Please wait a minute...

Current Issue

    15 May 2009, Volume 25 Issue 5
    Technology and Application for Optical Grid
    Guo Wei,Jin Yaohui,Sun Weiqiang and Hu Weisheng
    2009, 25(5):  1-5. 
    Asbtract ( 806 )   Knowledge map   
    Related Articles | Metrics
    Optical grid is a novel technology and promising solution to support large-scale distributed scientific applications. This paper introduces the backgrounds of optical grid, and analyses key technological problems and development of optical grid, and gives the typical applications.
    A Technical Network Framework for Realizing Mobile Internet Services
    Dong Bin,Cao Min,Xue Lihong and Zhou Feng
    2009, 25(5):  6-10. 
    Asbtract ( 843 )   Knowledge map   
    Related Articles | Metrics
    Mobile Internet service is a combination of Internet service and mobile telecommunication service, both are developing rapidly. In this paper, according to the different characteristics of Internet and mobile network, we analyzed the mobile Internet service development demands and gave a technical network framework to meet these demands. We also put forward technical solutions to try to realize the network framework.
    Research on Essential Factors About Operation of Mobile Internet and Business Model
    Xue Lihong,Zhang Yunhua and Cao Min
    2009, 25(5):  11-17. 
    Asbtract ( 752 )   Knowledge map   
    Related Articles | Metrics
    The thesis focuses on the challenges that mobile Internet brings to telecom operators, including content, price, cooperation, user interface, network and terminal. It proposes a smart-pipe model based on discussing several different business models.
    Research on the Application of Mobile Widget Technology in the Mobile Value-Added Services
    Ni Ganfeng,Xue Lihong and Gong Xuefeng
    2009, 25(5):  17-21. 
    Asbtract ( 869 )   Knowledge map   
    Related Articles | Metrics
    Widget technology is one of the most popular technologies in Web2.0 times. With the coming times of the mobile Internet, the Widget technology which was combined of the mobile technology will be got an enormous development. In this article, the advantage of Widget technology is analyzed, which was combined with the introduction of Widget technology and the analysis of the characteristics of the mobile value-added business. Based on the advantage of Widget technology, the mobile Widget technology is researched in the mobile value-added services in this article.
    Research on System Architecture and Key Technologies of Mobile eBook Reading System
    Tong Jiangang,Zhu Lifang and Zhu Zhe
    2009, 25(5):  22-26. 
    Asbtract ( 754 )   Knowledge map   
    Related Articles | Metrics
    The mobile ebook reading system is known as one of killer applications in 3G mobile network. Based on the analysis of the architecture and function requirements of the MEBRS, this thesis discussed the structure of ebook document, the interface between platform with reading terminal and DRM solutions in MEBRS. It may make solid technical foundations for the MEBRS design.
    A Solution of Arrearages Control in Mobile Internet
    Diao Yanrong,Zhou Feng and Shi Fangyan
    2009, 25(5):  27-31. 
    Asbtract ( 775 )   Knowledge map   
    Related Articles | Metrics
    There are a large number of high-value services and high risk of arrearages in mobile Internet. A solution based on 3GPP online charging system concept is purposed, describing CDMA network construction. It provides a effective solution to reduce arrearages in communication system.
    Discussion on Operating Mode and Co-Operation Strategy of Mobile Game
    Gong Jing and Wu Jianjiang
    2009, 25(5):  31-35. 
    Asbtract ( 821 )   Knowledge map   
    Related Articles | Metrics
    As the 3G era, mobile data network bandwidth and services upgraded provide the possibility of mobile game becoming the next killer application, Chinese mobile phone games as the next Internet gold mine is located. Based on the mobile game industry value chain analysis, the mobile telecommunications operators in the game industry chain positioning, business model and strategy are recommended.
    A Fixed Mobile Convergence Solution Based on SIP/Wi-Fi
    Xu Longjie,Zhang Zhengfeng and Xue Lihong
    2009, 25(5):  36-39. 
    Asbtract ( 794 )   Knowledge map   
    Related Articles | Metrics
    This paper proposes a fixed mobile convergence solution based on SIP——a CDMA network convergence solution based on SIP/Wi-Fi, and details the principle of this solution.
    Scheduling Based on Multirate Transmission in Wireless Ad Hoc Network
    Wang Qi,Han Jianghong,Wang Qingshan and Lu Yang
    2009, 25(5):  40-44. 
    Asbtract ( 773 )   Knowledge map   
    Related Articles | Metrics
    This paper studies the multirate scheduling in wireless Ad-Hoc network. Firstly, we formulate it as an optimization problem. Moreover, the HRFWICB (highest rate first without considering buffer) algorithm and the HRFWCB (highest rate first with considering buffer) algorithm are present. Their main idea is scheduling prior the flow with higher transmission rate to decrease the transmission time and delay subject to that the minimum channel allocation for each flow is guaranteed. Finally the simulations are performed to compare our algorithms with Luo algorithm and GPPF(greatest potential packet first) algorithm. The result shows our algorithms can greatly decrease the transmission time and delay.
    Analysis and Design of MSTP Service Management System
    Xu Nan and Xiong Ao
    2009, 25(5):  45-49. 
    Asbtract ( 791 )   Knowledge map   
    Related Articles | Metrics
    This paper analyzed the network features and management needs of MSTP network, and raised objectives for MSTP service management system, discussed the system design based on norms. Through correlation analysis for the service and network element equipment, the system realized the business view management, and it implemented the service alarm management and the performance management on the basis of business view management. We presented the generic SLA templates and the performance indicator algorithm for MSTP. It was in application of actual network for some domestic large-scale operator.
    Framework of Broadband Satellite Wireless Access System Based on DVB-RCS and WiMAX
    Qin Yong,Zhang Jun and Zhang Tao
    2009, 25(5):  50-55. 
    Asbtract ( 767 )   Knowledge map   
    Related Articles | Metrics
    Satellite broadband communications have become one of hot issues. The existing satellite wireless access standard DVB-RCS is concentrated on physical layer technique criterions, however, a systemic framework of satellite broadband access system has not been proposed. This paper analyzes requirements and characteristics of satellite broadband access system, and a functional framework of which is also proposed based on the DVB-RCS standard and WiMAX terrestrial broadband access technique. Furthermore, the designing and realization methods of main functions of this proposed framework are researched.
    Study of the Relay Selection Algorithm for Cooperative Diversity
    Qin Qin,Zeng Zhimin and Zhang Tiankui
    2009, 25(5):  56-61. 
    Asbtract ( 741 )   Knowledge map   
    Related Articles | Metrics
    In recent years there has been an increasing focus on the cooperative diversity in wireless communications, the reasonable selection of the relay in cooperative communications can give high-gain. In this paper, we introduce the choose of cooperative timing and the form of cooperative relation, focused on three main methods of relay selection: location-based information, based on the average received signal to noise ratio and based on the instantaneous state channel relay selection algorithm, and then give an analysis and comparison to these methods.
    Research on Detection Methods of CC Attack
    Chen Zhonghua,Zhang Lianying and Wang Xiaoming
    2009, 25(5):  62-65. 
    Asbtract ( 1097 )   Knowledge map   
    Related Articles | Metrics
    At first, the paper introduces the basis, action and character of CC attack,then summarizes three traditional ways based on code optimization of Website of detect this attack action, and raises two new detection methods based on carrier network.
    Setting End to End Quality of Service in IPTV Content Distributing Network
    Guo Feng
    2009, 25(5):  66-70. 
    Asbtract ( 885 )   Knowledge map   
    Related Articles | Metrics
    Setting end to end quality of service in IPTV content delivery network is very meaningful in reality, and its effect monitoring and management have new features. We study the IPTV content distributing network of carrier and analyse different methods of QoS, which is focused on network layer and data link layer in OSI model. Then combined with backbone, MAN, access network and STB, we advise the proper methods of QoS for keeping the transmitting consistency. At last, we provide the demands on daily effect monitoring. All of the principles and methods are fit with the real network and have the value of extending in complex IP network.
    Application and Research of Trusted Computing Technology on Hierachical Protection
    Wang Lifang and Li Xu
    2009, 25(5):  71-74. 
    Asbtract ( 835 )   Knowledge map   
    Related Articles | Metrics
    A series of national standards about hierachical protection refer to the boundary of secure area must be explicit in classified information system, communication between different grade areas must be in control, and the system should be realized identity discrimination, classification level as information security requirement and so on. Facing these safe demand, this paper is applied on active label, safety isolation and unequal access control technology based on trusted computing technology, begin from the hardware first floor, build the trust relation among user, platform and network. So it realizes trusted interconnection among terminals or network areas of different security level.
    An Architecture Design and Services Implement for Mobile Best Tone WAP Portal
    Li Qing
    2009, 25(5):  75-80. 
    Asbtract ( 860 )   Knowledge map   
    Related Articles | Metrics
    The paper firstly analyses and designs the China Telecom Best Tone WAP portal framework, then gives a hierarchy and modularization software architecture, and finally describes in detail the network organization forms for Best Tone services, the way of symbol WAP services implement, and so on. It will provide a useful reference for the future provincial-level sub WAP portal construction and localization characteristics services development.
    A Deception Attack Problem and Its Security Solution in Cognitive Radio Network
    Xue Nan,Zhou Xianwei and Zhou Jian
    2009, 25(5):  81-85. 
    Asbtract ( 706 )   Knowledge map   
    Related Articles | Metrics
    Because of the characteristics of the dynamic spectrum in cognitive radio, a special security problem of deception attack is proposed. In the distributed cognitive radio networks, cognitive nodes perform routing setup using on-demand routing protocol, malicious nodes can launch attack by adding false spectrum information to route request packet and making other nodes to reject data packet which need to be transmitted. In order to solve this security problem, cognitive radio networks are divided into single-hop clustering structure, and cluster-head is designed to detect malicious nodes. The paper designs a routing protocol by combining with cluster-head detect, which proved to be feasible and reliable for data transmission. Theoretical analysis and experimental simulation show that the security issues can significantly reduce the network performance, and the proposed solution is with security and feasibility.
    Research on ICT Transition Strategy of Telecom Operators
    Jian Jie and Liang Peng
    2009, 25(5):  86-88. 
    Asbtract ( 911 )   Knowledge map   
    Related Articles | Metrics
    In order to meet the fierce competition in telecom market, telecom operators begin to transition from basic network operator to information and communications technology service operator. This paper analyzes China’s major telecom operators transition strategy before and after the reorganization of Telecom, and puts forward new advices for telecom operators in new situation.
    Research on Cell Search in MIMO OFDM System
    Wang Xianhua,He Genhong and Hao Donglai
    2009, 25(5):  89-93. 
    Asbtract ( 728 )   Knowledge map   
    Related Articles | Metrics
    Based on the research of OFDMA technique, this paper study the cell search arithmetic in LTE frame. Cell search scheme and flow is proposed, simulation result in multi antenna mode shows the better performance of the scheme proposed in the paper. At the final, the author summarizes the main work .
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: