Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Decision-feedback detection strategy for nonlinear frequency-division multiplexing

Open Access Open Access

Abstract

By exploiting a causality property of the nonlinear Fourier transform, a novel decision-feedback detection strategy for nonlinear frequency-division multiplexing (NFDM) systems is introduced. The performance of the proposed strategy is investigated both by simulations and by theoretical bounds and approximations, showing that it achieves a considerable performance improvement compared to previously adopted techniques in terms of Q-factor. The obtained improvement demonstrates that, by tailoring the detection strategy to the peculiar properties of the nonlinear Fourier transform, it is possible to boost the performance of NFDM systems and overcome current limitations imposed by the use of more conventional detection techniques suitable for the linear regime.

© 2018 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Nowadays, most of the global data traffic is carried by optical fibers. However, optical fiber Kerr nonlinearity severely limits the capacity of current optical communication systems, whose design is based on concepts developed for linear systems [1]. For this reason, recently, there has been growing interest in nonlinear Fourier transform (NFT)-based transmission schemes [1–7]. The NFT [5,8], a sort of nonlinear analogue of the standard Fourier transform (FT), defines a nonlinear spectrum that evolves trivially and linearly along the optical channel on its nonlinear frequency domain, thus turning nonlinearity into a mean for information transfer rather than an impairment. Nonlinear frequency-division multiplexing (NFDM) is a novel transmission paradigm that aims at mastering nonlinearity using the NFT to avoid any deterministic intra and interchannel interference by encoding information directly on the nonlinear spectrum [5,6]. However, research about NFDM schemes is still ongoing and it is not yet clear whether NFDM can outperform conventional systems [9,10]. We refer to [1] for a complete review about different NFT-based transmission schemes.

Nonlinear inverse synthesis (NIS) [2] is a popular NFDM scheme based on the NFT with vanishing boundary conditions. NIS maps the information on the continuous part of the nonlinear spectrum through a backward NFT (BNFT), and then recovers it with the reverse operation, the forward NFT (FNFT). An intrinsic limitation of this scheme with respect to conventional systems was highlighted in a previous work [9]. Indeed, the insertion of guard symbols between different bursts, as required by NIS, causes a reduction of the overall spectral efficiency that, differently from conventional systems, cannot be mitigated by increasing the burst length, as system performance decays for longer bursts. Moreover, in [9] it is conjectured that the NIS performance decay is due to the considered symbol-by-symbol detection strategy, based on the Euclidean distance, which is optimal only in the linear regime and does not account for the statistics of noise in the nonlinear spectrum.

In this work, we exploit a powerful property of the NFT to devise a novel detection strategy for NFDM systems. The proposed strategy employs decision feedback and the BNFT to avoid the detrimental effect that an increase of the burst length has on the noise statistics in the nonlinear frequency domain. After introducing and discussing the decision-feedback BNFT (DF-BNFT) strategy, system performance obtained through simulations are presented, and theoretical performance estimations are given.

The paper is organized as follows. Section 2 states and proves a causality property of the NFT that plays a key role in the derivation of the DF-BNFT detection strategy. Section 3 describes the system and derives two important corollaries of the causality property. Section 4 introduces and explains the DF-BNFT detection strategy. Section 5 derives an approximation, a lower bound, and an upper bound to the probability of error of DF-BNFT. Section 6 deals with DF-BNFT performance; also, it compares DF-BNFT with standard FNFT detection and conventional systems in terms of performance, considering different scenarios. Section 7 validates the approximation and bounds derived in Section 5 by comparison with simulation results. Finally, Section 8 concludes the paper.

2. NFT causality property

The BNFT—by which a time domain signal r(t) is recovered from its nonlinear spectrum ρ(λ)—can be computed via the Gelfand-Levitan-Marchenko equation (GLME) [8]

K(x,y)σF*(x+y)+σxxK(x,r)F(r+s)F*(s+y)drds=0,
where σ = 1 in the focusing regime and σ = −1 in the defocusing regime, * denotes the complex conjugate, and F(y) is an integral function of the nonlinear spectrum [8]. Specifically, if there is no discrete spectrum,
F(y)=12πρ(λ)ejλydλ.
The time domain signal is recovered from the GLME solution K(x, y) as r(t) = −2K(t, t).

Proposition 1. (NFT Causality Property) Given a generic time instant τ, for tτ the time domain signal r(t) depends only on the values of F(y) for y ≥ 2τ.

Proof. Since r(t) = −2K(t, t), one should obtain the solution K(t, t) of Eq. (1) for all tτ. Given t1, t2τ, the solution K(t1,t2)=σF*(t1+t2)σt1t1K(t1,r)F(r+s)F*(s+t2)drds depends on F(y) for all y ≥ 2τ (since r + s ≥ 2t1 ≥ 2τ and s + t2t1 + t2 ≥ 2τ) and on all the solutions K(t1, r) for rt1. Nevertheless, since t1τ, K(t1, r) is one of the solutions K(t1, t2) for t1, t2τ. Therefore, for t1, t2τ, K(t1, t2) depends only on F(y) for y ≥ 2τ. Consequently, considering t1 = t2 = t, one obtains that, for tτ, r(t) = −2K(t, t) depends only on F(y) for y ≥ 2τ.

3. System description

The transmission scheme considered in this work is sketched in Fig. 1. As in the NIS scheme [2], the transmitter (TX) encodes a burst of Nb symbols {x1, . . ., xNb} drawn from an M-ary quadrature amplitude modulation (QAM) alphabet {X1, . . ., XM} onto a QAM signal

s(t)=k=1Nbxkg[t(k1)Ts]
with pulse shape g(t) and symbol time Ts. In this work, for reasons that will be clarified later, we restrict g(t) to have a finite duration TTs. The ordinary Fourier transform S(f) of (3) is then mapped on the continuous part of the nonlinear spectrum ρ(λ) according to
ρ(λ)=S(λ/π).
Furthermore, before computing the BNFT, deterministic propagation effects (dispersion and nonlinearity) are precompensated by multiplying the nonlinear spectrum by exp(j4λ2L), where L is the link length. Finally, the input optical signal is taken to be q(t) = q′(−t), where q′(t) is the BNFT of the precompensated nonlinear spectrum.

 figure: Fig. 1

Fig. 1 NFDM with DF-BNFT detection.

Download Full Size | PDF

There are two differences between the TX described here and the one in [2], which, however, do not change the overall NIS working principle. Firstly, propagation effects are removed at the TX (precompensation) rather than at the receiver (RX). While both solutions are feasible (and splitting the compensation between TX and RX might even be advantageous [9]), precompensation is considered here because the proposed DF-BNFT detection strategy relies on it. Indeed, Corollary 3, on which DF-BNFT is based (as explained in the following), applies only to optical signals unaffected by propagation effects. Precompensation ensures that the received signal meet this requirement. Secondly, in this work each burst in the optical signal is inverted in time just to help explaining the working principle, not because it is necessary. Finally, for the sake of simplicity, we avoid explicitly mentioning the normalization and denormalization procedures required to relate the normalized signals q(t) and (t) (see Fig. 1) to the physical signals propagating in a real fiber link, therefore assuming that the channel is characterized by the normalized version of the nonlinear Schrödinger equation (NLSE) given in [5].

Let us denote by r(t) the optical signal obtained by propagating q(t) in a noiseless channel. In this case, the only channel effect is the multiplication of the nonlinear spectrum by exp(−j4λ2L), so that r′(t) = r(−t) would be the BNFT of ρ(λ), the nonlinear spectrum before precompensation.

Corollary 2. Considering a NIS modulation, the above optical signal r(t) for tτ depends only on the values of the QAM signal s(t) for tτ.

Proof. Taking into account (2), (3) and (4), we have that F(y) = −s(−y/2)/2 and thus, F(y) for y ≥ 2τ depends only on the values of s(t) for t ≤ −τ. Therefore, recalling that r′(t) is the BNFT of ρ(λ), the NFT causality property (Proposition 1) implies that r′(t) for tτ depends only on s(t) for t ≤ −τ. Changing the sign of τ, one obtains that r′(t) for t ≥ −τ depends only on s(t) for tτ. Finally, the thesis follows considering that r(t) = r′(−t).

Corollary 3. Let tk = (k − 1/2)Ts. If the pulse shape g(t) in (3) has finite duration TTs, for ttk the optical signal r(t) depends only on the symbols x1, .., xk, and not on the following ones xk+1, .., xNb, as shown in Fig. 2. In mathematical formulas

r(t)|ttk=𝒢{x1,..,xk},
where 𝒢 is a generic function.

 figure: Fig. 2

Fig. 2 The NFT causality property for NIS with no ISI on s(t). A train of Gaussian pulses, modulated by 16QAM symbols, and almost ISI-free, is shown before (on the left) and after (on the right) the BNFT. The red signal is generated by 8 symbols, while for the blue one only the first 6 are taken into account. The two optical signals are superimposed for tt6, as for Eq. (5) (baudrate Rs = 50 GBd, optical power Ps = 7 dBm).

Download Full Size | PDF

Proof. With this hypothesis, s(t) depends only on the symbols x1, . . ., xk for ttk. Then, applying Corollary 2, the thesis follows.

4. Decision-feedback BNFT detection

In conventional NIS, the RX recovers a noisy version of the transmitted nonlinear spectrum ρ(λ) by computing the FNFT of the received optical signal, and then makes decisions based on standard matched filtering and symbol-by-symbol detection. The improved detection scheme proposed in this work originates from the idea that, since a detrimental signal-noise interaction takes place when computing the FNFT of the received noisy signal, decisions could be alternatively made by comparing the received signal with the BNFT of all possible transmitted (noiseless) waveforms, thus avoiding signal-noise interaction effects. Selecting the waveform (and the corresponding symbols) closest to the received optical signal would correspond to a maximum a posteriori probability (MAP) strategy, under the assumption that the accumulated optical noise can be modeled as additive white gaussian noise (AWGN) (more on this later). The drawback of a sequence—rather than symbol-by-symbol—detection strategy, is an exponential growth of the detector complexity with the burst length Nb. In order to avoid this growth, the NFT causality property and a decision-feedback scheme are finally employed, obtaining the DF-BNFT detection scheme depicted in Fig. 1.

Having in mind that NIS performance decay is caused by the detection strategy itself, rather than signal-noise interaction during propagation—as also hinted by the fact that the performance obtained by simply adding AWGN after noiseless propagation is superimposed with that of the actual optical link [9]—the aim of this work is to devise a detection strategy at least optimal for the AWGN channel. Therefore, assuming the channel as AWGN, we can write the received noisy optical signal as

r˜(t)=r(t)+n(t),
where r(t) is, as before, the optical signal obtained by propagating the input signal q(t) in a noiseless channel, and n(t) is circularly-symmetric complex white Gaussian noise with power spectral density N0. We would like to stress that (6) is only an ansatz and not an actual identity.

An analog-to-digital converter (ADC) recovers the samples of the received noisy optical signal and collects them in the vector . The ADC is modeled as a rectangular filter with bandwidth ν/(2Ts) that acquires ν samples per symbol time. Assuming that the filter bandwidth is larger than the overall signal bandwidth, under the AWGN assumption (6), is a sufficient statistic and we can write = r + n, where r is a vector collecting the samples of r(t), and n is a vector of i.i.d. circularly-symmetric complex Gaussian r.v.s nk, with zero mean and variance σ2 = E{|nk|2} = N0ν/Ts. Therefore, conditional on r, the components of are independent. For the sake of simplicity, let k (and rk) be the vector of length ν representing the noisy optical signal (and, respectively, its noise-free equivalent) in the time window [tk−1, tk). Hence, can also be written as a compound vector = (1, . . ., Nb) containing the samples of the received signal in [−Ts/2, (Nb − 1/2)Ts), i.e., the time window of duration NbTs in which information is encoded. Indeed, with respect to the QAM signal s(t), the optical signal after the GLME broadens in time, developing a sort of right tail that extends outside the considered detection window, i.e., for t > (Nb − 1/2)Ts, as shown for instance in Fig. 2. Therefore, a longer vector should be considered to obtain a sufficient statistic. However, in the decision-feedback strategy derived in the following, this tail could be used only to detect the last symbol xNb of the sequence, with a negligible contribution to the overall performance. Hence, for the sake of simplicity, we simply discard it.

According to the MAP strategy, and assuming equally likely input symbols, optimal detection maximizes the probability density function (pdf) p(|x) of the vector conditional upon the transmitted sequence x = (x1, .., xNb). Thus, an optimum RX chooses the sequence according to

x^=argmaxxp(r˜|x).
Since, conditional upon x, the components of are independent, the pdf in Eq. (7) can be factorized as
x^=argmaxxk=1Nbp(r˜k|x)=argmaxxk=1Nblnp(r˜k|x),
where the second equality stems from the monotonic behavior of the logarithm.

The NFT property (5) implies that the signal samples in the time window [tk−1, tk), i.e., those collected in k, depend only on the symbols (x1, . . ., xk). Therefore, an optimum RX performs decisions according to

x^=argmaxxk=1Nblnp(r˜k|(x1,,xk)).
Since the symbols x1, . . ., xk uniquely determine rk, under the AWGN assumption we have
p(r˜k|(x1,,xk)=1(πσ2)νexp(r˜krk2/σ2)
so that ln p(k|(x1, . . ., xk)) = −ν ln (πσ2) − ‖krk2/σ2. This implies that, in order to determine the optimal sequence , all possible MNb input sequences should be considered, which is not a viable solution. In order to avoid this exponential growth of complexity, we resort to a sub-optimal decision-feedback strategy—namely, DF-BNFT—by which symbols are decided iteratively for k = 1, . . ., Nb as
x^k=argmaxXi{X1,..,XM}lnp(r˜k|(x^1,,x^k1,Xi))
bringing down to M×Nb the number of sequences to be considered. Equation (11) can be evaluated comparing the (samples of the) received signal with (the samples of) M trial waveforms rk(i)(t) uniquely corresponding to the sequences 1, ..., k, Xi for each Xi in the symbol constellation {X1, .., XM}. The waveform rk(i)(t) is obtained from the symbol sequence 1, ..., k, Xi by the same encoding technique used at the TX, except for precompensation. Let rk(i) denote the vector of length ν containing the samples of rk(i)(t) in [tk−1, tk), referred to as detection window. In other words, rk(i), i = 1, . . ., M, are all possible vectors rk given that the sequence 1, ..., k, Xi has been sent. The RX implements the DF-BNFT strategy through Nb steps as follows.

For k = 1, . . ., Nb:

  • Digitally obtain the vectors rk(i), for each Xi in the symbol constellation {X1, .., XM}.
  • Choose k by the rule
    x^k=argminXi{X1,..,XM}r˜krk(i)2
    where this last equation follows from (10) and (11).

The DF-BNFT strategy (11) avoids any ISI thanks to decision feedback, which accounts for the dependence of k on previous symbols, and to Corollary 3, which ensures that k does not depend on next symbols. However, it is still suboptimal compared to (9) for two reasons. The first reason is that it does not exploit the information about xk that is contained in the received signal after tk. In fact, as shown in Fig. 2, while in the original QAM signal s(t) (on the left) the information about xk is fully contained in the time interval [tk−1, tk), in the corresponding optical signal r(t) (on the right) part of this information goes to times t > tk, the effect becoming more relevant with power and as k increases. An apparent consequence of this effect is that the optical signal r(t) has an average amplitude that decreases with time and a sort of “tail” that extends beyond the duration of the original QAM signal. The second reason is that it is affected by error propagation, as previous decisions 1, ..., k−1 might be incorrect, this effect becoming more relevant as k increases, too. Finally, even the strategy (9), that is optimal for the AWGN channel (6), might be suboptimal on a real fiber link. The effects of error propagation, information loss, and non-AWGN channel statistics are discussed in more detail in Section 6.

While the DF-BNFT strategy is conceived to improve system performance (as it will be verified in Section 6), it also has some drawbacks compared to the FNFT strategy. Firstly, to fulfill the hypothesis of Corollary 3 and avoid ISI, the pulse shape must be fully confined within a symbol time—a more stringent requirement compared to the conventional Nyquist criterion. This imposes the use of pulses with a wider bandwidth, which has a negative impact on the achievable spectral efficiency. Secondly, full channel precompensation is required to use Corollary 3 at the RX, and, therefore, channel compensation cannot be split between RX and TX to reduce guard intervals [4,9]. Thirdly, as far as it concerns computational complexity, the DF-BNFT scheme requires the evaluation of M BNFTs over νNb points. On the other hand, standard NIS detection computes only one FNFT over a comparable number of points. While an exact comparison between the two strategies depends on the relative complexity and accuracy of the considered BNFT and FNFT algorithms, it is reasonable to assume that the complexity of the DF-BNFT detector is considerably higher than that of standard FNFT detection. However, the aim of this work is to show that standard FNFT detection is far from being optimal, and that a significant increase of performance can be achieved by an improved detection strategy.

5. Error probability estimation and bounds

For a given sequence, the probability of error Pe of the DF-BNFT strategy can be evaluated by averaging (over all constellation symbols and symbols within a burst) the probability Pk(m) that an error occurs when the symbol Xm is sent at position k, provided that the symbols 1, .. k−1 are correctly detected. Specifically,

Pe=1MNbk=1Nbm=1MPk(m).

As computing Pk(m) may be difficult, we will bound it through standard techniques [11]. By defining the events Em,i = {Xi is preferred to Xm when deciding on xk} and

Em={Xmisnotpreferredwhendecidingonxk}=i=1imMEm,i
we can upper bound Pk(m) by the union bound
Pk(m)=P(Em|(x^1,,x^k1,Xm))=P(i=1imMEm,i|(x^1,,x^k1,Xm))i=1imMP(Em,i|(x^1,,x^k1,Xm))
Due to our AWGN assumption, the pairwise error probabilities in (15) are given by
P(Em,i|(x^1,,x^k1,Xm))=𝒬(dk(m,i)2σ)
where
dk(m,i)=rk(m)rk(i)
is the Euclidean distance between rk(m) and rk(i), and 𝒬(x)xet2/2dt/2π=erfc(x/2)/2 is the Q-function. We can also obtain a useful approximation on Pk(m) as follows. Denoting by Cm,i the event complementary to Em,i, we have
Pk(m)=P(i=1imMEm,i|(x^1,,x^k1,Xm))=1P(i=1imMCm,i|(x^1,,x^k1,Xm))
and, taking into account that P(Cm,i | (1, ..., k−1, Xm)) = 1 − P(Em,i | (1, ..., k−1, Xm)),
Pk(m)1i=1imM(1P(Em,i|(x^1,,x^k1,Xm)))
where the approximation is due to the fact that, in general, the events Cm,i are not mutually independent. Let us now derive a lower bound. Recalling that the probability of a union of events is lower bounded by each one of the probabilities of the single events, we have
Pk(m)=P(i=1imMEm,i|(x^1,,x^k1,Xm))maximP(Em,i|(x^1,,x^k1,Xm)).
In conclusion, from (15), (19), (20), and taking into account (16), we have the following upper bound, approximation and lower bound, respectively, on Pk(m)
Pk(m)i=1imM𝒬(dk(m,i)2σ)
Pk(m)1i=1imM(1𝒬(dk(m,i)2σ))
Pk(m)𝒬(dk2σ)
where
dk=minimdk(m,i)
and dk(m,i) is as in (17). Replacing (21)(23) into (13) gives the corresponding bounds and approximation on Pe. We remark that both the bounds and the approximation were derived by assuming that the channel is AWGN and that previous decisions are correct. Deviations from this ideal situation might invalidate the bounds and slightly reduce the accuracy of the approximation, as shown in Section 7 by numerical simulations.

The above estimates of the probability of error for a given sequence should be averaged over all possible MNb sequences to obtain the average error probability. However, to speed up computation, one can think of averaging over randomly generated sequences until the result stabilizes. As we will show in Section 7, this practical approach still provides a reasonable accuracy and a significant computational saving compared to direct error counting.

6. System performance

We simulated the system described in the previous sections and sketched in Fig. 1 by using a 16QAM signal s(t) with symbol rate Rs = 1/Ts = 50 GBd. To fulfill the no-ISI requirement on s(t), the supporting pulse was chosen to be g(t) = exp(−12.5(t/Ts)2), i.e., a Gaussian pulse with a full width at half maximum (FWHM) of (2/5)2ln2TsTs/2, so that about 99.9% of the energy of a pulse is contained in a symbol time. This pulse shape is chosen to fulfill the requirement of Corollary 3 on the duration of g(t) with only a moderate bandwidth increase compared to the root-raised-cosine pulse employed in [9]. Note that, by relaxing the energy constraint, the bandwidth could be further reduced to approach the one in [9]. This, however, would also reduce the performance due to the ISI generated by the pulse tail, with an overall effect on the achievable spectral efficiency that should be carefully considered. The optimization of the pulse shape for the maximization of the spectral efficiency is outside the scope of this work and will be addressed in a future publication. A typical example of generated signal is shown in Fig. 2 on the left.

The channel is a standard single-mode fiber of length L = 2000 km with group velocity dispersion (GVD) parameter β2 = −20.39 ps2/km, nonlinear coefficient γ = 1.22 W−1km−1, and attenuation α = 0.2 dB/km. Ideal distributed amplification (spontaneous emission factor ηsp = 4) is considered along the channel. The bandwidth of both the digital-to-analog converter (DAC) and the ADC is 100 GHz. In order to account for the NFT boundary conditions and for temporal broadening due to dispersion, a total of Nz = 2000 guard symbols is considered in our simulations. The FNFT and BNFT operations are performed considering an oversampling factor of 8 samples per symbols, respectively using the Layer-Peeling (LP) method [1] and an enhanced version of the Nystrom method [12]. The simulation results are deemed free from numerical inaccuracies, since it was verified that the noise-free performance was sufficiently higher than the noisy one (when applicable), and that higher accuracy did not change the results, similarly to what done in [13].

As often customary in optical communications, performance is measured in terms of Q-factor, defined as QdB2=20log10[2erfc1(2Pb)], where the probability of bit error Pb is given by direct error counting [14]. The rate efficiency η = Nb/(Nb + Nz) is considered to account for the spectral efficiency loss due to the insertion of guard symbols [9]. The performance is reported as a function of the mean power per symbol, defined as Ps = Es/Ts, where Es = Etot/Nb is the mean energy per information symbol and Etot the total energy of the optical signal (so that the actual average optical power is ηPs).

Figure 3 shows the NFDM performance obtained with DF-BNFT detection (solid lines), and with conventional FNFT (dashed lines), for different burst lengths (same color for same length). As can be seen, the performance obtained with DF-BNFT is significantly better than that obtained with FNFT detection, with an improvement of 4.4 dB for Nb = 256 and 6.2 dB for Nb = 2048. However, performance still decays when increasing Nb. This behavior may be due either to the suboptimality of the DF-BNFT detection, or to an intrinsic limitation of the NIS modulation format. For what concerns suboptimality, there are three possible causes of performance degradation, already discussed in Section 4: the non-AWGN statistics of the fiber channel, which is affected by signal-noise interaction; the error propagation in the decision-feedback mechanism of (11); and the information loss entailed by (12), which neglects the information about xk that is contained in the received signal for t > tk. All these effects become more relevant as the burst length increases. Also signal-noise interaction increases with the burst length, as the optical noise interacts with a longer portion of non-zero signal. This effect, however, saturates when the burst length becomes longer than the channel memory. One may wonder whether the NIS performance shown here is in accordance with the theoretical estimation of the signal to noise ratio (SNR) given in [15]. Such a comparison was performed in [9] for almost the same system configuration considered here. The only differences are: (1) the modulation format, which however does not significantly change the results, and (2) the chosen pulse shape. In this work, a pulse with a shorter time duration and, hence, a wider bandwidth is considered. This difference is responsible for a slight performance improvement.

 figure: Fig. 3

Fig. 3 Performance of the NFDM system for DF-BNFT (solid lines) and standard FNFT (dashed lines) detection for different burst length Nb (and rate efficiency η). 16QAM symbols, β2 = −20.39 ps2/km, Nz = 2000, L = 2000 km, and Rs = 50 GBd.

Download Full Size | PDF

The impact of signal-noise interaction during propagation can be estimated by comparing the performance obtained on the fiber link with the performance obtained on the corresponding AWGN channel, shown in Fig. 4 with dotted lines for Nb = 256, 512, 1024, 2048. For longer bursts, i.e., Nb ≥ 1024, the corresponding dotted and solid lines are almost indistinguishable. On the other hand, for shorter bursts, i.e., Nb = 256, 512, the slight difference between the dotted and solid lines denotes a small impact of signal-noise interaction on system performance and a slight deviation of channel statistics from the AWGN assumption (6). One of the effects of signal-noise interaction during propagation is a constant phase rotation of the optical signal. This deviation can be estimated and removed from the optical signal considering for detection (t)e, α being the phase shift, rather than (t) itself. Fig. 4 shows that a small performance gain can be obtained with this technique (performance shown with dashed lines) and that the performance approaches those of the equivalent AWGN channel. Obviously, when performance is superimposed to that of the AWGN channel, this technique does not affect the detection strategy.

 figure: Fig. 4

Fig. 4 Impact of fiber propagation: performance of DF-BNFT on the fiber link without (solid lines) and with average nonlinear phase compensation (dashed lines) and on the AWGN channel (dotted line). Same scenario of Fig. 3.

Download Full Size | PDF

As regards error propagation, its impact can be estimated from Fig. 5, in which the actual DF-BNFT performance is compared to that of an ideal detector that makes decisions according to the same strategy (11), but using the correct symbols x1, . . ., xk−1 rather than the detected ones 1, . . ., k−1. Contrarily to what observed for signal-noise interaction, the impact of error propagation is more relevant for longer bursts, while it tends to be negligible for shorter ones. Indeed, for longer bursts, farther symbols (i) affect more significantly detection, and (ii) are more likely to be wrong, since the probability of error is higher.

 figure: Fig. 5

Fig. 5 Impact of error propagation due to decision feedback in the proposed DF-BNFT detection strategy: actual performance (solid lines), and error-propagation-free performance (dotted lines). Same scenario of Fig. 3.

Download Full Size | PDF

As regards the third possible cause of performance degradation, further investigations are required to estimate the impact of information loss due to the suboptimality of (11) and to devise a better strategy to avoid it. Eventually, the implementation of an optimal strategy based on (9), but with a feasible complexity, would allow to estimate the ultimate performance of NIS modulation and to understand if the observed performance decay is due to suboptimal detection or to an intrinsic limitation of this modulation scheme. This is currently under investigation.

The maximum performance achieved by FNFT and DF-BNFT detection (at their respective optimum power) in Fig. 3 are reported in Fig. 6 as a function of the rate efficiency and compared with the maximum performance achieved by conventional systems (also operating in burst mode, for a fair comparison) employing ideal electronic dispersion compensation (EDC) and digital backpropagation (DBP) (practically implemented by the split-step Fourier method with 100 steps per span of fiber, enough to practically achieve a perfect compensation of deterministic nonlinearity). DBP performance is estimated from the error vector magnitude [16], rather than calculated by direct error counting, being the corresponding error probability too low to be measured. The improvement of DF-BNFT with respect to FNFT is quite relevant and slightly increases with the rate efficiency η. However, the DF-BNFT performance is still not on par with that of conventional systems and keeps decreasing at higher rates, when the performance of conventional systems saturate to the one achieved with continuous (non burst mode) transmission. Finally, the performance achievable by DF-BNFT detection was investigated also in different scenarios. Fig. 7a refers to the same system setup used in Figs. 36 but with a lower dispersion parameter β2 = −1.27 ps2/km and, therefore, a lower number of guard symbols Nz = 125. The overall results do not change significantly, as already observed in [9], and DF-BNFT achieves a performance improvement of almost 6 dB with respect to FNFT detection. The behavior also does not change when using quadrature phase-shift keying (QPSK) symbols in the otherwise same system of Fig. 3 but with lower symbol rate Rs = 10 GBd, longer link length L = 4000 km, and Nz = 160 guard symbols, as shown in Fig. 7b.

 figure: Fig. 6

Fig. 6 Best achievable performance vs rate efficiency for NFDM with different detection strategies and for conventional systems with EDC or DBP. Same scenario of Fig. 3.

Download Full Size | PDF

 figure: Fig. 7

Fig. 7 Best achievable performance vs rate efficiency for NFDM with different detection strategies and for conventional systems with EDC or DBP: (a) low-dispersion fiber with 16QAM symbols, β2 = −1.27 ps2/km, Nz = 125, L = 2000 km, and Rs = 50 GBd; (b) QPSK symbols with β2 = −20.39 ps2/km, Nz = 160, L = 4000 km, and Rs = 10 GBd.

Download Full Size | PDF

7. Validation of the approximation and bounds

The bounds and approximation obtained by replacing (21)(23) into (13) are reported in Fig. 8 for Nb = 256 and Nb = 1024, after conversion to Q-factor. As the Q-factor is directly related to the bit-error probability Pb, the approximation PbPe/M is used, assuming that a symbol error always corresponds to a single bit error. Moreover, if Pe increases, the Q factor decreases, and the other way around. Therefore a lower (or upper) bound for Pe becomes an upper (or lower) bound for QdB2. In order to check their accuracy, they are compared with the performance obtained by numerical simulations for the actual fiber channel. In both cases, the approximation lies between the bounds, asymptotically approaching the lower bound when power increases. At low powers, the approximation is in very good agreement with numerical simulations. On the other hand, near the optimum power, the approximation overestimates the actual performance, which falls slightly below the lower bound. This is due to signal-noise interaction during propagation (for Nb = 256) and to error propagation in the decision-feedback strategy (for Nb = 1024), both neglected in the derivation of the bounds and approximation (21)(23). In fact, when considering the numerical simulations for the AWGN channel in Fig. 8a, and the error-propagation-free simulations in Fig. 8b, they correctly fall between the bounds and are in excellent agreement with the approximation.

 figure: Fig. 8

Fig. 8 Validation of the semianalytic approximation and bounds for the performance of DF-BNFT detection. Same scenario of Fig. 3, with (a) Nb = 256 and (b) Nb = 1024.

Download Full Size | PDF

As already explained, the probability of error for a given sequence Pe in (13) should be averaged over all possible sequences. However, the number of possible sequences MNb is practically unmanageable, making it impossible performing an exact average. Anyway, most sequences contribute in the same way to the average, so that we don’t need to explore all of them, but only account for the most significant ones. This can be done by performing a Monte Carlo average, consisting in randomly generating sequences until the corresponding average performance stabilizes. This is in contrast with the full numerical estimation used in Section 6, in which also the effect of noise is numerically estimated by averaging over many random realizations. To illustrate the difference between the two approaches and show the speed of convergence of the various estimates, Fig. 9 reports the same bounds and estimates shown in Fig. 8a as a function of the number of iterations (corresponding to the number of sequences of length Nb over which the performance is averaged), considering two different values of the mean power. As can be seen, the computation of the semianalytical bounds and approximation requires only a few iterations in all cases, while computing the performance by full numerical simulations requires a number of iterations that depends on the actual error probability and, hence, on the input power, such that a sufficient number of error events are observed. As an example, 30 ÷ 40 iterations suffice for an input power of −9 dBm, while more than 200 iterations are necessary at the optimum input power of −4 dBm.

 figure: Fig. 9

Fig. 9 Convergence of the numerical simulations and of the semianalytic approximation and bounds with the number of iterations (transmitted sequences). Same scenario of Fig. 3, with Nb = 256 at Ps = −9dBm (above) and at optimal power Ps = −4dBm (below).

Download Full Size | PDF

8. Conclusions

Differently than in conventional systems, there is still no theory for optimum detection when using the NFT as a mean to transmit information. As a result, the existing NFT-based transmission schemes mostly rely on reasonable assumptions and are guided by concepts and principles borrowed from the more familiar detection theory for linear systems. This means that big improvements are to be expected as soon as the principles of nonlinear detection theory are better understood. There is a lot still to be discovered, but some well known general principles can be applied independently of the nature of the systems at hand, be it linear or not. For example, this is the case for the MAP detection strategy to be applied in a given communication system, once a statistical knowledge of the channel is available or can be reasonably approximated.

Following this line, by assuming a simple channel model, a novel (suboptimal) detection strategy for NFDM systems, referred to as DF-BNFT, has been introduced in this work. In a nutshell, taking advantage of a peculiar property of the NFT, rather than using a strategy based on the FNFT and the minimization of the Euclidean distance in the nonlinear frequency domain, DF-BNFT takes decisions by minimizing the Euclidean distance in the time domain through BNFT and decision feedback. Moreover, a semianalytical approximation, upper and lower bounds to system performance have been derived, providing an effective tool to estimate system performance without resorting to time-consuming numerical simulations.

As demonstrated by numerical results, the proposed detection strategy allows for a performance improvement of up to 6.2 dB with respect to standard FNFT detection. Despite such a big improvement, also the performance of the proposed DF-BNFT strategy decays when the burst length increases, similarly to what observed for FNFT-based detection [9]. This peculiar behavior forces the use of short bursts, separated by long guard times, severely limiting the overall spectral efficiency achievable by the system. However, while the performance decays in FNFT and DF-BNFT detection appear to be similar, their causes are different: the perturbation of the nonlinear spectrum caused by optical noise (and non-optimally accounted for by the detection metrics) in the former case; the information loss and error propagation caused by the use of the suboptimum strategy (11) in the latter.

Though the persistence of this undesirable behavior might be daunting, in fact making NFDM not yet competitive with conventional systems, the relevant performance improvement obtained by a still sub-optimum strategy is rather encouraging and paves the way for further progresses. Possible future developments include: the implementation of the optimum detection strategy (9) to overcome the limitations induced by (11); the reduction of computational complexity; the optimization of the pulse shape to maximize the achievable spectral efficiency; the investigation of the impact of more practical amplification schemes, such as lumped amplification, in which the lossless path-average model needs to be employed [17,18]; and the extension of the detection strategy to the dual-polarization case. Such developments are required to fully exploit the potentials of the NFDM technique and to understand if it can provide any practical advantages compared to conventional transmission techniques.

Funding

Ente Cassa di Risparmio di Firenze.

References and links

1. S. K. Turitsyn, J. E. Prilepsky, S. T. Le, S. Wahls, L. L. Frumin, M. Kamalian, and S. A. Derevyanko, “Nonlinear Fourier transform for optical data processing and transmission: advances and perspectives,” Optica 4, 307–322 (2017). [CrossRef]  

2. S. T. Le, J. E. Prilepsky, and S. K. Turitsyn, “Nonlinear inverse synthesis for high spectral efficiency transmission in optical fibers,” Opt. Express 22, 26720–26741 (2014). [CrossRef]   [PubMed]  

3. S. T. Le, I. D. Philips, J. E. Prilepsky, P. Harper, A. D. Ellis, and S. K. Turitsyn, “Demonstration of nonlinear inverse synthesis transmission over transoceanic distances,” J. Lightw. Technol. 34, 2459–2466 (2016). [CrossRef]  

4. I. Tavakkolnia and M. Safari, “Dispersion pre-compensation for NFT-based optical fiber communication systems,” in Proceedings of Conference on Lasers and Electro-Optics (CLEO) (IEEE, 2016), pp. 1–2.

5. M. I. Yousefi and F. R. Kschischang, “Information transmission using the nonlinear Fourier transform, Parts I–III,” IEEE Trans. Inform. Theory 60, 4312–4369 (2014). [CrossRef]  

6. M. I. Yousefi and X. Yangzhang, “Linear and nonlinear frequency-division multiplexing,” in Proceedings of European Conference on Optical Communication (ECOC) (VDE, 2016), pp. 1–3.

7. H. Bülow, “Experimental demonstration of optical signal detection using nonlinear Fourier transform,” J. Lightw. Technol. 33, 1433–1439 (2015). [CrossRef]  

8. M. J. Ablowitz and H. Segur, Solitons and the inverse scattering transform, vol. 4 (SIAM, 1981). [CrossRef]  

9. S. Civelli, E. Forestieri, and M. Secondini, “Why noise and dispersion may seriously hamper nonlinear frequency-division multiplexing,” IEEE Photon. Technol. Lett. 29, 1332–1335 (2017). [CrossRef]  

10. I. T. Lima, T. D. DeMenezes, V. Grigoryan, M. O’sullivan, and C. R. Menyuk, “Nonlinear compensation in optical communications systems with normal dispersion fibers using the nonlinear Fourier transform,” J. Lightw. Technol. 35, 5056 (2017). [CrossRef]  

11. J. G. Proakis and M. Salehi, Digital Communications (5th ed.) (McGraw-Hill, 2008).

12. S. Civelli, L. Barletti, and M. Secondini, “Numerical methods for the inverse nonlinear Fourier transform,” in Proceedings of Tyrrhenian International Workshop on Digital Communications (TIWDC) (IEEE, 2015), pp. 13–16.

13. S. Civelli, E. Forestieri, and M. Secondini, “Impact of discretizations and boundary conditions in nonlinear frequency-division multiplexing,” in Proceedings of Fotonica 2016, (IET, 2016), pp. 1–4.

14. E. Grellier and A. Bononi, “Quality parameter for coherent transmissions with Gaussian-distributed nonlinear noise,” Opt. Express 19, 12781–12788 (2011). [CrossRef]   [PubMed]  

15. S. A. Derevyanko, J. E. Prilepsky, and S. K. Turitsyn, “Capacity estimates for optical transmission based on the nonlinear Fourier transform,” Nat. Commun. 7, 12710 (2016). [CrossRef]   [PubMed]  

16. R. A. Shafik, M. S. Rahman, and A. R. Islam, “On the extended relationships among EVM, BER and SNR as performance metrics,” in Proceedings of International Conference of Electrical and Computer Engineering (ICECE) (IEEE, 2006), pp. 408–411.

17. S. T. Le, J. E. Prilepsky, and S. K. Turitsyn, “Nonlinear inverse synthesis technique for optical links with lumped amplification,” Opt. Express 23, 8317–8328 (2015). [CrossRef]   [PubMed]  

18. S. T. Le, V. Aref, and H. Buelow, “Nonlinear signal multiplexing for communication beyond the Kerr nonlinearity limit,” Nat. Photon. 11, 570 (2017). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (9)

Fig. 1
Fig. 1 NFDM with DF-BNFT detection.
Fig. 2
Fig. 2 The NFT causality property for NIS with no ISI on s(t). A train of Gaussian pulses, modulated by 16QAM symbols, and almost ISI-free, is shown before (on the left) and after (on the right) the BNFT. The red signal is generated by 8 symbols, while for the blue one only the first 6 are taken into account. The two optical signals are superimposed for tt6, as for Eq. (5) (baudrate Rs = 50 GBd, optical power Ps = 7 dBm).
Fig. 3
Fig. 3 Performance of the NFDM system for DF-BNFT (solid lines) and standard FNFT (dashed lines) detection for different burst length Nb (and rate efficiency η). 16QAM symbols, β2 = −20.39 ps2/km, Nz = 2000, L = 2000 km, and Rs = 50 GBd.
Fig. 4
Fig. 4 Impact of fiber propagation: performance of DF-BNFT on the fiber link without (solid lines) and with average nonlinear phase compensation (dashed lines) and on the AWGN channel (dotted line). Same scenario of Fig. 3.
Fig. 5
Fig. 5 Impact of error propagation due to decision feedback in the proposed DF-BNFT detection strategy: actual performance (solid lines), and error-propagation-free performance (dotted lines). Same scenario of Fig. 3.
Fig. 6
Fig. 6 Best achievable performance vs rate efficiency for NFDM with different detection strategies and for conventional systems with EDC or DBP. Same scenario of Fig. 3.
Fig. 7
Fig. 7 Best achievable performance vs rate efficiency for NFDM with different detection strategies and for conventional systems with EDC or DBP: (a) low-dispersion fiber with 16QAM symbols, β2 = −1.27 ps2/km, Nz = 125, L = 2000 km, and Rs = 50 GBd; (b) QPSK symbols with β2 = −20.39 ps2/km, Nz = 160, L = 4000 km, and Rs = 10 GBd.
Fig. 8
Fig. 8 Validation of the semianalytic approximation and bounds for the performance of DF-BNFT detection. Same scenario of Fig. 3, with (a) Nb = 256 and (b) Nb = 1024.
Fig. 9
Fig. 9 Convergence of the numerical simulations and of the semianalytic approximation and bounds with the number of iterations (transmitted sequences). Same scenario of Fig. 3, with Nb = 256 at Ps = −9dBm (above) and at optimal power Ps = −4dBm (below).

Equations (24)

Equations on this page are rendered with MathJax. Learn more.

K ( x , y ) σ F * ( x + y ) + σ x x K ( x , r ) F ( r + s ) F * ( s + y ) d r d s = 0 ,
F ( y ) = 1 2 π ρ ( λ ) e j λ y d λ .
s ( t ) = k = 1 N b x k g [ t ( k 1 ) T s ]
ρ ( λ ) = S ( λ / π ) .
r ( t ) | t t k = 𝒢 { x 1 , . . , x k } ,
r ˜ ( t ) = r ( t ) + n ( t ) ,
x ^ = argmax x p ( r ˜ | x ) .
x ^ = argmax x k = 1 N b p ( r ˜ k | x ) = argmax x k = 1 N b ln p ( r ˜ k | x ) ,
x ^ = argmax x k = 1 N b ln p ( r ˜ k | ( x 1 , , x k ) ) .
p ( r ˜ k | ( x 1 , , x k ) = 1 ( π σ 2 ) ν exp ( r ˜ k r k 2 / σ 2 )
x ^ k = argmax X i { X 1 , . . , X M } ln p ( r ˜ k | ( x ^ 1 , , x ^ k 1 , X i ) )
x ^ k = argmin X i { X 1 , . . , X M } r ˜ k r k ( i ) 2
P e = 1 M N b k = 1 N b m = 1 M P k ( m ) .
E m = { X m is not preferred when deciding on x k } = i = 1 i m M E m , i
P k ( m ) = P ( E m | ( x ^ 1 , , x ^ k 1 , X m ) ) = P ( i = 1 i m M E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) i = 1 i m M P ( E m , i | ( x ^ 1 , , x ^ k 1 , X m ) )
P ( E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) = 𝒬 ( d k ( m , i ) 2 σ )
d k ( m , i ) = r k ( m ) r k ( i )
P k ( m ) = P ( i = 1 i m M E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) = 1 P ( i = 1 i m M C m , i | ( x ^ 1 , , x ^ k 1 , X m ) )
P k ( m ) 1 i = 1 i m M ( 1 P ( E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) )
P k ( m ) = P ( i = 1 i m M E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) max i m P ( E m , i | ( x ^ 1 , , x ^ k 1 , X m ) ) .
P k ( m ) i = 1 i m M 𝒬 ( d k ( m , i ) 2 σ )
P k ( m ) 1 i = 1 i m M ( 1 𝒬 ( d k ( m , i ) 2 σ ) )
P k ( m ) 𝒬 ( d k 2 σ )
d k = min i m d k ( m , i )
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.