performance analysis of ocdma pon con guration … author's copy.pdfand advanced...
TRANSCRIPT
Performance Analysis of OCDMA PON Configuration
Supporting Multi-Rate Bursty Traffic
with Retrials and QoS Differentiation
John S. Vardakasa, Ioannis D. Moscholiosb,∗, Michael D. Logothetisc,Vassilios G. Stylianakisc
aIquadrat, 08009, Barcelona, SpainbDept. of Informatics & Telecommunications, University of Peloponnese,
221 00, Tripolis, GreececWCL, Dept. of Electrical & Computer Engineering, University of Patras,
265 04 Patras, Greece
Abstract
An Optical Code Division Multiple Access (OCDMA) Passive Optical Net-
work (PON) is a highly promising PON configuration, thanks to the potential
of OCDMA technology in eliminating channel contention and efficiently sup-
porting multi-rate traffic with different QoS requirements. In this paper,
we provide a mathematical framework for a call-level performance analysis
of an OCDMA PON that accommodates multiple service-classes of bursty
traffic with retries. Blocked calls of random arrivals may immediately retry
several times, by requesting less resources (number of codewords) each time,
in order to be admitted for service. The bursty nature of traffic is denoted
by the fact that in-service calls may alternate between transmission and no-
transmission periods. Our analysis takes into account user activity and the
various components of additive noise. An approximate recursive formula is
∗Corresponding author:[email protected] Tel.:+30-2710-372283; Fax:+30-2710-372160
Preprint submitted to Optical Switching and Networking November 11, 2015
derived for the efficient calculation of call-level performance measures. The
proposed analytical model is further extended to assess the performance of
an OCDMA PON that provides QoS differentiation, through the utilization
of multiple-weight optical codes. Both proposed models are verified through
simulation and found to be absolutely satisfactory. Moreover, comparison
of the new models with a model without retries, shows the necessity and
effectiveness of the new models.
Keywords: passive optical networks, optical code division multiple access,
bursty traffic, retrials, quality of service.
1. Introduction
The high volume of diversified data traffic resulted from the emergence of
IP-based multimedia applications, such as IPTV, VoIP and video conferenc-
ing, require access networks that can support in an efficient way multi-rate
applications with different QoS requirements. To this end, the Ethernet PON
(EPON) has been widely spread, mainly due to its ability to provide econom-
ically 1 Gb/s or 10 Gb/s to a number of end users, covering a distance of
about 20 Km [1], [2]. However, future optical access networks will require
to provide “symmetric gigabit-bandwidth”, which is very difficult to be im-
plemented by adapting an EPON solution [3]. To increase the longer-term
PONs’ performance, at 40 Gb/s Wavelength Division Multiplexing (WDM)
PON systems have been proposed [4], but these schemes have wavelength al-
location problems when they co-exist with 1 Gb/s and 10 Gb/s–based PON
systems [5]. A promising access network is the emerged OCDMA PON that
provides high-speed symmetric traffic in a simple and cost-effective manner
2
and advanced characteristics in supporting multiple service-classes [6], [7].
The OCDMA principle is based on the differentiation of each communica-
tion channel by a codeword that is assigned to each user. A codeword is a set
of (0,1) sequences, where the total number of 0 and 1 is the code’s length and
the number of 1’s is the code’s weight [8]. Various OCDMA techniques have
been proposed and implemented that consider different codewords’ length
and weight, in order to support various traffic types with highly variable
performance targets. The OCDMA PON can be considered as a viable net-
work configuration in supporting multiple service-classes with QoS differenti-
ation, and it has received much attention recently [9]. In multi-rate networks,
OCDMA can flexibly support arbitrary data rates and QoS; more precisely,
OCDMA can provide reduced packet latency and packet collisions compared
to EPON approaches, while higher channel utilization is achieved, which is
beneficial especially for bursty traffic [10].
Multi-rate service-classes can be offered in an OCDMA network through
the utilization of multi-length codes [11], the optical fast-frequency technique
[12], the time hopping technique [13], or the parallel mapping (PM) technique
[14]. In multi-length coding methods, different code lengths are assigned to
calls, to achieve different data rates; however, short-length codes introduce
greater interference to long-length codes. In order to increase the code car-
dinality, a two dimensional (2-D) wavelength-time coding technique can be
applied to these methods, where wavelength changes at every pulse of a
time-spreading code sequence [15]. The optical fast-frequency technique uses
variable attenuators to provide data-rate differentiation, but this technique
requires expensive, multi-wavelength transceivers with high sensitivity on
3
power control. Under the time hopping technique, data-rate differentiation
is achieved by utilizing intermittent transmission, in order to accommodate
various data rate signals using only one sequence. However, the changing
time-hopping rate is implemented based on an optical selector device, which
consists of a number of optical hard limiters [16]. In the PM technique, a
number of optical codes proportional to the data rate of each service-class is
assigned to each call. For the provision of QoS differentiation, one- or two-
dimensional multi-weight codes are considered, in order to achieve different
Bit Error Rate (BER) levels [17], [18]. The combination of multi-length and
multi-weight coding may be used for the provision of multi-rate and QoS-
differentiated OCDMA system. Multi-length, variable length, optical orthog-
onal codes are used in [19] for the support of two service-classes. Specifically,
different code lengths are used for the support of different data rates, while
high-weight users transmit at a lower power and low-weight users transmit
at higher power. Different power levels are also considered in [20] and [21],
in order to provide QoS differentiation for two service-classes.
A number of research efforts appear in the literature for the performance
assessment of OCDMA networks that are based on analytical models. Sig-
nificant work has been carried out for the packet-level analysis of OCDMA
networks (e.g., [22]-[26]), where main performance metrics are the network
throughput and the packet delay. In [22], an analytical model has been
developed for OCDMA PONs that estimates the data throughput of binomi-
ally distributed traffic at the packet-level, while considering the multi-user
interference and code contention in the upstream direction. Furthermore,
in [23]-[26] various access protocols have been proposed for OCDMA net-
4
works; in [23] two different protocols are proposed, which are differentiated
by the “pretransmission” coordination requirement, while this work is ex-
tended in [24], in order to consider multi-packet messages and the connection
establishment effect. The proposed protocol of [24] is called Round Robin
Receiver/Transmitter (R3T ) protocol and has been also studied in [25], in
order to include different noise sources in the protocol analysis. In the con-
tinuance of the above research work, in [26] an OCDMA Medium Access
Control (MAC) protocol is proposed that considers variable size window in
the link layer, in order to support the variable length data transmission. On
the other hand, only a few analytical models have been developed for the call-
level analysis of OCDMA networks, where the main performance metrics are
the blocking probabilities. For Call Blocking Probability (CBP) and teletraf-
fic capacity computation in OCDMA networks, analytical models appear in
[27]-[29], but only a single service-class is considered. Analytical models for
the CBP calculation of multiple-service-classes are proposed in [30], where
an OCDMA network utilizes variable-weight, multi-length optical codes. In
all these references neither the effect of different sources of additive noise,
nor the user activity, are taken into account. In [31], a call-level performance
analysis is presented for OCDMA PONs that accommodate multiple service-
classes, where in-service calls alternate between active (transmission) and
passive (non-transmission) periods. This work is extended in [32] and [33],
to cover a code reservation mechanism (an equivalent mechanism to trunk
reservation of telephone networks). Another significant extension appears in
[34] to include service-classes of finite traffic source population (quasi-random
arrivals), whereas in [30]-[33] the service-classes are of infinite population
5
(random arrivals).
In this paper, we present an analytical framework for the call-level perfor-
mance analysis of OCDMA PONs that keeps the integrity of our study. The
PONs support multi-rate service-classes of bursty traffic with random arrivals
and retries, as well as QoS differentiation, while we take into account many
parameters of the OCDMA-PON configuration. Blocked calls may immedi-
ately retry, one or more times, to enter the system by reducing their demand
for resources. The “retrial” feature largely differentiates the proposed model
from the model of [33] (and [34]). On the other hand, multi-retries make the
performance analysis more complicated, and result in new and more intricate
formulas, which however are computationally efficient, since they are recur-
sive. Moreover, the feature of multi-retries is an important consideration,
because it is realistic in the environment of contemporary networks, where
most of input traffic is elastic and, therefore, necessitates a deep study (i.e.
comparison between models with and without retries). As far as the data
rate / service-class differentiation is concerned, it is performed by adopting
the PM technique, where a different number of fixed-length codewords is
allocated to each service-class.
We adopt the PM technique instead of other multi-rate techniques, be-
cause it has very good features, as stated in [14]; the proposed analysis,
however, is applicable to multi-length codes, too. A PON uses a pool of
codewords; the maximum number of codewords is defined according to the
desired maximum value of BER. A Poisson (random) arriving call in the
PON is blocked if the required number of codewords exceeds the maximum
number of codewords. This blocking case is expressed by the so called Hard
6
Blocking Probability (HBP). Even if the required number of codewords is
available in the PON, a new call may also be blocked due to the presence
of additive noise, composed of thermal, fiber-link, beat and shot noise. This
soft blocking case is expressed by the so called Local Blocking Probability
(LBP). In both cases, a call may also immediately retry one or more times to
access the system, while requesting a smaller number of codewords each time,
with an increased service-time. In-service calls alternate between active and
passive periods, for which different times are considered. Thus, by taking
into account the user activity in this way, we capture the bursty nature of
traffic.
The proposed analysis extends the basic model of [35] to OCDMA systems
in general, and particularly to OCDMA PONs, where our study is concen-
trated on the uplink, i.e. the bottleneck link from the Optical Network Units
(ONUs) to the Optical Line Terminal (OLT) (Fig. 1). The maximum number
of codewords in the PON resembles the link capacity, while the codewords
in use resemble the link occupancy. We provide an approximate recursive
formula for the efficient calculation of the distribution of the codewords in
use. Based on this formula, we calculate the CBP as a function of both
HBP and LBP that occurs at the last attempt of a call to access the sys-
tem. We also determine the probability that a passive call cannot return to
the active state (Burst Blocking Probability-BBP). Moreover, we extend our
analysis to OCDMA PONs which provide the important feature of QoS dif-
ferentiation through the utilization of variable-weight optical codes. With or
without QoS differentiation, the accuracy of the proposed models is evaluated
(through simulation) absolutely satisfactory, while their comparison with a
7
model without retries ([33]) shows their necessity and effectiveness. Specif-
ically, the comparison shows that when retries are permitted, either with
or without QoS differentiation, considerable traffic saving (CBP) is achieved
(at least 10% in our evaluation examples), which is a significant amount in
high-speed networks. On the other hand the increment of the BBP (delay)
that is observed, it can be controlled so as to remain very low, by reducing
the number of calls in the passive state.
The analytical calculation of blocking probabilities is significantly vital
for network designers, since it is performed in relatively very short CPU-
time, in comparison to the time-consuming simulations, which are typically
performed by using complex and expensive simulation tools. Furthermore,
the proposed models are resourceful tools that could be used by network
designers, in answering questions involving trade-offs between the amount
of resources allocated to a specific service-class and the QoS experienced
by subscribers, as well as to predict the network performance under various
traffic conditions. Specifically, they can be used for the derivation of the
maximum number of supported codewords that achieve blocking probabilities
under a predefined upper limit, while considering the end users’ behavior
(arrival rate of connection requests, service times or user activity).
The rest of this paper is organized as follows: In Section 2, we present the
modeling principles for a multi-rate OCDMA PON without QoS differentia-
tion, and we provide the analysis for the calculation of LBP, distribution of
codewords in use, HBP and CBP. In Section 3, we present the analysis for a
multi-rate OCDMA PON that supports QoS differentiation. The evaluation
appears in section 4. We conclude in Section 5.
8
2. System Model of a Multi-Rate OCDMA PON Without QoS
Differentiation
We consider the OCDMA PON of Fig. 1 with U ONUs, which are con-
nected to the OLT through a Passive Optical Splitter/Combiner (PO-SC).
We study the upstream direction of the PON, while our analysis can be ap-
plied to the downstream direction (from the OLT to the ONUs), too. The
PON utilizes (L,W, la, lc)-codewords, which have the same length L, the same
weight W (number of “1’s”), while the auto-correlation and cross-correlation
parameters, la and lc, respectively, are estimated according to the desired
BER at the receiver. The PON supports K service-classes with service dif-
ferentiation (i.e. data-rate differentiation), but without QoS differentiation.
Data-rate differentiation is performed by using the PM technique, where a
different number of codewords is assigned to each service-class. More pre-
cisely, the data bits of a service-class k call are grouped per bk (k=1, . . . ,
K ) and these bk bits are transmitted in parallel during a data bit duration.
On the other hand, the OLT assigns bk codewords to a service-class k call
for the entire duration of the call. One codeword is used to encode data
bit “1”, while data bit “0” is not encoded. Thus, the call uses a number
of these bk codewords that is equal to the number of “1” that are transmit-
ted in each data bit period; therefore at most bk bits are encoded in each
data bit period (see the lower part of Fig. 1 for an example). In this way,
the complex procedure of assigning codewords in each data bit duration is
avoided by assigning the same bk codewords for the entire duration of the
service-class k call. Since bk data bits are simultaneously transmitted in a
data bit duration, the bit rate of service-class k is bkD, where D is the basic
9
bit rate of a single codeworded call and is a function of the length L of the
codeword. The received power per data bit “1” of a single-codeworded call
is denoted by Iunit, and it is a function of the desired BER at the receiver.
A three-way handshake (Request–ACK–Confirmation) is applied for the
connection establishment between an end-user and the OLT. Let λk denote
the total arrival rate of service-class k calls from all ONUs to the OLT; we
assume that calls arrive/originate at an ONU according to a Poisson process.
Accepted calls in the ONU-OLT link, start an active transmission period and
may remain active for their entire duration, or alternate between active and
passive periods. During an active period a burst of data is sent to the OLT
at a fixed rate, whereas during a passive period no data transmission occurs.
When an active service-class k call becomes passive, it releases the assigned
bk codewords, which then become available to new arriving calls. In order for
a passive call to be transferred to the active state again, the same number
of codewords, as in the previous active state, is re-requested by the call.
If this number of codewords is available, then the call is transferred to the
active state; otherwise burst blocking occurs, that is, the call remains in the
passive state for another passive period. There is a probability ak whereby
a service-class k call moves to passive state at the end of an active period,
and a probability 1− ak whereby the call departs from the system. The call
cannot depart from the system via a passive state. The time-periods that
a service-class k call spends in active and passive states are exponentially
distributed with mean µ−11k and µ−12k , respectively.
A new service-class k call that arrives to an ONU requests bk,0 codewords
and if the available codewords are less than bk,0, the call is blocked. In this
10
case, the call may retry several times, while requesting a smaller number of
codewords each time. The number of retries for service-class k calls is denoted
as Rk. If the call is accepted for service in the r-th (r = 0, 1, . . . , Rk) attempt,
then it uses bk,r codewords; note that bk,0 = bk. At the final attempt the call
is blocked and lost, if the available codewords are less than bk,Rk. Based
on the required codewords of a service-class k call, the received power that
corresponds to the r-th attempt is at most Ik,ract = bk,rIunit, since at most bk,r
bits “1” are transmitted in parallel in each bit period.
2.1. Call Admission Control – Soft Blocking
In an OCDMA system a call should be blocked if, after the call admission,
the total received power in the receiver is above a predefined threshold (soft
blocking). The total received power comprises of the noise from all other
calls, which is the Multiple Access Interference (MAI), and of other forms of
additive noise (thermal, fiber-link, beat and shot noise). Thermal, fiber-link
and beat noise are modeled as Gauss distributions with parameters (0, σth),
(0, σfb) and (0, σb), respectively, while the shot noise is modeled as a Poisson
process (p, p) [36], [37]. By using the central limit theorem we can assume
that the total additive noise follows a Gauss distribution with the following
parameters:
µN = p and σN =√σ2th + σ2
fb + σ2b + p2. (1)
A Call Admission Controller (CAC) located at the OLT decides on the
acceptance or the rejection of an arriving call, based on the total maximum
received power at the OLT. The maximum received power is calculated based
on the worst case scenario that all bk,r data bits transmitted in parallel are
11
“1”, in order to ensure that the BER will never increase above a desired value.
If the total maximum received power together with the power of the new call
exceeds a maximum threshold Imax, the call is blocked. The value of Imax
is determined based on the desired BER at the receiver [38]. The following
relation is checked by the CAC, in order to decide on the acceptance or the
rejection of a call in the r -th attempt:
K∑k=1
(n1kI
k,0actPinterf)+Ik,ract+IN>Imax ⇔ IN
Imax>1−
K∑k=1
(n1kbkIunitImax
Pinterf)− Ik,ract
Imax(2)
where n1k is the number of service-class k calls in the active state, IN is the
interference caused by the total additive noise and Pinterf is the probability
of interference. In order to derive eq. (2), we follow the analysis of [34] and
we assume that all in-service calls are accepted for service with their initial
requirements in codewords. This assumption does not affect the accuracy of
eq. (2) at all, because the summation of eq. (2) finally includes the total
number of codewords in use, which would be the same with the total number
of codewords even if all calls were accepted with their initial requirements
in codewords. As far as the probability of interference is concerned Pinterf ,
it is a function of the maximum cross-correlation parameter lc, the weight
W and the length L of the codewords, and the hit probabilities between two
codewords of different users. Let plc,s denote the hit probabilities of getting s
hits during a bit period out of the maximum cross-correlation value lc; then
they are obtained through [39]:
lc∑s=0
s · plc,s =1
2· W
2
L(3)
where∑lc
s=0 plc,s =1, and the factor 1/2 is due to the fact that data-bit “0” is
not encoded. For lc = 1, the percentage of the total power of another’ s user
12
bit that interferes with a bit of the new call is 1/W, since 1 out of W “1” of
the codewords may interfere. In this case, Pinterf = (1/W ) plc,1 = (1/2)W/L.
However, the same expression for Pinterf holds, even in the general case where
the maximum value of the cross-correlation is lc ≥ 1 [34]:
Pinterf =lc∑s=0
s
Wplc,s =
1
2· WL
(4)
Not only when a new call is accepted but also when a passive call tries
to become active, the OLT will examine the condition of eq. (2). Based on
eq. (2), the probability that a call is blocked in its r -th attempt, due to the
presence of the total additive noise, is expressed by:
Lk,r(n1k) = P
[INImax
>1−K∑k=1
(n1kbkIunitImax
Pinterf
)− Ik,ract
Imax
]⇔
1−Lk,r(n1k)=P
[INImax≤1−
K∑k=1
(n1kbkIunitImax
Pinterf
)− Ik,ract
Imax
] (5)
where n1k indicates the number of in-service active calls in the system.
The LBP is a function of the variable IN/Imax, which follows a Gauss dis-
tribution (µN/Imax, σN/Imax), since the total additive noise follows a Gauss
distribution (µN , σN) [40]. Therefore, the right hand side of eq. (5) is the
Cumulative Distribution Function (CDF) of the variable IN/Imax [40]:
Fn(x) =1
2(1 + erf(
x− µN/Imax
(σN/Imax)√
2)) (6)
The LBP can be calculated as:
Lk,r(x) = Fn(x), where x = 1−∑K
k=1(n1kbkIunitImax
Pinterf)−Iactk,r
Imax.
It should be noted that based on eq. (5), higher values of the mean additive
noise result in higher LBP.
13
2.2. Call Admission Control – Hard Blocking
Let C1 be the total number of the supported codewords which can be as-
signed to active calls. This number is a function of the applied type of code-
words and its maximum value is determined by the so called Johnson bound
[41]. For example, by considering the (L,W, λ) optical orthogonal codes
(with la= lc = λ), the maximum number of codewords is upper bounded by
b1/W b(L− 1)/(W − 1) · · · b(L− λ)/(W − λ)c · · ·cc.
When a call is at the passive state, no codewords are utilized by the call,
in the reality. However, in the proposed model, we assume that this call is
assigned a number of fictitious codewords from a total number of fictitious
codewords C2. This fictitious system is used in order to model the transition
of a call from the active to the passive state, and to define the number of calls
which are present in the passive state. The number of codewords that are
assigned to a passive call equals the number of codewords that are assigned
to this call in the active state. The value of C2 is defined so that it is larger
than or equal to C1. If C1 = C2, then a passive call can always become active
(no burst blocking occurs), while if C1 < C2, there is a probability that a
passive call cannot become active; this probability is called BBP [35], [42].
If an arriving call of service-class k is not blocked due to the additive
noise (soft blocking), the CAC checks the following hard blocking conditions
[35]:
j1 ≤ C1 − bk,r ∧ j1 + j2 ≤ C2 − bk,r (7)
where j1 and j2 are the total number of codewords in the active and passive
state, respectively.
If a new arriving call of service-class k is blocked in its first attempt
14
(r = 0) to enter the system, it may immediately retry r = 1, . . . , Rk times to
connect to the system, with traffic parameters (λk, bk,r, µ−1ik,r), where bk,Rk
<
bk,Rk−1 < ...bk,1 < bk and µ−1ik,Rk> µ−1ik,Rk−1 > ...µ−1ik,1 > µ−1ik,0 = µ−1ik [35].
According to the first condition of eq. (7) a new call is accepted for service, if
at least bk,r codewords out of C1 are available for active calls, while, according
to the second condition of eq. (7), the CAC prevents the acceptance of a
new call, when a large number of calls are in the passive state. If eq. (7)
is not satisfied in (the last) attempt r = Rk, then the call is blocked and
lost; otherwise the call is accepted for service and starts alternating between
active and passive states.
2.3. Distribution of Active and Passive Calls
Let Ω be the set of all permissible states of the active and passive states.
The distribution of the codewords in use ~j = (j1, j2), denoted by q(~j), is
given by the proposed two-dimensional approximate recursive formula:
jsq(~j) =2∑i=1
K∑k=1
bi,k,spik,0(~j)q(~j −Bik)+
2∑i=1
K∑k=1
Rk∑r=1
bi,k,r,spik,r(~j)Di,k,r(~j)q(~j −Bretryi,k )
(8)
for ~j = (j1, j2), j1 = 1, ..., C1, j2 = 1, ..., C2−j1, and
Dik,r(~j)=
1, if ~j : [(C1−(bi,k,r−1,s−bi,k,r,s)<j1≤C1) ∧ (j1+j2≤C2)]
∨ [(C2−(bi,k,r−1,s − bi,k,r,s) < j1 + j2 ≤ C2)]
0, otherwise
The variable bi,k,r,s is defined as [35]:
bi,k,r,s =
bk for r = 0 and s = i
bk,r for r > 0 and s = i
0 for r ≥ 0 and s 6= i
(9)
15
Also, Bi,k = (bi,k,1, bi,k,2) is the i,k row of the (2K×2) matrix B with elements
bi,k,s. Similarly, Bretryi,k = (bi,k,r,1, bi,k,r,2) is the i,k row of the (2K×2) matrix
Bretry with elements bi,k,r.s. Finally, pik,r(~j) is the utilization of state i by
service-class k calls in their r -th attempt:
pik,r(~j) =
λk(1−Lk,r(j1−bk,r))
(1−ak)µ1k,rfor i = 1
λkak(1−ak)µ2k,r
for i = 2(10)
Equation (10) gives the utilization pik,0(~j) of state i by service-class k calls
in their initial attempt, for r=0. It should be noted that if Rk = 0 for all
service-classes, eq. (8) coincides with eq. (10) of [33], i.e. for the case where
calls of all service-classes cannot retry.
The CBP that we examine is the probability that a call is blocked in its
last attempt to access the system. The calculation of the CBP of service-class
k, Pbk,Rk, is based on the combination of LBP and HBP:
Pbk,Rk=
∑~j∈Ω−ΩH
G−1Lk,Rk(~j)q(~j) +
∑~j∈ΩH
G−1q(~j) (11)
where G ≡ G(Ω) is the normalization constant of q(~j) and
ΩH =~j : [b1,k,Rk,1 + j1 > C1] ∧ [b1,k,Rk,1 + j1 + j2 > C2]
.
The first summation of eq. (11) signifies the probability that a call cannot
be accepted due to the presence of the additive noise. The second summation
of eq. (11) refers to the HBP that the available codewords are less than the
requirements of the call at its last attempt to access the system.
The derivation of an analytical formula for the BBP is based on the fact
that burst blocking occurs when a passive call cannot return to the active
state. This situation takes place when: a) the codeword requirements of the
16
call together with the number of assigned codewords to all in-service calls
exceed the total number of the supported codewords, b) the additive noise
causes the total received power to exceed Imax. Since the BBP may occur in
the initial attempt or in any one of the Rk retries, the BBP is given by:
Bbk=
Rk∑r=0
∑~j∈Ω∗
r
y2k,r(~j)q(~j)µ2k,r
Rk∑r=0
∑~j∈Ωr
y2k,r(~j)q(~j)µ2k,r
+
Rk∑r=0
∑~j∈Ω−Ω∗
r
y2k,r(~j)Lk,r(~j)q(~j)µ2k,r
Rk∑r=0
∑~j∈Ωr
y2k,r(~j)q(~j)µ2k,r
(12)
where ~j ∈ Ω∗r ⇔
(C1−Bk,r+1≤j1≤C1) ∧(∑2
s=1 js≤C2
)and ~j ∈ Ωr ⇔
(C1−(bk,r−1−bk,r)≤j1≤C1) ∧(∑2
s=1 js≤C2
).
The average number yik,0(~j) of service-class k calls in state i accepted in the
system in their initial attempt is given by:
yik,0(~j) =pik,0q(~j −Bi,k)
q(~j)(13)
while the average number yik,r(~j) of service-class k calls in state i accepted
in the system in the r -th attempt is given by:
yik,r(~j) =pik,r(~j)Dik,r(~j)q(~j −Bretry
ik )
q(~j)(14)
Note that if Rk = 0 for all service-classes, eq.(12) coincides with eq. (30) of
[33].
3. System Model of a Multi-Rate OCDMA PON With QoS Dif-
ferentiation
QoS differentiation can be achieved by assigning codewords with different
weights. We assume that the PON supports K = T ·S service-classes; where
17
S service-classes are differentiated by the data-rate and each one of these
service-classes supports T different QoS levels, which are defined by different
values of the BER. Therefore, there are S groups of service-classes, and
each group comprises of T service-classes. The application of variable-weight
codewords to an OCDMA system that utilizes the PM technique has been
studied in [43]. In the proposed analysis, we consider the (L, F = Wt, la, 1)
codewords of [43], for t = 1, . . . , T , where L is the temporal code length,
while the weight is equal to the number F of the supported wavelengths.
Calls of these T service-classes require the same number bl,t,r (l = 1, . . . , S)
of codewords in the r -th attempt (in order to have the same data rate).
However, calls of these service-classes are differentiated by the weight Wt of
the codewords that they utilize during their service. The traffic parameters of
service-class t, l are denoted as (λt,l, µ−11,t,l,r, µ
−12,t,l,r, σt,l). The received power
per bit “1” of a single-codeworded call of service-class l of the group t is
denoted as I t,lunit, while the received power that corresponds to a service-class
t, l call in the r -th attempt is at most Iactt,l,r = bt,l,rIt,lunit. In order to use one
notation for the service-classes, we denote that the parameters of service-
class k (k = 1, . . . , T · S) are Ikunit = I t,lunit, Ik,ract = I t,l,ract , bk,r = bl,r, λk = λt,l,
µ−1ik,r = µ−1i,t,l,r and σk = σt,l.
The LBP of service-class k can be calculated by eq. (6) and the following
relation which is based on eq. (5):
Lk,r(n1k)=P
[INImax
>1−T ·S∑x=1
(n1xbxIunitImax
P x,kinterf
)− Ik,ract
Imax
]⇔
1−Lk,r(n1k)=P
[INImax≤1−
T ·S∑x=1
(n1kbxIunitImax
P x,kinterf
)− Ik,ract
Imax
] (15)
where the probability of interference P x,kinterf between two codewords with
18
weights Wx and Wk is a function of the hit probability [10]:
px,k =WxWk
2L(16)
Following the same procedure that was used in order to derive eq. (4), the
probability of interference of a codeword of a service-class k new arriving call
and a codeword of service-class x is:
P k,xinterf =
1
Wx
Wx ·Wk
2L=
1
2
Wk
L(17)
The distribution of active and passive calls for the case of the multi-rate
OCDMA PON with QoS differentiation is given by eq. (8), where the upper
bound of the summations that refers to the total number of service-classes
has to be changed (from K) to T · S. The same change has to be applied in
eq. (11) and eq. (12) in order to calculate the CBP and BBP, respectively.
4. Evaluation and Discussion
In this section we examine the accuracy of the proposed analytical mod-
els through simulation, by providing two application examples: (a) for an
OCDMA PON without QoS differentiation support, and (b) for another
OCDMA PON with QoS differentiation. Besides, in both examples, we reveal
the necessity and the effectiveness of the new models, by comparing them
with a model without retries ([33]), based on the resultant performance on
the OCDMA PONs.
4.1. Results of an OCDMA PON without QoS Differentiation
In the first example we simulate a multi-rate OCDMA PON without QoS
differentiation, by using the Simscript III simulation tool [44]. The PON
19
supports three service-classes and utilizes the (211, 4, 1, 2)-codewords. The
number of codewords cannot exceed the Johnson bound, which is 105 for the
specific type of codewords. Based on the analysis presented in [38], while
considering a typical value of BER=10−6, the total number of codewords is
reduced to C1 = 40 for Iunit = 0.4 µW. The traffic description parameters
are (b1, b2, b3)=(8, 5, 2), (µ−111 , µ−112 , µ
−113 ) = (0.6, 1.0, 1.3), (µ−121 , µ
−122 , µ
−123 ) =
(0.5, 1.9, 1.5), (a1, a2, a3) = (0.9, 0.9, 0.95). Calls from the 1st service-class
can retry twice; the retry parameters are (b1,1, b1,2) = (7, 6), (µ−111,1, µ−111,2) =
(0.8, 0.9), (µ−121,1, µ−121,2) = (0.7, 0.9). Calls from the 2nd and 3rd service-class
can retry once; the retry parameters for the 2nd service-class are b2,1 = 3,
µ−112,1 = 1.2 and µ−122,1 = 2.2, while for the 3rd service-class the retry parameters
are b3,1 = 1, µ−113,1 = 1.5 and µ−123,1 = 1.7. The maximum received power
at each receiver is assumed to be equal to 5 µW, while the total number
of fictitious codewords is C2=46. The total additive noise follows a Gauss
distribution (1, 0.1) µW. Note that according to eq. (4), higher values of the
mean additive noise result in higher local blocking probabilities and therefore
to higher call blocking probabilities.
In Figs. 2, 3 and 4 we present analytical and simulation results for the
CBP of the three service-classes, respectively, versus the call arrival rate.
We consider 9 arrival rate points in the x-axis of Figs. 2, 3 and 4. Point 1
corresponds to (λ1, λ2, λ3)=(0.02, 0.06, 0.06) calls/sec, while in the successive
points the arrival rate of all service-classes is increased by 0.005 calls/sec.
Thus, Point 9 corresponds to (λ1, λ2, λ3) = (0.06, 0.1, 0.1) calls/sec. The
simulation considers the retries, while the error bars in all figures denote
reliability ranges of 95% for the mean values of CBP results. In each figure,
20
we present the corresponding analytical results from the model of [33], i.e.
by considering the same parameters, except of the retry parameter (calls are
not allowed to retry in [33]), in order not only to demonstrate that the retry
consideration reduces the CBP, but also to show that this is a substantial
reduction. The latter reveals the necessity of the proposed model. On the
other hand, we show that this substantial CBP reduction is paid by BBP
degradation, which is controllable, however.
The comparison between analytical and simulation results reveals that
the accuracy of the proposed model is quite satisfactory. Small declinations
between analytical and simulation results reveal the fact that the proposed
recursive formula is an approximate one. The comparison of the analytical
results of our proposed model and the corresponding results of [33] shows
that the CBP is significantly decreased. Specifically, by considering the retry
feature, CBP is decreased on average by 28.7%, 32.3% and 10.1% for the three
service-classes, respectively. The average variation V of the CBP results is
calculated by using the expression:
V =|Xretry −X|
X× 100 % (18)
where Xretry and X are the CBP results from the proposed analysis and [33],
respectively.
However, the retry feature has a negative impact on the BBP. In Figs. 5,
6 and 7 we present analytical and simulation results for the BBP of the three
service-classes, respectively, versus the call arrival rate. We also present the
corresponding BBP results of [33]. The comparison of the results reveals that
the BBP is increased when calls are able to retry; this increase is on average
29.3%, 30.2% and 39.8% for the three service-classes, respectively; these
21
values are obtained by (18). Nevertheless, BBP increase can be addressed
by decreasing the number C2 of the fictitious codewords. More precisely, by
decreasing the value of C2 from 46 to 45, we derive BBP results from the
proposed analysis that are approximately equal to the corresponding results
of [33] (the average declination is lower than 10−3%), while the CBP results
of the proposed analysis are still lower than the results of [33] by 23.7%,
28.1% and 8.6% for the three service-classes, respectively. On the other
hand, the proposed analysis gives approximately the same CBP results with
the analysis of [33] if the value of C2 is decreased from 46 to 43 (the average
declination is lower than 0.2%); in this case the BBP results of the proposed
analysis are in average 46.3%, 59.2% and 54.5% for the three service-classes,
respectively, lower than the corresponding results of [33]. The aforementioned
results prove the superiority of the proposed analysis over the analysis of [33],
in terms of lower CBPs.
We also study the effect of the total number of fictitious codewords C2
to the CBP and BBP, when the total number of codewords of the active
system (C1) is constant. To this end, in Figs. 8 and 9 we present analytical
results of the CBP and BBP, respectively, versus the total number of fictitious
codewords C2. In both figures we assume that the arrival rate of the three
service-classes is kept constant and equal to (0.04, 0.08 and 0.08) calls/sec;
the values of all other parameters remain unchanged. From Figs. 8 and 9 we
observe that the increment of C2 results in lower CBP (Fig. 8), since more
calls can be accommodated to the passive system. On the other hand, this
increment results in the increase of BBP (Fig. 9), because a higher number
of passive calls compete for the transition to the active state. Note that when
22
C1 = C2 no burst blocking occurs, but at the expense of higher CBP values.
4.2. Results of an OCDMA PON with QoS Differentiation
In the second example we examine a multi-rate OCDMA PON with QoS
differentiation. The PON supports four service-classes. Service-classes s1
and s3 require the same number of codewords (same data-rate), as well as
service-classes s2 and s4 require the same number of codewords, but different
than that of s1 and s3. Service-classes s1 and s2 utilize the (331, 10, 10,
1, 1)-codewords, while service-classes s3 and s4 utilize the (331, 5, 5, 1, 1)-
codewords. The total number of codewords is assumed to be equal to C1=45,
for a BER value that is equal to 10−7, for I1unit = I2unit = 0.35 µW and
I3unit = I4unit = 0.5 µW. The traffic description parameters of the 4 service-
classes are (b1, b2, b3, b4)=(7, 5, 7, 5), (µ−111 , µ−112 , µ
−113 , µ
−114 ) = (1.0, 1.0, 1.0, 1.1),
(µ−121 , µ−122 , µ
−123 , µ
−124 ) = (1.5, 1.9, 1.5, 1.1), (a1, a2, a3, a4) = (0.9, 0.9, 0.95, 0.95).
Calls from the 1st and the 3rd service-classes can retry, twice, by using the
retry parameters: (b1,1, b1,2) = (6, 5), (µ−111,1, µ−111,2) = (1.2, 1.6), (µ−121,1, µ
−121,2) =
(1.4, 1.8), (b3,1, b3,2) = (5, 3), (µ−113,1, µ−113,2) = (1.2, 1.6), (µ−123,1, µ
−123,2) = (1.4, 1.8).
Calls from the 2nd and 4th service-class can retry one time, by using the
retry parameters b2,1 = 4, µ−112,1 = 1.2, µ−122,1 = 1.4 and b4,1 = 2, µ−114,1 = 1.4,
µ−124,1 = 1.8. The maximum received power at each receiver is assumed to be
equal to 5.25 µW, while the total number of fictitious codewords is 55. The
total additive noise follows a Gauss distribution (1, 0.1) µW.
In Figs. 10–13, we present analytical and simulation results for the CBP
of the 4 service-classes, respectively, versus the call arrival rate. We also
present corresponding analytical results from the model of [33]. We consider 9
arrival rate points: Point 1 corresponds to (λ1,λ2,λ3,λ4)=(0.02, 0.02, 0.02, 0.02)
23
calls/sec, while in the successive points the arrival rate of the service-classes is
increased by 0.0025 calls/sec. That is, Point 9 corresponds to (λ1, λ2, λ3, λ4)=
(0.04, 0.04, 0.04, 0.04) calls/sec. Comparison between analytical and simula-
tion results shows that the accuracy of the proposed model with QoS dif-
ferentiation is quite satisfactory. Furthermore, in Figs. 14–17, we present
analytical and simulation results for the BBP of the four service-classes, re-
spectively, versus the call arrival rate, as well as the corresponding analytical
BBP results from the model of [33]. Note that the obtained CBP and BBP
results are also differentiated because of the different BER, which is expressed
by the different codewords. Moreover, by comparing the CBP and BBP re-
sults of the proposed models with the corresponding results of [33] (assuming
the same traffic parameters but without retries), we derive conclusions simi-
lar to the case of no QoS differentiation. Specifically, the average decrease of
the CBP results under the retry model is 20.5%, 9.6%, 48.5% and 40.6%, for
the four service-classes respectively, while the average increase of the BBP
results are 29.8%, 13.6%, 53% and 29.3% (for each arrival rate point the
relative CBP decrease or the BBP increase is illustrated in each figure). The
increased BBP results may be negated by decreasing the number C2 of ficti-
tious codewords from 55 to 51; by using this value, the CBP results are still
lower than the corresponding results from [33] by 13.2%, 8.5%, 17.4% and
12.1%, for the four service-classes, respectively.
4.3. Discussion
The results presented in the previous subsections reveal that the retry
consideration can significantly reduce the CBP, while results in increased
BBP values. The amount of the CBP reduction and the BBP increase is
24
highly affected by the selection of the retry parameters’ values and the value
of the fictitious capacity C2, whereby we can control (reduce) the number of
calls in the passive state and achieve lower BBP. Therefore, for the applica-
tion of the proposed scheme, the corresponding analytical models should be
used for the derivation of the optimal set of the retry parameters and the
total number of fictitious codewords that guarantees specific CBP and BBP
thresholds. This information can be derived fast and in a cost-effective way,
compared to time-consuming simulation tools.
Another important parameter that affects the performance of OCDMA
PONs is the coding scheme that can be applied to the proposed analysis.
As it is shown in the previous sections, the PM technique is a suitable solu-
tion that fits well in the proposed analysis, since the number of codewords
assigned to service-class k is expressed by the parameter bk. However, the
proposed analysis can be applied to other existing techniques, which have
been implemented in multi-rate OCDMA networks. For the case of multi-
length schemes, the parameter bk can be expressed by the number of chips
of each code; thus, the different code lengths lead to different bk values, as it
is required in our analysis. Furthermore, coding schemes providing only QoS
differentiation can also fit to the proposed analysis, in the following way. If
the coding scheme considers T different QoS levels, then the same number of
service-classes should be considered in the proposed analysis, with parameter
bt equals 1 for all of these T service-classes, since they are not differentiated
based on the data-rate, but only on the QoS. In any case, to apply the pro-
posed analysis for a coding scheme, we have to find the maximum number of
supported codewords, under specific BER thresholds, and thus to define the
25
system capacity (the total number C1 of codewords).
5. Conclusion
We present a mathematical framework for the call-level performance anal-
ysis of OCDMA PONs, while proposing new multi-rate loss models for the
calculation of blocking probabilities. The PON supports multiple service-
classes of bursty traffic with random arrivals. Blocked calls are allowed to
immediately retry several times to access the system, with reduced number
of codewords and increased service time requirements. In-service calls alter-
nate between active and passive states. The proposed models incorporate the
characteristics of the utilized codewords, the user activity and different addi-
tive noise distributions. We provide a recurrent formula for the determination
of the occupancy distribution in the PON (number of utilized codewords).
Based on this formula, we efficiently calculate the probability that the re-
quired number of codewords in the last retry of a call is not available, i.e.
CBP, and the probability that a call cannot return to the active state, i.e.
BBP. Moreover, we assess the call-level performance of a multi-rate OCDMA
PON with differentiated QoS through the use of multi-weight codewords. Fi-
nally, we reveal the necessity and the effectiveness of the proposed models
by comparing their resultant performance on an OCDMA PON against an
existing model without retries.
As a future work, open issue is the study of the effect of different code
sequences, as well as of interference cancellation capability at the receiver,
on the performance of OCDMA PONs. Furthermore, new research activities
can be contacted on comprehensive CAC schemes, by jointly exploiting the
26
call-level and packet-level performance analysis of OCDMA PONs. Having
contacted performance measures for each service-class both at call level and
at packet level, the CAC can decide whether to accept or reject a call based
on the trade-off between the two levels, in order to guarantee specific QoS
requirements of each service-class.
Acknowledgments
Work supported by the Research Program Caratheodory, Research Com-
mittee of the University of Patras, Greece.
References
[1] S. Yoshima, M. Nogami, S. Shirai, N. Suzuki, M. Noda, H. Ichiban-
gase, and J. Nakagawa, “A 10.3 Gbit/s LAN-PHY based burst-mode
transmitter with a fast 6 ns turn-on/off time for 10 Gbps-based PON
systems”, in Proc. OFC/NFOEC 2008, San Diego, CA, 26-28 Feb. 2008.
[2] J. Zheng, H. T. Mouftah, “A survey of dynamic bandwidth allocation
algorithms for Ethernet Passive Optical Networks”, Opt. Switch. Netw.,
vol. 6, no. 3, pp. 151-162, Jul. 2009.
[3] K. Kitayama, X. Wang, and N. Wada, “OCDMA over WDM PON -
Solution path to gigabit-symmetric FTTH”, J. Lightw. Technol., vol.
24, no. 4, pp. 1654-1662, Apr. 2006.
[4] S. Kimura, “10-Gbit/s TDM-PON and over-40-Gbit/s WDM/TDM-
PON systems with OPEX-effective burst-mode technologies”, in Proc.
OFC/NFOEC 2009, San Diego, CA, 22-26 Mar. 2009.
27
[5] K. Tanaka, “10 G-EPON standardization and its development status”,
Proc. OFC/NFOEC 2009, San Diego, CA, 22-26 Mar. 2009.
[6] A. Okassa m’foubat, F. Elbahhar, and C. Tatkeu, “Performance evalua-
tion of Passive Optical CDMA Networks using a linear parallel interfer-
ence receiver in imperfect power cases”, Opt. Switch. Netw., vol. 9, no.
(2), 138-144, Apr. 2012.
[7] H. Beyranvand and J. Salehi, “Multirate and Multi-Quality-of-Service
Passive Optical Network Based on Hybrid WDM/OCDM System”,
IEEE Commun. Mag., vol. 49, no. 2, pp. s39-s44, Feb. 2011.
[8] M. Ravi Kumar, S. S. Pathak, and N. B. Chakrabarti, “Design and anal-
ysis of three-dimensional OCDMA code families”, Opt. Switch. Netw.,
vol. 6, no. 4, pp. 243-249, Dec. 2009.
[9] P. R. Prucnal, Optical Code Division Multiple Access: Fundamentals
and Applications, Taylor and Francis, 2006.
[10] N. G. Tarhuni, T. O. Korhonen, E. Mutafungwa, and M. S. Elmusrati,
“Multiclass Optical Orthogonal Codes for Multiservice Optical CDMA
Codes”, J. Lightw. Technol., vol. 24, no. 2, pp. 694-704, Feb. 2006.
[11] W. C. Kwong and G.-C. Yang, “Multiple-Length extended Carrier- Hop-
ping Prime Codes for Optical CDMA systems supporting Multirate Mul-
timedia services”, J. Lightw. Technol., vol. 23, no. 11, pp. 3653-3662,
Nov. 2005.
[12] E. Intay, H. M. Shalaby, P. Fortier, L. A. Rusch, “Multirate optical
28
fast frequency-hopping CDMA system using power control”, J. Lightw.
Technol., vol. 20, no. 2, pp. 166-177, Feb. 2002.
[13] H. Yashima and T. Kobayashi, “Optical CDMA with time hopping and
power control for multimedia networks”, J. Lightw. Technol., vol. 21,
no. 3, pp. 695-702, Mar. 2003.
[14] A. R. Forouzan, N-K. Masoumeh and N. Rezaee, “Frame Time-Hopping
patterns in Multirate Optical CDMA Networks using Conventional and
Multicode schemes”, IEEE Trans. Commun., vol. 53, no. 5, pp. 863-875,
May 2005.
[15] C. Y. Chang, H. T. Chen, G. C. Yang, and W. C. Kwong, “Spectral effi-
ciency study of QC-CHPCs in multirate optical CDMA system”, IEEE
J. Select. Areas Commun., vol. 25, no. 9, pp. 118-128, Dec. 2007.
[16] F. R. Durand and T. Abrao, “Distributed SNIR Optimization Based
on the Verhulst Model in Optical Code Path Routed Networks With
Physical Constraints”, IEEE J. Opt. Commun. Netw., vol. 3, no. 9, pp.
683-691, Aug. 2011.
[17] V. Baby, W. C. Kwong, C.-Y. Chang, G.-C. Yang, P. R. Prucnal,
“Performance analysis of variable-weight multilength optical codes for
wavelength-time OCDMA multimedia systems”, IEEE Trans. Com-
mun., vol. 55, no. 6, pp. 1325-1333, Jul. 2007.
[18] G. C. Yang, “Variable-weight optical orthogonal codes for CDMA net-
work with multiple performance requirements”, IEEE Trans. Commun.,
vol. 44, no. 1, pp. 47-55, Jan. 1996.
29
[19] H. Beyranvand, B. M. Ghaffari, and J. A. Salehi, “Multirate,
differentiated-QoS, and multilevel fiber-optic CDMA system via optical
logic gate elements”, J. Lightw. Technol., vol. 27, no. 19, pp. 4348-4359,
Oct. 2009.
[20] S. Khaleghi and M. R. Pakravan, “Quality of service provisioning in
optical CDMA packet networks”, IEEE J. Opt. Commun. Netw., vol. 2,
no. 5, pp. 283-292, May 2010.
[21] G. C. Yang, C. H. Chen, and W. C. Kwong, “Accurate analysis of
double-weight optical CDMA with power control”, IEEE Trans. on
Commun., vol. 60, no. 2, pp. 322-327, Feb. 2012.
[22] J. Ratnam, S. Chakrabarti, and D. Datta, “A heuristic approach for
designing hybrid PONs employing WDM and OCDMA with asymmetric
traffic distribution”, Opt. Switch. Netw., vol. 6, no. 4, pp. 235-242, Dec.
2009.
[23] H. M. Shalaby, “Optical CDMA random access protocols with and with-
out pretransmission coordination”, J. Lightw. Technol., vol. 21, no. 11,
pp. 2455-2462, Nov. 2003.
[24] H. M. Shalaby, “Performance analysis of an optical CDMA random ac-
cess protocol”. J. Lightw. Technol., vol. 22, no. 5, pp. 1233-1241, May
2004.
[25] Z. A. El-Sahn, Y. M. Abd-El-Malek, H. M. H. Shalaby, and E. A. El-
Badawy, “Performance of the R3T random-access OCDMA protocol in
30
noisy environment”, IEEE J. Sel. Topics Quantum Electron., vol. 13,
pp. 1396-1402, Sept./Oct. 2007.
[26] M. A. A. Mohamed, H. M. H. Shalaby, and E. A. Badawy, “Performance
analysis of an optical CDMA MAC protocol with variable-size sliding
window”, J. Lightw. Technol. vol. 24, no. 10, pp. 3590-2462, Oct. 2003.
[27] S. Goldberg and P. R. Prucnal, “On the Teletraffic Capacity of Optical
CDMA”, IEEE Trans. Commun., vol. 55, no. 7, pp. 1334-1343, Jul.
2007.
[28] M. Gharaei, C. Lepers, O. Affes, and P. Gallion, “Teletraffic Ca-
pacity Performance of WDM/DS-OCDMA Passive Optical Network”,
NEW2AN/ruSMART 2009, LNCS 5764, Springer-Verlag Berlin Heidel-
berg, pp. 132-142, 2009.
[29] E. Mutafungwa and S. J. Halme, “Analysis of the Blocking Performance
of Hybrid OCDM-WDM Transport Networks”, Microw. Opt. Technol.
Let., vol. 34, no. 1, pp. 61-67, Jul. 2002.
[30] Y. Deng, P. R. Prucnal, “Performance Analysis of Heterogeneous Opti-
cal CDMA Networks with Bursty Traffic and Variable Power Control”,
IEEE J. Opt. Commun. Netw., vol. 4, no. 4, pp. 313-316, Jul. 2011.
[31] J. Vardakas, I. Anagnostopoulos, I. Moscholios, M. Logothetis and V.
Stylianakis, “A Multi-Rate Loss Model for OCDMA PONs”, in Proc. of
the 13th ICTON, Stockholm, Sweden, 26-30 Jun. 2011.
[32] J. Vardakas, I. Moscholios, M. Logothetis and V. Stylianakis, “On Code
31
Reservation in a Multi-Rate OCDMA Passive Optical Network”, in
Proc. of the 8th IEEE/IET CSNDSP, Poznan, Poland, 18-20 Jul. 2012.
[33] J. S. Vardakas, I. D. Moscholios, M. D. Logothetis and V. G. Stylianakis,
“Blocking Performance of Multi-rate OCDMA PONs with QoS Guaran-
tee”, IARIA International Journal On Advances in Telecommunications,
vol. 5, no. 3 and 4, pp. 120-130, Dec. 2012.
[34] J. S. Vardakas, I. D. Moscholios, M. D. Logothetis and V. G. Stylianakis,
“Performance Analysis of OCDMA PONs Supporting Multi-Rate
Bursty Traffic”, IEEE Trans. Commun., vol.61, no.8, pp.3374-3384,
Aug. 2013. 2013.
[35] I. Moscholios, M. Logothetis and G. Kokkinakis, “Call-burst blocking of
ON-OFF traffic sources with retrials under the complete sharing policy”,
Perform. Evaluation, vol. 59, no. 4, pp. 279-312, Mar. 2005.
[36] W. Ma, C. Zuo, and J. Lin, “Performance Analysis on Phase-Encoded
OCDMA Communication System”, J. Lightw. Technol., vol. 20, no. 5,
pp. 798-803, May 2002.
[37] X. Wang, and K. Kitayama, “Analysis of Beat Noise in Coherent and
Incoherent Time-Spreading OCDMA”, J. Lightw. Technol., vol. 22, no.
19, pp. 2226-2235, Oct. 2004.
[38] C. S. Weng, and J. Wu, “Optical Orthogonal Codes With Nonideal Cross
Correlation”, J. Lightw. Technol., vol. 19, no. 12, pp. 1856-1863, Dec.
2001.
32
[39] H. W. Chen, G. C. Yang, C. Y. Chang, T. C. Lin and W. C. Kwong,
“Spectral Efficiency Study of Two Multirate Schemes for Asynchronous
Optical CDMA”, J. Lightw. Technol., vol. 27, no. 14, pp. 2771-2778,
Jul. 2009.
[40] S. M. Ross, Introduction to Probability Models, Academic Press, 2007.
[41] Y. Zhang and M. Peng, “Constructions for (2 × n, 2, 2, 1)-2D optical
orthogonal codes”, Opt. Switch. Netw., vol. 10, no.4, pp. 458-462, Nov.
2013.
[42] I. Moscholios, M. Logothetis and M. Koukias, “An ON-OFF Multi-Rate
Loss Model of Finite Sources”, IEICE Trans. Commun., vol. E90-B, no.
7, pp. 1608-1619, Jul. 2007.
[43] S. Sahuguede, A. Julien-Vergonjanne, and J. P. Cances, “OCDMA code
design for BER and data rate differentiation in Beat Noise Corrupted
Systems”, in Proc. IEEE GLOBECOM 2010, Miami FL, USA, 6-10 Dec.
2010.
[44] Simscript III, http://www.simscript.com
33