Please wait a minute...

Current Issue

    15 February 2009, Volume 25 Issue 2
    Research of China Telecom OSS Transformation and Construction Based on the Successful Transformation of BT
    Su Gengshu and Yu Qianli
    2009, 25(2):  1-6. 
    Asbtract ( 1010 )   Knowledge map   
    Related Articles | Metrics
    This article analyzed and summarized the best practicing experiences of the successful transformation of British Telecom and studied the current situation and transformation objectives of China Telecom. An in-depth analysis of OSS status-quo of typical provinces was provided in China, suggesting a thought that how OSS system could better support China Telecom’s evolving to a full-service operator and some advices of OSS construction and implementation in future.
    Discussion on the Situation and Some Issues of Network and Information Security
    Huang Yuanfei,Gu Liyong and Jin Liping
    2009, 25(2):  16-20. 
    Asbtract ( 912 )   Knowledge map   
    Related Articles | Metrics
    With the ICT’s rapid development, telecommunications network has gradually shifted from the traditional channels of information transmission into today’s diverse network platform, telecommunication network security problems are more and more emergent. In this paper, we will first analyse the telecommunications network security situation, and then focus on the current telecommunications network information security-related hot issues and trends.
    Overview of Mobile Communication Services Security
    Bai Hongtao,Liu Hailong,Ren Xiaoming and Liu Fei
    2009, 25(2):  21-28. 
    Asbtract ( 922 )   Knowledge map   
    Related Articles | Metrics
    By analyzing all types of secure threats that mobile communication services faced, this paper proposed a security architecture for mobile communication services, and then gave a detailed introducion to the overall structure of the security architecture, terminal and smart card security technology.
    Security Threats and Technology Development Trends of Information Network
    Zheng Zhibin
    2009, 25(2):  28-34. 
    Asbtract ( 812 )   Knowledge map   
    Related Articles | Metrics
    First of all, this paper analyses security threat problems of network on present, and discusses the development of vulnerability mining, and finally describes development trends of primary security technologies in the near future.
    Identity Management Technology and Its Development
    Chen Jianyong and Wu Guihua
    2009, 25(2):  35-41. 
    Asbtract ( 938 )   Knowledge map   
    Related Articles | Metrics
    With the rapid development of network service, identity management has got great attention as a vehicle to set up trust relationship between users and service providers. It can evidently improve users’ experience on services, the flourish of service and the security of networks if users’ identities are shared among different services through IDM. This paper details general framework of IDM, introduces the current development of IDM standards all around the world, and describes main features of related products.
    Development and Analysis of Managed Security Services in North America
    Zhou Sining and Xiang Youjun
    2009, 25(2):  41-47. 
    Asbtract ( 882 )   Knowledge map   
    Related Articles | Metrics
    After years of development, the market of managed security service in North America is coming to maturity. The author visited some local representative MSS providers in the United States to understand the current North America managed security services market situation, industry trends, the status of business, and the technical and operational situation. In this paper, the main research results are summarized, in the hope that is helpful to domestic enterprises, especially telecom operators.
    Security Schemes and Development Trends of Evolved Broadband Wireless Communication Systems
    Wu Hao,Wu Shaobo and Zhong Zhangdui
    2009, 25(2):  48-54. 
    Asbtract ( 915 )   Knowledge map   
    Related Articles | Metrics
    This paper analyses the security threats and requirements in the evolved broadband wireless communication systems: LTE and WiMAX, and discusses the security schemes of LTE and WiMAX network. Finally, it gives the security scheme development trends in WiMAX and 3GPP interworking.
    Discuss on Internet Traceback
    Wei Liang
    2009, 25(2):  55-59. 
    Asbtract ( 909 )   Knowledge map   
    Related Articles | Metrics
    At first, the paper analyzes the problems that have been faced with Internet traceback, then discusses sorts and application scenes of traceback.Finally, some technologies about the trackback are introudced.
    Research About System-behavior-based Anomaly Detection Technologies
    Zhou Binbin,Cui Baojiang and Yang Yixian
    2009, 25(2):  59-65. 
    Asbtract ( 864 )   Knowledge map   
    Related Articles | Metrics
    This paper gives an overview of different kinds of behavior-based anomaly detection technologies. It compares two classes of IDS-HIDS and NIDS, introduces the role of HIDS in Internet security and the classification of technologies it adopts. After that, it describes both static analysis technologies of HIDS anomaly detection by explaining their basic concepts, development and effects, with a focus on system-behavior based methods. At last, this paper concludes the current situation, future hot topics and prospect of behavior-based HIDS.
    Attack and Defense of Software Vulnerability
    Chen Xin,Cui Baojiang,Fan Winqing and Niu Xinxin
    2009, 25(2):  66-71. 
    Asbtract ( 874 )   Knowledge map   
    Related Articles | Metrics
    software vulnerability, vulnerability disclosure, vulnerability exploiting
    Study and Trends on Client-side Malicious Code of Web Application
    Huang Wei,Cui Baojiang and Hu Zhengming
    2009, 25(2):  72-79. 
    Asbtract ( 806 )   Knowledge map   
    Related Articles | Metrics
    Web application and in particular Web 2.0 application gains more and more popularity nowadays, while malicious codes are now targeting more at Web application. In this paper, we provide a detailed overview of threats to Web application at first and then turn to the discussion on malicious scripts at the client-side of Web application, which includes the history, variation and upgrade of XSS, JavaScript function hook technology at runtime and the new trends of client-side malicious scripts in the context of Web 2.0 application. The Web browser’s vulnerability discovery and exploit related technologies are also introduced. At last, we predict the future development of client-side malicious code of Web application and give some advices on the security enhancements of Web application client-side.
    Research on Graded Network and Information System Security Defense Mechanism
    Zhao Yang,Zhang Jian and Wang Xinfeng
    2009, 25(2):  80-83. 
    Asbtract ( 822 )   Knowledge map   
    Related Articles | Metrics
    The graded defense mechanism of network and information system is the key point of our national informatization procedure. It is put forward a graded security defense model for the large-scale network on the basic of discussing general graded security measures in this thesis. The model has been used in an actual testing network and already obtains a good effect.
    Applications of RNS in SDR Systems
    Ma Shang,Hu Jianhao and Ling Xiang
    2009, 25(2):  84-89. 
    Asbtract ( 789 )   Knowledge map   
    Related Articles | Metrics
    The residue number system is a carry-free system and allows a high degree of concurrency. Due to this property, the RNS has received considerable attention in digital signal processing systems with intensive additions and multiplications. And these DSP modules are important for software definition radio systems. In this paper, we first introduce the fundamental concept of RNS and the recent research about it. Then we point out the key units of RNS-based DSP systems and present a DSP architecture based on RNS. Furthermore, combined with the properties of fault-tolerance and parallelism of RNS, we introduce a RNS-based parallel orthogonal signaling system. Finally, we indicate the applications of RNS in the array-based SDR and aeronautic signal processing platforms.
    A FFT/IFFT Processor for MB-OFDM UWB Applications
    Liang Huaguo,Tan Mindong and OuYang Yiming
    2009, 25(2):  90-95. 
    Asbtract ( 918 )   Knowledge map   
    Related Articles | Metrics
    This paper presents a high-throughput, hybrid word-length, mixed-radix, four-parallel data-path 128-point FFT/IFFT processor for MB-OFDM ultrawideband (UWB) systems. The proposed processor uses an error compensation method for modified booth fixed-width multipliers and canonic signed digit (CSD) multipliers, which leads to higher precision and lower hardware complexity. From analysis, it is shown that the proposed architecture can save 49% multipliers utilizations compared to MRMDF architecture, additional our proposed architecture can save 30% memory resource and be increased by 33% throughput rate compared to the two- parallel data-path architecture under the same hardware cost. So it makes the best balance of the precision, the hardware cost and the speed. Also, ours processor is designed using 0.18 μm COMS process with a throughput rate of up to 1.2 Gsample/s at 300 MHz, which meets the requirements for gigabit WPAN.
    Research of Telecommunication Product Model
    Yang Yuyan and Zhao Dongsheng
    2009, 25(2):  96-101. 
    Asbtract ( 869 )   Knowledge map   
    Related Articles | Metrics
    Product model design is one of the critical factors to tackle fast changing market. Shared information/data (SID) model from telecommunication management forum(TMF) is good and comprehensive. But the complication of implementation and high cost makes it hard to be adopted in building operation support system(OSS) in China. With the actual situations of Chinese telecom operators in mind, this paper simplifies the SID model and presents a new product data model for communication service providers based on the in-depth study of SID model. This paper also describes the differences between SID model and new product data model from model complicity and model cohesion perspective. The new product data model has been successfully implemented into the telecom operation management support system(TOMSS) in China Netcom Henan Branch.
    A Low Complexity Echo Canceller on TMS320DM642
    Gao Guoping and Chen Shuixian
    2009, 25(2):  102-107. 
    Asbtract ( 910 )   Knowledge map   
    Related Articles | Metrics
    We developed a low complexity echo canceller suitable for double talk cases on DSP TMS320DM642. It uses the two echo path model (TEPM) as the basic structure to enhance robustness under double talk, and the multi-delay block frequency domain adaptive filter (MDF) as the echo path impulse response estimator to lower computational complexity. For implementation, the echo canceller takes the advantages of parallel processing power and single instruction multiple data (SIMD) capability of the DSP through linear assembly level optimization for main operations. It is shown that the echo canceller is able to process echoes with path delay up to 128 ms at 4.5% CPU load for composite source signals and real source signals.
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: