Erwin Patzak

Learn More
In this paper, we show the benefit of an integrated analysis of performance and technology, as both signal degradation and burst losses limit the effective throughput of optical burst switching nodes. The investigation covers the Tune-andSelect (TAS) base architecture as well as extensions with dedicated and shared FDL buffers. First, we describe these node(More)
In this paper different variations of the so-called “Tune-and-Select” (TAS) switching node for Optical Burst Switching (OBS) are investigated. Both signal degradation and burst losses limit the effective throughput of such optical burst switching nodes. These limitations are analysed for different nodes with four input/output fibres at different bit rates.(More)
Transmitting optical bursts through a chain of erbium-doped fiber amplifiers (EDFAs) results in dynamic gain changes, which in turn lead to possibly large variations in output power of the data channels. There are many proposals how to control these optical amplifiers in order to minimize or eliminate the power variations. In this paper, we investigate the(More)
Several types of ASK multiport homodyne receivers are investigated, and the impact of the phase noise and of the shot noise on these receivers is analyzed. The simplest structure is the conventional multiport receiver with a matched filter in each branch. This structure can tolerate AvT (Av is the laser linewidth and T is the bit duration) of several(More)
In this paper we analyze the limits of effective throughput for TCP segments through an optical burst switching (OBS) network. Wavelength conversion and deflection routing are considered as contention resolution methods. The work shows that there is a strong interaction between TCP congestion avoidance mechanisms and the load dependant contention in the OBS(More)
In two-layer networks there are various ways to improve virtual and physical topology and capacity allocations in terms of cost. One way is introducing bypass links, to reduce the amount of switching in the upper layer. Our approach for finding the bypass links and the corresponding bypass nodes is based on a mixed integer programming approach. Our starting(More)