Please wait a minute...

Current Issue

    15 September 2015, Volume 31 Issue 9
    Topic: heterogeneous networks
    Multi-Way Relaying Techniques for Heterogeneous Cooperative Wireless Network: From Theory to Practice
    Wei Chen,Ke Ke,Yanping Yang,Ou Li
    2015, 31(9):  1-10.  doi:10.11959/j.issn.1000-0801.2015243
    Asbtract ( 410 )   HTML ( 10)   PDF (3972KB) ( 700 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A heterogeneous network integration scheme based on cooperative relay technology was proposed, then the foundation of heterogeneous network was conceived through the relay node, with the aim to solve the transmission bottleneck between heterogeneous wireless access network by using the multidirectional relay technology, with the aid of cooperative communication. More specifically, based on WLAN and cellular networks, the effective integration and key technologies of the scene problems were investigated, then some possible solutions, with the purpose of meeting the indoor high data rate requirements and the outdoor high mobility requirements, so as to cost-effectively improve the quality of the user experience, were put forward.

    Resource Allocation of Distributed Heterogeneous Network Based on CoMP Transmission
    Jia Yu,Ye Wang,Shaohua Wu,Qinyu Zhang
    2015, 31(9):  11-19.  doi:10.11959/j.issn.1000-0801.2015245
    Asbtract ( 352 )   HTML ( 8)   PDF (2830KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Improving utilization of radio resource is a promising solution to alleviate the contradiction between increasing wireless communications demands and limited radio resources of wireless transmission. Coordinated multipoint (CoMP)based heterogeneous network (HetNet)has huge application prospects to improve the spectrum efficiency and energy efficiency, and therefore, has attracted constant attentions from not only academia and industry. The radio resource allocation for CoMP based HetNet was investigated, and a distributed resource schedule algorithm by means of cross-entropy method was proposed. Extensive simulations are conducted to verify the effectiveness of the proposed algorithm in terms of throughput, energy efficiency and user fairness.

    A Joint Sub-Channel and Power Allocation Algorithm in Co-Channel Heterogeneous Femtocell Network
    Geng Chen,Wenjing Yao,Yinjing Guo,Weiwei Xia
    2015, 31(9):  20-27.  doi:10.11959/j.issn.1000-0801.2015236
    Asbtract ( 448 )   HTML ( 2)   PDF (2451KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A joint sub-channel and power allocation algorithm was proposed to suppress co-channel interference. Power control and handover mechanism could be used to suppress the co-channel cross-tier and intra-tier interference achieved by the power allocation for MU and joint sub-channel and power allocation for FU. Mathematically, the cross-tier handover was formulated as optimizing the network throughput under the constraints of each tier target outage probability and the interference-aware resource allocation was formulated as optimizing the sum rate of FU subject to the constraints of the target data rate of handover MU and interference thresholds to other MU and FU. Theoretical analysis and simulation results show that the sum rate of FU can be increased greatly. Meanwhile, the femtocell network capacity and the number of deployable femtocells can also be improved.

    Fair Resource Allocation for Multiple Types of Services in Femto-Macro Heterogeneous Network
    Chengyi Liu,Song Xing,Jing Hu,Weiwei Xia
    2015, 31(9):  28-34.  doi:10.11959/j.issn.1000-0801.2015241
    Asbtract ( 347 )   HTML ( 5)   PDF (2157KB) ( 443 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problem how to allocate the femtocell base station(FBS)resource fairly among multiple services (constant-rate services and variable-rate services)in femtocell network was focused on. Using the proportional fair to allocate the FBS transmit power for different variable-rate users was proposed to achieve fair allocated transmit rates in femto-macro heterogeneous network.The dual decomposition method was employed to find the optimal solution.Finally, the simulation results show that, besides protecting the individual QoS for each user, the proposed algorithm can not only provide fair resource allocation among variable-rate users,but also restrict the cross-tier interference to the MU.

    An Adaptive Concurrent Control Method for High Definition Video Transmission Based on Multi-Terminal Cooperation
    Xiaoqin Luo,Xiaorong Zhu
    2015, 31(9):  35-43.  doi:10.11959/j.issn.1000-0801.2015244
    Asbtract ( 334 )   HTML ( 16)   PDF (2199KB) ( 664 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the purpose of solving the problem of controlling video traffic concurrent transmission in heterogeneous wireless networks to improve quality of experience (QoE), a video traffic concurrent transmission control model in heterogeneous wireless networks was built, which aimed at the minimization of the system transmission delay and the jitters. Then to solve the optimization problem, an explicit adaptive traffic allocation scheme was proposed. In order to closely simulate the network traffic, the video traffic with self-similarity and long-range dependence was modeled by using Pareto distribution and P/P/1 queue theory to obtain the delay of concurrent transmission system. At the same time, this model jointly considered the sender and receiver for adaptive adjusting buffer size and send rate in order to improve the user's experience. Simulation results show that, compared with commonly used traffic allocation scheme for load balancing, the proposed scheme has some advantages in aspects of delay and packet loss rate.

    Network Selection Algorithm Based on Weighted Bipartite Graph in Heterogeneous Network Environment
    Nan Bao,Weiwei Xia,Xu Bao
    2015, 31(9):  44-50.  doi:10.11959/j.issn.1000-0801.2015242
    Asbtract ( 519 )   HTML ( 12)   PDF (2579KB) ( 617 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In convergence environment of heterogeneous network, a network selection algorithm based on weighted bipartite graph was proposed for rational utilization of heterogeneous network wireless resource. The network selection process was mapping as looking for the optimal weighted bipartite graph. The requirements of users and networks were mathematically modeled for optimal matching of supply and demand. And there was a second chance of matching to balance the network load. Compared with other algorithms, the proposed algorithm can provide matching results that meet the requirements for different QoS. Meanwhile it can dynamically adjust networks' loads, and achieve reasonable matching of user demands and network resources in convergence environment of heterogeneous network.

    Network Selection Algorithm Based on Stable Matching Game in Vehicular Heterogeneous Network
    Rui Zhang,Jing Hu,Weiwei Xia
    2015, 31(9):  51-59.  doi:10.11959/j.issn.1000-0801.2015233
    Asbtract ( 499 )   HTML ( 15)   PDF (2695KB) ( 680 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A gaming method of vehicular heterogeneous network selection was proposed, to solve the network access problem of vehicles in heterogeneous network coverage. Based on the concepts of stable matching in two-sided matching game, stable matching of network selection was obtained through the mutual selection between users and networks. Firstly, the corresponding weights were calculated by using AHP to obtain the satisfaction function, then, one-to-many two-sided matching problem was converted into one-to-one two-sided matching problem, and optimal matching results could be obtained by constructing the multi-objective optimization model under the condition of stable matching. The performance analysis and simulation results show that the proposed model based on stable matching optimizes the satisfaction degree of both the network and user sides, and thus the equilibrium state of two way network selection was obtained,compared to the traditional selection-making model.

    Mobility Management and Resource Management of Internet of Vehicles in Converged Heterogeneous Network Scenario
    Qiong Yang,Jing Hu,Weiwei Xia
    2015, 31(9):  60-65.  doi:10.11959/j.issn.1000-0801.2015234
    Asbtract ( 710 )   HTML ( 35)   PDF (1421KB) ( 1406 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to characteristics of internet of vehicles in converged heterogeneous network scenario, mobility management and resource management were studied. The converged heterogeneous network scenario was analyzed based on the concepts of internet of things and internet of vehicles. Network architecture of internet of vehicles was proposed by research of communication equipments, communication mode and networking. Compared with general heterogeneous network, vehicles are moving quickly in internet of vehicles which leads to frequent handoff. In order to solve this problem, mobility management in internet of vehicles was studied. Various communication equipments and communication modes lead to various service requirements and resource management based on priority was proposed according to different priority services. In resource management of heterogeneous network, high priority service should have priority in resource allocation, access control and network selection.

    Protocol Sequence-IEEE 802.11p Based Channel Access Mechanism in VANET/LTE-Advanced Heterogeneous Network
    Zhexin Xu,Lingling Cai,Xiao Lin,Yi Wu
    2015, 31(9):  66-72.  doi:10.11959/j.issn.1000-0801.2015235
    Asbtract ( 542 )   HTML ( 6)   PDF (1785KB) ( 862 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Abstract: VANET/LTE-Advanced heterogeneous network was proposed by combining LTE-Advanced with VANET. The utilization of channel and channel access mode was reconfigured in order to improve the system performance. Aiming at the V2V communication, the performance of channel access mechanism based on IEEE 802.11p and protocol sequence were analyzed and compared with each other. And then, protocol sequence-IEEE 802.11p based channel access mechanism was proposed, which combines the scheduling-based and competition-based mechanism to completing the standard of IEEE 802.11p. Through simulation with MATLAB, it shows that protocol sequence-IEEE 802.11p based channel access mechanism can tradeoff the performance between UI-based and IEEE 802.11p-based ones in user average throughput and average packet delay, which has important theory meaning and practical value.

    Research and development
    A Transmission Mechanism of Self-Adjustment Pipeline Oriented on Common Content Characteristics
    Peng,ZhangZhen Yi,Dongnian Cheng,Julong Lan,
    2015, 31(9):  73-82.  doi:10.11959/j.issn.1000-0801.2015091
    Asbtract ( 476 )   HTML ( 8)   PDF (3271KB) ( 415 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Content-centric networking is the core of future network. Current network was established on the inter-connection of host, in which the bottom transmission units could not denote semantics of upper content. The content characteristics for various applications were concluded. The network transmission structure which was named parametric self-adapting content pipeline for content characteristics was consturcted. The mapping between content characteristics and the pipeline was established. All content characteristics would be normalized by pipeline parameters, and therefore establish the self-adapting transmission channel driven by content characteristics. In detail, the resolution of content characteristics, the structure of content pipeline,the automatic matching between pipeline and content characteristics were researched. This would realize the dynamic extraction, real-time computing of pipeline parameters and the corresponding adjustment of pipeline specifications.

    An Entropy Based Anomaly Traffic Detection Approach in SDN
    Mingxin Wang,Huachun Zhou,Jia Chen,Hongke Zhang
    2015, 31(9):  83-89.  doi:10.11959/j.issn.1000-0801.2015217
    Asbtract ( 780 )   HTML ( 27)   PDF (1351KB) ( 1627 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    SDN(software defined networking)is a novel network infrastructure which separate the control plane from the data plane. Taking advantage of the idea of SDN, a central security center was built which collected traffic from the SDN data plane entity for analyzing. The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. The anomaly traffic can be detected early and can't influence the performance of the controller. Besides, the controller can be protected from attack based on our system.

    Selection of Failure Data in Software Reliability Modeling Based on RVM
    Xiaoming Yang,Jungang Lou,Zhangguo Shen,Wenjun Hu
    2015, 31(9):  90-96.  doi:10.11959/j.issn.1000-0801.2015192
    Asbtract ( 294 )   HTML ( 3)   PDF (1693KB) ( 413 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The high complexity of software is the major contributing factor of software reliability problems, and traditional parametric models may exhibit different predictive capabilities among different software projects, it is hard to select a suitable model for every software projects. Compared to traditional models, kernel based models could achieve better prediction accuracy, and had arouse the interesting of many researchers. The RVM learning scheme was applied to model the failure time data so as to capture the inner correlation between software failure time data and the m nearest failure time data. In addition, the trend of predictive accuracy with the varying of m was detected by way of Mann-Kendall test method. Thereupon, the reasonable value range of m was achieved,thus m∈{6,7,8,9,10} through paired T-test in 5 common used software failure data.

    Nonlinear Blind Source Separation Algorithm Using Glowworm Swarm Optimization with Baffle Effect
    Pubo Huang,Yu Wei
    2015, 31(9):  97-102.  doi:10.11959/j.issn.1000-0801.2015213
    Asbtract ( 292 )   HTML ( 9)   PDF (1758KB) ( 514 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the characteristics of glowworm swarm optimization(GSO)algorithm, to overcome the disadvantages of premature convergence, a new method called “baffle effect”was proposed. The diversity of swarm was expanded. Based on the analysis of the model of nonlinear blind source separation(NBSS), using traversing glowworm swarm twice, comparing evaluation function, the best result was get. Their validity is confirmed by effect of the signal separation test.

    A Novel Personalized Recommendation Algorithm of Collaborative Filtering Based on RFM Model
    Ning Zhang,Chongrui Fan,Yan Zhang
    2015, 31(9):  103-111.  doi:10.11959/j.issn.1000-0801.2015180
    Asbtract ( 491 )   HTML ( 16)   PDF (2264KB) ( 823 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the accuracy of recommendation, especially the matrix score of personalized recommendation technology is too spars, a new recommendation algorithm was proposed. The advantages of this algorithm were mainly embodied in the following aspects. Firstly, the improved algorithm with RFM model was used to select the original customer in some condition, making the recommended source of data more accurate and efficient. Secondly, in the improved algorithm the customer consumption history records were filled to the matrix to improve the consistency of the matrix of score. Thirdly, the traditional Pearson similarity calculation formula was improved to make the search of target users of similar neighbor more accurate. Then the simulation experiment was carried on by using the improved algorithm. It can be proved that the improved algorithm is better than the traditional one in accuracy. At last, the improved algorithm was applied to a recommendation system with personalized recommendation function. It was shown that the recommendation algorithm was efficient and valid.

    New Channel Estimation Algorithm for Non-Sample-Spaced Channels in Fast Time-Varying OFDM System
    ,
    2015, 31(9):  112-117.  doi:10.11959/j.issn.1000-0801.2015223
    Asbtract ( 386 )   HTML ( 4)   PDF (2207KB) ( 814 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In fast time-varying OFDM(orthogonal frequency division multiplexing)system, in order to lessen the effects of the CIR(channel impulse response)leakage and ICI(inter-carrier interference), a new channel estimation algorithm was proposed, which was adapted to non-sample-spaced channels. The algorithm combined complex exponential basis expansion model and the feedback of DFT(discrete fourier transform), which was built according to the fraction taps channel approximation.The channel parameters were firstly estimated with the complex exponential basis expansion model based on the fraction taps channel approximation.Then the ICI in fast time-varying OFDM system could be calculated according to the estimated channel parameters. Then the feedback was obtained by the elimination of ICI, and noises could be eliminated by DFT. The algorithm could suppress the CIR leakage, eliminate ICI and noises and effectively approximate the actual channels. The simulation results show that the bit error rate and channel mean square error of the proposed algorithm are both effectively improved.

    A Cooperative Spectrum Sensing Method of Aeronautical Radio Based on Reputation
    Yufeng Li,Nairui Hu,Yupeng Wang
    2015, 31(9):  118-123.  doi:10.11959/j.issn.1000-0801.2015145
    Asbtract ( 291 )   HTML ( 5)   PDF (1449KB) ( 413 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional cooperative spectrum sensing algorithm of aeronautical radio can't distinguish the node type(normal/malicious), though weighted sequential probability ratio test(WSPRT)method meets the requirement but when the spectrum sensing data falsification(SSDF)node is exist, it can't keep high sensing accuracy any more. An improved WSPRT was proposed. On the foundation of traditional WSPRT, reputation rewards and punishment algorithm was improved, and sensing stability factor was taken into account. The simulation results show that it can make identify malicious cognitive nodes easier and make the fusion algorithm distinguish malicious user more accurate.

    Non-Uniform Segmentation Method for Streaming Media Based on Best Segmentation Point Estimation
    Yushan Deng,Yirong Zhuang,Ge Chen,Jun Zhang
    2015, 31(9):  124-129.  doi:10.11959/j.issn.1000-0801.2015232
    Asbtract ( 327 )   HTML ( 5)   PDF (1139KB) ( 419 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the relationship between the byte hit rates and the popularities of the stored streaming media segments, a new non-uniform segmentation method for the streaming media based on best segmentation point estimation was proposed. In the proposed method, the best internal segmentation points of the streaming media were estimated according to the external boundary popularity of the streaming media at the current storage size of the proxy. Then each video was divided into high popularity and low popularity parts using the estimated best internal segmentation point. Experimental results show that the proposed method can effectively reduce the number of segments and improve byte hit rates comparing with the uniform segmentation method.

    Design of 433 MHz Communication Protocol and Implementation of Gateway in Intelligence Home
    Yang Ge,Dagang Li
    2015, 31(9):  130-136.  doi:10.11959/j.issn.1000-0801.2015216
    Asbtract ( 739 )   HTML ( 28)   PDF (2734KB) ( 1979 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the network establishing demands of the internal network of intelligent home, such as low cost, low data rate, short distance communication, a type of 433 MHz RF communication protocol stack based on CC1101 was created and a gateway based upon the embedded operating system called μC/OS-II and micro controller called STM32F407 was implemented. This intelligent gateway equipped with Wi-Fi, GSM, ethernet and other functional modules works with the 433 MHz RF communication protocol stack to achieve multiple intelligent controls. Specifically the following points were mainly presented: the design of 433 MHz RF protocol stack, the definition of communication protocol and node model, the establishment of 433 MHz RF network, and the mechanism of date collision avoidance and retransmission. Owing to simplicity and practicality, this scheme is suitable for the application in family internal network.

    An Interference Links Selection Method Based on Genetic Algorithm
    Juan Meng,Li Hong,Yanan Li,Zhiming Han,Lili Guo
    2015, 31(9):  137-142.  doi:10.11959/j.issn.1000-0801.2015214
    Asbtract ( 350 )   HTML ( 6)   PDF (1373KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on interference alignment with partial interference links in multi-cell multiple input multiple output (MIMO)networks, an interference links selection scheme was proposed based on genetic algorithm. By exploiting the heterogeneous path loses, the design problem of transceiver precoding matrices was formulated into a mixed integer bi-level optimal program. Then this problem was solved based on genetic algorithm to achieve the optimal system throughput. The simulation results show that, in a 19 hexagonal wrap-around-cell layout, the algorithm proposed outperforms a standard multi-user MIMO technique with far less transmit antennas. The present scheme is therefore of great promise to practical applications.

    Modified Binary Partition Assisted Broadcast Protocol for Emergency Message Dissemination in VANET
    Daiyue Cheng,Guoan Zhang,Xiang Ye
    2015, 31(9):  143-148.  doi:10.11959/j.issn.1000-0801.2015199
    Asbtract ( 383 )   HTML ( 3)   PDF (1588KB) ( 387 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A modified binary partition assisted broadcast(MBPAB)protocol was proposed, which was designed for emergency messages dissemination in vehicular Ad Hoc network(VANET). The protocol divided the communication range into small sectors, and sought the farthest possible nodes in the farthest sector from the sender node to be the forwarding node to increase the dissemination speed by reducing the forwarding hops. A mini distributed inter-frame space(mini-DIFS)in a medium access control(MAC)sublayer was introduced to give the emergency messages a higher access priority to the communication channel compared with other messages. The results demonstrate that MBPAB protocol outperforms benchmarks of the existing broadcast protocols in VANET in terms of communication delay and the average message dissemination speed.

    Overview
    Current Research and Development Trend of 5G Network Technologies
    Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
    2015, 31(9):  149-155.  doi:10.11959/j.issn.1000-0801.2015218
    Asbtract ( 2716 )   HTML ( 394)   PDF (1401KB) ( 7029 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The challenges for mobile communication network raised by new requirements in 5G were analyzed, and then the necessity of researching 5G network technologies was explained. After that, the research situation of global research organizations was introduced, such as NGMN, 5GPPP, IMT-2020 and so on, regarding 5G network technologies, moreover, the standardization status of global standards development organizations on 5G network technologies were introduced. According to the analysis on new requirements and new challenges in 5G network, and current research of 5G network technologies, the development trend of 5G network technologies was predicted and some specific network technologies for the future network were provided. At last, the development of 5G network was concluded and forecasted.

    Operating technology wide-angle
    Survivability Protection in TWDM Optical Access Network with Dynamic Wavelength Scheduling
    Xintian Hu,Zhiguo Zhang,Xue Chen
    2015, 31(9):  156-162.  doi:10.11959/j.issn.1000-0801.2015220
    Asbtract ( 352 )   HTML ( 6)   PDF (2127KB) ( 436 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It is a key technical problem to locate failure correctly and perform protection switching for strong survivability in time and wavelength division multiplexing(TWDM)optical access network with dynamic wavelength scheduling. To solve the above problem, a cost-effective survivability protection scheme using control channel for fault location and based on dynamic wavelength scheduling was presented. For the scheme, the quantitative comprehensive analysis of survivability and cost was carried on. Analysis and calculations show that at the best the proposed scheme can pay only 1% of the cost for survivability protection and bring in 54% improvement in survivability. The proposed scheme can finish protection switching within 50 ms.

    VxLAN Application in Cloud Datacenter Network
    Jiexin Zhang,Zhiren Fu,Zhiming Wu,Wenhua Xu,Haifeng Xu
    2015, 31(9):  163-169.  doi:10.11959/j.issn.1000-0801.2015238
    Asbtract ( 633 )   HTML ( 12)   PDF (2426KB) ( 1375 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud datacenter demand on new techniques and new architecture were summarized firstly. And also the mainstreams of VxLAN technical schemes were analyzed. Then typical VxLAN applications in cloud datacenter network were studied. Finally, several VxLAN problems were discussed in case of scale applications in cloud datacenter.

    A Brief Probe into Big Data Architecture of Enterprise
    Yongfeng Wang,Xinzhou Cheng,Jie Gao
    2015, 31(9):  170-174.  doi:10.11959/j.issn.1000-0801.2015229
    Asbtract ( 337 )   HTML ( 3)   PDF (1345KB) ( 540 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    While data value is deeply appreciated nowadays, enterprises are considering about extracting and digging data value. The architecture of big data was analyzed from the aspect of enterprises. And the characteristic and the application of data were also deeply considered.

    Principle and Architecture Analysis of VoWi-Fi Technology
    Lei Cao,Bo Wang,Zhen Shao,Xiao Shen,Yiming Li
    2015, 31(9):  175-181.  doi:10.11959/j.issn.1000-0801.2015219
    Asbtract ( 375 )   HTML ( 8)   PDF (3272KB) ( 653 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the commercial application of VoWi-Fi technology and support of terminals such as apple mobile phone for Wi-Fi calling technology, VoWi-Fi technology has become a hot spot in the industry once again. The principle and architecture and key issues of the VoWi-Fi technology were introduced and analyzed, other VoWi-Fi technical implementation schemes were also studied. The problem of technology deployment of VoWi-Fi technology which merges with VoLTE which should be considered was put forward.

    Solution of Improving the Packet Domain Gateway's Performance
    Guohui Liu
    2015, 31(9):  182-189.  doi:10.11959/j.issn.1000-0801.2015239
    Asbtract ( 384 )   HTML ( 4)   PDF (3799KB) ( 737 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increasing of the business, the internal logic of the packet domain gateway GGSN/SAE GW is becoming more and more complex. Meanwhile, the requirement to the performance of equipment is becoming higher and higher. In this way, the actual operational capability of the GGSN/SAE GW is far away from the safety working level. As a solution, it was focused on improving GGSN/SAE GW processing logic, adjusting the rank of NON-DPI top traffic to reduce the equipment load and enhance the operational capacity of the gateway effectively.

    OTDR Integrated in OLT PON Port
    Yuehua Ou,Yan Ren
    2015, 31(9):  190-200.  doi:10.11959/j.issn.1000-0801.2015225
    Asbtract ( 546 )   HTML ( 9)   PDF (866KB) ( 915 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Along with the propulsion of the“broadband China”strategy,FTTx has been deployed massively,therefore there are more and more requirements on detecting optic fiber faults, solutions with low cost are needed to detect fiber faults and improve the efficiency of PON operation and maintenance. OTDR integrated in OLT PON port was studied, and the implementation and the cost of different wavelength solutions were analyzed and compared. The PON system architecture based on OTDR integrated in PON port was proposed, and the requirements of OTDR detection ability and the limitation requirements of OTDR effecting the physical parameters of PON port and the communication service were given. The goal is that OTDR integrated in PON port can satisfy the requirements of operators' PON detection, and improve the efficiency of PON operation and maintenance.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: