions of Latvia and the ability to attract external financing, investing in
human resources and infrastructure” of the Operational Programme “Growth and
Employment” (No. 1.1.1.2/VIAA/1/16/044).
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
100
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
References
[1] Wei JL, Grobe K, Griesser H. High [8] Wagner C, Spolitis S, Olmos
speed next generation passive optical J, Bobrovs V, Tafur MI. Re-use of
networks: Performance, cost, and low bandwidth equipment for high
power dissipation. In: 2016 Progress in bit rate transmission using signal
Electromagnetic Research Symposium slicing technique. In: Conference
(PIERS), Shanghai, China. 2016. proceedings of Asia Communications
pp. 4856-4857 and Photonics Conference, China,
Hong Kong, 19-23 November 2015.
[2] Reed GT, Mashanovich G, Gardes FY, Honkonga: Optical Society of America;
Thomson DJ. Silicon optical modulators. 2015. pp. 1-3
Nature Photonics. 2010;4(8):518-526
[9] Spolitis S, Wagner C, Olmos J,
[3] Nazemi A, Kangmin H, Catli B, Delong Bobrovs V, Ivanovs G, Monroy I.
C, Singh U, He T, et al. A 36Gb/s PAM4 Experimental Demonstration of a
transmitter using an 8b 18GS/s DAC in 28 nm Scalable Sliceable Transceiver for
CMOS. In: ISSCC 2005 IEEE International Optical Access Networks. In: Asia
Digest of Technical Papers Solid-State Communications and Photonics
Circuits Conference. 2015. pp. 1-3 Conference 2014: Conference
Proceedings, China, Shanghai, 11-14
[4] Amirkhany A, Abbasfar A, Savoj J, November 2014. Shanghai: Optical
Jeeradit M, Garlepp B, Kollipara RT, Society of America; 2014. pp. 1-3
et al. A 24 Gb/s software programmable
analog multi-tone transmitter. IEEE [10] Keysight Technologies, Canada
Journal of Solid-State Circuits. Keysight High Speed Digital Seminar
2008;43(4):999-1009 Series. PAM-4 Stressed Pattern
Generation. 2015. p. 41. Available from:
[5] Xiong C, Douglas MG, Jonathan EP, http://www.keysight.com/upload/cmc_
Jason SO, Wilfried H, William MJG. upload/All/HSDSeminarPaper4.pdf
Monolithic 56 Gb/s silicon photonic
pulse-amplitude modulation [11] Keysight Technologies. PAM-4 Design
transmitter. Optica. 2016;3:1060-1065 Challenges and the Implications on Test.
Application Note. 2015. p. 12. Available
[6] Geisler DJ, Fontaine NK, Scott RP, He T, from: http://literature.cdn.keysight.com/
Paraschis L, Gerstel O, et al. litweb/pdf/5992-0527EN.pdf
Bandwidth scalable, coherent
transmitter based on parallel synthesis [12] Kaur R, Dewra S. Duobinary
of multiple spectral slices. In: Optical modulation format for optical
Fiber Communication Conference and system—A review. International Journal
Exposition (OFC/NFOEC), 2011 and of Advanced Research in Electrical,
the National Fiber Optic Engineers Electronics and Instrumentation
Conference. Los Angeles, CA; 2011, Engineering. 2014;3:11039-11046.
paper OTuE3. pp. 1-3 Available from: http://www.ijareeie.
com/upload/2014/august/12_%20
[7] Spolitis S, Olmos JJ, Bobrovs V, Duobinary.pdf
Ivanovs G, Monroy I. A novel approach
for transmission of 56 Gbit/s NRZ signal [13] Qamar F, Khawar Islam M,
in access network using spectrum slicing Shah SZA, Farhan R, Ali M. Secure
technique. In: Asia Communications and duobinary signal transmission in optical
Photonics Conference 2013: Conference communication networks for high
Proceedings, China, Beijing. 12-15 performance & reliability. IEEE Access.
December 2013, paper AF4D.2. pp. 1-3 2017;5:17795-17802
101
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
[17] ITU-T G.694.1 Spectral Grids for [23] Salgals T, Spolitis S, Olonkins S,
WDM Applications: DWDM Frequency Bobrovs V. Investigation of 4-PAM
Grid. 2012. pp. 1-7 modulation format for use in
WDM-PON optical access systems.
[18] Olonkins S, Spolitis S, Lyashuk I, In: Progress in Electromagnetics
Bobrovs V. Cost effective WDM-AON Research Symposium (PIERS 2017), St.
with multicarrier source based on Petersburg, Russia. 2017. pp. 1-4
dual-pump FOPA. In: International
Congress on Ultra Modern [24] Forzati M, Berntson A, Martensson J,
Telecommunications and Control Pincemin E, Gavignet P. NRZ-OOK
Systems and Workshops, 2015. 2015. transmission of 16 × 40 Gb/s over
Art. No. 7002073. pp. 23-28 2800 km SSMF using asynchronous
phase modulation. In: IEEE Conference
[19] Spolitis S, Bobrovs V, Ivanovs G. on Lasers and Electro-Optics and 2008
Reach improvement of spectrum- Conference on Quantum Electronics
sliced dense WDM-PON system. In: and Laser Science. 2008. pp. 1-2
Proceedings—2012 7th International
Conference on Broadband, Wireless [25] Wang Y, Gai W, Tang L. A novel
Computing, Communication and 40-Gb/S PAM4 transmitter with
Applications, BWCCA 2012. 2012. power-efficient pre-emphasis. In: IEEE
pp. 296-301. Art. No. 6363072 International Conference on Solid-State
and Integrated Circuit Technology
[20] Anritsu. Enabling Precision EYE (ICSICT). 2014. pp. 1-3
Pattern Analysis Extinction Ratio,
Jitter, Mask Margin. pp. 3-6. Available [26] Salgals T, Skladova L, Vilcane K,
from: https://dl.cdn-anritsu.com/en-us/ Braunfelds J, Spolitis S. Evaluation
test-measurement/files/Technical-Notes/ of 4-PAM, NRZ and duobinary
Technical-Note/MP2100A_EE1100.pdf modulation formats performance for
use in 20 Gbit/s DWDM-PON optical
[21] Brunina D, Porto S, Jain A, Lai CP, access systems. In: 2018 Advances in
Antony C, Pavarelli N, et al. Analysis Wireless and Optical Communications
102
Research of M-PAM and Duobinary Modulation Formats for Use in High-Speed WDM-PON…
DOI: http://dx.doi.org/10.5772/intechopen.84600
103
Chapter 6
Mitigating Turbulence-Induced
Fading in Coherent FSO Links:
An Adaptive Space-Time Code
Approach
Ojo O. Adedayo, Oluwafemi B. Ilesanmi,
Ogunlade M. Adegoke and Ajibade Adedayo
Abstract
1. Introduction
105
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
more efficient, faster and reliable wireless communication techniques. To this end,
free space optical (FSO) communication has been a viable solution [1].
Free space optical communication is a communication technology that employs
light as carrier by modulating baseband information with optical carriers often
from laser beams through free space to the receiver [2]. The path of connection
between FSO transmitters and the receivers are known as FSO links. Even though
the very first optical system dates back to the eighteenth century, modern FSO
communication systems were first widely deployed by the National Aeronautics
and Space Administration (NASA) and have since become a promising broadband
wireless access technology. FSO communication systems are also being combined
with standard RF systems in order to form hybrid communication systems that
harness the unique features of RF and FSO communication systems to enhance
performance, capacity and reliability.
Characteristically, FSO communication systems are highly secure as they have
high immunity to interference with the use of secure point-to-point line-of-sight
links, they require no licensing or regulatory permission, and they are fast and can
be easily deployed and operated compared to other systems like the fiber optic
systems [3]. These features make FSO communication the favored option for the
provision of high-speed links for a variety of next generation optical applications
including broadcast, security, wireless backhaul at a data rate as high as 40 Gbps
[4], fiber backup and last mile communication [5]. Finally, the ease of setup and
cost effectiveness of FSO systems have made them the preferred option for restor-
ing connection in case of disaster.
However, the performance of FSO communication systems are greatly affected
by turbulence-induced fading [6–12], and different investigations are currently
being explored to address this challenge. The inhomogeneity of the temperature and
pressure of the atmosphere causes local variations in the refractive index as light
propagates from the transmitter to the photoreceptor; these variations degrade the
performance of FSO links significantly.
Geared towards the improvement of the performance of coherent FSO commu-
nication systems in the presence of atmospheric turbulence, this work examines the
error reduction schemes currently being employed for FSO links and presents an
adaptive space-time trellis code (STTC) scheme for coherent FSO links.
systems depending on the application for which they are deployed, and these
applications include inter-chip communication, inter-vehicular communication,
metropolitan area communication as well as satellite and space exploration.
4. Turbulence models
One of the most crucial steps in the attempts to mitigate the degradation in the
performance of optical communication systems is accurate modeling of the
atmospheric turbulence under different conditions. Below are some of the
irradiance functions presented in terms of probability distribution functions.
The lognormal distribution is one of the most widely employed for weak atmo-
spheric turbulence distribution. Here, the irradiance value received at the receiver
follows the distribution [9]
!
1 ðln a þ 2σ x Þ2
f A ðaÞ ¼ � �21 exp � (1)
2a 2πσ 2x 8σ 2x
Figure 1.
Some turbulence mitigation techniques in FSO systems.
107
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
4.2 K-distribution
2α α�1
� pffiffiffiffiffi�
pðIÞ ¼ ðαIÞ 2 K α�1 2 αI , I > 0, α > 0 (2)
ΓðαÞ
K m ð∙Þ ¼ modified Bessel function of second kind and order m:
where K v ðxÞ is the modified Bessel function of the second kind and α and β are
the turbulence parameter.
c ¼ ðc0 ; c1 ; c2 ; …; ct ; …Þ (5)
108
Mitigating Turbulence-Induced Fading in Coherent FSO Links: An Adaptive Space-Time Code…
DOI: http://dx.doi.org/10.5772/intechopen.84911
Space-time code (STC) leverages on the features of both time diversity and
space diversity to combat turbulence-induced fading in wireless communication
systems. RF wireless systems in particular have witness an explosion of interest in
the use of space-time coding to improve communication system performance in
terms of error control and turbulence mitigation, and FSO communication systems
are also witnessing a lot of interest in using this same tool for similar purpose.
In this chapter, we present an adaptive four-state space-time trellis coded
coherent FSO system with two transmit lasers, as illustrated in Figure 3. Firstly, the
error correction performance of the system is complemented by the interleaver, a
mechanism put in place to distribute the burst errors—an effect of deep fade, onto
different codeword lengths.
Denoting the average SNR as γ, we take the received signal matrix for each
codeword C as [20]
pffiffiffi
R¼ γ CH þ Z (8)
where H and Z are the channels and noise matrices, respectively, and H is
modeled in terms of the uniformly distributed channel gain phase ϕμv and the
channel gain amplitude aμv as [20]
Figure 2.
STTC encoder [18].
Figure 3.
Space-time trellis coded FSO communication system.
109
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
We begin our analysis using the pairwise error probability (PEP), which is the
probability
� that the � decoder erroneously decodes a transmitted STTC codeword C
as C0 ¼ c00 …c0T�1 . Then, assuming a gamma-gamma fading distribution as
portrayed in Eq. (4), we represent the conditional PEP as [5]
0sffiffiffiffiffiffiffiffiffiffiffiffiffiffi1
γd2 ðEÞA
Pe ðEjHÞ ¼ Q @ (10)
2
where
� �
d2 ðEÞ ¼ tr HH EH EH (11)
and by equating B with the positive semi-definite matrix EH E and comparing the
elements thereof, where E represents the error matric in the decoding of the
codewords and ð∙ÞH denotes the Hermitian transpose function, we write the
asymptotic pairwise error probability of the systems as [21]
� � ��N � �
πa2h Γ2 ð2μÞF μ; μ; 1; ξ2 Γ 2μN þ 21 γ �2μN
PEP ¼ pffiffiffi � � (13)
2 π ðb11 b22 ÞμN Γð2μN þ 1ÞΓ2N μ þ 21
�t t � �� t � �2
2þn�1
∞
2
F ; ; 1; ξ ¼ ∑ ξn (14)
2 2 n¼0 n
The function Γ in Eq. (13) is a function of the channel parameters α and β; these
parameters may be obtained through the Rytov variance, which in turn is a function
of the refractive index, the transmission path length between the transmitter and
the receiver and the optical wave number [22].
With proper modifications of the values of ξ, Eq. (13) and by extension,
Eq. (14), could be modified for general case as well as specific non-orthogonal
space-time codes for coherent free space optical communication system. We lever-
age onto this feature to introduce an adaptive orthogonality controller which adjusts
its parameters to any STC supplied thereby not merely eliminating the orthogonal-
ity condition as presented in [21] but effectively introduces additional flexibility to
the coding scheme.
Readers are to note, however, that several space-time code designs reported for
IM/DD FSO communication systems cannot be simply employed for coherent FSO
communication systems. This caveat is due to the peculiarities inherent in coherent
FSO systems. In addition to this, it should also be noted that in this work, it is
assumed that the transmit lasers simultaneously illuminate the receivers with the
receivers far away enough from the transmit lasers to assume independent and
identically distributed (iid) fading gain.
110
Mitigating Turbulence-Induced Fading in Coherent FSO Links: An Adaptive Space-Time Code…
DOI: http://dx.doi.org/10.5772/intechopen.84911
In this section, the results of the space-time code technique for mitigating
turbulence-induced fading in coherent FSO communication systems are presented.
Free space optical systems often face the challenge of fading as well as pointing
error, and the effect of the latter has been well addressed [23]. The performance of
the link under gamma-gamma turbulence is investigated for two transmit lasers,
first, with two receivers and then four and six receivers, respectively, as shown in
Figure 4. Apart from the reduction of the average bit error rate with increase in
SNR values, the result shows that at low average SNR, the average performance of
the link under the turbulence condition for the different number of receivers are
relatively close. However, the difference in performance becomes apparent at
higher SNRs as evidenced from SNR 20 to SNR 38.
Although gamma-gamma distribution have been well reported as suitable for
modeling weak turbulence as well as strong turbulence scenarios, for the sake of
analysis, we employ the values α ¼ 3:0 and β ¼ 2:7. The choice of these values is
Figure 4.
Performance of coherent FSO link with different receivers.
Extended Alamouti STC with PPM IM/DD 0 ≤ SNR per bit ≤ 30 [29]
turbo coding
Table 1.
Some coding schemes employed for FSO links.
111
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
7. Conclusion
For coherent free space optical communication links, we explore the space-time
approach to mitigating turbulence-induced fading which thus far remains a serious
performance degrading factor for FSO systems. Additionally, as an effort geared
towards realizing the promising potentials of coherent free space optical communi-
cation systems, we propose an adaptive orthogonality controller for seamless
deployment of space-time codes for coherent free space optical communication
systems.
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
112
Mitigating Turbulence-Induced Fading in Coherent FSO Links: An Adaptive Space-Time Code…
DOI: http://dx.doi.org/10.5772/intechopen.84911
References
113
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
114
Chapter 7
Abstract
Keywords: spatial light modulator (SLM), liquid crystal silicon (LCoS) SLM,
optical transforms, computer-generated holography (CGH), photonic integrated
circuits (PICs), spatial division multiplexing (SDM)
1. Introduction
There has been significant growth in the required capacity of the telecommunica-
tion systems, which can be attributed to the proliferation of mobile devices, band-
width-intensive applications, and services [1–3]. As a result, a significant increase in
the broadband connections as well as the related multimedia traffic on a yearly basis
[4–6] has been progressing. Moreover, the traffic explosion has been one of the chal-
lenges being faced in telecommunication systems [2, 7]. Also, it has been observed
that the traditional electronic media which are based on copper are unable to meet the
system requirements majorly in terms of bandwidth and latency [5, 8–10].
115
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
116
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
Optical signal processing has been providing relevant solutions to convert data
into spatially modulated coherent optical signals with SLM devices, allowing the
effective implementation of digital holograms [25]. One of the most useful proper-
ties of the hologram is its ability to control phase and amplitude of light in the far
field. The Fourier transform describes the relationship between a hologram (near
field) and its corresponding replay field (far field). The far field can be formed at
the focal point of a positive lens or an infinite distance from the near field plane in
free space [25, 26], as depicted in Figure 1.
Holograms can reproduce waveforms from an existing object. With digital
advances and optical signal processing, it is possible to numerically calculate
interference patterns to generate completely synthetic wave fronts of arbitrary
form. These interference patterns can have different denominations, such as CGH,
diffractive optical elements (DOE), phase/amplitude masks, diffractive grating,
etc. [26]. All operate in the principle of diffraction, so it is somehow an arbitrary
choice of terminology.
The SLM is a device that can be used to modulate light in accordance with a
fixed spatial (pixel) pattern and can be programed electrically. Usually, it can
be exploited for incident light phase and/or amplitude control. Subsequently,
phase-only, amplitude-only, or the combination of phase-amplitude can be read-
ily realized with SLM. There are a number of modulation mechanisms that can be
employed. One of the attractive and widely used ones is electro-optical SLM. The
117
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 1.
Diagram of a Fourier transform through a positive lens. A complex design pattern (diffractive optical element
(DOE)) is provided to the SLM to generate the expected hologram in the replay field ( far field).
118
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
Figure 2.
LCoS SLM Pluto phase modulator from Holoeye© 2018 Holoeye photonics AG.
light efficiency [38]. Due to this, they have been applicable in a plethora of opti-
cal contexts such as communication, reconfigurable interconnects [39], storage
[40], diffractive optics [41], metrology [42], and quantum computing [43]. They
are also applicable in the wave shaper technology for optical signal processing and
monitoring [44]. In addition, other advantages of the LCoS are that it is highly
cost-effective and can as well be flexibly programmed. This helps in supporting a
number of additional functions like group delay ripple compensation, wavelength
filtering, and chromatic dispersion compensation. Besides, it can aid in ensuring
variable attenuation for individual wavelength channels as well as output ports.
Consequently, LCoS device offers a cost-effective and promising solution for the
wavelength selective switch (WSS) [40].
The LCoS microdisplay SLM has a good implementation history in the WSS
systems. Its employment in the WSS system core component can be attributed
to a number of advantages such as larger spatial bandwidth, more port avail-
ability, and enhanced resolution, as well as the system miniaturization. The WSS
systems have been exploited in the reconfigurable optical add/drop multiplexers
(ROADM) in WDM optical networks. It has been observed that ROADM is one
of promising schemes that can be employed to improve on the traffic capacity
of the existing and future telecommunication systems [40, 45]. Moreover, in
communication networks, the ease of adding or dropping the wavelength is
essential. They can ensure effective information access or rerouting to another
appropriate path in the network. It should be noted that WSS is the ROADM
sub-system that has been extensively employed in optical switch applications.
In addition, microelectromechanical systems (MEMS) [46] and WSS based on
LCoS [47] have been commercialized for different applications. Also, WSS by
means of LCoS operates on the principle of “disperse and select,” in which the
inward bound WDM channels are dispersed into a distinct wavelength channel
and subsequently relayed by LCoS through programmable grating patterns.
This is in an attempt to facilitate an add and drop function. It is envisaged
that the next-generation ROADM will hold different attractive features such
as directionless, colorless, and contentionless in order to improve the system
performance [40].
Furthermore, LCoS technology can also be employed in flex grid that has
been considered as the major feature for the next-generation networks [40, 48].
It should be noted that the traditional fixed grid with 50 GHz spacing standard-
ized by the International Telecommunication Union (ITU) Telecommunication
Standardization Sector (ITU-T) possesses a number of challenges. The fixed grid
has been observed to bring about the optical spectra being inefficiently used.
Besides, it constrains the system transmission capacity considerably. On the other
hand, the flex grid implementation enables the use of different modulation formats
119
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
and their coexistence on a shared infrastructure. They can also be densely and effi-
ciently multiplexed which aids the optical networks, not only to extend the reach
but also the per channel bit rate. It has also been envisaged that implementation of
WSS and SDM will significantly help further in extending the network reach and
capacity [40].
3. Methodology
The adopted methodology to implement the SLM flexible platform for optical
systems can be subdivided into two main sections: (i) the algorithms employed
for the CGH generation and optimization methodology (in Section 3.1) and (ii)
the SLM framework setup implementation with application in SDM systems and
characterization/testing of PIC (in Section 3.2).
The framework ability to improve the overall alignment process and excite
different cores of a MCF, can provide a valuable contribution for the impairment
mitigation of the system optical path, which can relax digital signal processing
(DSP) equalization requirements of the SDM system [5, 18, 22, 34, 49].
Furthermore, its use as a flexible platform for feeding photonic integrated
processors was also explored for the characterization/test of PICs, and results have
been presented for its implementation as a parallel implementation of the Haar
transform (HT) image compression algorithm [8, 18, 23].
120
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
A collimated Gaussian beam with transverse profile Sin is imaged onto the SLM
via a lens, Eq. (2), where (x0, y0) offer the horizontal and vertical position, respec-
tively, and (wx, wy) represent the width and the height of the beam, respectively, as
depicted in Figure 3 [8].
( ( ( wy log (√2 ) ) )
2 2
y − y0
wx log (√ 2 ) )
x−x
Sin = exp − 2 _0
_ − 2_ _ (2)
A graphical user interface (GUI) was also developed to test different masks to be
applied to the SLM device [18] (see Figure 4).
Different phase masks can be attained by adjusting the different available
parameters from the developed GUI. For the Input Beam GUI panel the following
Figure 3.
Cartesian coordinate system description of the parameters (x0, y0) and (wx, wy) employed for the input beam Sin
estimation [8].
121
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 4.
GUI SLM_mask to generate the different phase masks applied to the SLM [18].
input parameters are available: (i) horizontal position (x0); (ii) vertical position
(y0); (iii) width of the beam (wx); and (iv) height of the beam (wy) (see GUI panel
Input Beam in the Figure 4).
The Phase Mask GUI panel offers the correspondent input parameters: (i) hori-
zontal translation (dx); (ii) vertical translation (dy); (iii) horizontal frequency delay
(cx); (iv) vertical frequency delay (cy); (v) percentage of zoom (%); (vi) rotation
in degrees (°); and (vii) selection of three possible input functions, i.e., sinusoidal
Eq. (4), linear Eq. (1), or defined by the user (user-defined). The option to save or
replace the phase mask file is also made available, as depicted in the Phase Mask
GUI panel from Figure 4.
The implemented scripts and GUI were written in MATLAB© [52].
In an effort to realize the hologram that can suitably replicate the output signal,
we estimated the hologram of the beam through the image phase-only information
of the generated hologram. Thus, a first linear phase mask is generated to produce
the expected initial field, i.e., the input function of interest.
Since a phase-only SLM does not permit the inverse Fourier of the desired
pattern to be addressed into the far field and replicated into the resultant
distribution of amplitude and phase on the SLM directly. It is quite demand-
ing to generate a CGH with guarantees for the light to be spatially modulated
with the required accuracy and resolution. To address these challenges and
obtain the desired hologram with an error factor δ ≤ 10%, we implemented
an iterative algorithm to optimize the generation of the linear phase mask.
Also, the error factor threshold was set so as to prevent an infinite loop in the
adopted optimization algorithm, while guaranteeing that the output result has
an accuracy ≥90%.
The algorithm was implemented to generate a hologram that replicates the
output of the four waveguides (WG) of an optical chip for data compression
proposes [8, 23, 53]. A hologram of four beams was calculated by a phase-only
122
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
The block diagram of the employed algorithm is given in Figure 5, and the major
steps of the algorithm are enumerated as follows [23]:
i. Generate a first linear phase mask to produce the expected initial field based
on Eq. (5).
+ a3 e + a4 e ).
iH
3 iH
4
iii. Acquire the replay field from the hologram generated by SLM (I SLM) with a
camera, and feed this data to the algorithm.
iv. Calculate the difference between the hologram generated and the initial field
expected, defined as error factor: δ = |ISLM − I1| ≤ 0.1.
v. If the condition δ ≤ 0.1 is not satisfied, repeat steps ii–iv by iteratively adjust-
ing the values of a1−4 to compensate for the error factor.
The employed SLM is a reflective LCoS phase-only type, and its model
is PLUTO-TELCO-012. It can operate within the wavelength range of
Figure 5.
Block diagram of the algorithm applied for the optimization of the linear phase mask CGH [23].
123
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
1400–1700 nm. Additionally, an active area of 15.36 × 8.64 mm2, a pixel pitch of
8.0 μm, a 92% fill factor, and 80% reflectivity are employed for displaying the
generated hologram.
Two different setup arrangements were implemented to create CGH for SDM
(e.g., MCF) and PIC applications.
Setup alignments were carried out, using a red laser of 637 nm (power 70 mW,
SM fiber-pigtailed laser diode), a collimator, two lenses, a charge-coupled device
(CCD) image sensor, and the LCoS-SLM. After the alignments, an MCF of 10 m of
length and a bit error rate (BER) tester were introduced in the setup, as depicted
in Figure 6.
Figure 6.
[A] Setup diagram of the SLM platform for MCF applications. [B1, B2] photographs of the setup.
124
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
Figure 7.
[A] Hologram reconstruction scheme using an infrared (IR) laser of 1550 nm, a polarization controller, lens L1,
an LCoS-SLM, lens L2, and an IR camera. [B] Photography of the presented setup.
The MCF contained four cores arranged in a quadrangular lattice pattern, with a
side length of 36.25 μm and attenuation @1550 nm of 0.45 dB/km.
The nonreturn-to-zero (NRZ) signal was generated by a pattern generator
(Agilent N4901B) using a pseudorandom binary sequence (PRBS) 231–1. This signal
was injected to the tunable direct modulator laser to create 10 Gb/s optical signal.
After the MCF, the signal was detected by avalanche photodiode (APD) receiver
inside the small form-factor pluggable (SFP) transceiver.
In an effort to eliminate the phase distortion and enable the full Fourier trans-
form scale by the focal length (f) factor, the optical system is designed based on the
4f system configuration. The implementation is the basis of a low distortion optical
system.
The setup consists of devices such as two lenses (AC254–050-C-ML, AR
coating 1050–1620 nm) L1 and L2 with a focal length of 75 and 250 mm, respec-
tively; polarization controller; an infrared (IR) laser of 1550 nm (wavelength);
a near-infrared (1460–1600 nm) camera (sensing area, 6.4 × 4.8 mm; resolu-
tion, 752 × 582; pixel size, 8.6 × 8.3 μm) for capturing the produced hologram;
and a neutral density filter, to prevent saturation in the camera acquisition
(see Figure 7) [8, 23].
In this section, we present the experimental CGH results obtained for the SDM
and PIC applications.
A BER of 1.2 × 10−3 was measured in the experiment described in Section 3.2.1.
Test result shows an error-free transmission below the BER limit of 3.8 × 10−3
(7% hard-decision FEC) [54, 55] threshold.
Thus, the SLM framework was able to properly function as a spatial coupling
interface between the SLM generated pattern and the MCF cores. The platform
allows an easy adjustment of the generated phase mask (CGH), contributing to an
effective dynamic optimization of the MCF fiber transmission [18].
125
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 8.
[A] Design architecture of the PIC for data compression based on HT. [B] Measurements of the distance
between the four WG at the end of the two-level compression network of the PIC [23].
126
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
In Figure 9, we present the obtained image from the hologram replay field
generated with the initial (I1) and optimized (Iout) CGH [8, 23].
The analysis of the obtained replay field images can be described by the steps
described below:
i. Calculate the intensity integration of the image matrix, i.e., the sum of all
elements along each line of the image matrix, depicted as Sraw.
Results from the integrated intensity profile of the replay field after the CGH
optimization, i.e., after step (3), are presented in Figure 10.
The distance between the four beams was calculated from the center posi-
tion of each beam profile, given by the Gaussian fit coefficient corresponding
to the position of the center of the peak. The coefficients were obtained with
95% confidence bounds [23]. The deviation values (δ) between the generated
holograms (i.e., initial I1 and optimized Iout), when compared with the expected
output of the optical chip (i.e., d1, d2 and d3 from Figure 8), are presented in
Table 1 [23].
The measured power of the beams obtained by the integration intensity profiles
is depicted in Table 2 [23].
An improved hologram is achieved with the optimization of the linear phase
mask CGH, i.e., with a reduction of up to 11% in the error factor (between
Figure 9.
Hologram replay field obtained by the IR camera with an (i) initial hologram (left figure) and (ii) optimized
hologram (right figure).
127
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 10.
Gaussian fit (Gauss fit, blue line) of smoothed integrated intensity signal from the replay field image (S , red
SG
δ d1 19.76 7.48
δ d2 1.96 2.90
δ d3 14.31 9.44
Table 1.
Error factor (δ) values for d1, d2, and d3.
Table 2.
Integration of the intensity profiles for the four beams.
initial and optimized holograms). Nonetheless, the loss of 1.1 dB identified on the
mean beam power for the optimized CGH, an improved equalization between the
beams was observed, with a 2% reduction in the standard deviation [23].
Algorithm improvements should be implemented to mitigate the power
discrepancies between the four beams and optical artifacts associated with the
diffraction of light, with the objective of mitigating the signal loss at the output of
the optical chip.
128
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
A possible approach to correct some of this artifacts can be the application of the
Gerchberg-Saxton [37] or simulated annealing [36] algorithms; nonetheless, due
to the power loss (up to 9 dB [26]) associated with these approaches, they were not
addressed in this implementation [23].
The phase mask that replicates the expected output of the PIC optical operation
can be used to multiplex/demultiplex the obtained result. Furthermore, a phase
mask, which addresses the HT operations, can also be applied to invert the com-
pression induced by the HT (optically implemented in the PIC all-optical network
with three AAC). Thus, a proof of concept of the PIC operation through the SLM
coupling framework is expected [8, 23].
5. Conclusion
Acknowledgements
129
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
130
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
References
[2] Ericsson. Ericsson Mobility Report. [12] Ip E, Kahn JM. Increasing optical
2018 fiber transmission capacity beyond
next-generation systems. In: LEOS
[3] Winzer PJ. Spatial multiplexing in 2008. 21st Annual Meeting of the IEEE
fiber optics: The scaling of metro/core Lasers and Electro-Optics Society 2008.
capacities. Bell Labs Technical Journal. pp. 606-607
2014;19:22-30
[13] Shannon CE. A mathematical
[4] Ayyash M et al. Coexistence of theory of communication. Bell System
WiFi and LiFi toward 5G: Concepts, Technical Journal. 1948;27(3):379-423
opportunities, and challenges.
IEEE Communications Magazine. [14] Alimi I, Shahpari A, Sousa A,
2016;54(2):64-71 Ferreira R, Monteiro P, Teixeira A.
Challenges and opportunities of optical
[5] Pinho C, Shahpari A, Alimi I, Lima M, wireless communication technologies.
Teixeira A. Optical transforms and CGH In: Optical Communication Technology.
for SDM systems. In: 18th International London: IntechOpen; 2017. p. 41
Conference on Transparent Optical
Networks (ICTON 2016). 2016. pp. 1-4 [15] Richardson DJ, Fini JM, Nelson LE.
Space-division multiplexing in
[6] Alimi IA, Monteiro PP, Teixeira AL. optical fibres. Nature Photonics.
Outage probability of multiuser mixed 2013;7(5):354-362
RF/FSO relay schemes for heterogeneous
cloud radio access networks (H-CRANs). [16] Yuan H, Furdek M, Muhammad A,
Wireless Personal Communications. Saljoghei A, Wosinska L, Zervas G.
2017;95(1):27-41 Space-division multiplexing in data
center networks: On multi-Core fiber
[7] Alimi IA, Monteiro PP, Teixeira AL. solutions and crosstalk-suppressed
Analysis of multiuser mixed RF/ resource allocation. Journal of Optical
FSO relay networks for performance Communications and Networking.
improvements in cloud computing-based 2018;10(4):272
radio access networks (CC-RANs). Optics
Communication. 2017;402:653-661 [17] Morita I, Igarashi K, Tsuritani T. 1
Exabit/s·km transmission with multi-core
[8] Pinho C et al. Flexible platform for fiber and spectral efficient modulation
feeding photonic integrated processors. In: format. In: 2014 OptoElectronics and
The Thirteenth Advanced International Communication Conference and
Conference on Telecommunications Australian Conference on Optical Fibre
(AICT 2017). 2017. pp. 1-4 Technology. 2014. pp. 316-318
[9] Grand View Research. Photonic [18] Pinho C et al. Spatial light
Integrated Circuit (IC) Market Size modulator based flexible coupling
Report. 2016 platform for applications in SDM and
PIC. In: 20th European Conference on
[10] Credence Research. Photonic Integrated Optics (ECIO 2018). 2018.
Integrated Circuits Market. 2016 pp. 238-240
131
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
[20] Essiambre R-J, Tkach RW. Capacity [29] Hamamatsu. Phase spatial light
trends and limits of optical modulator LCOS-SLM. In: Opto-
communication networks. Proceedings Semiconductor Handbook. Tokyo:
of the IEEE. 2012;100(5):1035-1055 Hamamatsu Photonics. 2012. pp. 1-14
132
Spatial Light Modulation as a Flexible Platform for Optical Systems
DOI: http://dx.doi.org/10.5772/intechopen.88216
133
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
134
Section 3
Convergence of
Wireless-Optical Networks
135
Chapter 8
Abstract
Keywords: 5G, backhaul, centralized unit (CU), common public radio interface
(CPRI), distributed unit (DU), fiber to the X (FTTX), fronthaul, functional split,
optical wireless communication (OWC), passive optical network (PON), photonic
integrated circuits (PICs), radio access network (RAN), radio over fiber (RoF)
1. Introduction
There have been growing concerns regarding the increasing number of unprec-
edented bandwidth-intensive mobile applications and services being experienced
by the Internet. A notable cause of the increase in the traffic and the subsequent
pressure on the network is the Internet of things (IoT) technologies. For instance,
massive IoT (mIoT) schemes have caused remarkable revolutions in the amount of
137
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
mobile devices and applications in the networks. This is in an effort to enhance the
user experience in delivering enhanced mobile broadband (eMBB) services and
providing ultra-reliable low-latency communication (uRLLC) for critical commu-
nication and control services. In theory, IoT comprises universal existence of a
collection of things like mobile PCs, tablets, smartphones, actuators, sensors, wire-
less routers, as well as radio-frequency identification (RFID) tags. It is remarkable
that these devices are capable of cooperating not only with each other but also with
their neighbors. By this approach, they are able to achieve common network goals
by means of unique addressing scheme [1, 2]. Furthermore, it has been predicted
that massive number of mobile devices on which various bandwidth-intensive
applications and services will be operating and will be Internet connected [3]. In
actual fact, there is a tremendous demand for effective systems that are capable of
delivering various services in a cost-effective manner while meeting the essential
network demands. Consequently, in an effort to accomplish the next-generation
mobile network technical demands, there have been intensive researches on viable
solutions that can satisfy the network requirements.
Additionally, to support the anticipated massive devices, there has been general
consensus that the fifth-generation (5G) wireless communication system is the
viable and promising solution. Meanwhile, massive multiple-input multiple-output
(M-MIMO) antenna and millimeter-wave (mm-wave) technologies are anticipated
to be integrated into the 5G networks, so as to enhance the wireless system band-
width. This is due to the fact that radio-frequency (RF)-based wireless system
transmission speeds are highly constrained by the regulated RF spectrum. This
limitation can be attributed to numerous advanced wireless systems and standards
such as UWB (IEEE 802.15), iBurst (IEEE 802.20), WiMAX (IEEE 802.16), Wi-Fi
(IEEE 802.11), as well as the cellular-based 3G and 4G. On the other hand, there is a
vast amount of unexploited and underutilized frequency at high bands [2, 4] as
expatiated in Section 2. Nevertheless, the radio propagation at higher frequency
bands is comparatively demanding. Consequently, advanced scheme like
beamforming (BF) technique is essential for radio operation at the bands. The
technique will help in compensating mm-wave band inherent path loss in the radio
access network (RAN) [5–7].
In addition, owing to several innovative technologies that have been
implemented in the optical communications, significant improvements have been
noted in the network performance [8]. Among the remarkable improvements are
the increase in the network reach, optical system capacity, and the number of users
that can be effectively supported. This is as a result of cutting-edge optical fiber-
based technologies. The optical schemes have been increasingly advancing deeper
into different access networks, in order to provide various services such as mobile
backhaul/fronthaul and multitenant fiber to the X (FTTX) with some variants of
fiber-based broadband network architectures as discussed in Section 3. For
instance, the optical broadband network architectures, such as fiber to the curb or
cabinet (FTTC), fiber to the node (FTTN), fiber to the building (FTTB), fiber to the
premise (FTTP), and fiber to the home (FTTH), proffer commercial solutions to
the communication network performance bottleneck, by progressively delivering
services in close proximity to the numerous subscribers [2].
It is noteworthy that various 5G use cases like uRLLC and eMBB can be effec-
tively achieved by radio elements and BSs that are not far-off the end users or
wireless devices. This is due to the fact that close proximity helps in facilitating
better signal quality, with lower latency and higher data rates in the system [9]. This
can be effectively realized by means of passive optical network (PON) technologies
such as gigabit PON (GPON), 10Gbps PON (XG-PON), as well as Ethernet PON
(EPON). It is noteworthy that one of the key issues is the process of supporting
138
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
different service demands with the intention of realizing ubiquitous and elastic
connections. As a result, optical and wireless networks convergence is very indis-
pensable. This is not only a cost-effective approach but also enables high-network
penetration, in order to achieve the envisaged ubiquitous feature of the next-
generation network (NGN) [2]. Based on this, there is a growing consensus of
opinion that high-capacity optical fronthaul scheme is one of potential solutions for
addressing the network demands. For instance, if the CPRI standard is to be directly
employed for the transportation of a considerable number of long-term evolution-
advanced (LTE-A) and/or 5G radio signals, an enormous aggregate bandwidth will
be required on the backhaul/fronthaul networks [10].
Furthermore, it has been observed that the reference system architectures for
the 5G standardizations are based on the notion of heterogeneous networks where
mm-wave small cells are overlaid on the larger macrocells [9]. This will enable the
RAN to handle the growing traffic demands. In addition, to contain the massive
deployment of small-cell BSs, cloud RAN (C-RAN) has been adopted as a promising
architecture to ensure effective scalability regarding deployment cost as well as
energy consumption [11–14]. The C-RAN offers an innovative architecture that is
really different from the traditional distributed RAN (DRAN). In the C-RAN archi-
tecture, the baseband unit (BBU) is shifted away from the cell sites where it is
normally located in the DRAN. Consequently, BBU collections that are usually
referred to as BBU pools are centralized at the central office (CO). With this
configuration, the remote radio heads (RRHs) are left at the cell sites.
As a result, C-RAN implementation offers significant benefits such as improved
system spectral efficiency and better flexibility for further RRH deployments than
the DRAN. Likewise, with the centralized BBUs, C-RAN supports greener infra-
structure, enhanced interference mitigation/coordination, better resource pooling,
improved BS virtualization, as well as simplified management and operation.
Besides, multiple technologies can be supported with smooth and scalable evolu-
tion. Furthermore, in the C-RAN architecture, the BBU pools are connected via the
fronthaul network to the RRHs. It is remarkable that the de facto air interface
standard that is usually employed for connecting the BBU pools to the RRHs is the
common public radio interface (CPRI) protocol. This is an interface that helps in
the digital baseband sample distribution on the C-RAN fronthaul. However, strin-
gent requirements concerning jitter, latency, and the bandwidth are imposed on the
fronthaul network for seamless connectivity. This makes the CPRI-based fronthaul
links to be prone to flexibility and bandwidth limitations, which may prevent them
from being visible solutions for the next-generation networks [11, 12]. Meanwhile,
it has been noted that the 5G systems will impose higher requirements on the
transport network regarding latency, bandwidth, reliability, connectivity, and
software-defined networking (SDN) capability openness [15]. A number of
approaches such as cooperative radio resource allocation and data compression
technologies have been adopted to address the challenges; however, the fronthaul
capacity demand is still considerable high [11, 12].
The viable means of addressing the capacity requirement is through the imple-
mentation of passive optical network (PON) solutions such as wavelength division
multiplexed PON (WDM-PON) and ultradense WDM-PON (UDWDM-PON). The
PON architectures are compatible with the 5G networks and are capable of
supporting both wired and wireless services. Based on the PON architecture, indi-
vidual RRH has the chance to communicate with the BBU pools using a dedicated
wavelength. Besides, in the upstream direction, the aggregate wavelengths can be
further multiplexed into a single shared fiber infrastructure at the remote node
(RN). They can eventually be de-multiplexed at the CO [11, 12]. As aforementioned
and as depicted in Figure 1, optical and wireless network convergence is a
139
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 1.
A scenario for optical and wireless access networks convergence (adapted from Alimi et al. [2]).
promising scheme for exploiting the optical system inherent bandwidth and the
mobility advantage of wireless connectivity, which can help in realizing the 5G
network envisaged capacity and energy efficiency. In addition, optical wireless
communication (OWC) is another feasible and attractive optical broadband access
solution that is capable of supporting high-capacity, high-density, and low-latency
networks. Therefore, it can effectively address the network requirements for dif-
ferent applications and services at a comparatively lower cost. So, it has been seen as
an alternative and/or complementary solution for the existing wireless RF solutions
[4, 16–18]. This chapter presents optical wired and wireless networking solutions
for high-capacity, high-density, and low-latency networks. Furthermore, because of
its potential for intense revolution and salient advantages, we focused on the second
standard of the next-generation PON (NG-PON2) system. In addition, with the
exploitation of notable features of photonic integration, we design and develop the
physical (PHY) layer architecture of the NG-PON2 system. The proposed NG-
PON2 architectures offer an enabling platform for active device integration into the
chip to ensure a significantly low propagation loss. We also present simulation
results for model validation. This helps in demonstrating the potential of photonic
integration for optical architectures.
Furthermore, with concise information on the enabling optical wired and wire-
less technologies and the need for alleviating the stringent requirements in the
network being introduced, we present comprehensive overview of the fronthaul
transport solutions in Section 2. The salient needs for PON in the envisaged
ultradense network deployments are considered in Section 3. In Section 4, a
practical method for network investment optimization by the operators based on
PON system coexistence is discussed. In Section 5, we present a number of viable
schemes for alleviating the imposed stringent requirements in the system. The
NG-PON2 PHY architecture design and development based on photonic integration
are demonstrated in Section 6. In Section 7, the obtained simulation results with
further discussion are presented. Section 8 concludes the chapter.
The fronthaul protocol can be transported by different viable means. Apart from
the usually employed small form pluggable and serial constant bit rate CPRI
140
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
specification that is based on digital radio over fiber (D-RoF) implementation, there
are other innovative and standard fronthaul interfaces such as Open Base Station
Architecture Initiative (OBSAI), next-generation fronthaul interface (NGFI), open
radio interface (ORI), and enhanced CPRI (eCPRI) that can be used [19–21]. In
[11], we give an overview of various prospective and standard fronthaul interfaces.
In this chapter, for reference purposes, we focus on the extensively employed CPRI
protocol. However, it should be noted that the transport methods to be discussed in
this section are applicable to other fronthaul interfaces. The transport methods
discussed in this section are grouped into wired and wireless fronthaul solutions.
Wireless transport schemes are very viable fronthaul solutions that have resulted
into tremendous evolutions in the communication systems. This is due partly to the
inherent advantages such as operational simplicity, ease of deployment, scalability,
roaming support, effective collaboration, and cost-effectiveness. Furthermore, it is
an appropriate scheme for complementing fiber-based fronthaul solutions. How-
ever, their susceptibility to transmission channel conditions makes their implemen-
tation effective for short range. Besides, the current solution can only support few
CPRI interface options. This brings about bandwidth limitation for this solution.
Moreover, to alleviate this, promising wireless technologies like mm-wave and
wireless fidelity (Wi-Fi) can be employed in the fronthaul [11, 22, 23].
As aforementioned in Section 1, there is a huge amount of unexploited and
underutilized frequency at high bands. The fronthaul in which mm-wave is being
employed is feasible due to the availability of various compact and high-
dimensional antenna arrays for commercial use in the band. Besides, as a result of
60 GHz standards like 802.11ad, 802.15.3c, and WirelessHD that have been issued,
considerable attention has been given to mm-wave communications. Nonetheless,
the inherent high propagation losses of the mm-wave communications give rise to
comparatively shorter transmission range [11, 22, 24, 25].
In addition, as stated in Section 1, RF-based system transmission speeds are
substantially limited due to a number of advanced wireless systems being deployed
in the network. Consequently, to meet the demands of the current and future
wireless networks, many chipset suppliers and wireless operators have been paying
significant attention to the unlicensed spectrum. The major focus is in the 2.4 GHz
and 5 GHz frequency bands that are under implementation by the Wi-Fi. This is
being used for the 5G LTE-Unlicensed communication systems [11, 26]. With this
implementation, the unlicensed spectrum resources could be effectively allotted to
the LTE system, in order to have more capacity for supporting the Wi-Fi users [27].
Furthermore, it is remarkable that the Wi-Fi unlicensed spectrum is a promising
solution for the fronthaul network. A notable advantage of exploiting the
unlicensed spectrum for the fronthaul network is due to the fact that separate
frequency procurement for the fronthaul might not be necessary for the network
providers. Besides, the same spectrum could be effectively reused in the access and
fronthaul links. This can be accomplished by means of time-division multiplexing
(TDM) and frequency-division multiplexing (FDM) schemes. Another way of
achieving this is through opportunistic fronthauling, in which unlicensed spectrum
can be sensed. For instance, the RRH can sense unlicensed spectrum that is available
(unused unlicensed spectrum) and then employ it for fronthauling. Besides, in a
situation where the active user signal is considerably lower than the predefined
threshold, the RRH can also make use of the spectrum. In addition, the fronthaul
link constraints could be effectively eased via the Wi-Fi. This is majorly due to the
fact that it can be employed for offloading [26]. Although Wi-Fi networks are
141
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
capable of offering relatively high-data rates, they exhibit limited mobility and
coverage. The drawbacks can be reduced by employing Wi-Fi mesh networks
[11, 28].
142
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
and passive. In active solution, other protocols are used for the CPRI traffic encap-
sulation, before being multiplexed on the fronthaul network. Also, the solution
offers robust network topologies with considerable flexibility. Moreover, with opti-
cal amplifiers, the network reach can be significantly extended. Another important
distinguishing feature of an active solution is that the cell site demarcation point
requires power supply for operation. On the other hand, a passive solution mainly
depends on CPRI link passive multiplexing (MUX)/demultiplexing (DEMUX).
Besides, this solution’s demarcation point can function effectively without any
battery backup and power supply. Nonetheless, active equipment can be employed
for the system monitoring at the CO demarcation point [11, 22, 23, 29].
In general, the main dissimilarities between the passive and active solutions can
be recognized in the nature of their routing table and switching granularity. For
instance, unlike the active solution, routing table can be statically and dynamically
configured as well as associated with the interface; that of passive solution is fixed
and lacks configuration capability. Likewise, the passive solution switching granu-
larity is based on spectrum or time slot as being implemented in the TWDM-PON,
while an active solution presents finer switching granularity which can be based on
packet or frame switching. Consequently, the active solution offers better configu-
ration flexibility; however, it is power-consuming and relatively complicated [12].
In the following, we expatiate on different WDM-based fronthaul solutions.
2.1.3.2 WDM/OTN
143
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 2.
Potential 5G fronthaul solutions: (a) microwave, (b) point-to-point, (c) WDM-PON, (d) OTN, and
(e) Ethernet.
144
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
The existing fiber-based methods as well as active P2P Ethernet might unable to
meet the envisaged bandwidth-intensive traffic requirements by the 5G and beyond
networks. For instance, ultradense network deployments with the associated huge
network resources are envisaged in the 5G network. As illustrated in Figure 3, PON
system can make better use of the current fiber infrastructures than the existing P2P
system such as CPRI. This helps considerably in reducing the required number of
interfaces in the network. As a result, it aids not only in reducing the site space, but
also substantial amount of system power can be saved [30]. As explained in Section
2, PON technology has been deemed as an attractive access network solution owing
to the presented advantages such as low-operation cost, high bandwidth, and low-
maintenance cost [11, 31, 32].
It should be noted that the PON architectures have been experiencing continu-
ous and gradual evolution, so as to considerably enhance the service availability and
the related data rates. The offered technological options and the intrinsic benefits
have been attracting the operators in deploying a number of PON systems. It has
been observed that the most widely deployed one is the gigabit PON (GPON)
system. Moreover, the first standard 10 Gbps PON technology, the next-generation
PON (NG-PON) system, known as 10-gigabit PON (XG-PON1) has also been
gaining considerable attention. With continuous demand for further capacity, there
are innovative PON generations such as 10-gigabit symmetric PON (XGS-PON)
145
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 3.
Potential fronthaul solutions (a) CPRI-based and (b) PON-based schemes.
and the second standard of NG-PON (NG-PON2) that are now becoming the target
of various providers [33]. In PON system, WDM and TDM techniques are normally
employed to further enhance the capacity and fiber efficiency. Based on these
techniques, the PON system can be broadly grouped into WDM-PON and
TDM-PON.
Moreover, it is noteworthy that the TDM-PON is capable of giving considerable
greater bandwidth for various data applications; however, availability of the
resources that can be delivered to the end users is limited. In contrast, the issue can
be effectively addressed with the WDM-PON scheme. This can be done by
assigning a peculiar wavelength per subscriber. As a result of this, a distinct, high-
data rate, as well as secure P2P channel, can be delivered over a high-capacity and
longer optical reach, between each of the subscriber and the CU. Consequently, a
WDM-PON scheme is suitable for partitioning the ONUs into a number of distinc-
tive virtual P2P links over the shared physical optical infrastructure by multiple
operators. This attribute facilitates fiber efficiency compared to P2P Ethernet. Sim-
ilarly, in relation to TDM-based systems, it gives lower latency. These features make
WDM-PON a disruptive solution that is very appropriate for FTTX as well as
mobile backhaul and fronthaul applications. This will eventually aid the operators
not only in developing converged networks but also in enhancing the current access
networks. As a consequence of this, some redundant COs can be eliminated in an
attempt to enhance the network performance in cost-effective ways [11, 31, 32].
146
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
The data traffic being encapsulated in the Ethernet frames as defined by the
IEEE 802.3 standard is transported by the EPON solution. Different network ele-
ments such as optical network unit (ONU), optical line terminal (OLT), and optical
distribution network (ODN) are the building blocks of a standard EPON system and
other PON architectures. In the EPON solution, PON topology is exploited for
getting the Ethernet access. Based on the joint schemes, EPON solution is capable of
offering high bandwidth and good network scalability. Besides, due to the fact that
it is highly compatible with Ethernet, network management can be supported in
cost-effective manners. Likewise, as illustrated in Figure 4, FTTB, FTTC, and
FTTH network architectures can be supported depending on the ONU deployments
and demarcation point between the copper cable and optical fiber termination [32].
Typically, ONUs can be deployed beside the telegraph pole junction boxes, or
else, at roadside when FTTC system is employed. Also, different types of twisted
pair cables can be utilized for connecting the ONUs and the respective customer. It
has been observed that FTTC technology offers a cost-effective and practical solu-
tion for delivering narrowband services. However, FTTC solution is not an ideal
scheme, when broadband and narrowband services are to be incorporated [32].
Moreover, the ONU deployment can be made closer to the users in the FTTB
solution. So, it can be located inside the buildings through further optical fiber
penetration into customer homes. This can be achieved by means of cables, local
Figure 4.
FTTX architectures.
147
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
148
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
149
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 5.
Typical TWDM-PON architecture.
Class
1 2 3
Table 1.
Tuning time classes [42].
150
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
The XGS-PON presents a novel technology that offers a generic solution for the
NG-PON system. It can be viewed as an uncomplicated variant of TWDM-PON in
which the wavelength tunability and mobility are eliminated for a more cost-
effective reason. In addition, there can be an efficient coexistence between the
XGS-PON and TWDM-PON using the same fiber infrastructure, since the
employed wavelengths by each technology are different. Consequently, the opera-
tors can exploit the lower-cost XGS-PON for quick delivery of 10 Gbps services.
This will also enable them to seize 10 Gbps services opportunities for immediate
deployments. With XGS-PON, there can be cost-efficient, gradual upgrade, and
well-controlled transition to a full TWDM-PON system, with minimum or no
disruption to the offered services. It can also facilitate TWDM-PON system by
enabling its deployment using the wavelength by wavelength approach. This
will really help in pay-as-you-grow scheme for effective system upgrade and
migration [33, 43].
Besides its capability for delivering 10 Gbps in both US and DS directions, XGS-
PON has high potential for the dual rate transmission support as well [44]. Based on
this, the 10/2.5G XG-PON ONUs and 10/10G XGS-PON ONUs can be coupled to
the same OLT port via a native dual US rate TDMA scheme. It is remarkable that
XGS-PON dual rate presents a comparable cost to XG-PON; nonetheless, it is
capable of providing 4 times of the XG-PON US bandwidth. In addition, XGS-PON
has been seen as a transitional scheme to NG-PON2 due to its ability for offering the
associated NG-PON2 high-data rates in conjunction with the XG-PON1 CAPEX
efficiency [33, 43]. Furthermore, it should be noted that the GPON employs 1490
and 1310 nm in the DS and UP, respectively. Likewise, XGS-PON utilizes 1578 and
1270 nm in the DS and UP, respectively. This implies that the XGS-PON service can
be effectively overlaid on the same infrastructure as that of GPON. Similarly, the
G.989 standard is employed in NG-PON2. The G.989 supports TWDM technologies
and it is a multiwavelength access standard [44].
In addition, NG-PON2 is not only a state-of-the-art PON technology with the
potential for intense revolution in the operational models of providers but also
offers them flexible platform that is capable of enhancing their agility to the market
demands as never before. Besides, it has the ability for cost-effective support for
both the scale and capacity of the existing gigabit services while at the same time
having more than enough room for the multi-gigabit bandwidth requirements of
the future networks [38]. Consequently, based on the aforementioned advantages
and its proficiency for multiple networks converging with outstanding
151
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
performance, in this work, we focus on the NG-PON2 system. Its PHY architecture
and development are presented in Section 6.
Class
A B B+ C N1 N2 E1 E2
Max. (dB) 20 25 28 30 29 31 33 35
Note: The degree of severity of specific class requirements could vary from one system category to another.
Table 2.
ODN optical path loss classes [42, 46].
Figure 6.
PON system coexistence.
152
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
generations can effectively coexist over a shared ODN fiber infrastructure. Besides,
optical time-domain reflectometer (OTDR) and RF signals can also coexist with the
PON systems. This is mainly due to the fact that there is no wavelength overlap
between each of the technologies. So, this permits in-band measurement without
any service interruption [34, 45]. Different ODN optical path loss classes are
presented in Table 2.
It is remarkable that, apart from the fact that the existing GPON subscribers can
be kept together with higher-bandwidth services, the coexistence will also give the
operators the profound chance to take advantage of different approaches such as
asymmetrical and symmetrical data rates. They also have deployment flexibility by
operating on fixed or tunable wavelengths in order to offer appropriate operations
and services at suitable costs. It will also assist the operators in the NG-PON
evolution path not only by allowing them to upgrade their networks accordingly but
also for gradual migration to the evolving PON technologies that are capable of
offering the full optical potential. Thus, they have the liberty of adopting the cost
and deployment pace that best fit their precise business requirements [43]. More-
over, this will enable the operators in making further revenue by exploiting flexible
bandwidth and wavelength plans in order to support any service type as well as any
business need. Figure 6 depicts a PON system coexistence for a gradual and pay-
as-you-grow expansion [33].
The RoF schemes offer efficient and economical methods for modulated RF
signal transmission. For instance, it can be used for transmission from the CO, to a
number of distributed RRHs, through low-loss optical fiber networks, by employing
an optical carrier. In addition, as aforementioned in Section 1, optical and wireless
network convergence is highly imperative for scalable and cost-effective broadband
wireless networks. The envisaged convergence for the next-generation mobile
communication networks can be efficiently achieved with the implementation of
RoF. This is due to its simplicity and efficiency in conveying wireless signal via an
optical carrier. Furthermore, the inherent low attenuation and huge bandwidth of
optical link can effectively support multiple wireless services on a shared optical
fronthaul network. Moreover, with RoF implementation, the CUs and DUs can be
well-supported. This offers effective centralized network control that subsequently
presents advantages such as easy upgrade, simple maintenance, and efficient
resource sharing [11, 47, 48].
It should be noted that there are various RoF options that can be employed in the
network. Furthermore, each of the viable options presents related distinct merits
153
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
and demerits. Out of the variants, the highly spectrally efficient scheme is the
ARoF. Besides, its implementation results in a most power-efficient and least com-
plex RRH design. Nevertheless, it is susceptible to intermodulation distortion which
is as a result of optical and microwave component nonlinearity. This results in
relatively shorter operating distance. Moreover, the transmitter components such as
oscillators, digital to analog converters (DACs), and mixers consume a considerable
amount of power. On the other hand, with D-RoF implementation, the ARoF-
associated nonlinearity issue can be effectively mitigated. However, in a scenario
where high baud rates and high carrier frequencies are required, the DAC power
consumption and expenditure are excessively high. Also, if upconversion is
required or implemented at the RRHs, it turns out to be substantially high. Conse-
quently, having a fixed phase relation among various RRHs is really challenging.
Besides, digitized sample transmission, rather than the analog signal, brings about a
significantly low spectral efficiency. The aforementioned drawbacks can be more
challenging when densely distributed RRHs are to be supported [11, 47, 48]. There-
fore, to address the challenges, a hybrid scheme that is capable of exploiting the
ARoF and D-RoF schemes can be employed. One of notable techniques for a hybrid
scheme is based on the implementation of sigma-delta-over-fiber (SDoF). This
scheme helps in ensuring digital transmission that can support simple and power-
efficient RRHs. Besides, there is no need for high-resolution and high-speed DACs
with its implementation [47].
It is noteworthy that the RoF scheme employment is contingent on physical
optical fiber availability. On the other hand, for the envisaged ultradense
small-cell deployment, fiber deployment is not only time-consuming but also
capital intensive. Likewise, there could be inappropriate system deployment due
to the associated right-of-way acquisition. For these reasons, as well as limited
number of the deployed fiber, the FSO system practicability has been considered
[11, 13, 14].
154
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
capacity of optical systems and the related deployment simplicity of wireless net-
works [11, 13, 14].
Furthermore, a DWDM RoFSO scheme implementation has the capability of
supporting concurrent multiple wireless signal transmission [49]. Nevertheless, the
FSO systems have some drawbacks due to their susceptibility to the atmospheric
turbulence and local weather conditions. The effects of these can cause beam wan-
dering, as well as scintillation, which in due course results in the received optical
intensity fluctuation. Consequently, the system reliability and availability can be
determined by the extent of the effects. As a result, FSO technology is relatively
unreliable like the normal optical fiber technology. Therefore, apart from the fact
that these can limit the RoFSO system performance, its employment for uRLLC
applications might also be limited as well. Consequently, the drawbacks hinder the
FSO scheme as an effective standalone solution. Therefore, for the FSO scheme to
be effective, the associated turbulence-induced fading has to be alleviated [2, 17,
18, 50]. Based on this, several PHY layer ideas like maximum likelihood sequence
detection, diversity schemes, adaptive optics, and error control coding with inter-
leaving have been presented to address the issue [11, 50, 51]. Besides, innovative
schemes such as relay-assisted transmission and hybrid RF/FSO technologies can be
implemented to enhance the system performance regarding capacity, reliability,
and availability [11].
155
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
features. The architecture takes advantage of the RF and FSO features for an
efficient and reliable service delivery. In addition, a relay-assisted transmission
system is an innovative communication technique known as a mixed RF/FSO dual-
hop communication system. The dual-hop scheme meaning can be easily under-
stood from its architecture. In the architecture, the transport networks from the
source to the relay system are RF links; however, the transport networks between
the relay system and the associated destination node(s) are FSO links. Hence, in a
dual-hop system, RF is used for signal transmission at one hop, while FSO trans-
mission is implemented at the other. The FSO link mainly functions to facilitate the
RF users’ communication with the backbone network. This is purposely for filling
the connectivity gap between the backbone and the last-mile access networks.
Accordingly, the offered architecture can efficiently address the system-related
last-mile transmission bottleneck. This can be effectively achieved by supporting
multiplexed users with RF capacities. The users can also be aggregated onto a shared
high-capacity FSO link. This will help in harnessing the inherent huge bandwidth of
an optical communication system. Another outstanding advantage of this scheme is
that any kind of interference can be easily inhibited via its implementation. This is
due mainly to the fact that the RF and FSO operating frequency bands are
completely different. Consequently, it offers better performance than the tradi-
tional RF/RF transmission schemes [2, 11, 13, 14].
The RAN functional split is another innovative and practical scheme for allevi-
ating the imposed fronthaul requirements by the C-RAN architecture [11, 54]. For
instance, to address the drawbacks of CPRI-based fronthaul solutions, an eCPRI
specification presents additional physical layer functional split options and a
packet-based solution. Consequently, unlike the conventional constant data rate
CPRI in which the stream significantly depends on the carrier bandwidth, as well as
the number of antennas, the eCPRI stream does not depend on either of the factors
but on the actual traffic load. In essence, apart from being able to alleviate the
stringent bandwidth demands, multiple eCPRI stream can also be multiplexed onto
a wavelength for onward transmission over the fronthaul network [12].
In addition, with recent network architecture development, the traditional BBU
and RRU have been reformed into different functional entities which are the CU,
DU, and RRU/active antenna unit (AAU). With the configuration, the CU majorly
focuses on non-real time and part of the traditional Evolved Packet Core function-
alities. This involves high-level protocol processing like dual connectivity and radio
resource management. In addition, the DU is responsible for the real-time media
Figure 7.
Functional split options between CU and DU with emphasized PHY layer.
156
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
access control layer functions like HARQ flow and physical layer function
processing. Also, when massive MIMO antennas are to be employed, certain parts
of the physical layer functions can also be shifted to the RRU/AAU. The implemen-
tation will not only aid in lessening the associated transmission bandwidth between
the RRU/AAU and DUs but will also help in reducing the transmission cost consid-
erably. Therefore, a number of functional split options have been presented in order
to reduce the processing and network resource cost considerably. As shown in
Figure 7, each of the option is categorized according to the demarcation point
between the CU and the DU. Therefore, depending on the deployment scenarios
and use cases, each option offers different degrees of flexibility regarding resource
allocation for different service requirements [12, 29].
The NG-PON2 physical layer requirements are very challenging. Besides, the
requirements are even more strict than the legacy PON technologies. For instance,
when compared with the GPON taken into consideration the related spectrum,
GPON employs only one channel for the transmission and one for the reception,
with a very wide wavelength allocation (up to 100 nm). On the other hand, in NG-
PON2, there are <4 nm to accommodate four channels. Consequently, this means
that the thermal control must be very precise in order to keep each channel inside
the specified channel space (which is +/20 GHz). As aforementioned, there are
multiple channels in NG-PON2 transmission; therefore, the receiver must be tun-
able so as to work for any one of them at a particular time while others are rejected.
This requirement implies that there is a need for a very tight band-pass filter too for
efficient operation. Also, the tuning time classes, already presented in Table 1 in
Section 3, are likewise strict and difficult to achieve on the hardware side. Besides,
one of the major related issues is the amount of the required optical-electrical-
optical (OEO) conversions, which can bring about an unviable and unsustainable
system [55].
157
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
In the following, for the system realization, we propose three different architec-
tures: the ONU architecture, the OLT architecture, and the architecture that can
perform both functions just by hardware selection. It should be noted that all of
these architectures have the transmit and the receive parts.
As explained before, the OLT is not tunable; both transmitter and receiver
should work on the same fixed wavelength pair, as depicted in Figure 9. Conse-
quently, four pairs of optical devices will be needed. Since it is very difficult to
encapsulate everything on the same transceiver, the solution that is being followed
commercially is having four different transceivers, one for each wavelength pair,
and the wavelength multiplexer (WM) device is external. This WM should, in each
port, allow one wavelength pair, meaning that in each port, it should pass only one
downstream and the respective upstream channel.
The architectures presented in Figures 8 and 9 are the basic ones to have
functional devices for NG-PON2. But taking advantage of photonic integration, it is
possible to develop a much more complex circuit with more functionalities, which is
being presented next. Figure 10 illustrates the block diagram of an architecture that
can be used both as ONU and OLT. This helps in exploiting the advantage of both
functionalities on a single chip. The purpose (OLT or ONU) to be served can be
achieved just by hardware selection. This proposed architecture fits inside a 4
4.6 mm indium phosphide (InP) PIC. In the following subsection, we present the
final design and some obtained simulation results.
Figure 8.
ONU transceiver architecture.
158
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
Figure 9.
OLT transceiver architecture.
Figure 10.
Block diagram of OLT/ONU transmission architecture.
159
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
switches and determine the chip’s operating mode (i.e., OLT or ONU). Therefore,
one of the SOAs is amplifying the light (active SOA), while the other is absorbing
(passive SOA). Consequently, by this configuration, only one band filter is contrib-
uting to the setup. The employed lasers are built using laser cavities which contain
SOAs that are being used for gain purposes, filters, and reflectors on both sides. The
C þ L band filter helps in the selection of the downstream or upstream channel [39].
Moreover, the architecture includes also a multimode interferometer reflector
(MMIR) before the band selection and another one after each gain SOA. These
reflectors define the laser cavity limits. The second MMIR, after the gain SOAs, only
reflects 50% of the light, and the remaining 50% is the laser cavity output and is
sent to the MZM for modulation. After the modulation on the MZMs, all four
channels are combined in just one, and the resulting light signal is sent to the output
Figure 11.
Receiver block diagram.
Figure 12.
OLT/ONU integrated transceiver design masks.
160
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
of the PIC, where a fiber will be aligned to collect the light, and subsequently, it will
be sent to the network [39].
This PIC has also a receiver circuit, but it is a simple one, with just a wavelength
division multiplexer (WDM) filter which receives the light from the network and
routes each NG-PON2 channel for a different PIN. The receiver circuit schematic is
depicted in Figure 11.
Using the photonic design kit (PDK) from the foundry Smart Photonics and a
software for PIC design (Phoenix Software at the time, meantime bought by syn-
opsis) for the implementation, the final circuit masks of the chip are shown in
Figure 12.
In this section, we present the obtained simulation results with further discus-
sion on NG-PON2 physical layer architecture design and development based on
PICs. Figure 13 shows the spectral simulation results obtained using advanced
simulator for photonic integrated circuits (Aspic) software from filarete. On the left
figure, there is the downstream operation (L band selected), and on the right there
is the upstream (C band selected). In the figure, the spectra in blue, pink, orange,
and green are the four channels. In both cases, it is possible to conclude that there is
about 30 dB of suppression of replicas. The suppression facilitates smooth operation
of the system by preventing intra-channel interference.
The reason for using laser cavities is due to the limitations on the foundry.
During the chip’s design period, the Smart Photonics did not offer lasers on their
process design kit (PDK). Consequently, improvements in the architecture can be
undertaken to potentiate the results. For instance, the laser cavities could be
replaced by distributed feedback (DFB) or distributed Bragg reflector (DBR) lasers
that have narrow linewidth and a stable single mode operation. In this case, the
cavity would disappear, and the filtering should be done after the lasing. In addi-
tion, the architectures can be simplified using only one modulator; nevertheless, it
Figure 13.
Optical spectra at the transmitter output (a) downstream and (b) upstream.
161
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
would not be possible to transmit the four channels simultaneously; this implies that
only one channel can be transmitted at a time. The proposed and developed archi-
tectures demonstrate the potential of photonic integration for optical architectures.
Consequently, the architectures not only have the ability of supporting high data
rates, high density, and flexible solutions but also offer advantages such as low
power consumption, improved functionality, low footprint, and cost-effectiveness.
8. Conclusion
Acknowledgements
162
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
163
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
164
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
165
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
[33] Bogataj T. Safe Migration to [42] Wey JS, Nesset D, Valvo M, Grobe
Next-Gen Optical Broadband Access: K, Roberts H, Luo Y, et al. Physical layer
A gradual and controlled journey aspects of ng-pon2 standards—Part 1:
to XGS-PON and NG-PON2. Kranj, Optical link design [invited]. IEEE/OSA
Slovenia: Executive whitepaper, Journal of Optical Communications and
Iskratel, January 2018 Networking. 2016;8(1):33-42
[34] Xu Q. What the future holds for [43] Thomas D. XGS-PON makes NG-
next-generation PON technologies. PON simpler. Technical report, Nokia,
Nashua, USA: Article, Cabling June 2016
Installation and Maintenance, October
2017 [44] Challenges in Next-Gen PON
Deployment. White paper, Viavi
[35] Next-Generation PON Evolution.
Solutions, 2017
Shenzhen, China: Manual, Huawei
[45] WaveCEx: WDM module for PON
Technologies. 2010
coexistence-GPON, XGS-PON, NG-
PON2, RF, OTDR. Wavecex family:
[36] Wang X, Wang L, Cavdar C,
180409 data sheet, TELNET Redes
Tornatore M, Figueiredo GB, Chung HS, Inteligentes, October 2017
et al. Handover reduction in virtualized
cloud radio access networks using [46] OBA000100 GPON Fundamentals.
twdm-pon fronthaul. IEEE/OSA Journal Technical report, Huawei
of Optical Communications and
Networking. 2016;8(12):B124-B134 [47] Breyne L, Torfs G, Yin X,
Demeester P, Bauwelinck J. Comparison
[37] Cheng N, Gao J, Xu C, Gao B, Liu D, between analog radio-over-fiber and
Wang L, et al. Flexible twdm pon sigma delta modulated radio-over-fiber.
system with pluggable optical IEEE Photonics Technology Letters.
transceiver modules. Optics Express. 2017;29(21):1808-1811
2014;22(2):2078-2091
[48] Thomas VA, Ghafoor S, El-Hajjar
[38] The Future of Passive Optical M, Hanzo L. A full-duplex diversity-
Networking is Here: NG-PON2. assisted hybrid analogue/digitized radio
Marketing report, Broadband Forum over fibre for optical/wireless
integration. IEEE Communications
[39] Jesus Teixeira AL, Maia Tavares AC, Letters. 2013;17(2):409-412
Silva Lopes AP, Rodrigues CE. Photonic
integrated tunable multi-wavelength [49] Dat PT, Bekkali A, Kazaura K,
transmitter circuit. USA: United States Wakamori K, Matsumoto M. A
Patent; 2017 universal platform for ubiquitous
wireless communications using radio
[40] Nesset D. Ng-pon2 technology and over fso system. Journal of Lightwave
standards. Journal of Lightwave Technology. 2010;28(16):2258-2267
Technology. 2015;33(5):1136-1143
[50] Alimi IA, Shahpari A, Monteiro PP,
[41] Monteiro PP, Viana D, da Silva J, Teixeira AL. Effects of diversity
Riscado D, Drummond M, Oliveira ASR, schemes and correlated channels on owc
et al. Mobile fronthaul rof transceivers systems performance. Journal of
for c-ran applications. In: 2015 17th Modern Optics. 2017;64(21):2298-2305
International Conference on
Transparent Optical Networks [51] Navidpour SM, Uysal M, Kavehrad
(ICTON); July 2015. pp. 1-4 M. Ber performance of free-space
166
Enabling Optical Wired and Wireless Technologies for 5G and Beyond Networks
DOI: http://dx.doi.org/10.5772/intechopen.85858
167
Chapter 9
Abstract
This chapter is a study of exploring the role of the optical network in the cloud/
fog computing environment. With the growing network issues, unified and
cost-effective computing services and efficient utilization of optical resources are
required for building smart applications. Fog computing provides the foundation
platform for implementing cyber-physical system (CPS) applications which require
ultra-low latency. Also, the digital revolution of fog/cloud computing using opti-
cal resources has upgraded the education system by intertwined VR using the fog
nodes. Presently, the current technologies face many challenges such as ultra-low
delay, optimum bandwidth, and minimum energy consumption to promote virtual
reality (VR)-based and electroencephalogram (EEG)-based gaming applica-
tions. Ultra-low delay, optimum bandwidth, and minimum energy consumption.
Therefore, an Optical-Fog layer is introduced to provide a novel, secure, highly
distributed, and ultra-dense fog computing infrastructure. Also, for optimum
utilization of optical resources, a novel concept of OpticalFogNode is introduced that
provides computation and storage capabilities at the Optical-Fog layer in the soft-
ware defined networking (SDN)-based optical network. It efficiently facilitates the
dynamic deployment of new distributed SDN-based OpticalFogNode which supports
low-latency services with minimum energy as well as bandwidth usage. Therefore,
an EEG-based VR framework is also introduced that uses the resources of the optical
network in the cloud/fog computing environment.
1. Introduction
169
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
virtual frictionless fashion by using the optical network elements. It has provided
new ways for various business applications to move over the latest technologies
such as big data analytics, machine learning, etc. in the era of the 5G network.
Fog computing is a new distributed architecture which brings computing,
storage, and networking services closer to the proximity of the end user [3]. As
compared to the traditional cloud computing techniques, it processes real-time
applications and data at the edge with minimum latency, minimum network
congestion, and lower energy consumption which are the key demand of many
industries such as manufacturing, e-health, education, oil and gas, smart cities,
smart homes, and smart grids [4]. Fog nodes aggregate the computing resources of
edge devices to perform the critical data-sensitive computations where the data of
analysis part is directly sent to the cloud for further processing because traditional
fog nodes have limited storage and computing power.
The integration of fog computing and PON is an inexpensive, scalable, and simple
technology to provide a most promising solution for building e-learning-based smart
educational applications [5]. The dynamic capabilities of SDN combined with the
state-of-the-art optical technologies have the ability to modernize the optical trans-
port network through its primary feature, i.e., programmability [6]. The purpose of
this chapter is to explore efficient techniques to combine SDN-based optical technol-
ogy at different levels of design and development of smart VR-based applications.
Figure 1.
Utilization of optical resources in cloud/fog computing environment.
170
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
centralized, intelligent, and controlled (real time) which can serve application-level
services efficiently in the heterogeneous IoT, machine learning, big data, and cloud
computing paradigms. The acronyms used in this paper are defined in Table 1.
Presently, SDN is supporting wide area network to deal with many more tech-
nologies for delivering several benefits. It has adopted a hierarchical approach in
which domain controllers collect information and delegate the control (real time)
over the network layers and geographic clusters to support applications and provide
higher levels of service orchestrations. Initially, SDN was used in data centers for
separating the data plane, control plane, and management plane from each other
[9]. The interface like OpenFlow is used by the centralized controller to deliver
computing infrastructure for making better communication. While applying this
concept to the optical network, optical domain controller (ODC) plays an impor-
tant role. As shown in Figure 2, it provides a more programmatic and abstract view
of the underlying optical network through the northbound interface [10]. The
programming feature of SDN makes it capable of fulfilling customized demands
for manipulating network infrastructure. To handle real-time, bandwidth-intensive
applications, fog uses the computing resources of the SDN-based optical network.
The SDN-based optical network infrastructure fulfills the demand of increas-
ingly high-performance and network-based applications with flexibility and
efficiency. The key security issues in fog/cloud computing over optical network lies
at both downstream and upstream channels of PON. PON uses broadcasting in the
downstream channel which is prone to eavesdropping attacks where an attacker can
modify the behavior of ONUs at its media access control (MAC) layer. On the other
hand, the traffic in the upstream channel is only visible to the OLT rather than other
ONUs that can also be exploited for attacks. In PON network, OLT uses time division
multiplexing access (TDMA) that provides sharing of the upstream channel among
VR Virtual reality
EEG Electroencephalogram
Table 1.
List of acronyms.
171
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 2.
SDN-based optical network.
ONUs [11]. It assigns static or dynamic nonoverlapping time slots to connected ONUs.
Here, OLT and all connected ONUs are well synchronized that result in the collision-
free transmission of the traffic or data frames. In the security aspects of PON, more
research work is required that can restrict the ONUs to send data frames outside of
their preassigned time-slots. In case if a malicious ONU intends to send data frames
outside its preassigned time slot, the collision can encounter with the data-frames of
other ONUs that degrade the quality of service (QoS) of the optical channel.
To ensure QoS and quality of experience (QoE) to the end-user for various
real-time CPS-based applications, Optical-Fog layer is utilized. To handle real-time
processing, this layer uses the optical network resources by creating OpticalFogNode.
The optical network can effectively realize the interconnected optical resources
(PON, OLTs, and ONUs) across the 5G network. It provides ultralow delay and
less energy consumption for IoT devices and uses the majority of the computing
resources of the optical layer rather than the cloud layer.
172
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
novel solution to deploy OpticalFogNode at the edge of the network. All free avail-
able resources (FARs) of the optical elements are grouped together to form an
OpticalFogNode with the computing capabilities like processor, memory, and band-
width. ONV converts the free available physical resources of the optical network ele-
ments into the virtual resources as infrastructure-as-a-service (IaaS) model. Initially,
each submitted task is categorized as CBS-based or non-CPS-based task on the basis
of requested resources in terms of processing power, storage, bandwidth, accept-
able security level, etc. The Optical-Fog manager can dynamically reconfigure the
OpticalFogNode which provides the desired reliability and QoS for the CPS. An algo-
rithm is proposed that identify all possible created OpticalFogNode on the SDN path
and assign them CPS-based tasks for further processing. The non-CPS-based tasks are
directly sent to the cloud layer only if the resources of OpticalFogNode are not free.
In the proposed algorithm, the resources required by the new task are evalu-
ated and then allocated on the OpticalFogNode. This node is scalable to provide the
required computing resources dynamically by using the concept of ONV.
173
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
• T represents the requirements of submitted task for the framework along with
its category as CPS-based or non-CPS-based task.
Further, this layer uses the SDN-based controller for optimizing the distribu-
tion of the flow among various redundant paths. In order to increase the QoS,
the shortest path is chosen that minimizes the delay. In the optical network in the
5G environment, the OpticalFogNode has a flow table which is used to match the
routing information of the received packet in the path. If there is no entry found in
the flow table, the received packet is forwarded to the SDN controller for finding
the shortest path so that the particular packet can be forwarded. Thus, a new entry
is added (once the path is chosen) in the flow table of the OpticalFogNode for the
coming future packets. Hence, the proposed SDN controller identifies the shortest
path with the least congestion among all possible paths.
174
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
Figure 3.
Deployment scenario of OpticalFogNode at Optical-Fog layer.
Figure 4.
SDN-based OpticalFogNode architecture.
175
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 5.
Free available resource.
Hence, all FARs of optical network are grouped together to form virtual data
centers with computing resources such as processor, memory, and bandwidth.
ONV converts the physical resources of optical network elements into the virtual
resources as infrastructure-as-a-service (IaaS) model to build virtual honeypots
that prevents vulnerability and its identity from the attacker.
Figure 6.
SDN-based Optical-Fog network.
176
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
from the requesting Core Fog nodes to the Top of Rack (TOR) Fog nodes in the optical
network which is shown in Figure 6. It uses an open-loop congestion control mechanism
to employ congestion aware direct routing. Each node of the SDN network keeps the esti-
mation cost Cnc(t) for delivering packets to their destination node c [14]. It helps to find
the shortest path with least congestion by using the historical knowledge of the connec-
tion to node c and the waiting time of packets to c in the node n’s queue. It is assumed that
all nodes broadcast a request for the cost frequently to their neighbors. Also, all neighbor
nodes keep updating their cost table on the basis of the received request for the cost. To
find the shortest path with the least congestion, the node with minimum delivery cost
is selected as shown in Figure 7. The convoluted parameters are referred to as Proximity
Measure Θcn(t) and Net Destination Queue Waiting Time Ωcn(t) are used to compute the
delivery cost [13].
Q c(t)
Θ cn(t) = _____
n
c (1)
Tn(t)
The value of Θcn(t) lies between 0 and 1. The value 1 indicates the connection
between n and c, whereas 0 shows that they were never connected. Here, Tnc(t) is the
time increment, and Qnc(t) is the time duration while c and n remains connected.
N
Ω cn(t) = ∑ (τ − an,i
c
) (2)
i=0
Figure 7.
Workflow to find the shortest path.
177
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
c
Here, τ id the present time and an,i is the arrival time of packets i. Since the queue
waiting time is used to predict the congestion, delivery cost can be considered as an
exponentially increasing function. Hence, the delivery cost to c via n is computed as:
Thus, the shortest path with least congestion is identified by pulling packets
toward the neighbors that have the smallest queue. It helps the SDN controller to set
the threshold value for decision making.
178
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
3. Performance analysis
The real-time gaming applications and CPS systems require ultralow latency,
minimum energy consumption, and optimum bandwidth. The proposed Optical-
Fog layer provides the desired QoE by evaluating the following parameters such
as latency measure, energy consumption and bandwidth usage in contrast to the
traditional cloud computing.
The proposed system utilizes the Optical-Fog layer that reduces the delay and
improves QoE. The latency measured in the context of delay is the most concerning
issue. The communication between ONU and OLT is supported by the multi-point
control protocol (MPCP) which is a frame-based protocol [15]. Here, only GATE
and REPORT messages are exchanged between OLT and ONU. So, in the Optical-
Fog network, the delay is measured as the time between the arrival of its last bit at
ONU and the arrival of its last bit at OLT. The delay tD(fi) is the computation of
adding three basic components shown as:
For computing energy consumption, only the edge devices of the network is a
concerning issue because energy consumption by the PON channel is negligible.
Thus, the total energy consumption is computed as:
• EOptical–Fog = Σ(EONU + EOLT + EPON) represents the energy consumed by the opti-
cal elements which is negligible.
179
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
0 ≤ λ i,j ≤ λ max
i,j ∀ i ϵ Nfog and ∀ i ϵ Mcloud (6)
Here, Nfog represents the set of fog devices where Mcloud is the set of cloud data
center servers. The optimum utilization of Optical-Fog network is more effective
than the traditional cloud.
4. Conclusion
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
180
Role of Optical Network in Cloud/Fog Computing
DOI: http://dx.doi.org/10.5772/intechopen.84404
References
181
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
182
Section 4
183
Chapter 10
Abstract
Radial line slot array (RLSA) antenna was initially developed for satellite
antenna receivers at a frequency of Ku-band. The success of this development
inspired researchers to continue the study to other bands and other applications,
such as Wi-Fi at 5.8 GHz. Wi-Fi applications need small antennas that lead to the
diminution of RLSA antennas. Small-RLSA antennas experienced high reflection
due to the small number of slots. One of the techniques that effectively eliminates
the reflection was developed and named as extreme beamsquint technique. Several
researches have successfully developed small-RLSA antennas by implementing this
technique for Wi-Fi applications. Furthermore, for the future, it is possible to
widen the researches to other frequencies and other features of RLSA antennas such
as multibeam, multiband, and diminution by cutting off RLSA antennas.
Keywords: RLSA antennas, extreme beamsquint, small RLSA, RLSA for Wi-Fi,
future RLSA antennas
1. Introduction
Radial line slot array (RLSA) antennas are a type of cavity or waveguide anten-
nas. These antennas were firstly developed for satellite receivers as an option
besides parabolic antennas. Unlike parabolic antennas, RLSA antennas have an
advantage of having feeders at the back of the antenna, so that the feeders do not
block out incoming signals. The other advantage is their flat shape so that they are
more aesthetic compared to parabolic antennas. Nowadays, RLSA antennas are
developed for different frequency applications such as Wi-Fi, 5th G, etc.
This chapter discusses briefly all about radial line slot array (RLSA) antennas,
especially for the linearly polarized (LP)-RLSA antennas. Firstly, in Section 2, the
review of RLSA antennas including the development of RLSA antennas, their
applications, their development obstacles and the developed technique to overcome
the obstacles are reviewed. Secondly, in Section 3, the theory of RLSA antennas is
explained which includes how the antenna works and several equations to calculate
antenna parameters. Thirdly, in Section 4, the mechanism of reflections in RLSA
antennas, which is due to slot reflections and due to remaining power in antenna
perimeter, is discussed. Fourthly, in Section 5, the theory of extreme beamsquint
technique is also explained in detail. Lastly, in Section 6, the idea of future research
in topic of RLSA antennas is briefly explained, including the idea of cutting off
RLSA antennas to smaller size, multibeam RLSA antennas, utilizing background as
185
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
radiating element and multiband RLSA antennas. It is hoped that the ideas can
inspire researches for the next development of RLSA antennas.
Kelly introduced the concept of RLSA antennas in the 1950s [1]. Although Kelly
could produce a high-gain RLSA antenna, the structure of the antenna feeder was
still complex, leading it to be costly.
In 1988, Ando et al. proposed a RLSA antenna at a frequency of 12 GHz. This
antenna was designed using the technique of slot arrangements. The technique aims
to produce a uniform-aperture distribution. This antenna has a double-layer cavity
and exhibits a good linear polarization. Ando also proposed a beamsquint technique
to improve the poor reflection coefficient in linearly polarized RLSA antennas
[2, 3]. In the same year, by applying a reflection coefficient suppression and slot
coupling technique, Ando successfully designed a LP-RLSA antenna for satellite
applications at 12 GHz. This antenna has the efficiency of 76% and the gain of 36 dB
[4–6]. Takada et al. introduced a technique to improve the reflection coefficient
using a reflection cancelling slot technique. This technique successfully improved
the reflection coefficient of RLSA antennas from 2 to 10 dB [7]. Endo et al.
designed an optimum thickness of double-layer RLSA antennas in order to realize
the mass production of thinner RLSA antennas [6].
In 1990, Ando et al. furthermore introduced a circularly polarized RLSA (CP-
RLSA) antenna. This antenna utilizes a single-layer cavity instead of a double-layer
cavity. This simpler cavity structure improves the complexity of RLSA fabrications
and can achieve the gain of 35.4 dBi and the efficiency of 65%. Ando used two
techniques to improve the antenna performance. The first is the technique of
varying the slot length and slot spacing used to event out the aperture illuminations
of the antenna. The second is the technique of matching spiral used to reduce the
reflection of the residual power at the antenna perimeters [8, 9]. In 1991, Takashi
et al. proposed the technique of varying the slot length and spacing. Utilizing this
technique Takahashi proposed several high-efficiency single-layer RLSA antennas
with the diameter of 25–60 cm. These antennas can achieve efficiencies of between
70 and 84% [10]. Furthermore, Takashi et al. produced and marketed a-78% effi-
ciency, 32.6 dB gain and single-layer RLSA [11–13].
Australian researchers started to investigate RLSA in 1995. They reported several
investigations to design LP-RLSA antennas for satellite receivers. These investiga-
tions used the combination of the theoretical and experimental approach. The
availability of low-cost materials (polypropylene) and low-cost fabrication also
become a consideration in these researches. In 1997, Davis reported a 60 cm diam-
eter LP-RLSA prototype designed using the reflection cancelling slot technique.
This technique can overcome the inherent poor reflection coefficient of LP-RLSA
antennas [4]. Davis and Bialkowski also successfully tested a RLSA antenna
designed utilizing the reflection cancelling slot technique and a beamsquint value of
20° [14, 15]. Furthermore, Davis and Bialkowski reported an investigation of LP-
RLSA antennas utilizing the beamsquint technique for several squint angles. This
technique successfully improved the reflection coefficient under 25 dB [16]. Davis
integrated the report of [2, 4, 7, 11] to form a beam synthesis algorithm used to
calculate the design parameter of LP-RLSA antennas [17].
Due to the successful development of RLSA antennas for satellite applications,
researchers tried to bring RLSA antennas into small antenna application for Wi-Fi
devices. However, the design of small-RLSA antennas was not easy since small-size
RLSA antennas normally performed high reflection coefficient [18–20]. Hirokawa
186
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
et al. used a technique for matching slot pair in order to reduce the remaining power
at the antenna perimeter of small-aperture RLSA, so that this technique can mini-
mize the reflection coefficient [21, 22]. Akiyama et al. also used the same technique
for matching slot pair [23, 24]. However, the technique for matching slot pair is
only used to radiate the remaining power at the antenna perimeter and does not
contribute to the antenna gain. Reference [25] introduced the use of long slots in
order to increase the ability of slots to radiate power, so that it can reduce the
remaining power at the perimeter of small-aperture RLSA antennas, thus reducing
the reflection coefficient. However, although this method can reduce the reflection
coefficient, this method also can decrease the antenna gain. This is because that
the long slots cannot radiate a focus power.
In 2002, Malaysian and Australian researchers started to investigate the applica-
tion of RLSA antennas for wireless LANs. Tharek and Ayu successfully fabricated a
low-profile RLSA antenna at a frequency of 5.5 GHz with a broad radiation pattern
of 60° used for indoor wireless LANs [26]. Bialkowski and Zagriatski investigated
the design of RLSA antennas for wireless LANs and successfully fabricated a dual-
band 2.4/5.2 GHz antenna [27, 28]. Furthermore, Imran et al. reported the design
and test of RLSA antennas for outdoor point-to-point applications at the frequency
of 5.8 GHz [29–31]. However, this design utilized a beamsquint technique that is
similar with the technique used to design RLSA antennas for satellite applications.
Hence, the diameter of this antenna is still considered large with a diameter of
650 mm, so that it is not applicable for small Wi-Fi devices. Islam reported the
utilization of low-cost FR4 materials to fabricate RLSA antennas at the frequency of
5.8 GHz for wireless LANs. This invention is quite innovative since FR4 materials
are a low-cost material and easy to be fabricated [32, 33]. However, there are some
drawbacks in designing this antenna, such as a design of overlap slots, a loss cavity
due to the use of several FR4 boards and the use of material loss of FR4. These all
lead to low gain (only 8 dB) and low bandwidth (75 MGhz).
Purnamirza et al., in 2012, introduced a technique called extreme beamsquint
technique in order to overcome the problem of high reflection in small-RLSA
antennas [34]. This technique uses the beamsquint values higher than 60°. The
theory of how the high values of beamsquint can significantly minimize the reflec-
tion coefficient is explained. Purnamirza also developed RLSA antennas that mimic
the specification of other types of antenna that is available in markets [35–38].
This section discusses the theory of RLSA antennas including the structure, the
theory of how RLSA antennas work as well as several formulas to design RLSA
antennas.
Figure 1 shows the illustration of the structure of a RLSA antenna. The figure
shows the structure of RLSA antennas consisting of a radiating element, a cavity, a
background and a feeder. The radiating element usually is a circular plate made of
metals, such as aluminium, copper or brass. The radiating element consists of many
slot pairs. One slot pair acts as one antenna element so that all the slot pairs form an
array antenna. The background is a metal plate just like the radiating element, but
the background does not have slots. The cavity is a dielectric material that has the
form of a tube. Together with the radiating element and the background, the cavity
operates as a circular waveguide that guides the signal from the feeder to propagate
187
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
in radial direction. The feeder is a part of RLSA antennas used to feed signals from a
transmission line into the antenna.
Figure 2 shows the wave propagation mechanism including TEM cavity mode
and TEM coaxial mode. The feeder placed in the centre of the antenna cavity feeds
the electromagnetic power (indicated by the arrows). The feeder is an ordinary
SMA feeder, which is modified by adding a head disc. The head disc has a function
to convert the electromagnetic power from a TEM coaxial mode into a TEM cavity
mode (a radial mode), so that the electromagnetic power fed by the feeder will
propagate in a TEM mode and in a radial direction within the antenna cavity.
When the power passes the slot pair, some amount of the power escapes through
the slot pair and radiates as illustrated in Figure 3. Hence, the slot pair can be
considered as one antenna element. Since there are many slot pairs (thousands in
normal-size RLSA antennas), all the slot pairs will form an array antenna. There-
fore, this is the reason why ‘array’ word is included in the name of RLSA.
Figure 1.
(a) The component of RLSA antennas. (b) The magnified view of the feeder [39].
Figure 2.
Illustration of the TEM cavity mode and the TEM coaxial mode [39].
188
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
3.3 Polarizations
A slot pair, which represents a signal source in RLSA antennas, is located in the
top surface of the radiating element of a RLSA antenna. A linear polarization in the
RLSA antenna can be produced by combining two signals from the slot pair.
Figure 4a shows the illustration of the slot pair. The signal from Slot 1 and the signal
from Slot 2 have a phase difference of 180° or phi radians since Slot 1 and Slot 2
have the distance of half wavelength (0.5λg Þ to each other. Since the orientation of
Slot 1 and Slot 2 is perpendicular to each other, the signals from Slot 1 (at y axis) and
Slot 2 (at x axis) are also perpendicular to each other, as shown in Figure 4b.
Figure 4b shows that when Signal 1 is increasing in positive values, Signal 2 is
decreasing in negative values. Since their position is perpendicular to each other,
the resulting wave becomes a line in Quadrant II. When Signal 1 is decreasing
towards zero and Signal 2 is increasing towards zero, the resulting signal will be a
line in Quadrant II but with a shorter length compared to the line in the previous
case. When Signal 1 is decreasing in negative values and Signal 2 is increasing in
positive values, then the resulting signal will be a line in Quadrant IV. When Signal
1 is increasing towards zero and Signal 2 is decreasing towards zero, then the
resulting signal will be a line in Quadrant IV but with the shorter length compared
to the line in the previous case. Now, we can understand that the resulting signal
of Signal 1 and Signal 2 results in a signal that looks like a straight line where the
Figure 3.
Illustration of the power escaping from the slot pairs [39].
Figure 4.
Polarization establishment in a linearly polarized RLSA [39]. (a) slot pair position (b) signal of each slot.
189
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
length changes as a function of time; this is the reason why its name is ‘linear
polarizations’.
Figure 5 shows the position of the slots (indicated by ‘A’ and ‘B’) and the squint
of the inclination angles of the slots (indicated by 'θ1 and θ2). The slot pair must be
located in the correct position on the radiating surface of RLSA antennas. The slot
pair must be located in different and unique positions in order to prevent
overlapping between them.
Equations (1) and (2) express the squint of the slots obtained by the beamsquint
technique [4, 14–17, 39–43]:
� � � �
π 1 cos ðθT Þ
θ1 ¼ þ arctan � ðϕ � ϕT Þ (1)
4 2 tan ðϕT Þ
� � � �
3π 1 cos ðθT Þ
θ2 ¼ þ arctan � ð ϕ � ϕT Þ (2)
4 2 tan ðϕT Þ
Figure 6 shows the geometrical arrangement of a slot pair or also called a unit
radiator. The arrangement of the unit radiator in the radiating surface of RLSA
antennas must be carefully calculated and drawn since a little deviation of the unit
radiator position will rapidly decrease the performance of RLSA antennas.
Based on Figure 6, the distance of a particular unit radiator from the centre
point of RLSA antennas is expressed in Eq. (3) [4, 14–17, 39–43]:
nλg
ρρ ¼ (3)
1 � ξsinθT cos ðϕ � ϕT Þ
Where ξ ¼ p1ffiffiffi
ffi
εr:
Figure 5.
Slot pair geometry [39].
190
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
Figure 6.
Geometrical arrangement of a unit radiator [39].
Equation (4) expresses the distance between two adjacent unit radiators located
in two different rings (the distance in the radial direction) [4, 14–17, 39–43]:
λg
Sρ ¼ (4)
1 � ξsinθT cos ðϕ � ϕT Þ
Equation (5) expresses the distance between two adjacent unit radiators in a
same ring (the distance in the azimuth direction) [4, 14–17, 39–43]:
2πλg q
Sϕ ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi (5)
2 2p
1 � ξ sin θT
where λg is the length of the wavelength inside the cavity of RLSA antennas; εr is
the relative permittivity of the cavity of RLSA antennas.
n is the ring numbers (1,2,3, etc.); q is the integer numbers (1, 2, 3, etc.) that
express the distance of the innermost ring from the centre of RLSA antennas; and p
is the number of unit radiators in the innermost ring.
The parameters of Sρ , Sϕ , ρρ ,ρ1 , and ρ2 are shown in Figure 7. Since the distance
from the centre of the unit radiator to Slot 1 or Slot 2 is ‘λg =4’, Eqs. (5)–(7) express
the distance of slots from the centre of antennas [4, 14–17, 39–43]:
ðn � 1 þ q � 0:25Þλg
ρρ1 ¼ (6)
1 � ξsinθT cos ðϕ � ϕT Þ
ðn � 1 þ q þ 0:25Þλg
ρρ2 ¼ (7)
1 � ξsinθT cos ðϕ � ϕT Þ
191
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 7.
Definition of some slot parameters [39].
The length of the slots on the radiating surface of RLSA antennas must be varied
in order to achieve a uniform aperture illumination. The farther a slot from the
centre of the antenna, the longer the length of the slot will be. The length of the slot
is the function of ρ that is the distance of the slot from the centre of the antennas, as
expressed by Eq. (8) [42]:
12:5 x109
Lrad ¼ 4:9876 � 10�3 ρ (8)
f0
The power (P) comes from the feeder, which is located at the centre of the
antenna, and flows towards the antenna perimeter, as illustrated in Figure 8b.
When the power passes the slots, some amount of the power radiates through the
slots. The power inside the cavity will decrease every time the power passes the slots
and will continue to decrease until the power reaches the antenna perimeter. Equa-
tion (9) expresses the remaining power (PR) at the antenna perimeter [42]:
192
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
Figure 8.
(a) Top view of RLSA. (b) Cut view of a RLSA antenna and the power flow mechanism inside the RLSA cavity [39].
Figure 9.
Illustration of the reflected signals from the slot [39].
Equation (9) shows that the amount of the remaining power depends on the
number of rings (n), which is also proportional to the number of slots. For small-
RLSA antennas, which have a small number of slots, the amount of the remaining
power at the antenna perimeter will be high. Part of this remaining power will be
reflected back to the feeder and result in a high signal reflection, thus increasing the
reflection coefficient. For normal-size RLSA antennas, which have thousands of
slots, the remaining power at the antenna perimeter is very small so that its effect to
the signal reflection is neglected.
Figure 9 shows the front cut view of a RLSA antenna and the signal flow within
the cavity of the RLSA antenna. The grey arrows represent the signals that flow
from the centre of the RLSA antenna to the antenna perimeter, and the black arrows
represent the reflected signal from the slots. Figure 9 shows that since the distance
between the slots (d) is λg/2, the signal from slot ‘A’ will travel for λg/2 to reach ‘B’.
At ‘B’, some of the signal will be reflected back and travel for another λg/2 to reach
‘A’. Therefore, the reflected signal from slot ‘A’ and slot ‘B’ will have a different
193
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
phase of λg/2 + λg/2 = λg or 360° (or can be said there is no phase difference), so that
they will strengthen each other and result in a high signal reflection [42].
The ability of beamsquint technique in minimizing the reflected signal from the
slots depends on one condition, that is, the number of ring must be sufficient. As an
example, Figure 10a and b shows the reflected signals of a three-ring RLSA antenna
and the reflected signals of a two-ring RLSA antenna, respectively. Since every ring
consists of two slots, hence, there are six reflected signals for the three-ring RLSA
antenna and four reflected signals for the two-ring RLSA antenna. It is assumed that
the amplitude of all reflected signals is the same in order to simplify the analysis.
From Figure 10a, it can be observed that all the graph space is covered by the
reflected signals; hence the combination of all reflected signals will cancel out each
other, and the minimum signal reflection is obtained. In contrast, from Figure 10b,
it can be seen that not all graph space (the area pointed by ‘A’) is covered by the
reflected signals; hence the combined signal will be greater than the combined
signal in Figure 10a.
From the example in the previous paragraph, it can be concluded that a smaller
number of ring will decrease the ability of beamsquint technique in cancelling the
reflected signal. Therefore, this is the reason why the reflection coefficient of small-
RLSA antennas, which have few numbers of rings (less than 2), is high and why the
normal beamsquint technique fails to minimize the reflection coefficient of small-
RLSA antennas. The next section will explain how the proposed extreme
beamsquint technique can reduce the high reflection coefficient of small-RLSA
antennas by increasing the number of ring.
The position of the ring in radial direction (Sρ ) can be expressed by Eq. (10) [21]:
rλg
Sρ ¼ (10)
1 � ξ sin θT cos ðϕ � ϕT Þ
Figure 10.
(a) Reflected signal of a three-ring RLSA antenna. (b) Reflected signal of a two-ring RLSA antenna [39].
194
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
Figure 11.
(a) Illustration of some parameters of ring position. (b) Plot of the ring for beamsquint of 20, 30 and 60°.
(c) Plot of various ring numbers for beamsquint angle of 20°. (d) Plot of various ring numbers for beamsquint
angle of 80° [39].
It illustrates that the beamsquint technique performs the ring in the shape of ellipse
rather than in the shape of circular. From Figure 11b, it can be observed that the
position of the ring at the left-hand side will move closer to the centre of the
antenna as the beamsquint increases. In contrast, the position of the ring at the
right-hand side will move farther from the centre of the antenna as the beamsquint
increases.
Still based on Eq. 3, by utilizing ϕT ¼ 0 and ϕ = 0 to 360°, the rings are plotted
for various ring numbers both for the beamsquint angle of 20° and 800 as shown in
Figure 11c and d, respectively. From these figures, it can be observed that at the
left-hand side, the distance between rings for beamsquint angle of 80° is shorter
than the distance between the rings for beamsquint angle of 20°. Due to the shorter
distance between rings, the beamsquint angle of 80° has more rings (nine rings)
that can be plotted in the antenna area compared to the beamsquint angle of 20° (six
rings). Based on the previous examples and explanations, it can be concluded that
the higher beamsquint angle can yield more rings. This fact is very useful to include
additional rings for the small-RLSA antenna, which originally has a low number of
rings (less than 2). The extra number of rings will have more ability to minimize the
195
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Space to be explored for RLSA antennas has remained wide, since only few
researchers study this topic. This is due to the drawing slots of RLSA antennas that
are difficult without using computer programmes. This is unlike microstrip anten-
nas which are easy to draw since their shape is simple. Moreover, it is more difficult
to fabricate RLSA antennas compared to microstrip antennas since there is no row
material that is ready to be cut or to be formed. This is unlike microstrip, which can
use many types of boards such as FR4. Therefore, due to these reasons, less
researchers are interested in studying RLSA antennas than microstrip antennas.
Below, several research ideas in the field of RLSA are presented to be explored
deeper, especially for doctoral dissertation and master thesis.
The use of extra high beamsquint results in concentrated slots in a certain area of
radiating elements, and leaving other areas vacant from slots, as shown in
Figure 12a.
Our hypothesis is that since the vacant area is not useful, then it can be cut off,
thus resulting in a smaller antenna, as shown in Figure 12b. We have studied that
definitely there will be an effect of the cut, which is a leakage power along the
cutting line, shown in Figure 12c. This leakage power reduces the antenna gain.
However, the antenna gain will not be affected significantly since the power density
within the cut antenna will increase, thus also will increase the gain, then counter-
ing the decrease gain due to the leakage power.
Theoretically, only radiating elements that are used as place for slots, as shown
in Figure 13a. The background always functions as conventional background to
Figure 12.
(a) Concentrated slots. (b) Cut antennas. (c) Leakage power.
196
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
Figure 13.
(a) Radiating element. (b) Background. (c) Radiation pattern.
Figure 14.
(a) Design of dual-beam antenna. (b) Beam result.
radiating elements. Our hypothesis is that the background can be used to draw slots
on it, as shown in Figure 13b. This will result in a dual-beam antenna as shown in
Figure 13c. Of course, the gain will decrease by 3 dB compared to the originally
single-beam antenna, since the power is divided into two beams.
Figure 15.
(a) Design of dual-band antenna. (b) Band result.
cannot differentiate between the 5.4 and 5.8 GHz slots since they are plotted mixed.
This will not effect to the gain since all slots are designed using a same beamsquint
value. Research on this topic can be as follows: firstly, a study on how to correctly
place different frequency slots, so that the correct placement will not increase
antenna reflections. Secondly, a study of how far two different bands or more can
be separated since a different band needs a different feeder structure. However in
multiband antennas, we use a same feeder structure so that it will effect to the
increase of reflection, such that different bands cannot be separated too far.
7. Conclusions
RLSA antennas have been developed since the 1980s until nowadays. They were
initially developed for satellite receiver antennas. Due to their advantages, such as
high gains and flat shapes, these antennas have been also developed for small device
applications at smaller frequencies, such as Wi-Fi, 5th G, 4th G, etc. However
developing RLSA antennas for small device applications had been facing the prob-
lem of high signal reflections, due to the limited number of slots. Several techniques
had been proposed to overcome the problem. Among the techniques, the extreme
beamsquint technique is the most effective technique in reducing signal reflections.
By resolving the problem of signal reflections, the research areas for RLSA antennas
become wide open, especially for multibeam RLSA antennas, multiband RLSA
antennas and size minimization by cutting RLSA antennas.
198
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
Author details
Teddy Purnamirza
Universitas Islam Negeri Sultan Syarif Kasim, Pekanbaru Riau, Indonesia
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
199
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
[1] Kelly KC. Recent annular slot array 1990;1:930-933. AP-S International
experiments. In: IRE National Symposium (Digest)
Convention Record; Vol. 5; 1957;1.
pp. 144-151 [10] Takahashi M et al. High efficiency
flat array antennas for DBS reception.
[2] Ando M et al. Linearly polarized In: Conference Proceedings—European
radial line slot antenna. IEEE Microwave Conference; 1991.
Transactions on Antennas and pp. 629-634
Propagation. 1988;36:1675-1680
[11] Takahashi M et al. A slot design for
[3] Ando M et al. Linearly-polarized uniform aperture field distribution in
radial line slot antenna. IEEE single-layered radial line slot antennas.
Antennas and Propagation Society. IEEE Transactions on Antennas and
1988;1:836-839. AP-S International Propagation. 1991;39:954-959
Symposium (Digest)
[12] Takahashi M et al. Characteristics of
[4] Davis PW. Experimental small-aperture, single-layered, radial-
investigations into a linearly polarized line slot antennas. IEEE Proceedings H:
radial slot antenna for DBS TV in Microwaves, Antennas and Propagation.
Australia. IEEE Transactions on 1992;139:79-83
Antennas and Propagation. 1997;45:
1123-1129 [13] Takahashi M et al. Small aperture
single-layered radial line slot antenna
[5] Ando M et al. Radial line slot antenna for DBS reception. In: IEEE Conference
for DBS reception. In: Conference Publication; 1991. pp. 738-741
Proceedings—European Microwave
Conference; 1988. pp. 306-311 [14] Davis PW, Bialkowski ME.
Comparing beam squinting and
[6] Endo K et al. Waveguide design of a reflection cancelling slot methods for
radial line slot antenna. Electronics and return loss improvement in RLSA
Communications in Japan. Part I: antennas. IEEE Antennas and
Communications. 1990;73:109-115. Propagation Society. 1997;3:
(English translation of Denshi Tsushin 1938-1941. AP-S International
Gakkai Ronbunshi) Symposium (Digest)
[7] Takada J-i et al. A reflection [15] Davis PW, Bialkowski ME. Linearly
cancelling slot set in a linearly polarized polarized radial-line slot-array antennas
radial line slot antenna. IEEE with improved return-loss performance.
Transactions on Antennas and IEEE Antennas and Propagation
Propagation. 1992;40:433-438 Magazine. 1999;41:52-61
[8] Ando M et al. Single-layered radial [16] Davis PW, Bialkowski ME.
line slot antenna for DBS reception. In: Performance of a linearly polarized
Conference Proceedings—European RLSA antenna for different beam squint
Microwave Conference; 1990. angles. In: Asia-Pacific Microwave
pp.1541-1546 Conference Proceedings (APMC); 1997.
pp. 653-656
[9] Ando M et al. A slot design for
uniform aperture field distribution in [17] Davis PW, Bialkowski ME. Beam
single-layered radial line slot antennas. synthesis in linearly polarized radial line
IEEE Antennas and Propagation Society. slot array antennas. IEEE Antennas and
200
Radial Line Slot Array (RLSA) Antennas
DOI: http://dx.doi.org/10.5772/intechopen.87164
[18] Tong KF et al. Broadband [26] Tharek AR, Ayu IKF. Theoretical
characteristic of an offset aperture- investigations of linearly polarized
coupled dual circular disk microstrip radial line slot array (RLSA) antenna for
antenna. Electronics Letters. 1994;30: wireless LAN indoor application at 5.5
1728-1729 GHz. In: Proceedings of the
Mediterranean Electrotechnical
[19] Mowlér M, Lindmark B. A matching Conference—MELECON; 2002.
slot pair for a circularly-polarized pp. 364-367
slotted waveguide array. Proceeding in
2006 First European Conference on [27] Bialkowski KS, Zagriatski S.
Antennas and Propagation; 2006.1 Investigations into a dual band 2.4/
5.2 GHz antenna for WLAN
[20] Haridas N et al. Reconfigurable applications. In: 15th International
MEMS antennas. In: Proceedings of the Conference on Microwaves, Radar and
NASA/ESA Conference on Adaptive Wireless Communications (MIKON-
Hardware and System; 2008. 2004); 2004. pp. 660-663
pp. 147-154
[28] Bialkowski KS, Zagriatski S. A dual
[21] Hirokawa J et al. Matching slot pair band 2.4/5.2 GHz antenna including a
for a circularly-polarized slotted radial line slot array and a patch. IEEE
waveguide array. IEEE Proceedings H: Antennas and Propagation Society.
Microwaves, Antennas and Propagation. 2004;3:3095-3098. AP-S International
1990;137:367-371 Symposium (Digest)
[22] Hirokawa J et al. A matching slot 21 [29] Imran MI, Tharek AR. Radial line
pair for a circularly-polarized slotted 22 slot antenna development for outdoor
waveguide array. Proceeding in point to point application at 5.8 GHz
International Symposium on Antennas band. In: 2004 RF and Microwave
and Propagation Society, Merging Conference, RFM 2004—Proceedings;
Technologies for the 90’s. 1990;1. pp. 2004. pp. 103-105
926-929
[30] Imran MI et al. An optimization of
[23] Akiyama A et al. Numerical beam squinted radial line slot array
optimization of slot parameters for a antenna design at 5.8 GHz. In: 2008
concentric array radial line slot antenna. IEEE International RF and Microwave
IEEE Proceedings: Microwaves, Conference (RFM 2008); Sabah; 2008.
Antennas and Propagation. 1998;145: pp. 139-142
141-145
[31] Imran MI et al. Beam squinted radial
[24] Akiyama A et al. Design of radial line slot array antenna (RLSA) design
line slot antennas for millimeter wave for point-to-point WLAN application.
wireless LAN. IEEE Antennas and In: 2007 Asia-Pacific Conference on
Propagation Society. 1997;4:2516-2519. Applied Electromagnetics Proceedings
AP-S International Symposium (Digest) (APACE-2007); 2007
[25] Zagriatski S, Bialkowski ME. [32] Islam MRU, Rahman TA. Novel and
Circularly polarized radial line slot array simple design of multi layer radial line
antenna for wireless LAN access point. slot array (RLSA) antenna using FR-4
In: 15th International Conference on Substrate. In: 2008 Asia-Pacific
Microwaves, Radar and Wireless Symposium on Electromagnetic
201
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
[33] Islam MRU et al. Simple integrated [40] Bialkowski ME, Davis PW.
system for wireless backhaul networks. Predicting the radiation pattern of a
In: Proceedings of the International radial line slot array antenna. In:
Conference on Computer and Asia-Pacific Microwave Conference
Communication Engineering 2008 Proceedings (APMC); 1999. pp. 162-165
(ICCCE08): Global Links for Human
Development; 2008. pp. 341-345 [41] Bialkowski ME, Davis PW. Design
and development of a radial line slot
[34] Purnamirza T, Tharek AR, array antenna of arbitrary polarization.
Jamaluddin MH. The extreme In: Asia-Pacific Microwave Conference
beamsquint technique to minimize the Proceedings (APMC); 2000. p. 2
reflection coefficient of very small
aperture-radial line slot array [42] Bialkowski ME, Davis PW. Linearly
antenna. Journal on Electromagnetic polarized radial-line slot-array antenna
Wave and Application. 2012;26: with a broadened beam. Microwave and
2267-2276 Optical Technology Letters. 2000;27:
98-101
[35] Purnamirza T, Kristanto D, Ibrahim
IM. A design of compact radial line slot [43] Davis PW. A linearly polarised
array (RLSA) antennas for Wi-Fi radial line slot array antenna for direct
market needs. Progress in broadcast satellite services [thesis].
Electromagnetics Research Letter. 2016; Queensland: University of Queensland;
64:21-28 2000
202
Chapter 11
Abstract
The production of energy from water represents large amounts of clean and
renewable energy. However, only 30% of this energy has been developed so far.
Hydropower, particularly hydropower plants, is not only environmentally friendly
but also economical, and operates more efficiently than any other renewable energy
system. Hydropower plants are largely automated and have relatively low operating
costs. The main components of the power system must be continuously monitored
and protected to maintain the quality and reliability of the power source. This task
is provided by the data collection, monitoring and protection system. Turbines
must be protected not only by short circuits but also by abnormal conditions.
The proposed protection has been designed to avoid damaging the original power
(motor or turbine), this usually happens when the generator fails, and the machine
operates as a synchronous motor connected to the power system. In this case, the
generator becomes an active load, causing a rise in temperature and severe damage
to the main turbine, and hence it becomes a need to quickly detect these conditions.
This study proposes a new controller for Neuro-Fuzzy to prevent reverse power
flow and to keep the quality and reliability of supply. Fuzzy system network has
attracted various scientific and engineering researchers. The new feature of this
work is to adjust the membership function as a reverse mechanism derived of the
Fuzzy Logic Controller. The smart meter network is the basis of the smart grid. In
this study, smart grid meters were implemented using ZigBee technology based
on wireless sensor networks. The ZigBee network of wireless sensors due to its low
battery, low power consumption, become more useful than other wireless com-
munication systems to provide a high-performance measurement. This study shows
the ZigBee network using the OPNET simulation. Depending on the performance,
parameters were analysed to understand the operating characteristics of the star,
tree, and mesh.
Keywords: smart grids, ZigBee IEEE 802.15.4, neuro-fuzzy network, directional relay
1. Summary
203
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
evaluated and synthesized [1–3]. The proposed study could provide a theoretical
basis for confirming the need for investigative questions, proving that research
methods have increased accumulated knowledge. Besides, high-quality reviews
have made researchers look for a lot of literature when conducting empirical
research.
In addition, high-quality reviews have made researchers look for a lot of
literature when conducting empirical research. To conclude, our main objective
in this chapter is to develop solutions to improve the spread of distributed energy
and with high-speed synchronisation communication, that is central to the
continuous development of the smart grid field. We hope that ours. This chapter
will serve as a valuable source for those conducting, evaluating or engineers in
this important and growing domain. The future distribution network may include
a large-scale distributed power generation penetration into the smart grid. This
scenario is aimed at the transition from a passive distribution network to an active
distribution. The integration of DG units has a significant impact on the operation
of power flow, voltage distribution, and protection systems in the distribution
network [1]. (1) Explore issues that drive the demands of future rapid Intelligent
protection systems, (2) design and develop a protection strategy that can be
applied to any grid equipped DG. The concept of innovative protection must
ensure the selectivity of protection in case of failure, (3) apply the new concept of
intelligent protection algorithm.
As a result, the performance of the existing distribution network’s traditional
inverse-time protection system was evaluated. In this way, we have identified
the problems faced by the current applicable protection strategies; the results
of the simulation prove that the traditional protection system is insufficient to
provide a satisfactory level of protection selectivity. This chapter introduces
the transformation of the traditional protection strategy to the future intel-
ligent distribution network protection system. This shows how unprecedented
advances in sensor technology and the emergence of new communication proto-
cols have stimulated innovation in protection systems. The latest technological
advances have enabled existing protection systems based on local information
to be transferred to innovative security systems, In Addition; the details of the
new communication mechanism for the application of high-speed protection
systems were discussed. Clever’s protection strategies are fast, flexible and offer
a high level of selectivity protection.
This chapter designs and develops a new concept of intelligent protection
strategy. This approach applies to any network administered by DG. The proposed
intelligent protection system aims to reduce the time to eliminate failures, to
ensure the selectivity of protection and to enhance the availability of the units of
the DG throughout faults. The new scheme of realising a protection scheme using
advanced sensor, neural fuzzy scheme and ZigBee network is expounded. The
intelligent algorithm ensures the selectivity of the protection by minimising the
time of failure and eliminating the problem of the large time disconnection in
the system [1].
2. Introduction
The smart grid (SG) is the next generation of power grids. Its purpose is to over-
come the problems that exist in the conventional power grid. Smart grid technology
has been used, such as sensors and communication networks, and advanced soft-
ware and sensors to provide control and enhance the protection and optimisation
of all network components, including production, transmission, and distribution.
204
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Although neural networks implement to solve tuning problems, the fuzzy logic
controller is intended to use structured knowledge in the form of rules [4, 5].
The combination of Fuzzy Logic and neural networks provides the ability to solve
optimisation problems. This new method consolidates the established advantages of
both approaches and avoids the limitations of both approaches. Control algorithms
are used to prevent unexpected fluctuations in voltage and frequency. Smart grids
use energy storage systems and communication networks to ensure total coordi-
nation between power generation and energy use. Reduce the energy loss of the
network to minimise demand and energy costs [6–8]. A reliable, real-time informa-
tion flow among parts of the network is critical to the success of the smart grid
self-regulation process. There are many wireless standards for technical applications
[9]. One of the most popular technologies is ZigBee wireless sensor network (WSN),
which is distributed on the smart grid structure, which has a lot of equipment to
communicate with each other through the wireless network. These electronic devices
are called Sensors/Detectors/Transducers [9]. Sensors are devices that can recognise
several of the physical units, such as current, voltage, impedance, etc. Also, the
ZigBee system is featured by low energy consumption. It is also more economical
than other communications because it provides flexibility and scalability [10–12].
The construction of this chapter is as follows: Section 2 confers a study of the SG
communication system. The proposed protection system and results are analysed
in Section 3; Section 4 the wireless sensor network using OPNET and simulation
results; In Section 5, the conclusions are discussed.
Figure 1.
Communication network architecture [14].
205
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 1 shows the smart grid communication architecture, including the neigh-
bourhood network (NANs), home LAN (HANs), wide area network (WANs), substa-
tion and data centre. These networks as follows will be displayed briefly [14–16].
It serves as backbones that help the power grid that provides communication
between utility systems and substation systems. The can help prevent power
outages by providing real-time information from the electricity grid. It supports
real-time control and protection. This system is useful when dealing with unfore-
seen contingencies, and it is essential to avoid interruptions and failures [17–20].
This application helps in performing a generator process and provides support for
large power systems. The main disadvantage of this kind of WLAN is the possibility
of devices interfering at the same frequency is high. The network operates between
2.4 and 3.5 GHz. Among its advantages are low-cost equipment, the use of which
has spread across a wide range of applications.
Some technologies introduced in the Home Network System are ZigBee, WLAN
with PLC. The construction of a Building Area Network (BAN) is considered to be
more complicated than the Home Area Networks (HAN). The HAN can be classi-
fied as a part of the customer network structure; HAN is often used by consum-
ers in the housing and business sectors, using power tools to communicate [21].
It is a combination of connected devices, management software and dedicated
LAN. HAN supports communication between smart meters and appliances used
in homes, industries or buildings. It supports several other services, including
Demand Response, pre-payment, real-time pricing and load control. The essential
of the HAN communication system is to include low-cost, low power consumption
with secure communication [6, 10, 22].
NAN is best described as a bridge between WAN and HAN and used in a NAN to
collect data of points adjacent with the help of intelligent electronic devices (IEDs),
which are widely deployed in the whole area. It is a two-way communication tech-
nology developed that give information about the control system for smart grids.
Compared to WAN, the data rate is not high, and the transmission power is low for
short-range transmission. WLAN, PLC and ZigBee are some of the techniques on
which the NAN network can be implemented [23].
In some cases, the generator starts to behave like a motor when the prime
mover does not provide enough torque to keep the generator rotor rotating at the
same frequency as the line of the parallel power source, and instead of giving
power; it draws power from the parallel power source. Also, if the synchronisa-
tion ranges process rotates slowly, also both the loss of the alternator excitation.
The governor is the fault of the original sender. Similarly, the generator will
also extract the current from the source line [24]. When the rotating part of the
generator fails, the generator stops generating electricity and starts drawing elec-
tricity from the parallel power source [25]. This situation may damage the drive
206
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
unit and is not desirable. It should be detected as soon as a possible problem, and
quickly disconnect the equipment from the parallel power supply, thereby pro-
tecting the generator from damage. In exceptional turbine cases, the power supply
direction is changed from line to generator. It usually uses a directional protection
relay to monitor the current flow and take appropriate action to prevent all outage
case. The directional protection relay is working when the reverse power exceeds
a certain percentage of the rated power output; it will trip the circuit breaker of
the generator, disconnect the generator from the line under not normal circum-
stances, the relay setting is about 5% of the power generator [26]. The directional
protection relay is located on the generator latch cabinet and is an integral part of
the circuit breaker. The structure of the relay is designed to limit the reverse cur-
rent flow depending on the amount of current and voltage between the two phase
angles. If the line power is inverted, the current through the relay current coil will
be inverted concerning the polarisation voltage and provide directional torque
[27]. This technique compares the relative phase angle between the (current and
voltage), as shown in Figure 2.
Typically, the phase angle is used to define the fault compares to the refer-
ence value. The voltage is usually applied as a reference amount. By comparing
the operating voltage and current phase angle, can be inferred the fault occurs.
Therefore, the fault current can be described with the phase relationship with
the voltage line −90 for the forward fault, 90 for reverse fault. The relay wills
response to the phase angle difference between the two quantities to come out trip
signal [28]. In cases where optimal protection is required, Rogowski coil current
sensors are used as CT and PT to avoid faults in conventional AC Transformers
and must set a certain amount of delay during operation, to prevent power
fluctuations, the transient effect during synchronisation. If the angle between
the current vector and the voltage is Δ, the power flow is −900 < Δ < 900 [29].
Under normal conditions, the voltage overlaps with the current range is more
significant than their non-overlapping interval. However, in the case of reversing
energy flow, this overlap is reduced to a lower level. Figure 3 shows this assembly
and implementation. The low signal of the current and voltage of RC sensors
changes to form a square wave having a value of “±1” and then multiplying these
level signals to produce a positive number in the overlap interval, in the negative
numbers are generated in the non-overlap interval [30].
The integration limit of the scheme is set to zero, therefore the integration of the
load is perpetually <0 under normal conditions. However, in the opposite trend, the
production condition system as a whole tends to decline until the threshold constant
Figure 2.
According to the reverse power relay current with a voltage vector diagram.
207
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 3.
Diagram of implementing a directional component.
Figure 4.
Modelling of a directional relay component.
is reached. In this situation, the constant is set to 0.01 and the select value based on
the amount of reverse power [23]. The output of the reverse power relay (RPR) is
transferred to a decision where the production is one for normal operation, zero for
abnormal conditions, as displayed in Figure 4.
Figure 5(a) presents the 3ø current directions, cos ø, and power factor, and
Figure 5(b) the same ideas of the P and Q expansion.
208
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Figure 5.
(a) Quadrants of current/voltage. (b) Quadrants of a power.
Figure 6.
Control method using adaptive neuro-fuzzy.
variables, also known as fuzzification. The value of these rules certainly output.
Then use defuzzification to convert the output to a precise value. For simplicity,
we used a modified centre of area method, and the Triangle fuzzy set will be used
for input and output.
The linguistic form of the control rules is the basis of the designed fuzzy unit. It
depends on the accuracy of the choice of parameters, which is the translation of the
linguistic rules of the fuzzy set theory. The neural network (NN) is used to improve
the selection of these parameters. In this scenario, the neural network is combined
with the fuzzy logic unit. As shown in Figure 6, it uses the first fuzzy logic rule
and then uses the neural network to generate the automatic adjustment output.
References input [in (1)] related to the existing input [in (2)], product e(t), and
incremental changes Δe(t) [31, 32]:
The proposed unit has two input factor gain measures of control, Ge and
GΔe, and one scaling gain GΔu. The output-input scale factors are expressed as
follows:
209
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
In the same eN and ΔeN scaling factor system to identify the fuzzy logic con-
troller input signal product [33, 34]. Fuzzy logic controller output signal is ΔuN,
it is the scale factor input. The neural network has two inputs, e(t) and Δe(t), and
the neural network signal output α, which is used to fine-tune the product control
of the operator. The output signal of the scale factor can be expressed by the
formula:
The results are displayed in Figure 7, which illustrates the specified fuzzy rules.
We have selected fuzzy set and membership functions, Table 1 summarizes the
development of the rules used in this study [1].
Forming a neural network composed of three layers (two input layers, three hid-
den layers and one output layer). Neural network input (NN) is including the same
number of output of fuzzy logic. The activated function has a value from −1 to +1
for the output signal, as shown in Figure 8 [35–37].
Figure 7.
Fuzzy logic membership functions.
210
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Table 1.
Rules of FL.
Figure 8.
The description of the neural network compositions.
−x
1−e
f(x) = _____ (6)
−x
1+e
1
h(x) = _____ (7)
−x
1+e
Control Unit based on the measured output signal u(t) from neuro-fuzzy circuit
to adjust the trip circuit:
211
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
As shown in Figure 9, the simulation design uses 200 MVA /11 kV, with a
synchronous generator connected to a transmission line 25 kV through an 11/25
transformer, 60 Hz, Load10 MW, and 3 Mvar. Relays are tested in a variety of situa-
tions. The conditions and results of the discussion are as follows.
Figure 9.
Model of a reverse power relay in an electrical power system.
Figure 10.
(a) Performance of input-output power; and (b) relay status.
212
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Figure 11.
(a) Performance of the input-output power; and (b) relay status.
The structure of propose protection is shown in Figure 4. The nodes of in_1 and
in_2 represent the input variables and pass their values to the blocks that contain
the respective membership functions in Neuro-Fuzzy controller. The relays are
tested under a variety of conditions. We have provided the details of the system in
Table A1 [1].
In this case, the mechanical power input of the generator within 1–2 seconds
differs from 0.6 to 0.7 pu, at the under normal circumstances the observed state is
shown in Figure 10, and the relay does not trip.
In this case, the mechanical power input in 2–3 seconds from 0.7 to −0.1 pu.
Relay responds to this change after 0.15 second for safe, and the relay is triggered,
where the fault occurred at 2 seconds as shown in Figure 11. Input Mechanical
Power (pu).
The reverse current adjustment knob and the delay time are shown in Table A2
of the Appendix, and then the trip is confirmed with the minimum reverse current
in the range of 2–20%. The trip time delay setting range is 0–20 seconds.
213
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
The OPNET modeller is one of the most important simulation tools for com-
munication network inspection. ZigBee networks are known for their low power
consumption, low cost, low data rate, and high battery life.
The current work as shown in Figure 12, consists of the workstation featur-
ing a coordinated connection to six routers, with eight nodes installed at a range
(200 meters) from each other. To participate in the calculation of system variables,
the OPNET collected a large number of variables. The indicators relate to two types
of statistical data for the agreement: local and global statistics. However, in terms
of network performance, this study is more occupied in collecting quantitative
information for the system. As a result, current research is based on data obtained
from global statistics [1].
The values of the design parameters are shown in Figure 13, and the values of
the parameters on the router are shown in Figure 14. Transmission power is esti-
mated to be 0.1 w.
The ZigBee coordinator parameter is illustrated in Figure 15.
The simulation results are simulated under different topologies of the wireless sen-
sor network, and the effects of different topologies on network efficiency are discussed.
Figure 12.
Basic scenario consisting of one coordinator, (6) routers and (8) end devices.
214
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Figure 13.
End-device parameters.
Figure 14.
Router parameters.
215
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
Figure 15.
ZigBee coordinator parameter.
Figure 16.
Throughput case.
5.2.1 Throughput
Defined as the average number of bits or packets that are successfully transferred
from source to destination. The steady-state results for the star, mesh and tree topol-
ogy are 0.041, 0.034, and 0.028 Mbit/s, In the star topology, can achieve maximum
throughput, this finding is that the star topology interacts with the personal area
network (PAN) coordinator, (Figure 16).
216
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
As shown in Figure 17, and finding indicates that the maximum data traffic is in
a star topology because this topology type allows communication with the coordina-
tor. The data traffic sent was 0.1465, 0.0385, and 0.0325 Mbit/s, for a star, mesh and
tree topology [1].
Data traffic is defined as the number of data bits received per unit of time.
Figure 18 shows that the received data traffic for (star, mesh, and tree) topology is
0.650, 0.650, and 0.3805 Mbit/s.
This discovery means that the traffic received in the star topology is the largest
because all devices communicate via the PAN coordinator and are responsible for
generating traffic and routing [1].
Figure 17.
The total number of data bits transmitted.
Figure 18.
Data traffic received.
217
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
It is the time it takes for a home target application to get the package generated
by the source application. The results show the mesh/tree, and star topology delays
are 9.6 and 7.9 ms. And the delay time of the mesh/tree topology is longer than
that of the star topology, as shown in Figure 19. In a star topology, only one parent
object is represented by a ZigBee coordinator. Therefore, the final mobility of the
device may cause some delay.
As shown in Figure 20, MACload is used for forwarding the load for each PAN
in the transmission of packets in the IEEE 802.15.4 MAC, that is, the physical layer,
in the upper layers. The performance of the MACload presents similar results to the
throughput performance. In other words, this result confirms the conclusion that
Figure 19.
Data arrival rate against delay.
Figure 20.
Simulation scenario against a MAC load.
218
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Definition Value
Number of routers 6
Number of coordinators 1
Table 2.
Summary of the simulation parameters.
the faster the load transfer to the upper layers from the physical level is, the more
efficient the network. As shown in Table 2 the local routing information covers
only a small area (the diameter of the test distance is about 250 meters) [1].
6. Conclusions
The difference between the ZigBee and the WiMAX mobile networks is the
distinction in their technology standard. The WiMAX mobile networks used in the
simulation employ the IEEE 802.16 standard technology, whereas ZigBee follows
the 802.15.4 standard. Mobile WiMAX seems to have better functionality than
ZigBee, but taking into account the scalability of the latter, the former can install
additional ZigBee devices because of its low-cost features and the possibility of
reducing the battery size and operation hours. However, ZigBee may be more effec-
tive in certain areas because if its low energy consumption rate. The advantages of
proposed protection are as follows:
(1) To prevent the flow in the opposite direction, and damage to the generator
or the main engine. (2) To avoid the occurrence of explosion or fire, this is mostly
caused by unburned fuel in the generator.
The existing power system is undergoing significant changes. Smart grid
technology is the method used in the future power system framework, the integra-
tion of energy and communications infrastructure is inevitable. Intelligent network
technology is characterised by the realisation of a complete dual communications
infrastructure, automatic measurement, renewable energy integration, distribution
automation and network monitoring. Wireless network to achieve the collection
and transmission of real-time data. With flexibility in a wireless sensor network,
high detection accuracy, low cost and excellent performance. Therefore, it can be
used to develop interesting remote sensing applications. Implementation of sen-
sor networks must meet the flexibility, scalability, cost, equipment, changes in
the topology of the environment and energy consumption and other factors and
limitations. Wireless sensor network has the flexibility, with high precision sensing,
low cost and other excellent characteristics. Therefore, the sensor network must
meet the flexibility, scalability, cost, environmental topology changes and energy
consumption and other factors. The performance analysis of the topology of the
ZigBee wireless network was carried out by using OPNET 14.5 simulators. The
network topology of the star, tree and mesh is compared according to the end-to-
end delay, throughput, Mac traffic load, and the four parameters of the transmit
and receive traffic parameters. In terms of star topology throughput, the MacLoad
is higher than the resulting value of the mesh topology, so the use of star topology
is considered to be very important. The network types of the star, tree, and grid are
219
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
compared according to the end-to-end delay, throughput, MAC traffic load, and the
four parameters of the transmit and receive traffic parameters. The star topology
is the best in terms of performance and has a MAC load that is similar to the mesh
topology. Since the ZigBee network has a large number of nodes, so the use of star
topology is considered to be very important.
Acknowledgements
The author would wish to thank the editors and critics for their constructive
comments and suggestions. The project was supported by the BETC/Southern
Technical University.
Author contributions
I would like to thank Ms. Janan Abd-Ali and Dr. Shaorong Wang for overseeing
my studies. Thank you very much, Dear Ms. Sandra Maljavac, and all the staff who
have cooperated with you, and I wish you all the best.
A. Appendix
Table A1.
Technical data for reverse power monitoring.
Frequency 60 Hz
Table A2.
Microgrid simulator parameters [1].
220
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
Author details
© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms
of the Creative Commons Attribution License (http://creativecommons.org/licenses/
by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
221
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
References
[1] Abdulwahid AH, Wang S. A novel ZigBee network of devices and sensors
method of protection to prevent on embedded internet technology.
reverse power flow base on neuro- In: 14th International Conference on
fuzzy network for smart grid. MDPI, Information Technology; 2015. pp. 200-
Sustainability. 2018;10:1059. DOI: 205. DOI: 10.1109/ICIT.2015.37
10.3390/su10041059
[9] Kaleem Z, Ahmad I, Lee C. Smart
[2] Abdulwahid A, Wang S. Application and energy efficient led street light
of differential protection technique control system using ZigBee network.
of domestic solar photovoltaic In: 12th International Conference on
based microgrid. International Frontiers of Information Technology;
Journal of Control and Automation. 2014. pp. 361-365. DOI: 10.1109/
2016;9:371-386 FIT.2014.74
[3] Khan MS, Woo M, et al. Smart city [10] Qin H, Zhang W. ZigBee-assisted
and smart tourism: A case of Dubai. power saving for more efficient
Sustainability. 2017;9(12):2279. DOI: and sustainable ad hoc networks.
10.3390/su9122279 IEEE Transactions on Wireless
Communications. 2013;12(12):6180-
[4] Baronti P, Pillai P, Chook VSC, 6193. DOI: 10.1109/TW.
Gotta SA, Hu YF. Wireless sensor 2013.110813.130035
networks: A survey on the state of
the art and the 802.15.4 and ZigBee [11] Leccese F, Leonowicz Z. Intelligent
standards. Computer Communications. wireless street lighting system.
2007;30:1655-1695 In: 11th International Conference
on Environment and Electrical
[5] Akram U, Khalid M, Shafiq S. Engineering; 2012. pp. 958-961. DOI:
Optimal sizing of a wind/solar/battery 10.1109/EEEIC.2012.6221515
hybrid grid-connected microgrid
system. IET Renewable Power [12] Chen K-L, Chen Y-R, Tsai Y-P,
Generation. 2018;12(1):72-80 Chen N. A novel wireless
multifunctional electronic current
[6] Leccese F. Remote-control system transformer based on ZigBee-based
of high efficiency and intelligent street communication. IEEE Transactions on
lighting using a ZigBee network of Smart Grid. 2017;8(4):1888-1897
devices and sensors. IEEE Transactions
on Power Delivery. 2013;28(1):21-28. [13] Berger LT, Schwager A, Escudero-
DOI: 10.1109/TPWRD.2012.2212215. Garzás JJ. Power line communications
ISSN: 0885-8977 for smart grid applications. Journal of
Electrical and Computer Engineering.
[7] Cagnetti M, Leccese F, Proietti A. 2013;2013:1-16
Energy saving project for heating
system with ZigBee wireless control [14] Kumar S, Bhattacharyya B, Gupta VK.
network. In: 11th International Present and future energy scenario
Conference on Environment and in India. Journal of The Institution of
Electrical Engineering; 2012. pp. 580- Engineers (India). 2014;95(3):247-254
585. DOI: 10.1109/EEEIC.2012.6221443
[15] Maw HA, Xiao H, Christianson B.
[8] Mishra BC, Panda AS, Rout NK. A A survey of access control models
novel efficient design of intelligent in wireless sensor networks. Journal
street lighting monitoring system using of Sensor and Actuator Networks.
222
New High-Speed Directional Relay Based on Wireless Sensor Network for Smart Grid Protection
DOI: http://dx.doi.org/10.5772/intechopen.85891
[22] Shi JF, Chen M, Yang Z. Power [29] Aman MM, Jasmon GB, and Khan QA,
control and performance analysis et al. Modeling and simulation of reverse
for full-duplex relay-assisted D2D power relay for generator protection. In:
communication underlaying fifth- Power Engineering and Optimization
generation cellular networks. IET Conference (PEDCO) Melaka, Malaysia,
Communications. 2017;11(18):2729-2734 IEEE International. 2012. pp. 317-322
223
Telecommunication Systems – Principles and Applications of Wireless-Optical Technologies
224
Edited by Isiaka A. Alimi,
Paulo P. Monteiro and António L. Teixeira
This book is based on both industrial and academic research efforts in which a
number of recent advancements and rare insights into telecommunication systems
are well presented. The volume is organized into four parts: “Telecommunication
Protocol, Optimization, and Security Frameworks”, “Next-Generation Optical Access
Technologies”, “Convergence of Wireless-Optical Networks” and “Advanced Relay and
Antenna Systems for Smart Networks.” Chapters within these parts are self-contained
and cross-referenced to facilitate further study.
ISBN 978-1-83962-597-8
978-1-78984-293-7
Published in London, UK
© 2019 IntechOpen
© TheDigitalArtist / pixabay