Please wait a minute...

Current Issue

    15 January 2015, Volume 31 Issue 1
    View the focus
    Strategic Thinking on SDN
    Leping Wei
    2015, 31(1):  1-6.  doi:10.11959/j.issn.1000-0801.2015016
    Asbtract ( 277 )   HTML ( 6)   PDF (1229KB) ( 757 )   Knowledge map   
    References | Related Articles | Metrics

    Comprehensive analysis on global and disruptive impacts to telecom industry due to SDN development from strategic vision was made. It was started from the introduction on meaning and similarity and difference of SDN and NFV. Comparison on basic characteristics between telecom industry and information industry was made and exploration and lessons of telecom industry before SDN were analyzed. In the following part, fundamental problems of existing networks and major driving forces for SDN development were investigated. Next basic characteristics and five key values of SDN and application prospect were described. Finally major challenges for SDN development were presented and key points of thinking on SDN from strategic vision were summarized.

    research and development
    Micro-Blog Recommendation Based on User Interests and Recommendation Trust Domain
    Yabin Xu,Chao Liu,Zhuang Wu
    2015, 31(1):  7-14.  doi:10.11959/j.issn.1000-0801.2015042
    Asbtract ( 280 )   HTML ( 3)   PDF (1768KB) ( 386 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recommending micro-blogs to users whom are interested in is an important way to improve the user's experience. In order to make the recommended micro-blog more match user's interests and tastes, a micro-blog recommendation method was proposed. The method considers not only user's own characteristics, but also the evaluation from the user's community. In technology, vector machine(SVM)was supported for text classification to discover user interests, and through multidimensional Newman algorithm to discover user's community. This community will be regarded as the recommendation trust domain. Finally, the improved collaborative filtering algorithm was used. It integrated user's interests and recommendation trust domain to recommend micro-blog, in order to improve the quality of micro-blog recommendation. The experimental results show that, the micro-blog recommendation method is practical and effective.

    Congestion-Aware Incentive Scheme Based on Double Auction for DTN
    Qingfeng Jiang,Chaoguang Men,Meijuan Jia,Xiaoxu Cheng
    2015, 31(1):  15-22.  doi:10.11959/j.issn.1000-0801.2015027
    Asbtract ( 182 )   HTML ( 1)   PDF (1989KB) ( 353 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To stimulate the DTN selfish nodes to cooperatively forward messages when the buffer was limited, a congestion-aware incentive scheme based on double auction for DTN was proposed. In the scheme, nodes determined the self congestion degree according to the current free buffer and message receiving rate. Combining the message delivery probability and congestion degree, nodes traded the message based on double auction model, thereby achieved the cooperation between nodes. Extensive simulations were carried out on real-world traces to evaluate the proposed scheme. The experimental results show that, due to the congestion aware, the incentive scheme can further stimulate selfish nodes to cooperatively forward messages, improve the message delivery ratio and reduce the message delivery delay.

    Research on Large-Scale Social Network Graph Data Mining in Telecommunication
    Lijiao Liu,Juncai Tao,Xiaojun Xiao,Yu Lu
    2015, 31(1):  23-31.  doi:10.11959/j.issn.1000-0801.2015035
    Asbtract ( 410 )   HTML ( 13)   PDF (4048KB) ( 936 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the telecommunications technology, telephone call network almost covered the whole society; the huge social network presents tremendous opportunities for telecommunication companies. Especially in the increasing fierce market competition, more and more telecommunication companies are concerned on maintaining customer relationship, mining customer potential value and marketing suitable target customers. The distribute and stand-alone graph computing frameworks and tools were researched for mining large-scale social network graph data like telecommunication network, and at the end the feasibility and usability of Graphchi in large-scale graph datasets were verified and a graph mining application was made with telecommunication data using stand-alone graph data processing tool—Graphchi.

    Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture
    Yingbiao Yao,Xiaojuan Li
    2015, 31(1):  32-40.  doi:10.11959/j.issn.1000-0801.2015006
    Asbtract ( 253 )   HTML ( 8)   PDF (1704KB) ( 707 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce the intra coding complexity of HEVC, a fast block partitioning algorithm based on spatial correlation and image texture was proposed. Firstly, a concept of most possible depth range(MPDR)was proposed according to the correlation analysis of adjacent CTU depth range. Secondly, the difference between the current CTU texture and neighboring CTU texture was analyzed by detecting the dominant edge direction. According to the texture difference, the depth range of the current CTU was chose from MPDR and the origin range 0~3. Finally, a formula for texture complex threshold was formed by statistical calculation. Before CU coding, detect the texture complexity of the current CU by comparing the pixel variance and threshold, determine whether or not to skip the current unit coding calculation. Compared with HM13.0, experimental results reveal that the proposed algorithm can save about 20% computational complexity on average whereas the average bit rate increment is 0.84% and the decrement of PSNR is 0.04 dB.

    Research on Code-Division Multiple-Access of DS-SS/EBPSK Modulation
    Peng Zhang,Lenan Wu
    2015, 31(1):  41-45.  doi:10.11959/j.issn.1000-0801.2015031
    Asbtract ( 212 )   HTML ( 0)   PDF (1126KB) ( 271 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to realize multiple-access communication of direct sequence spread spectrum extended binary phase shift keying(DS-SS/EBPSK)modulation, a realization method based on code-division was researched. Firstly, based on the analysis of DS-SS/EBPSK modulation signal, the effective spread spectrum sequence which can be used for dispreading and code division multiple-access was obtained by formulizing the DS-SS/EBPSK modulation process. Then, the correlation receiver for DS-SS/EBPSK modulation signal detection was designed and the multiple-access transmission was realized by making use of the small-scale cross-correlation of different spread spectrum sequences. Finally, take m sequence for example, the relationship between bit error rate(BER) performance of the expected user and the number of users was simulated, so did the relationship between BER performance of the expected user and the cycle length of m sequence. The simulation results demonstrate the feasibility of the code-division multiple-access realization method and indicate that the interference degree depends on the cross-correlation of the spread spectrum sequences.

    Private Cloud Assistant Trust Model for P2P Secure Transactions
    Wei Lin,Xianghan Zheng
    2015, 31(1):  46-52.  doi:10.11959/j.issn.1000-0801.2015015
    Asbtract ( 267 )   HTML ( 3)   PDF (1579KB) ( 536 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Secure transactions among P2P peers are critical for system stability. Considering existing security breaches, a private cloud assistant trust model for P2P session negotiation and connection was proposed. With a few characteristics during computing and storage process(e.g. high efficiency, security, neutrality), private cloud platform is capable to provide trustworthiness calculation, storage and evaluation for each peer in P2P network. Some coping mechanisms were proposed to curb malicious behaviors, such as low quality services, false recommendation and strategic fraud attaches. Simulation result shows that the proposed model has feasibility, efficiency and dynamic adaptability.

    A Novel FM-DCSK Secure Communication System
    Gang Zhang,Yuan Wang,Ying Wang
    2015, 31(1):  53-57.  doi:10.11959/j.issn.1000-0801.2015005
    Asbtract ( 219 )   HTML ( 0)   PDF (1253KB) ( 468 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The bit energy of chaotic signals in DCSK system is not stable,which will cause the estimation interference and the bit error rate decline. At the same time, the system's transmission rate is lower and the security is poorer compared with other system. In order to solve these problems, a novel FM-DCSK secure communication system was proposed which was combined the FM modulation with the modified DCSK system.The bit energy of signals remained stable by using FM modulation so that the BER performance in such system can be improved. Meanwhile, the system was also combined with the modified DCSK system which uses two-channel scheme, therefore it can improve the transmission efficiency and further improve the security performance. Finally, the theoretical analysis and the simulation results prove that the relative performance in this proposed system can be greatly improved.

    Analysis Model of Gateway in Wireless Mesh Network Based on M/M/1 Queuing Model
    Taoshen Li,Hongyu Zhang,Jin Ye,Zhihui Ge
    2015, 31(1):  58-64.  doi:10.11959/j.issn.1000-0801.2015044
    Asbtract ( 245 )   HTML ( 1)   PDF (1754KB) ( 470 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the characteristics of M/M/1 model and production features of customer request service in the wireless mesh network, a gateway queuing model in wireless mesh network based on M/M/1 model was constructed. The model puts the original disorder state sets in request service into order sets and it was queued at the gateway node. As a single service platform, gateway services in the whole collection. Then, to solve the model by using the mathematical method, the network system key parameters and target analysis function were derived. Finally, through verification experiment, the proposed model can obtain better network parameters in the network of non-saturated resource allocation. The theory analysis and experimental results show that the proposed model is reasonable and effective.

    Energy-Efficient Virtual Machine Migration and Consolidation Algorithm in Cloud Data Center
    Hongjian Li,Yu Dai,Rui Liu,Yi Jiang
    2015, 31(1):  65-71.  doi:10.11959/j.issn.1000-0801.2015033
    Asbtract ( 199 )   HTML ( 1)   PDF (1811KB) ( 549 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An energy-efficient virtual machine(VM)migration and consolidation algorithm with multi-resource was proposed. The algorithm was developed based on a multi-resource energy efficiency model. A method of multi-resource utilization double threshold was designed to trigger migration of virtual machine, and the optical particle swarm optimization method was introduced in the consolidation of virtual machine. Compared with traditional heuristic algorithms, the algorithm reduces the number of active physical nodes and the amount of VM's migration effectively, and obtains better energy efficiency in cloud data center.

    An Improved Algorithm for TD-LTE Downlink Time Synchronization
    Wenle Bai,Xu Wang,Yongmei Zhang,Mugen Peng
    2015, 31(1):  72-76.  doi:10.11959/j.issn.1000-0801.2015030
    Asbtract ( 191 )   HTML ( 2)   PDF (1161KB) ( 354 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aimed at the application problem of timing synchronization algorithm in orthogonal frequency division multiplexing system, an improved algorithm for TD-LTE downlink time synchronization was proposed. It utilizes statistical energy difference and correlation of cyclic prefix to improve the system performance, which reduces the computational complexity, and can detect the cyclic prefix types. The simulation results demonstrate that the performance of the new method is excellent in multi-path fading channels, especially in the case of small SNR. And it is robust against the normalized frequency offset and Doppler shift.

    Improved Workload Distribution Scheme in Hybrid Cloud Setting
    Ying Liu,Quan Gan,Yu Wang
    2015, 31(1):  77-83.  doi:10.11959/j.issn.1000-0801.2015024
    Asbtract ( 186 )   HTML ( 0)   PDF (1383KB) ( 362 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. Aiming at the restrictions in different levels for public cloud usage, the optimal risk-aware workload distribution problem was formalized as a mechanism for workload response time minimization. A dynamic programming approach that results in an optimal distribution of the query workload was proposed, which that searches for an optimal computation and data partitioning scheme given a query workload and public cloud usage boundaries(resource allocation cost and sensitive data disclosure). Finally, the performance of the dynamic programming approach was evaluated. Experimental results show that the proposed scheme can lead to a major performance gain by exploiting both the hybrid cloud components without violating any pre-determined public cloud usage constraints.

    A Novel Beam Downtilt Selection Method for 3D Active Antenna System Based Cellular Network
    Kai Wang,Liang Zhang,Guoping Tan
    2015, 31(1):  84-88.  doi:10.11959/j.issn.1000-0801.2015007
    Asbtract ( 249 )   HTML ( 1)   PDF (1484KB) ( 624 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traditional 2D active antenna system can only carry on horizontal beam steering in cellular mobile radio system. The existing 3D active antenna system based cellular network can obtain large throughput gain with the use of vertical beam steering. The existing beam downtilt selection method for 3D active antenna system is based on the information of pitch angle. The received power of the user is very low. A novel beam downtilt selection method for 3D active antenna system was proposed to improve the received power, which is based on the received reference signal power. Simulation results show that the proposed method can improve the average throughput of the cell and the system performance sharply.

    Component Carrier Selection and Beamforming Jointly in LTE-Advanced Heterogeneous Network
    Rui Fang,Changyin Sun,Guangyue Lu,Longlong Zheng
    2015, 31(1):  89-93.  doi:10.11959/j.issn.1000-0801.2015004
    Asbtract ( 190 )   HTML ( 0)   PDF (1598KB) ( 267 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To deal with the interference between macro cell and pico cell, or between pico cell themselves in LTE-Advanced heterogeneous network, joint algorithm of component carrier selection and beamforming was proposed. By shutting down a subset of the component carrier in the dense low power node deployment scenario,it could remove lots of interference at the receive side. Additionally, based on utility function and calculate separately, algorithm reduced the dimensions and the searching complexity of the algorithm. Simulation results show that the proposed scheme can bring a great throughput gain of edge users and the whole system in the heterogeneous network.

    Multiuser OFDM Adaptive Resource Allocation Based on Differential Evolution Algorithm
    Yangkun Zhu,Xinyu Da,Yapu Zhang
    2015, 31(1):  94-99.  doi:10.11959/j.issn.1000-0801.2015003
    Asbtract ( 236 )   HTML ( 0)   PDF (1590KB) ( 519 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved subcarrier and power allocation algorithms based on differential evolution algorithm was proposed for the adaptive resource allocation problem of multiuser orthogonal frequency division multiplexing. Subcarrier allocation was first implemented to distribute the total power uniformly on each subcarrier. Then via adding the step of detecting and improving constraints to improve the differential evolution algorithm and using it to achieve power allocation with a fitness function of the user's fairness and system capacity. Computer simulation results show that the proposed algorithm can achieve high improvement of the system capacity under low complexity and maintaining the fairness among users, the effectiveness of the algorithm was verified.

    Spatial Correlation Analysis of 3D MIMO Array
    Chang Mu,Junliang Yao,Zhenhe Cai
    2015, 31(1):  100-105.  doi:10.11959/j.issn.1000-0801.2015001
    Asbtract ( 297 )   HTML ( 5)   PDF (1763KB) ( 954 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The spatial correlation of 3D MIMO arrays was investigated. First, the accurate channel model for 3D-MIMO in global coordinate system was presented. Based on the channel model, the closed-form formula of spatial correlation coefficient for different array position under Laplace power angle spectrum(PAS)distribution was derived. Finally, three examples were provided to confirm the validity of our analysis, and the reasons for generating spatial correlation were obtained.

    summarize
    5G Radio Access Network Architecture Based on C-RAN
    Qiuyan Lei,Zhizhong Zhang,Fang Cheng,Haonan Hu
    2015, 31(1):  106-115.  doi:10.11959/j.issn.1000-0801.2015028
    Asbtract ( 796 )   HTML ( 18)   PDF (2764KB) ( 1647 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of the traditional cellular structure of the radio access network(RAN)which is facing more and more challenges, the development trend and demand of current mobile communication system were introduced, and the research goal and requirement for the fifth generation mobile communication system(5G)were analyzed. Aiming at solving this problem, a new type of radio access network architecture based on C-RAN was proposed. Moreover, the potential key technologies were illustrated in detail, including UDN, virtualization(software defined network and network function virtualization), CDN and green communication. Those provide reference for 5G access network architecture research.

    Research on Technology and Industry Developments of Photonic Integrated Circuits
    Bingbing Wu,Wenyu Zhao,Haiyi Zhang
    2015, 31(1):  116-121.  doi:10.11959/j.issn.1000-0801.2015009
    Asbtract ( 503 )   HTML ( 27)   PDF (1953KB) ( 1684 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The photonic integrated circuits(PIC)are main trend of optical components. The developments of PIC on both technology and industry perspectives were studied, then challenges and future application prospects of PIC were discussed. Finally, the strategies of PIC developments in China were proposed.

    Wide operating technology
    Discussion of the Value and Implementation Strategy Brought by Frequency Re-Farming in China Mobile Industry
    Dongzhao Zhu,Junxiao Shi,Yi Yu
    2015, 31(1):  122-127.  doi:10.11959/j.issn.1000-0801.2015017
    Asbtract ( 447 )   HTML ( 2)   PDF (1251KB) ( 837 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The issues of investments on mobile network and its coverage affected by different wireless spectrum was studied, with the importance and desirability of frequency re-farming being analyzed systematically in reference to the current spectrum resource allocation and development status of mobile services in China. The value brought by frequency re-farming was explored from the perspective of cooperative networking and mobile network deployment, as the implementation strategy of frequency re-farming was proposed.

    Study on Data Modeling and Collection in OSS Based on Hadoop
    Lei Lei,Jingwen Li,Dapeng Gong,Rui Wang,Lei Su,Ningjiang Chen
    2015, 31(1):  128-138.  doi:10.11959/j.issn.1000-0801.2015021
    Asbtract ( 431 )   HTML ( 15)   PDF (3628KB) ( 900 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the data acquisition and the modeling problem of telecom operators facing in the construction of EDC, the data status and data characteristics in the OSS was analyzed, a modeling method of hierarchical classification of combing theory and data model management idea were proposed, the unification of OSS data collection, sharing the modeling and data concentration were realized. Through the application of end to end analysis on mobile internet terminal as case subject,it provides reference for the construction on telecom industry EDC.

    Research on the Same Frequency Interference on EGSM Uplink Signal from CDMA Downlink Signal
    Fangyuan Lei,Gang Lei
    2015, 31(1):  139-145.  doi:10.11959/j.issn.1000-0801.2015002
    Asbtract ( 204 )   HTML ( 0)   PDF (6947KB) ( 402 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The major factor affecting the EGSM network performance is the same frequency external interference from CDMA of other country in the border areas. A case which EGSM operator subject to a wide range of strong external interference by same frequency of neighbor country CDMA operators was analyzed, then a solution to reduce this external interference was proposed. Firstly, with KPI statistical and DT test analyze, the external interference source was located, and the intensity and scope of the effects also was confirmed. Then, using the rural Hata propagation model theoretically, the impact and scope of CDMA interference was analyzed; combined with the respiratory effects of CDMA network, the differences between day and night EGSM external interference were analyzed. Final, the solution was proposed, which use deviate cell of border to carry traffic, use the clean frequency band to plan or use the 1 800 MHz frequency to carry the traffic. Those solution weakened external interference, the KPI and user effecting of EGSM network has achieved good results.

    Segmentation Strategy of Streaming Media Based on Popularity Classifying
    Yushan Deng,Ge Chen,Jun Zhang,Jie Liang
    2015, 31(1):  146-151.  doi:10.11959/j.issn.1000-0801.2015034
    Asbtract ( 212 )   HTML ( 0)   PDF (1766KB) ( 293 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The characteristics of external and internal popularity of streaming media and the relationship of external popularity and the number of cache replacement were analyzed. Respecting the characteristics that cache replacements are focus on a small rang of popularity, a segmentation method based on popularity classifying of streaming media, which uses smaller segments on videos replaced frequently and bigger segments on the other videos, was proposed. The experimental result shows that the segmentation method can effectively reduce the number of segments compared with the uniform segmentation method under the same conditions of the byte hit ratio.

    Research on MTRF Deployment Scheme of 4G Mobile Network
    Zhigang Xie,Weihua Bao
    2015, 31(1):  152-158.  doi:10.11959/j.issn.1000-0801.2015040
    Asbtract ( 379 )   HTML ( 3)   PDF (1830KB) ( 563 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The LTE provides voice services for users by CSFB technology. The MTRF function can solve the problems that unsuccessful circuit switched fallback on the edge of CSFB. The deployment of MTRF function involves the range of network remake. By analyzed the problem of unsuccessful circuit switched fallback on the edge of CSFB and studied the principle of MTRF, two deployment proposal were provided. They could be used in different scales of networks. The results could be provided a reference for the follow -up network construction.

    Design of Routing Home Gateway in Large-Scale Commercial Engineering Deployment of IPv6
    Peiliang Sun,Xiang Zhou,Zhonghua Chen
    2015, 31(1):  159-163.  doi:10.11959/j.issn.1000-0801.2015043
    Asbtract ( 312 )   HTML ( 2)   PDF (1298KB) ( 753 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By analyzing the technology evolution of IPv6 in the deployment of IPng, indicate the difficulties to CP in large-scale deployment of IPv6 terminals. Combined with HG's key role in IPv6 network construction, the technical principle of HG was analyzed, the technical advantages of routing HG in large-scale deployment of IPv6 terminals were explained, and an implementable scheme was proposed to help CP, and the whole industry, to speed up the scale deployment of IPv6.

    Discuss on the Exploration and Practice of Information Communication Network Fault in the Centralized Monitoring Mode
    Yang Wang
    2015, 31(1):  164-170.  doi:10.11959/j.issn.1000-0801.2015008
    Asbtract ( 316 )   HTML ( 3)   PDF (1890KB) ( 691 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the information communication network equipment functions and business services, intensive management of the information communication network is gradually turning into a new management model. The influencing factors of management span planning were discussed based on flatting centralized monitoring and hierarchical fault management. The functional mechanism, announcements, strategies and methods were discussed from the six fault management aspects(equipment alarm obtaining, alarm standardized management, alarm rules and analysis, fault work order pretreatment, channel optimization and contingency plan, process through and quality control). The engineering practical value and management supporting values of emerging technology were analyzed in centralized fault management,such as big data technology,virtualization technology,etc.

    Automatic Verification Analysis Technology of Network Security Domain
    Xiaofeng Liu,Bin Tan,Lan Qiu,Huanru Wang
    2015, 31(1):  171-175.  doi:10.11959/j.issn.1000-0801.2015020
    Asbtract ( 224 )   HTML ( 1)   PDF (1305KB) ( 519 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.

    Spatial Correlation Analysis of 3D MIMO Array
    Mu Chang,Yao Junliang and Cai Zhenhe
    2015, 31(1):  2015001. 
    Asbtract ( 504 )   Knowledge map   
    Related Articles | Metrics
    The spatial correlation of 3D MIMO arrays was investigated. First, the accurate channel model for 3D-MIMO in global coordinate system was presented. Based on the channel model, the closed-form formula of spatial correlation coefficient for different array position under Laplace power angle spectrum(PAS) distribution was derived. Finally, three examples were provided to confirm the validity of our analysis, and the reasons for generating spatial correlation were obtained.


    论文引用格式:穆 昌,姚俊良,蔡振合.三维MIMO阵列空间相关性分析.电信科学,2015001
    Mu C,Yao J L,Cai Z H.Spatial correlation analysis of 3D MIMO array.Telecommunications Science,2015001
    Research on the Same Frequency Interference on EGSM Uplink Signal from CDMA Downlink Signal
    Lei Fangyuan and Lei Gang
    2015, 31(1):  2015002. 
    Asbtract ( 500 )   Knowledge map   
    Related Articles | Metrics
    The major factor affecting the EGSM network performance is the same frequency external interference from CDMA of other country in the border areas. A case which EGSM operator subject to a wide range of strong external interference by same frequency of neighbor country CDMA operators was analyzed, then a solution to reduce this external interference was proposed. Firstly, with KPI statistical and DT test analyze, the external interference source was located, and the intensity and scope of the effects also was confirmed. Then, using the rural Hata propagation model theoretically, the impact and scope of CDMA interference was analyzed; combined with the respiratory effects of CDMA network, the differences between day and night EGSM external interference were analyzed. Final, the solution was proposed, which use deviate cell of border to carry traffic, use the clean frequency band to plan or use the 1 800 MHz frequency to carry the traffic. Those solution weakened external interference, the KPI and user effecting of EGSM network has achieved good results.


    论文引用格式:雷方元,雷 刚.CDMA下行信号对EGSM上行信号的同频干扰研究.电信科学,2015002
    Lei F Y,Lei G.Research on the same frequency interference on EGSM uplink signal from CDMA downlink signal.Telecommunications Science,2015002
    Multiuser OFDM Adaptive Resource Allocation Based on Differential Evolution Algorithm
    Zhu Yangkun,Da Xinyu and Zhang Yapu
    2015, 31(1):  2015003. 
    Asbtract ( 365 )   Knowledge map   
    Related Articles | Metrics
    An improved subcarrier and power allocation algorithms based on differential evolution algorithm was proposed for the adaptive resource allocation problem of multiuser orthogonal frequency division multiplexing. Subcarrier allocation was first implemented to distribute the total power uniformly on each subcarrier. Then via adding the step of detecting and improving constraints to improve the differential evolution algorithm and using it to achieve power allocation with a fitness function of the user’s fairness and system capacity. Computer simulation results show that the proposed algorithm can achieve high improvement of the system capacity under low complexity and maintaining the fairness among users, the effectiveness of the algorithm was verified.


    论文引用格式:祝杨坤,达新宇,张亚普.基于差分进化算法的多用户OFDM自适应资源分配.电信科学,2015003
    Zhu Y K,Da X Y,Zhang Y P.Multiuser OFDM adaptive resource allocation based on differential evolution algorithm.Telecommunications Science,2015003
    Component Carrier Selection and Beamforming Jointly in LTE-Advanced Heterogeneous Network
    Fang Rui,Sun Changyin,Lu Guangyue and Zheng Longlong
    2015, 31(1):  2015004. 
    Asbtract ( 452 )   Knowledge map   
    Related Articles | Metrics
    To deal with the interference between macro cell and pico cell, or between pico cell themselves in LTE-Advanced heterogeneous network, joint algorithm of component carrier selection and beamforming was proposed. By shutting down a subset of the component carrier in the dense low power node deployment scenario, it could remove lots of interference at the receive side. Additionally, based on utility function and calculate separately, algorithm reduced the dimensions and the searching complexity of the algorithm. Simulation results show that the proposed scheme can bring a great throughput gain of edge users and the whole system in the heterogeneous network.


    论文引用格式:方 锐,孙长印,卢光跃等.LTE-Advanced异构网中载波选择与波束成形联合算法.电信科学,2015004
    Fang R,Sun C Y,Lu G Y,et al.Component carrier selection and beamforming jointly in LTE-Advanced heterogeneous network.Telecommunications Science,2015004
    A Novel FM-DCSK Secure Communication System
    Zhang Gang,Wang Yuan and Wang Ying
    2015, 31(1):  2015005. 
    Asbtract ( 393 )   Knowledge map   
    Related Articles | Metrics
    The bit energy of chaotic signals in DCSK system is not stable, which will cause the estimation interference and the bit error rate decline. At the same time, the system’s transmission rate is lower and the security is poorer compared with other system. In order to solve these problems, a novel FM-DCSK secure communication system was proposed which was combined the FM modulation with the modified DCSK system. The bit energy of signals remained stable by using FM modulation so that the BER performance in such system can be improved. Meanwhile, the system was also combined with the modified DCSK system which uses two-channel scheme, therefore it can improve the transmission efficiency and further improve the security performance. Finally, the theoretical analysis and the simulation results prove that the relative performance in this proposed system can be greatly improved.


    论文引用格式:张 刚,王 源,王 颖.一种新型FM-DCSK保密通信系统.电信科学,2015005
    Zhang G,Wang Y,Wang Y.A novel FM-DCSK secure communication system.Telecommunications Science,2015005
    Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture
    Yao Yingbiao and Li Xiaojuan
    2015, 31(1):  2015006. 
    Asbtract ( 362 )   Knowledge map   
    Related Articles | Metrics
    In order to reduce the intra coding complexity of HEVC, a fast block partitioning algorithm based on spatial correlation and image texture was proposed. Firstly, a concept of most possible depth range(MPDR) was proposed according to the correlation analysis of adjacent CTU depth range. Secondly, the difference between the current CTU texture and neighboring CTU texture was analyzed by detecting the dominant edge direction. According to the texture difference, the depth range of the current CTU was chose from MPDR and the origin range 0~3. Finally, a formula for texture complex threshold was formed by statistical calculation. Before CU coding, detect the texture complexity of the current CU by comparing the pixel variance and threshold, determine whether or not to skip the current unit coding calculation. Compared with HM13.0, experimental results reveal that the proposed algorithm can save about 20% computational complexity on average whereas the average bit rate increment is 0.84% and the decrement of PSNR is 0.04 dB.


    论文引用格式:姚英彪,李晓娟.基于图像空间相关性与纹理的HEVC块划分快速算法.电信科学,2015006
    Yao Y B,Li X J.Fast block partitioning algorithm for HEVC based on spatial correlation and image texture.Telecommunications Science,2015006
    A Novel Beam Downtilt Selection Method for 3D Active Antenna System Based Cellular Network
    Wang Kai,Zhang Liang and Tan Guoping
    2015, 31(1):  2015007. 
    Asbtract ( 359 )   Knowledge map   
    Related Articles | Metrics
    Traditional 2D active antenna system can only carry on horizontal beam steering in cellular mobile radio system. The existing 3D active antenna system based cellular network can obtain large throughput gain with the use of vertical beam steering. The existing beam downtilt selection method for 3D active antenna system is based on the information of pitch angle. The received power of the user is very low. A novel beam downtilt selection method for 3D active antenna system was proposed to improve the received power, which is based on the received reference signal power. Simulation results show that the proposed method can improve the average throughput of the cell and the system performance sharply.


    论文引用格式:王 凯,张 亮,谭国平.一种新颖的3D有源天线基站组网波束下倾角选择方法.电信科学,2015007
    Wang K,Zhang L,Tan G P.A novel beam downtilt selection method for 3D active antenna system based cellular network.Telecommunications Science,2015007
    Discuss on the Exploration and Practice of Information Communication Network Fault in the Centralized Monitoring Mode
    Wang Yang
    2015, 31(1):  2015008. 
    Asbtract ( 359 )   Knowledge map   
    Related Articles | Metrics
    With the development of the information communication network equipment functions and business services, intensive management of the information communication network is gradually turning into a new management model. The influencing factors of management span planning were discussed based on flatting centralized monitoring and hierarchical fault management. The functional mechanism, announcements, strategies and methods were discussed from the six fault management aspects(equipment alarm obtaining, alarm standardized management, alarm rules and analysis, fault work order pretreatment, channel optimization and contingency plan, process through and quality control). The engineering practical value and management supporting values of emerging technology were analyzed in centralized fault management, such as big data technology, virtualization technology, etc.


    论文引用格式:王 洋.集中监控模式下的信息通信网络故障管理探索与实践.电信科学,2015008
    Wang Y.Discuss on the exploration and practice of information communication network fault in the centralized monitoring mode.Telecommunications Science,2015008
    Research on Technology and Industry Developments of Photonic Integrated Circuits
    Wu Bingbing,Zhao Wenyu and Zhang Haiyi
    2015, 31(1):  2015009. 
    Asbtract ( 396 )   Knowledge map   
    Related Articles | Metrics
    The photonic integrated circuits (PIC) are main trend of optical components. The developments of PIC on both technology and industry perspectives were studied, then challenges and future application prospects of PIC were discussed. Finally, the strategies of PIC developments in China were proposed.


    论文引用格式:吴冰冰,赵文玉,张海懿.光子集成技术及产业发展研究.电信科学,2015009
    Wu B B,Zhao W Y,Zhang H Y.Research on technology and industry developments of photonic integrated circuits.Telecommunications Science,2015009
    Private Cloud Assistant Trust Model for P2P Secure Transactions
    Lin Wei and Zheng Xianghan
    2015, 31(1):  2015015. 
    Asbtract ( 361 )   Knowledge map   
    Related Articles | Metrics
    Secure transactions among P2P peers are critical for system stability. Considering existing security breaches, a private cloud assistant trust model for P2P session negotiation and connection was proposed. With a few characteristics during computing and storage process (e.g. high efficiency, security, neutrality), private cloud platform is capable to provide trustworthiness calculation, storage and evaluation for each peer in P2P network. Some coping mechanisms were proposed to curb malicious behaviors, such as low quality services, false recommendation and strategic fraud attaches. Simulation result shows that the proposed model has feasibility, efficiency and dynamic adaptability.


    论文引用格式:林 伟,郑相涵.基于私有云信任度量的对等网络节点安全互联模型.电信科学,2015015
    Lin W,Zheng X H.Private cloud assistant trust model for P2P secure transactions.Telecommunications Science,2015015
    Strategic Thinking on SDN
    Wei Leping
    2015, 31(1):  2015016. 
    Asbtract ( 502 )   Knowledge map   
    Related Articles | Metrics
    Comprehensive analysis on global and disruptive impacts to telecom industry due to SDN development from strategic vision was made. It was started from the introduction on meaning and similarity and difference of SDN and NFV. Comparison on basic characteristics between telecom industry and information industry was made and exploration and lessons of telecom industry before SDN were analyzed. In the following part, fundamental problems of existing networks and major driving forces for SDN development were investigated. Next basic characteristics and five key values of SDN and application prospect were described. Finally major challenges for SDN development were presented and key points of thinking on SDN from strategic vision were summarized.


    论文引用格式:韦乐平.SDN的战略性思考.电信科学,2015016
    Wei L P.Strategic thinking on SDN.Telecommunications Science,2015016
    Discussion of the Value and Implementation Strategy Brought by Frequency Re-Farming in China Mobile Industry
    Zhu Dongzhao,Shi Junxiao and Yu Yi
    2015, 31(1):  2015017. 
    Asbtract ( 397 )   Knowledge map   
    Related Articles | Metrics
    The issues of investments on mobile network and its coverage affected by different wireless spectrum was studied, with the importance and desirability of frequency re-farming being analyzed systematically in reference to the current spectrum resource allocation and development status of mobile services in China. The value brought by frequency re-farming was explored from the perspective of cooperative networking and mobile network deployment, as the implementation strategy of frequency re-farming was proposed.


    论文引用格式:朱东照,史俊潇,余 毅.我国移动通信频谱重耕的价值探讨和实施策略.电信科学,2015017
    Zhu D Z,Shi J X,Yu Y.Discussion of the value and implementation strategy brought by frequency re-farming in China mobile industry.Telecommunications Science,2015017
    Automatic Verification Analysis Technology of Network Security Domain
    Liu Xiaofeng,Tan Bin,Qiu Lan and Wang Huanru
    2015, 31(1):  2015020. 
    Asbtract ( 381 )   Knowledge map   
    Related Articles | Metrics
    By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy automatic verification were achieved. Through automation, normalization and processes curing methods, violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.


    论文引用格式:刘晓峰,谭 彬,邱 岚等.网络安全域自动核查分析技术及应用.电信科学,2015020
    Liu X F,Tan B,Qiu L,et al.Automatic verification analysis technology of network security domain.Telecommunications Science,2015020
    Study on Data Modeling and Collection in OSS Based on Hadoop
    Lei Lei,Li Jingwen,Gong Dapeng,Wang Rui,Su Lei and Chen Ningjiang
    2015, 31(1):  2015021. 
    Asbtract ( 387 )   Knowledge map   
    Related Articles | Metrics
    According to the data acquisition and the modeling problem of telecom operators facing in the construction of EDC, the data status and data characteristics in the OSS was analyzed, a modeling method of hierarchical classification of combing theory and data model management idea were proposed, the unification of OSS data collection, sharing the modeling and data concentration were realized. Through the application of end to end analysis on mobile internet terminal as case subject,it provides reference for the construction on telecom industry EDC.


    论文引用格式:雷 蕾,李景文,宫大鹏等.基于Hadoop的OSS域数据建模与采集方法研究.电信科学,2015021
    Lei L,Li J W,Gong D P,et al.Study on Data Modeling and Collection in OSS Based on Hadoop.Telecommunications Science,2015021
    Improved Workload Distribution Scheme in Hybrid Cloud Setting
    Liu Ying,Gan Quan and Wang Yu
    2015, 31(1):  2015024. 
    Asbtract ( 386 )   Knowledge map   
    Related Articles | Metrics
    An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. Aiming at the restrictions in different levels for public cloud usage, the optimal risk-aware workload distribution problem was formalized as a mechanism for workload response time minimization. A dynamic programming approach that results in an optimal distribution of the query workload was proposed, which that searches for an optimal computation and data partitioning scheme given a query workload and public cloud usage boundaries (resource allocation cost and sensitive data disclosure). Finally, the performance of the dynamic programming approach was evaluated. Experimental results show that the proposed scheme can lead to a major performance gain by exploiting both the hybrid cloud components without violating any pre-determined public cloud usage constraints.


    论文引用格式:刘 颖,甘 泉,王 宇.混合云环境中改进的工作负载分配方案.电信科学,2015024
    Liu Y,Gan Q,Wang Y.Improved workload distribution scheme in hybrid cloud setting.Telecommunications Science,2015024
    Congestion-Aware Incentive Scheme Based on Double Auction for DTN
    Jiang Qingfeng,Men Chaoguang,Jia Meijuan and Cheng Xiaoxu
    2015, 31(1):  2015027. 
    Asbtract ( 328 )   Knowledge map   
    Related Articles | Metrics
    To stimulate the DTN selfish nodes to cooperatively forward messages when the buffer was limited, a congestion-aware incentive scheme based on double auction for DTN was proposed. In the scheme, nodes determined the self congestion degree according to the current free buffer and message receiving rate. Combining the message delivery probability and congestion degree, nodes traded the message based on double auction model, thereby achieved the cooperation between nodes. Extensive simulations were carried out on real-world traces to evaluate the proposed scheme. The experimental results show that, due to the congestion aware, the incentive scheme can further stimulate selfish nodes to cooperatively forward messages, improve the message delivery ratio and reduce the message delivery delay.


    论文引用格式:蒋庆丰,门朝光,贾美娟等.基于双向拍卖的DTN拥塞感知激励策略.电信科学,2015027
    Jiang Q F,Men C G,Jia M J,et al.Congestion-Aware incentive scheme based on double auction for DTN.Telecommunications Science,2015027
    5G Radio Access Network Architecture Based on C-RAN
    Lei Qiuyan,Zhang Zhizhong,Cheng Fang and Hu Haonan
    2015, 31(1):  2015028. 
    Asbtract ( 546 )   Knowledge map   
    Related Articles | Metrics
    Based on the analysis of the traditional cellular structure of the radio access network(RAN) which is facing more and more challenges, the development trend and demand of current mobile communication system were introduced, and the research goal and requirement for the fifth generation mobile communication system (5G) were analyzed. Aiming at solving this problem, a new type of radio access network architecture based on C-RAN was proposed. Moreover, the potential key technologies were illustrated in detail, including UDN, virtualization (software defined network and network function virtualization), CDN and green communication. Those provide reference for 5G access network architecture research.


    论文引用格式:雷秋燕,张治中,程 方等.基于C-RAN的5G无线接入网架构.电信科学,2015028
    Lei Q Y,Zhang Z Z,Cheng F,et al.5G radio access network architecture based on C-RAN.Telecommunications Science,2015028
    An Improved Algorithm for TD-LTE Downlink Time Synchronization
    Bai Wenle,Wang Xu,Zhang Yongmei and Peng Mugen
    2015, 31(1):  2015030-0. 
    Asbtract ( 410 )   Knowledge map   
    Related Articles | Metrics
    Aimed at the application problem of timing synchronization algorithm in orthogonal frequency division multiplexing system, an improved algorithm for TD-LTE downlink time synchronization was proposed. It utilizes statistical energy difference and correlation of cyclic prefix to improve the system performance, which reduces the computational complexity, and can detect the cyclic prefix types. The simulation results demonstrate that the performance of the new method is excellent in multi-path fading channels, especially in the case of small SNR. And it is robust against the normalized frequency offset and Doppler shift.


    论文引用格式:白文乐,王 旭,张永梅等.一种改进的TD-LTE下行定时同步算法.电信科学,2015030
    Bai L W,Wang X,Peng Y M,et al.An improved algorithm for TD-LTE downlink time synchronization.Telecommunications Science,2015030
    Research on Code-Division Multiple-Access of DS-SS/EBPSK Modulation
    Zhang Peng and Wu Lenan
    2015, 31(1):  2015031. 
    Asbtract ( 374 )   Knowledge map   
    Related Articles | Metrics
    In order to realize multiple-access communication of direct sequence spread spectrum extended binary phase shift keying (DS-SS/EBPSK) modulation, a realization method based on code-division was researched. Firstly, based on the analysis of DS-SS/EBPSK modulation signal, the effective spread spectrum sequence which can be used for dispreading and code division multiple-access was obtained by formulizing the DS-SS/EBPSK modulation process. Then, the correlation receiver for DS-SS/EBPSK modulation signal detection was designed and the multiple-access transmission was realized by making use of the small-scale cross-correlation of different spread spectrum sequences. Finally, take m sequence for example, the relationship between bit error rate (BER) performance of the expected user and the number of users was simulated, so did the relationship between BER performance of the expected user and the cycle length of m sequence. The simulation results demonstrate the feasibility of the code-division multiple-access realization method and indicate that the interference degree depends on the cross-correlation of the spread spectrum sequences.


    论文引用格式:张 鹏,吴乐南.DS-SS/EBPSK调制的码分多址研究.电信科学,2015031
    Zhang P,Wu L N.Research on code-division multiple-access of DS-SS/EBPSK modulation.Telecommunications Science,2015031
    Energy-Efficient Virtual Machine Migration and Consolidation Algorithm in Cloud Data Center
    Li Hongjian,Dai Yu,Liu Rui and Jiang Yi
    2015, 31(1):  2015033. 
    Asbtract ( 450 )   Knowledge map   
    Related Articles | Metrics
    An energy-efficient virtual machine(VM) migration and consolidation algorithm with multi-resource was proposed. The algorithm was developed based on a multi-resource energy efficiency model. A method of multi-resource utilization double threshold was designed to trigger migration of virtual machine, and the optical particle swarm optimization method was introduced in the consolidation of virtual machine. Compared with traditional heuristic algorithms, the algorithm reduces the number of active physical nodes and the amount of VM’s migration effectively, and obtains better energy efficiency in cloud data center.


    论文引用格式:李鸿健,代 宇,刘 锐等.云数据中心高能效的虚拟机迁移整合算法研究.电信科学,2015033
    Li H J,Dai Y,Liu R,et al.Energy-efficient virtual machine migration and consolidation algorithm in cloud data center.Telecommunications Science,2015033
    Segmentation Strategy of Streaming Media Based on Popularity Classifying
    Deng Yushan,Chen Ge,Zhang Jun and Liang Jie
    2015, 31(1):  2015034. 
    Asbtract ( 344 )   Knowledge map   
    Related Articles | Metrics
    The characteristics of external and internal popularity of streaming media and the relationship of external popularity and the number of cache replacement were analyzed. Respecting the characteristics that cache replacements are focus on a small rang of popularity, a segmentation method based on popularity classifying of streaming media, which uses smaller segments on videos replaced frequently and bigger segments on the other videos, was proposed. The experimental result shows that the segmentation method can effectively reduce the number of segments compared with the uniform segmentation method under the same conditions of the byte hit ratio.


    论文引用格式:邓宇珊,陈 戈,张 军等.基于流行度分类的流媒体分段策略.电信科学,2015034
    Deng Y S,Chen G,Zhang J,et al.Segmentation strategy of streaming media based on popularity classifying.Telecommunications Science,2015034
    Research on Large-Scale Social Network Graph Data Mining in Telecommunication
    Liu Lijiao,Tao Juncai,Xiao Xiaojun and Lu Yu
    2015, 31(1):  2015035. 
    Asbtract ( 499 )   Knowledge map   
    Related Articles | Metrics
    With the development of the telecommunications technology, telephone call network almost covered the whole society; the huge social network presents tremendous opportunities for telecommunication companies. Especially in the increasing fierce market competition, more and more telecommunication companies are concerned on maintaining customer relationship, mining customer potential value and marketing suitable target customers. The distribute and stand-alone graph computing frameworks and tools were researched for mining large-scale social network graph data like telecommunication network, and at the end the feasibility and usability of Graphchi in large-scale graph datasets were verified and a graph mining application was made with telecommunication data using stand-alone graph data processing tool—Graphchi.


    论文引用格式:刘丽娇,陶俊才,肖晓军等.电信大规模社交关系网络图数据挖掘研究.电信科学,2015035
    Liu L J,Tao J C,Xiao X J,et al.Research on large-scale social network graph data mining in telecommunication.Telecommunications Science,2015035
    Research on MTRF Deployment Scheme of 4G Mobile Network
    Xie Zhigang and Bao Weihua
    2015, 31(1):  2015040. 
    Asbtract ( 510 )   Knowledge map   
    Related Articles | Metrics
    The LTE provides voice services for users by CSFB technology. The MTRF function can solve the problems that unsuccessful circuit switched fallback on the edge of CSFB. The deployment of MTRF function involves the range of network remake. By analyzed the problem of unsuccessful circuit switched fallback on the edge of CSFB and studied the principle of MTRF, two deployment proposal were provided. They could be used in different scales of networks. The results could be provided a reference for the follow-up network construction.


    论文引用格式:谢志刚,鲍伟华.4G移动网络MTRF部署方案研究.电信科学,2015040
    Xie Z G,Bao W H.Research on MTRF deployment scheme of 4G mobile network.Telecommunications Science,2015040
    Micro-Blog Recommendation Based on User Interests and Recommendation Trust Domain
    Xu Yabin,Liu Chao and Wu Zhuang
    2015, 31(1):  2015042-0. 
    Asbtract ( 363 )   Knowledge map   
    Related Articles | Metrics
    Recommending micro-blogs to users whom are interested in is an important way to improve the user’s experience. In order to make the recommended micro-blog more match user’s interests and tastes, a micro-blog recommendation method was proposed. The method considers not only user’s own characteristics, but also the evaluation from the user’s community. In technology, vector machine (SVM) was supported for text classification to discover user interests, and through multidimensional Newman algorithm to discover user’s community. This community will be regarded as the recommendation trust domain. Finally, the improved collaborative filtering algorithm was used. It integrated user’s interests and recommendation trust domain to recommend micro-blog, in order to improve the quality of micro-blog recommendation. The experimental results show that, the micro-blog recommendation method is practical and effective.


    论文引用格式:徐雅斌,刘 超,武 装.基于用户兴趣和推荐信任域的微博推荐.电信科学,2015042
    Xu Y B,Liu C,Wu Z.Micro-blog recommendation based on user interests and recommendation trust domain.Telecommunications Science,2015042
    Design of Routing Home Gateway in Large-Scale Commercial Engineering Deployment of IPv6
    Sun Peiliang,Zhou Xiang and Chen Zhonghua
    2015, 31(1):  2015043. 
    Asbtract ( 374 )   Knowledge map   
    Related Articles | Metrics
    By analyzing the technology evolution of IPv6 in the deployment of IPng, indicate the difficulties to CP in large-scale deployment of IPv6 terminals. Combined with HG’s key role in IPv6 network construction, the technical principle of HG was analyzed, the technical advantages of routing HG in large-scale deployment of IPv6 terminals were explained, and an implementable scheme was proposed to help CP, and the whole industry, to speed up the scale deployment of IPv6.


    论文引用格式:孙培良,周 翔,陈仲华.路由型家庭网关在IPv6规模商用工程中的方案设计.电信科学,2015043
    Sun P L,Zhou X,Chen Z H.Design of routing home gateway in large-scale commercial engineering deployment of IPv6.Telecommunications Science,2015043
    Analysis Model of Gateway in Wireless Mesh Network Based on M/M/1 Queuing Model
    Li Taoshen,Zhang Hongyu,Ye Jin and Ge Zhihui
    2015, 31(1):  2015044. 
    Asbtract ( 342 )   Knowledge map   
    Related Articles | Metrics
    According to the characteristics of M/M/1 model and production features of customer request service in the wireless mesh network, a gateway queuing model in wireless mesh network based on M/M/1 model was constructed. The model puts the original disorder state sets in request service into order sets and it was queued at the gateway node. As a single service platform, gateway services in the whole collection. Then, to solve the model by using the mathematical method, the network system key parameters and target analysis function were derived. Finally, through verification experiment, the proposed model can obtain better network parameters in the network of non-saturated resource allocation. The theory analysis and experimental results show that the proposed model is reasonable and effective.


    论文引用格式:李陶深,张宏宇,叶 进.基于M/M/1的无线mesh网络网关分析模型.电信科学,2015044
    Li T S,Zhang H Y,Ye J,et al.Analysis model of gateway in wireless mesh network based on M/M/1 queuing model.Telecommunications Science,2015044
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: