Please wait a minute...

Current Issue

    27 August 2015, Volume 31 Issue 8
    research and development
    Architecture of SDN Applications Based on Software Defined Price
    Bin Zhuge,Baoxia Wang,Yining Wang,Chunming Wu,Minhui Yao
    2015, 31(8):  1-11.  doi:10.11959/j.issn.1000-0801.2015207
    Asbtract ( 459 )   HTML ( 8)   PDF (4104KB) ( 663 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the concept of SDN applications was proposed from the perspective of users payment for allocating network resources.Secondly,with the comparison between traditional desktop application programming and network programming,the advantage of SDN programming was described.Thirdly,the concept of software defined price (SDP)was introduced.Based on the characteristics of SDN applications,the framework of SDP-based SDN application so as to apply to the OpenDaylight open source project was designed.Finally,an implementation of creating a virtual tenant network based on SDP was showed.The results of experiment present that the users can choose their desired virtual tenant according to the mechanism of SDP.

    Research on Topology Reconfiguration in Cognitive Radio Networks
    Qian He
    2015, 31(8):  12-18.  doi:10.11959/j.issn.1000-0801.2015147
    Asbtract ( 365 )   HTML ( 5)   PDF (2774KB) ( 584 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the inevitable trends for heterogeneous network convergence and self-adaptation ability,cognitive radio network(CRN)concept has been proposed with some essential characteristics to achieve global endto-end goals.CRN are composed of cognitive devices which have the capable of changing network configurations based on the dynamic environment.This capability opens up the possibility of designing flexible and dynamic topology control strategies with the purpose of opportunistically reusing idle licensed spectrum and effectively achieving data transmission.This work focuses on the problem of designing effective topology reconfiguration algorithm to offer optimal routing solutions.

    A Deployment Method of Middlebox Service Chain Based on Multi-Flow Table
    Shiran Liu,Julong Lan,Yuxiang Hu,Tong Duan
    2015, 31(8):  19-29.  doi:10.11959/j.issn.1000-0801.2015205
    Asbtract ( 506 )   HTML ( 8)   PDF (3330KB) ( 559 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the path cycle and source address binding problem in middlebox service chain deployment,a service chain deployment approach by combining the OpenFlow mechanism and NetFPGA was proposed.First of all,the OpenFlow multi-flow table was used for marking service chains and labeling service sequences so that data packets could be processed correctly according to desired service order;secondly,the service chain deployment algorithm was designed to achieve the mapping relationship between the service path and flow table rules;thirdly,a prototype system was implemented based on the hardware platforms of NetFPGA-10G.Finally,experimental results show that the proposed method have the advantage of feasibility and outperforms compared methods in the aspect of the flow table number and time overhead.

    Topology Control Algorithm in Heterogeneous Wireless Sensor Network with Energy Supply
    Chenming Ma,Wanliang Wang,Zhen Hong,Xinwei Yao
    2015, 31(8):  30-38.  doi:10.11959/j.issn.1000-0801.2015181
    Asbtract ( 317 )   HTML ( 8)   PDF (3513KB) ( 560 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the problem that current algorithm mainly research on topology construction or topology maintenance separately,a topology control algorithm based on two processes combined was proposed,which was adaptive to the network with heterogeneous communication and energy.Topology construction was to construct connected dominating set with low message overhead,and topology maintenance was to execute local or global repair strategies by sink node based on time,energy or failure mechanism to save energy.Theoretical analysis and simulation experiments confirm that the algorithm can construct topology with low time and message overhead and extend network lifetime.

    Joint Beamforming and Power Control Algorithm for Cognitive MIMO System via Game Theory
    Qing Peng,Yinwei Li,Zhijun Guo
    2015, 31(8):  39-45.  doi:10.11959/j.issn.1000-0801.2015151
    Asbtract ( 314 )   HTML ( 7)   PDF (3537KB) ( 701 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The optimization problem of joint beamforming and power for cognitive MIMO system was studied.Firstly,a non-cooperative separable game model was established and a cost function about the two parameters was put forward.Then it was concluded that the optimal Nash equilibrium of joint game exists by proving the existence of optimal Nash equilibrium of two sub-games through KT conditions.Finally,a new iterative algorithm alternately was presented.The simulation results demonstrate that the proposed algorithm has a faster convergence rate.Meanwhile,the algorithm also comes to the optimal Nash equilibrium and has perfect stability in the dynamic communication environment.

    Predicting Large-Scale WLAN Traffic via Granger Causality Based Bayesian Network
    Hao Wang,Yunfei Lv,Yuanbao Chen,Yunfei Peng
    2015, 31(8):  46-50.  doi:10.11959/j.issn.1000-0801.2015201
    Asbtract ( 576 )   HTML ( 11)   PDF (1297KB) ( 600 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Granger causality existed between traffic at different access points of large-scale wireless LANs was discovered.The Granger causality illustrates that the historical traffic of access points that exist causality within target access points help predict the future of target access points with better accuracy than when considering information from the past of target access point alone.Bayesian network to model the causal relationship between access points and adopted a Gaussian mixture model(GMM)was used,as well as a weighted combination of several normal distribution functions in order to approximate the joint probability distribution in Bayesian networks.Finally,the traffic data in large-scale wireless LANs was imported,having hundreds of access points,to verify the accuracy of the proposed method,and a processing flow of analysis,modeling and prediction of traffic flow data was established.

    Cyclostationary Feature Detection Based on Compressed Sensing and Wavelet De-Noising
    Haifeng Tan,Jun Lu,Xuan Fu,Qixun Zhang
    2015, 31(8):  51-57.  doi:10.11959/j.issn.1000-0801.2015208
    Asbtract ( 371 )   HTML ( 4)   PDF (2051KB) ( 645 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the vacant spectrum utilization,ultra-wideband spectrum sensing is critical for cognitive radio (CR)as it enables secondary users to dynamically access the unoccupied spectrum bands.However,the fast and accurate spectrum sensing is still a challenge over an ultra-wide bandwidth in low signal to noise ratio(SNR) environment.A compressed sensing (CS)-feature detector based on wavelet de-noising was proposed to perform wideband detection in low SNR.CS was proposed to improve the efficiency of wideband spectrum sensing.And two dimensional wavelet transform was introduced to deal with the noise in spectral coherence function(SCF)by the CS process.As a result,the detection accuracy in low SNR was improved.It is found that the proposed technology can detect spectrum holes at a range of low SNR through simulation results.

    A Polarity Reversion Elimination Method for LTE-Advanced Frequency Offset Estimation
    Guoqing Jia,Shanji Chen,Chao Chen,Xiaohong Ji,Weidong Fang
    2015, 31(8):  58-62.  doi:10.11959/j.issn.1000-0801.2015204
    Asbtract ( 317 )   HTML ( 7)   PDF (1607KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traditional fractional frequency offset(FFO)estimation algorithm pay less attention to FFO polarity estimation.Noise and channel fading induced FFO estimation polarity reversion degrades the frequency synchronization performance inevitably.An efficient FFO polarity detection method was proposed in LTE-Advanced system to solve the problem,which utilized the mirror symmetry property of time-domain primary synchronization signal(PSS).Numerical results show that the proposed method can depress FFO polarity reversion efficiently.

    An LSH Based Time Subsequence Matching Algorithm
    Genping Liu,Yefang Chen,Chengtou Du,Jiangbo Qian
    2015, 31(8):  63-71.  doi:10.11959/j.issn.1000-0801.2015196
    Asbtract ( 356 )   HTML ( 3)   PDF (2608KB) ( 945 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An algorithm called LSHSM,which uses locality sensitive hashing(LSH)to process time subsequence matching,was proposed.Different to the FRM and DualMatch algorithms,the LSHSM does not require feature transformation such as DFT and DWT.It just directly regards the sequence as a high-dimensional object to find similar subsequences.Comparing to a linear algorithm on three real datasets,the LSHSM algorithm demonstrates the effectiveness and efficiency.

    Performance Analysis of DE-QPSK with Joint Transmit and Receive Diversity in Nakagami Fading
    Guangqiu Li,Jiayun Dong
    2015, 31(8):  72-77.  doi:10.11959/j.issn.1000-0801.2015209
    Asbtract ( 303 )   HTML ( 6)   PDF (2618KB) ( 558 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By using the statistical average results of higher-order powers of Gaussian Q-function in multi-branch diversity reception with maximum ratio combining(MRC)in Rayleigh fading channel,exact closed-form for the average symbol error rate(ASER)of differentially encoded quadri-phase shift keying(DE-QPSK)using coherent detection with transmit selection combining(SC)and receive MRC(SC/MRC)in Nakagami fading channels was derived.Approximate closed-form for the ASER of DE-QPSK with SC/MRC in Nakagami fading channels was derived by using the approximate expression of Gaussian Q-function and moment generating function based analysis approach.Numerical and simulation results show that the theoretical analysis of the ASER of DE-QPSK is exact and the approximate closed-form for the ASER of DE-QPSK is accurate.The above results can be used to design SC/MRC antenna diversity systems with DE-QPSK.

    Performance Analysis of Simplification of Hyperplane Support Vector Machine
    Hui Cheng,Jinglong Fang,Daquan Wang,Xingqi Wang
    2015, 31(8):  78-83.  doi:10.11959/j.issn.1000-0801.2015161
    Asbtract ( 274 )   HTML ( 4)   PDF (796KB) ( 600 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Comparing with traditional support vector machine,hyperplane support vector machine (HPSVM)and hyperplane support vector machine for regression(HPSVMR)not only reduce the number of support vectors and calculation time but also have comparable accuracy.However,they have different simplification effect on different problems.The reasons for this phenomenon were analyzed,the conclusion that the lower the percentage of non-bound support vectors is,the more obvious the effect of simplification was pointed out.

    Power Allocation Based on Relay Location and PU Location for CR Network
    Fengdie Chen,Shouyi Yang,Bing Ning,Guangping Li
    2015, 31(8):  84-90.  doi:10.11959/j.issn.1000-0801.2015165
    Asbtract ( 301 )   HTML ( 7)   PDF (2222KB) ( 624 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new transmission mechanism called direct and relay-aided transmissions based on inter group cooperation was proposed for the cognitive radio network.The performance of a single-relay system based on amplify-forward in the Rayleigh fading environment by considering the interference constraints and peak power constraints was analyzed.The impact of the relay node and the primary users(PU)location on power allocation and system throughout was investigated and the performance of the optimal power allocation(OPA)scheme and equal power allocation(EPA)scheme was compared.The result shows that the locations of relay node and PU are crucial to the system performance and the proposal optimum power allocation scheme significantly outperforms the equal power allocation scheme.The best performance was achieved when the relay is at an equal distance from the sender and the destination in EPA scheme or the relay is closer to the destination around in OPA scheme.

    Optimal Resource Provision of Cloud Center with Guarantee Percentile Response Time
    Huaiwen He
    2015, 31(8):  91-98.  doi:10.11959/j.issn.1000-0801.2015197
    Asbtract ( 324 )   HTML ( 5)   PDF (1995KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to minimize resource provisioning cost of commercial cloud center,while guarantee percentile response time SLA,a cloud center model based on queuing theory was proposed.Resource provisioning cost was analyzed from an economic point of view,and the mathematical expressions of cloud center percentile response time were deduced.Meanwhile the minimum provisioning cost algorithm(MPCA)was developed to calculate the minimum cost of cloud center,the affect on cloud center cost by load flow,percentile response time and based response time was analyzed via a large number of experiments.The results show that with MPCA to optimized server number and speed of cloud center,it can achieve cost linear increase with increasing traffic load.

    Heterogeneous Wireless Network Resource Management Algorithm Based on Reinforcement Learning
    Chenwei Feng,Jiangnan Yuan
    2015, 31(8):  99-106.  doi:10.11959/j.issn.1000-0801.2015195
    Asbtract ( 516 )   HTML ( 15)   PDF (2038KB) ( 1178 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to make full use of the resources of all kinds of wireless network,the integration of heterogeneous network is necessary.However,when it comes to the heterogeneous network integration,the problems of call request access control and resource management emerge.A reinforcement-learning-based algorithm was presented for heterogeneous wireless network resource management.D2D (device-to-device)communication was introduced into the proposed algorithm and the appropriate network for access could be selected according to different traffic types,terminal mobility,network load status and so on.Meanwhile,to reduce the storage requirement,the neural network technology was used to solve the problem of continuous state space.Simulation results show that the proposed algorithm has an efficient learning ability to achieve autonomous radio resource management,which effectively improves the spectrum utility and reduces the blocking probability.

    Design and Performance Analysis of a Novel MAC Protocol for Full Duplex Wireless Network
    Hongzhi Mo
    2015, 31(8):  107-112.  doi:10.11959/j.issn.1000-0801.2015203
    Asbtract ( 379 )   HTML ( 11)   PDF (1108KB) ( 458 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Two independent frequency bands are used for half duplex radios to realize simultaneous transmission and reception.Recently,full duplex radios are allowed to transmit and receive data packets simultaneously in one frequency band.To improve the performance of full duplex radio networks,a novel MAC protocol called FD-MAC for full duplex radio networks,which was a simple and efficient protocol compatible with standard IEEE 802.11 MAC protocol,was proposed.By taking both the physical layer and MAC layer into account,the performance of full duplex network with FD-MAC was analyzed.The analytical and simulation results demonstrate that,compared with the existing MAC protocols for full duplex radio,FD-MAC protocol owns a higher network throughput performance and a lower power consumption.

    Pilot Position Optimization Design of WLAN System Based on Experiment
    Jue Lan,Yunzhou Li,Xin Su,Shidong Zhou
    2015, 31(8):  113-118.  doi:10.11959/j.issn.1000-0801.2015193
    Asbtract ( 241 )   HTML ( 1)   PDF (2170KB) ( 455 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the frame structure of IEEE 802.11ac with “leading preamble plus comb-like pilot”,the performance evaluation formula of the correction scheme based on maximum likelihood estimation was derived,according to which the effect of pilot location,channel fading and subcarrier correlation was studied.Furthermore,a signalling exchange method was proposed,which ensured pilot position synchronization on both end,and a low complexity algorithm of pilot optimization according to the frequency channel amplitude information.In this way,the pilot overhead can be reduced without loss of correction performance.The experiment and simulation result shows that for ideal Rayleigh channel data,correction performance improves by 1.85 dB and 7.15 dB for unknown channel amplitude information in frequency domain and known cases respectively.For field experiment channel data,correction performance improves by 1.67 dB and 2.68 dB respectively.

    summarize
    Traffic Modeling and Access Control for Machine Type Communications:A Comprehensive Survey
    Xin Jian,Xiaoping Zeng
    2015, 31(8):  119-131.  doi:10.11959/j.issn.1000-0801.2015160
    Asbtract ( 464 )   HTML ( 9)   PDF (1717KB) ( 633 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The historical development,traffic characteristics,potentials and challenges of machine type communications(MTC)were introduced.A comprehensive survey on the traffic modeling and access control for the concurrent data transmission from massive MTC devices was made.With the recommendations on traffic engineering suggested by International Telecommunication Union (ITU)and International Teletraffic Congress (ITC),some important issues and key problems in the fields of traffic characteristics analysis,traffic modeling and access control for MTC were summarized,in order to provide engineers and researchers insights on the improved performance analysis and enhanced access control for carrier network,which would promote the deployment and standardization of MTC and internet of things.

    Study on Key Technologies of Intelligent IoT Device
    Yingqi Wei,Weiping Lin,Ying Li
    2015, 31(8):  132-138.  doi:10.11959/j.issn.1000-0801.2015141
    Asbtract ( 649 )   HTML ( 57)   PDF (1593KB) ( 1420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.

    Wide operating technology
    TD-LTE and TD-SCDMA Collaborative Network Optimizing Strategy
    Chang Li,Jianbin Zhang,Jing An
    2015, 31(8):  139-146.  doi:10.11959/j.issn.1000-0801.2015210
    Asbtract ( 308 )   HTML ( 5)   PDF (2786KB) ( 542 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Compared to traditional network,the network structure has a greater impact on the quality of TD-LTE network.If only upgrade directly in the original site based on TD-SCDMA,the original structure and quality issues would be inherited.On the basis of the problems encountered in the shared antenna collaborative optimization,a collaborative network optimization method was presented.Network problems of TD-SCDMA and TD-LTE were solved from the dimensions of network structure,coverage and interference by using project parameters,measurement report,frequency sweep test,driving test and other data.After that,by using network planning and optimization tools,collaborative optimization scheme was outputted and verified in the existing network to solve these problems.Finally,TD-SCDMA and TD-LTE collaborative optimization adjustment strategy was summed up by evaluating implementation effects.

    Research and Realization of Ethernet Service MEF 2.0 Certification
    Quan Lu,Tong Lin,Xin Hu,Xuan Zhang
    2015, 31(8):  147-152.  doi:10.11959/j.issn.1000-0801.2015159
    Asbtract ( 433 )   HTML ( 9)   PDF (1652KB) ( 993 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    MEF Carrier Ethernet(CE)2.0 has been widely concerned and supported by international major telecom service providers.It has become new generation standard of Ethernet service interoperability and transparent management.By researching MEF CE 2.0 related standards,methods and key technical details in depth,related service definition,operation flow,network topology,test items and practical application of CE 2.0 authentication testing were summarized.

    CPRI Transport Scheme for Centralized BBU Deployment
    Xiaoli Huo,Ruiquan Jing
    2015, 31(8):  153-157.  doi:10.11959/j.issn.1000-0801.2015198
    Asbtract ( 253 )   HTML ( 1)   PDF (1401KB) ( 934 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    LTE of mobile communications has been fully opened.In the stage of LTE,BBU’s centralized deployment can effectively reduce the difficulty of development for base station sites,lower down CAPEX/OPEX and achieve rapid network construction,thus rendering large-scale application of the situation.Firstly,the requirement of CPRI link for BBU centralized deployment was introduced.Secondly,several possible solutions for carrying CPRI link were described.Finally,the application recommendations through comparison and analysis were presented.

    Cloud Security Certification Technology Based on Fingerprint Recognition
    Yafei Tang,Yunyong Zhang,Ni Zhang
    2015, 31(8):  158-164.  doi:10.11959/j.issn.1000-0801.2015211
    Asbtract ( 437 )   HTML ( 7)   PDF (1981KB) ( 660 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the guarantee of cloud security,user identity authentication is crucial to cloud computing.In this work,the requirements of security authentication in the current cloud service systems were analyzed.Considering the principle and the advantages of fingerprint recognition,a novel system based on fingerprint recognition was proposed for cloud security authentication.The architecture and workflow of the proposed system were investigated in depth to prevent the unauthorized access,achieving the secure access of user data for cloud services.

    Solution of Communication Services of Vehicle Mobile Terminals Based on LTE and Ev-Do Hybrid Networking
    Fei Zhao,Wenjun Zhang,Yong Deng
    2015, 31(8):  165-170.  doi:10.11959/j.issn.1000-0801.2015152
    Asbtract ( 495 )   HTML ( 6)   PDF (2043KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The realization to communications services of intelligent vehicle mobile terminal was discussed.Technology solutions of network architecture,signaling procedure,network handover and QoS guarantee were proposed.And the specific technology implementation scheme was proposed.

    Behaviour Analysis of Mobile Malicious Software in Network
    Xuetao Du,Ling Chang,Jia Liu,Chen Zhang
    2015, 31(8):  171-174.  doi:10.11959/j.issn.1000-0801.2015200
    Asbtract ( 370 )   HTML ( 5)   PDF (855KB) ( 565 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A behavior analysis method of mobile malicious softwares and a corresponding solution on the network-side were proposed.The method combined network behaviors and virus-inner behaviors of a mobile malicious software to improve the accuracy and the timeliness.The method was a useful guidance for communication operators to block mobile malware in real time.

    Research on Ev-Do Multi-Carrier Coverage Consistency Control
    Baofa Hu,Minghui Lin,Wen Chen
    2015, 31(8):  175-180.  doi:10.11959/j.issn.1000-0801.2015162
    Asbtract ( 289 )   HTML ( 6)   PDF (1226KB) ( 375 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the crowded area,China Telecom cdma2000 Ev-Do sector is configured with multi-carrier for improving the capacity.Nevertheless,the users’ experience is influenced because of the carrier’s effective coverage difference.Meanwhile,the traditional optimization methods for multi-carrier coverage such as performance index analysis and drive test are time-consuming and costly.According to the multi-carrier wireless environment typical model and combining with the DRC and call data analysis,an effective method to control the coverage of each carrier was proposed.This method can improve the optimization efficiency of China Telecom cdma2000 network by transforming the empirical method into quantitative strategy.

    RESEARCH AND DEVELOPMENT
    Physical server provision mechanism in cloud computing based on REST architecture style
    Chen Heng, Dong Xiaoshe
    2015, 31(8):  2015194.  doi:10.11959/j.issn.1000-0801.2015194
    Asbtract ( 340 )   PDF (1830KB) ( 138 )   Knowledge map   
    References | Related Articles | Metrics
    The trend of cloud computing market in the world is increasing rapidly. More and more companies and research organizations deploy their applications in commercial cloud computing platform. Unfortunately, a part of applications have degraded performance after deployed to virtual hosts in cloud computing. Moreover, some applications cannot run on virtual hosts. To solve this problem, a provision mechanism for physical servers in cloud computing based on REST architecture style was proposed, which can deploy those applications mentioned above to physical servers in cloud computing directly. Firstly, we installed Cobbler to control physical servers, and developed a REST-style module based on the API and command line of Cobbler server. Then, the Web server can communicate with the Cobbler server via RESTful API. Finally, a user can totally control a physical server in cloud computing through the Web management dashboard. The provision mechanism was tested in the experiment environment. The test results showed the provision mechanism achieves the expected goal.
    OPERATION TECHNOLOGY WIDE ANGLE
    Discussion on CPRI transport scheme for centralized BBU deployment
    Huo Xiaoli, Jing Ruiquan
    2015, 31(8):  2015198.  doi:10.11959/j.issn.1000-0801.2015198?
    Asbtract ( 132 )   PDF (1387KB) ( 314 )   Knowledge map   
    References | Related Articles | Metrics
    4G LTE of mobile communications has been fully opened. In the stage of LTE, BBU’s centralized deployment can effectively reduce the difficulty of development for base station sites, lower down CAPEX/OPEX and achieve rapid network construction, thus rendering large-scale application of the situation. Firstly, the requirement of CPRI link for BBU centralized deployment was introduced. Second, several possible solutions for carrying CPRI link were described. Finally, the application recommendations through comparison and analysis were presented.
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: