Please wait a minute...

Current Issue

    20 March 2016, Volume 32 Issue 3
    Topics: SDN & NFV
    Research and implementation of unified monitoring system for multi-datacenters
    Baojun JIA,Lei XU,Yuhua GUO,Wei XIONG,Sufen LI
    2016, 32(3):  2-6.  doi:10.11959/j.issn.1000-0801.2016095
    Asbtract ( 368 )   HTML ( 6)   PDF (1319KB) ( 822 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A monitoring system solution of supporting multi-datacenter and multiple private cloud environments were proposed.In order to achieve load balancing and easy scale-out,the unified monitoring system adopted a distributed framework and encapsulated Zabbix API and OpenStack API.This solution was significant for the study of similar distributed cluster scheduling system.

    Typical applications and realization of SDN in IP WAN
    Yongjun HUANG,Xiaoming LU,Weihua CAO
    2016, 32(3):  7-13.  doi:10.11959/j.issn.1000-0801.2016111
    Asbtract ( 428 )   HTML ( 8)   PDF (2515KB) ( 844 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Three key points of SDN are decoupling of data plane and control plane,centralized control and open interfaces.Some carriers develop a SDN application system based on RR+ or PCE technology in order to achieve the centralized control function on traditional IP WAN.The architecture and development suggestions of the SDN application system were presented,and some typical functions,such as routing optimizing,traffic balanced scheduling,paths intelligent arrangement and so on,were described.

    Route optimization method for BGP based on SDN in large-scale IP network
    Hong TANG,Huahong ZHU,Weihua CAO,Jie ZOU
    2016, 32(3):  14-19.  doi:10.11959/j.issn.1000-0801.2016112
    Asbtract ( 704 )   HTML ( 26)   PDF (2139KB) ( 1567 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at rotation problem of route because of large-scale,multi-path,overlap in IP backbone networks,an optimization method for route reflection supported by both traditional routing devices and OpenFlow devices based on SDN controller technology was proposed.At first,the defects of traditional BGP routing mechanism was analyzed in detail.Then,a specific algorithm implementation and deployment scenarios were given.Test results of typical application scenarios demonstrate the validity of the proposed method.The average delay of international access reduces by 30%.

    Flow scheduling technology based on BGP extended protocol
    Yujia LUO,Liang OU,Zhiwei MO,Hong TANG
    2016, 32(3):  20-27.  doi:10.11959/j.issn.1000-0801.2016113
    Asbtract ( 673 )   HTML ( 32)   PDF (2815KB) ( 1135 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel centralized flow scheduling scheme based on software defined networking(SDN)was proposed.The existing problems of current flow scheduling method based on BGP were analyzed,and a new scheme was proposed.In the scheme,the BGP Flowspec was enhanced to avoid reconfiguring the related routers one by one,and hence the network management was simplified and a more flexible flow scheduling method was provided.The proposed scheduling scheme is compatible with the traditional BGP,which matches the trend of current industry and solves some of the problems in traditional BGP scheme.

    Bearing technology across the data center based on SDN
    Hanjiang LIU,Liang OU,Wenhua CHEN,Hong TANG
    2016, 32(3):  28-34.  doi:10.11959/j.issn.1000-0801.2016114
    Asbtract ( 459 )   HTML ( 9)   PDF (1906KB) ( 827 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.

    Network function virtualization elastic technology
    Lu LIU,Zhibin GUO
    2016, 32(3):  35-38.  doi:10.11959/j.issn.1000-0801.2016105
    Asbtract ( 310 )   HTML ( 9)   PDF (1014KB) ( 663 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to NFV ETSI standard architecture,NFV system mainly includes NFVI,VNF and MANO three function modules and sub function modules.NFV elastic technology was analyzed,and it was emphasized that the flexible goal of network virtualization was mainly to ensure the continuity of the business,application design and virtualization facilities were also affected by this goal.And the principle of elastic structure design was summarized.

    NFV security requirements and strategies
    Zhibin GUO,Yangfan CHEN,Lu LIU
    2016, 32(3):  39-42.  doi:10.11959/j.issn.1000-0801.2016100
    Asbtract ( 526 )   HTML ( 14)   PDF (821KB) ( 624 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.

    Standards and open source technology of NFV
    Shuhui MA,Tao WU
    2016, 32(3):  43-47.  doi:10.11959/j.issn.1000-0801.2016101
    Asbtract ( 445 )   HTML ( 12)   PDF (556KB) ( 1575 )   Knowledge map   
    References | Related Articles | Metrics

    In recent years,many influential international and domestic standard organizations have established special working groups to research NFV related standards as an emerging technology.Meanwhile a batch of NFV related open source organizations have been produced on the basis of standard research and development.Related standard organizations followed by ETSI and many open source organizations represented by OPNFV were tracked and studied,and the latest achievements were further researched.And then the development trend of NFV standards was deeply analyzed.Finally,the key open source technologies of NFV architecture were summarized.

    Network function virtualization fault analysis and processing method based on improved intelligent optimization algorithm
    Zhiming WANG,Bing CHEN
    2016, 32(3):  48-52.  doi:10.11959/j.issn.1000-0801.2016099
    Asbtract ( 356 )   HTML ( 3)   PDF (1382KB) ( 426 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network function virtualization has become an important trend in the global development of telecommunications industry,with the rapid development of network function virtualization and rapid growth of the telecommunications business,analysis and processing of data is too large to deal with,its problems such as low efficiency of fault analysis and processing have become increasingly prominent.For the increasingly urgent development needs of network function virtualization,fault analysis and processing method based on improved intelligent optimization algorithm is important for the rapid and sustainable development of network function virtualization.Based on the research of the convention mechanism of fault analysis and processing for network function virtualization,a method of fault analysis and processing for network function virtualization based on improved intelligent optimization algorithm was presented,it could solve the existing problems of fault analysis and processing for network function virtualization better.

    research and development
    Spectrum prediction algorithm in ISM band based on two-dimensional LMBP neural network
    Xiaoyu WAN,Pan HU,Zhengqiang WANG
    2016, 32(3):  53-59.  doi:10.11959/j.issn.1000-0801.2016083
    Asbtract ( 372 )   HTML ( 3)   PDF (2565KB) ( 419 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development and application of short-range wireless communications technology,the electromagnetic interference of ISM(2.4 GHz)band has become more apparent.Using the spectral prediction algorithm to predict the information of spectrum occupancy has become an effective way to solve the problem of compatible coexistence between devices.On the basis of verifying the time-domain and frequency-domain correlation of ISM band,an LMBP neural network of time and frequency domain was proposed and applied in the spectral prediction of ISM band.Through simulations and theoretical analysis,the best training combination of time-frequency point (△t=5,△f=2)was obtained.This point improves 95% of the spectrum prediction accuracy under the conditions of the input vector N=9 of the neural network.It increased 9% and 4% prediction accuracy compared with Markov algorithm and time-domain LMBP neural network and it had a better convergence time of training.

    A dynamic trust evaluation scheme for cooperative spectrum sensing
    Meiying WANG,Jingyu FENG,Guangyue LU,Dingkun HAN
    2016, 32(3):  60-67.  doi:10.11959/j.issn.1000-0801.2016051
    Asbtract ( 317 )   HTML ( 3)   PDF (2426KB) ( 514 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the harmful effect of dynamic SSDF attack against cooperative spectrum sensing technologies,a dynamic trust evaluation scheme based on the real-time observation and analysis of cognitive users’ sensing behaviors was proposed.Time attenuation,additive reward and additive penalty factors based on the historical sensing variation of cognitive users were introduced to calculate the dynamic trust value which changes with time and the number of collaborations.Meanwhile,trusted cognitive users were selected to participate in cooperative sensing,and thus improving the accuracy of the final sensing decision.Simulation results show that the scheme can effectively suppress the growth of trust of malicious users,and reduce the attack success rate for“OR”,“AND”and“Majority”which are three kinds of cooperative spectrum sensing data fusion schemes.

    A brand new strategy of quantum relay strategy based on entanglement swapping
    Min XU,Min NIE,Guang YANG,Changxing PEI
    2016, 32(3):  68-74.  doi:10.11959/j.issn.1000-0801.2016061
    Asbtract ( 503 )   HTML ( 21)   PDF (2679KB) ( 765 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum protocols based on entanglement are known as information security,reliability,flexibility and a broad prospect in use.Meanwhile,the fidelity of photons is also required.A new quantum relay strategy was proposed.By setting multi-relays between distant correspondents and under the assistance of classical communications,the strategy can execute entanglement swapping and entanglement purification to provide the correspondents with remote entanglement connection of stable fidelity.Performance analysis shows that by reasonable control of relay series,improvement of entanglement swapping and entanglement purification,the time delay and throughput can be significantly improved,necessary entanglement resources can be provided for the global quantum communication.

    Study of wireless experiment platform in 60 GHz
    Yuannian QIN,Chuan ZOU,Zhaoyu TENG
    2016, 32(3):  75-80.  doi:10.11959/j.issn.1000-0801.2016052
    Asbtract ( 368 )   HTML ( 7)   PDF (1794KB) ( 584 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A scheme of 60 GHz wireless experimental platform was presented.The platform was made up of NI USRP(transceiver module),NetFPGA(data processing module)and PC(control module).NI USRP was connected with NetFPGA by Gigabit Nthernet interfaces,while NetFPGA was connected with PC by PCI-bus.This experiment platform works on Linux with the help of LabVIEW.The transceiver and data process module are reprogrammable.Many operations such as data stream capturing,classification and speed limit could be done with Linux and PCI.The platform has good performances in open-ended and expansibility.That would be convenient for farther research in channel modeling,timeslot allocation and multiple access algorithms.

    Detection method for selfish routes based on the sequential probability ratio test
    Qi WANG,Qingping WANG,Huaixing WANG,Zheng’an XIAO
    2016, 32(3):  81-86.  doi:10.11959/j.issn.1000-0801.2016059
    Asbtract ( 352 )   HTML ( 9)   PDF (959KB) ( 369 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to a network model based on the sequential probability ratio test(SPRT),one detection method of selfish routes with respect to the routing functionality in wireless sensor network was developed.Through the analysis of the observed sample values of the nodes,the calculated routes evaluation values were compared with the known threshold values so as to determine whether it was selfish route.Simulation results show that the sequential sampling scheme based on the sequential probability ratio test had high detection accuracy,and the number of the required observation was greatly reduced,so it could operate faster.A merit of SPRT is that the number of observations required to test statistical hypotheses need not be determined in advance when compared to other methods based on a fixed number of observations.This allows for making prompt decision on the behavior of damage to the network,thus it can limit the scope of the damaged networks.

    A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability
    Yi LIU,Junbin HONG
    2016, 32(3):  87-91.  doi:10.11959/j.issn.1000-0801.2016068
    Asbtract ( 471 )   HTML ( 13)   PDF (1003KB) ( 932 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    XSS vulnerability is a common vulnerability of attacking the Web application and getting the user’s privacy data.Traditional XSS vulnerability detection’s softwares aren’t specially detecting for AJAX Web application.There is a huge disparity in the inspection accuracy.According to this situation,the XSS vulnerability characteristics of AJAX Web applications were described in detail,and a dynamic detection method based on Web crawler and page code behavior was proposed.Experimental results show that the proposed method has good performance in labor-saving,time saving and vulnerability detection effect.

    Iris recognition algorithm based on feature weighting fast discrete Curvelet transform and fuzzy LS-SVM
    Zhenhong HE
    2016, 32(3):  92-98.  doi:10.11959/j.issn.1000-0801.2016058
    Asbtract ( 314 )   HTML ( 3)   PDF (1961KB) ( 631 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to overcome the weakness of wavelet transform in two dimensional spatial analysis,an improved algorithm based on fast discrete Curvelet transform for iris recognition was proposed.Curvelet transform which can effectively capture the image edge information was introduced to decompose iris image.Mean and variance of low frequency sub-band coefficients and the energy of high frequency sub-band were extracted.Then the feature vectors were weighted according to the difference of classification ability of sub-band feature.Fuzzy least square support vector machine with optimal binary tree was developed to implement classification and recognition.The simulation results show that the proposed algorithm has higher recognition performance than the present method.

    Interference from IMT system to mobile satellite system in 1 518~1 525 MHz band
    Rui HAN,Xiaoyan ZHANG,Chang LIU,Guan WANG
    2016, 32(3):  99-104.  doi:10.11959/j.issn.1000-0801.2016046
    Asbtract ( 402 )   HTML ( 4)   PDF (1373KB) ( 603 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to analyze the feasibility of deploying mobile satellite system below 1 518~1 525 MHz band,the interference from the IMT system in 1 492~1 518 MHz band to the mobile satellite system in 1 518~1 525 MHz band was studied in detail via theoretical analysis and simulations based on the combing of the ITU recommendations and radio regulation.Aiming at the interference link from IMT base station to the terminal of mobile satellite system in different scenarios,the Monte Carlo simulation method was used to calculate the blocking and the adjacent channel interference.The interference blocking probability and the coexisting conditions between the two systems in adjacent band were given in the simulation results.The conclusion can be used to support the planning of adjacent band by national radio management department.

    Resource optimization for device-to-device communication underlaying cellular network
    Jihong ZHAO,Jiaojiao DONG,Rui TANG,Hua QU
    2016, 32(3):  105-112.  doi:10.11959/j.issn.1000-0801.2016043
    Asbtract ( 443 )   HTML ( 5)   PDF (3403KB) ( 368 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Device-to-device(D2D)communication underlaying cellular network can greatly reduce the energy consumption for mobile terminals,enhance the aggregate throughput for the system and improve quality-of-service (QoS)experience for individual users by utilizing the proximity gain residing in local communicating pairs.However,intra-cell orthogonality is impaired due to spectral sharing and the design of radio resource allocation mechanism is addressed.Energy consumption,spectral efficiency,energy efficiency,the number of admitted D2D links and the worst individual data rate were optimized and QoS requirement incorporating of all links were guaranteed.With the help of simulations,the efficiency of the proposed mechanism was verified and the trade-offs between different optimization targets was observed.

    Routing optimization method of WSN based on improved ant colony algorithm
    Han ZHAO,Shaoqing HUANG
    2016, 32(3):  113-117.  doi:10.11959/j.issn.1000-0801.2016036
    Asbtract ( 421 )   HTML ( 6)   PDF (1499KB) ( 590 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wireless sensor network is a self-organizing network that storing and transferring the data by the interconnected nodes.It will promote the development of the internet of things technology.In order to optimize the ability of data communication and data process,and reduce the energy consumption,the routing optimization method of wireless sensor network based on improved ant colony algorithm was proposed.Improved ant colony algorithm had excellent global optimization ability,so it could be used to optimize the minimum hop routing problem in wireless sensor network.And the simulation proves its validity.

    Prediction and modeling of connectivity probability in vehicular Ad Hoc networks
    Huimin WANG,Haitao ZHAO
    2016, 32(3):  118-122.  doi:10.11959/j.issn.1000-0801.2016037
    Asbtract ( 256 )   HTML ( 6)   PDF (1073KB) ( 487 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,with the rapid development of vehicular communication technology,IoV(internet of vehicles)as one of the applications of IoT(internet of things),is attracting more and more attention as well as its basic applications.The algorithm of predicting the connectivity probability based on highway model was proposed.Also,the joint distribution of vehicles on highway was studied,and the equation calculating the boundaries of connectivity probability on one road segment was analyzed quantitatively.The diagram presenting the relationship between the connectivity probability on one road segment and the average number of vehicles in each tuple was depicted by Rstudio.As a consequence,the model of connectivity probability on one path was achieved by calculating the products of the connectivity probability on all road segments along one path.The analysis result shows that the connectivity probability on one path can be improved by increasing the communication range or the density of vehicles.

    Overview
    Analysis on the application and development of quantum communication
    Junsen LAI,Bingbing WU,Rui TANG,Wenyu ZHAO,Haiyi ZHANG
    2016, 32(3):  123-129.  doi:10.11959/j.issn.1000-0801.2016085
    Asbtract ( 1092 )   HTML ( 135)   PDF (1076KB) ( 3504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum communication,which can provide unconditional security,is a physical layer solutions for information security.The status and challenge of its technology development and application are the focus of the industry.The field trials of quantum communication and main problem were analyzed.Driving force and bottleneck of its commercialization were clarified and worldwide standardization research were reviewed.System performance test and evaluation were discussed and future development recommendations were also provided.

    Operating technology wide-angle
    An associated perception import method for big data
    Huaiyu GONG,Jinsong XU,Pan WANG
    2016, 32(3):  130-134.  doi:10.11959/j.issn.1000-0801.2016044
    Asbtract ( 293 )   HTML ( 2)   PDF (956KB) ( 737 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Against the background of the existing database to the large data migration,Apache introduced the Sqoop as the main tool for the relational database to the big data migration.Sqoop simply cut the data table and randomly store it on diffe rent nodes.Being aimed at the problem of low efficiency of the query of the relationship between the Hadoop,a method of data importing and preprocessing was designed.To reduce the network transmission delay and improve the performance of the system,the high correlation degree was kept in the adjacent nodes.The contrast experiment shows that the performance of the data query can be improved greatly by the same or adjacent nodes.

    Multi-index real time environment monitoring system based on IoT
    Shixu SU,Yanjun XIAO,Yong’an GUO
    2016, 32(3):  135-138.  doi:10.11959/j.issn.1000-0801.2016033
    Asbtract ( 461 )   HTML ( 8)   PDF (1008KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In view of the growing problem of environmental pollution in our country,the research of the feasibility of the application of IoT in the field of environmental monitoring was focused.The present situation of research in the field of intelligent environmental protection was reported.An environmental monitoring system has been designed which can monitor a variety of environmental indices in real time,and some professional suggestions were given through data analysis.

    Mobile user behavior analysis system and applications based on big data
    Hongxun GU,Ke YANG
    2016, 32(3):  139-146.  doi:10.11959/j.issn.1000-0801.2016039
    Asbtract ( 1409 )   HTML ( 187)   PDF (1739KB) ( 3854 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on Hadoop’s architecture,this system collects and analyzes the telecom operator network’s data to build up user behavior model for effective exploration of big data applications.The whole process was discussed,including data collection,system design,implementation and application cases.

    PCI planning method based on genetic algorithm in LTE network
    Panxing LI,Jing WANG
    2016, 32(3):  147-152.  doi:10.11959/j.issn.1000-0801.2016082
    Asbtract ( 506 )   HTML ( 13)   PDF (942KB) ( 847 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to avoid local optimum and the consumption on time and strength in traditional manual planning,an method of PCI planning based on genetic algorithm(GA-PCIAS)was proposed,the method took full consideration of the PCI planning principle,and the interference matrix was introduced to fitness function to reduce the interference in planned area.The simulation results in an dense area show that GA-PCIAS can improve RS-SINR (reference signal-signal to interference plus noise ratio)comparing with the classical sequential PCI allocation on small-scale base station.

    Efficiency improvement of antenna testing based on diversity technology
    Shaogeng AN,Yuliang FANG,Lin CHEN
    2016, 32(3):  153-157.  doi:10.11959/j.issn.1000-0801.2016091
    Asbtract ( 329 )   HTML ( 3)   PDF (863KB) ( 482 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of mobile communication,the efficiency of the antenna test demand is higher and higher,but antenna test efficiency is subject to the testing principle.In order to improve the test efficiency while ensuring accuracy of test results,the concept of diversity test was introduced.After argument and research,the test system was reformed.The test results show that the test method of diversity ensures the accuracy of the test,and the test efficiency has been greatly improved,and it has a good technical development prospects and economic benefits.

    Early-warning schemes for alarm mutation in networks based on control chart
    Xing SU,Lu ZHANG
    2016, 32(3):  158-162.  doi:10.11959/j.issn.1000-0801.2016102
    Asbtract ( 329 )   HTML ( 5)   PDF (1963KB) ( 478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The amount of various network elements and alarms trigged is pretty startling with the expansion of the network.The traditional network operation and maintenance,that is,passively processed worksheet after the occurrence of network failure one by one,has been unable to adapt to the complex network management today.The various types of important service-related network alarm titles were sorted out,and the fluctuation under control for kinds of important alarms by control chart,establishes the graded early-warning model and algorithm for alarm mutation in networks combining with the service-related analysis,were analyzed.At last,a dynamic closed-loop control mechanism,which was preceded by fault occurred and actively digs into hidden troubles,was proposed.

    Electric power information column
    Design and development of the network OA&M system based on SDN
    Shun WU,Hui ZHANG,Ningzhe XING,Wei SONG,Tianlin HUANG,Yazhe TANG
    2016, 32(3):  163-170.  doi:10.11959/j.issn.1000-0801.2016077
    Asbtract ( 404 )   HTML ( 9)   PDF (2962KB) ( 906 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The OA&M systems of network infrastructure in electric power companies have drawbacks such as weak functions,coarse-grained monitor and control on the underlying networks and bad support on service deployment.SDN technology was used to solve these problems.An SDN-based OA&M framework was presented,a cross-domain SDN network was built and the corresponding OA&M system was developed,which could perform functions like topology discovery and fault detecting along with backup components switching.The experiments results prove that the OA&M system can overcome the above drawbacks and achieve the design goal.

    An optimized routing algorithm in WSN for smart park
    Wei DING,Shuquan LI,Siwei LI,Liangrui TANG,Dandan SUN
    2016, 32(3):  171-175.  doi:10.11959/j.issn.1000-0801.2016070
    Asbtract ( 350 )   HTML ( 6)   PDF (898KB) ( 510 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the energy problem in wireless sensor networks used for smart park,an optimized routing algorithm based on routing cost in WSN was proposed.According to the characteristics of smart park,the algorithm took a comprehensive consideration of the remaining energy and geographical location of nodes and exploited a new routing cost function.The sensor nodes selected the node with the minimum routing cost to forward the packets.Simulation results show that the algorithm significantly reduces the energy consumption of the network and extends the network lifetime effectively.

    Development of energy internet based on internet thinking
    Jianan LIU,Yanjie DU,Xianyi MENG
    2016, 32(3):  176-182.  doi:10.11959/j.issn.1000-0801.2016074
    Asbtract ( 289 )   HTML ( 5)   PDF (994KB) ( 668 )   Knowledge map   
    References | Related Articles | Metrics

    The development of the next internet revolution era energy industry was concerned.Guided by the Maslow’s hierarchy of needs theory,it puts forward the theory of energy development needs was put forward.It was revealed that the energy internet and its very nature generated by the changing of the energy using form has the consistency of the internet thinking.To comply with the development trend of the times,using the internet thinking to build and develop a new generation of smart grid will become the only way of the grid development in the future.

    An energy conservation method for locating wireless sensor network nodes in smart grid
    Chong WANG,Zeng ZENG
    2016, 32(3):  183-186.  doi:10.11959/j.issn.1000-0801.2016110
    Asbtract ( 285 )   HTML ( 5)   PDF (817KB) ( 607 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wireless sensor network has been increasingly applied for detecting,monitoring and locating targets in smart grid.In a wireless sensor network,energy is deemed as a critical resource and life of the system can be prolonged by energy saving strategy.A node detection and localization method based on energy-aware was presented.The method could be used for the clustering-based wireless sensor networks.It employed a posterior algorithm using a two-step communication protocol between the clustering head sensor and sensors inside.Only a small amount of node information was needed for the clustering head to run the localization program to determine the subset of sensors for further localization.In this way,consumption of energy and demand for communication bandwidth could be reduced,and the system life could be prolonged as well.Experiment results show that this locating method is able to save up to 32% of energy.

    Indoor localization algorithm based on RFID technology for smart park
    Wenzhao WU,Xiao WANG,Kunpeng ZHAO,Yafeng WEN
    2016, 32(3):  187-191.  doi:10.11959/j.issn.1000-0801.2016073
    Asbtract ( 425 )   HTML ( 13)   PDF (1390KB) ( 1009 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To meet the various requirements of full range management of vast device in buildings of smart park,an indoor localization algorithm about information fusion of multi readers was proposed.Based on device management in RFID system,using the wireless sensing characteristics between the reader and the tag,and combining with the reference tag concept,an indoor localization algorithm based on RFID was proposed.The algorithm had the characteristic of high position accuracy,low complexity and low cost.This algorithm could realize the localization of device tag in smart buildings,and realize management to a large number of device in buildings of smart park more efficiently and intelligently.

    Ideas of enterprise informationization based on user experience
    Feng CHEN,Tongfei XIA,Dongshu YANG
    2016, 32(3):  192-196.  doi:10.11959/j.issn.1000-0801.2016098
    Asbtract ( 276 )   HTML ( 7)   PDF (1109KB) ( 499 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the purpose of solving the problems of the traditional modes,such as difficult to realize the user personalized design,tough to fuse data,and unable to respond to the user demand,some ideas of construction mode for experience informationization based on user experience were presented.Extending from the traditional enterprise informatization,the new mode based on the massive amounts of data.The new mode uses the data asset-like management for guarantee,and uses the service-oriented data processing method for support,to achieve the user experience application,which is form an end user perspective.In the end,a typical application scenario including data trading platform,data asset-like management,high-speed computing service,and public platform,was put forward.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: