Please wait a minute...

Current Issue

    20 June 2016, Volume 32 Issue 6
    Topic:5G
    Intelligent interference management in 5G wireless networks
    Jiandong LI,Lei LIU,Min SHENG,UChao X
    2016, 32(6):  3-14.  doi:10.11959/j.issn.1000-0801.2016167
    Asbtract ( 579 )   HTML ( 27)   PDF (3009KB) ( 971 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As one of the key technologies in 5G networks,ultra-dense wireless network is utilized to approach the future 1 000 ultra-high traffic volume.Nevertheless,the dense deployment of network nodes would result in severe interference,and thus interference management was proposed as the big principle behind 5G ultra-dense wireless networks research.Firstly,the interference management schemes were classifed from two aspects:avoidance and utilization.Then,an intelligent interference management architecture was proposed to accommodate the development trend of future wireless networks in terms of intelligence and heterogeneity in order to realize the dynamic tightly coupled interference management of wireless network environment and interference management.Taking the intrinsic relationship between interference management and resource management into consideration,three cutting-edge interference management schemes were introduced,which could significantly improve the network resource utilization and the network capacity.

    Principles,technologies and challenges of OQAM-OFDM for 5G applications
    Jun LI,Yuan TIAN,Yu QIU,Da CHEN,Tao JIANG
    2016, 32(6):  15-19.  doi:10.11959/j.issn.1000-0801.2016157
    Asbtract ( 1002 )   HTML ( 72)   PDF (1802KB) ( 1194 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G will need to be able to support much larger connections of communication devices and meet the requirements of diverse scenarios.However,this requirement cannot be met by OFDM(orthogonal frequency division multiplexing)due to its own drawbacks.As an alternative approach to OFDM,OQAM-OFDM (offset quadrature amplitude modulation based orthogonal frequency division multiplexing)adopts a prototype filter that is well localized in frequency domain,which makes OQAM-OFDM quite suitable for 5G.The OQAM-OFDM system was briefly introduced,then,its superiority employed in 5G was deeply discussed.Finally,some key technical issues of OQAM-OFDM for application in 5G were summarized,such as tail shortening.

    Fog computing based radio access networks:architecture,principles and challenges
    Bonan YIN,Yuan AI,Mugen PENG
    2016, 32(6):  20-27.  doi:10.11959/j.issn.1000-0801.2016162
    Asbtract ( 906 )   HTML ( 49)   PDF (2264KB) ( 1518 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To reduce the burden of fronthaul link,avoid large-scale wireless signal processing in centralized baseband unit(BBU)pool,and take full advantage of processing and storage capabilities in edge devices,a fog computing based radio access network(F-RAN)was presented as an evolution form of heterogeneous cloud radio access networks.The core idea of F-RAN was to take full advantage of processing and storage capabilities in edge devices which could achieve the local distributed content delivery,the local distributed collaboration radio signal processing and the local distributed cooperative radio resource management functions.System architectures of F-RAN,promising key techniques,and researching open issues of F-RAN were discussed in detail.

    Towards 5G:heterogeneous cellular network architecture design based on intelligent SDN paradigm
    Yifan ZHOU,Zhifeng ZHAO,Honggang ZHANG
    2016, 32(6):  28-35.  doi:10.11959/j.issn.1000-0801.2016163
    Asbtract ( 549 )   HTML ( 9)   PDF (2057KB) ( 1031 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To enrich the SDN(software defined networking)with intelligence and learning capability,an intelligent SDN paradigm was proposed for the first time.Combining it with the traditional cellular networks,5G-oriented heterogeneous cellular network architecture based on the intelligent SDN was set up,which made the integrated management of radio access networks and core networks possible.Based on the management and coordination of intelligent SDN,the decoupling of control and data,decoupling of uplink and downlink,and dynamic resource utilization in radio access networks to improve the spectrum efficiency and energy efficiency were put forward;content caching and network security strategies were deployed in the core networks to enhance the network scalability and data throughput.Globally,the resource utilization in radio access networks and core networks was optimized to achieve the network function virtualization and customized service provision,which contributed to the in-depth combination between the heterogeneous cellular networks and intelligent SDN.

    Architecture and solutions of 5G ultra dense network
    Jianmin ZHANG,Weiliang XIE,Fengyi YANG
    2016, 32(6):  36-43.  doi:10.11959/j.issn.1000-0801.2016076
    Asbtract ( 1960 )   HTML ( 129)   PDF (2262KB) ( 1932 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Ultra dense network(UDN)is referred to as the most efficient technique for meeting the challenges of 1 000 times higher trafficvolume and 10~100 times higher user data rate,which can improve the network capacity dramatically through network densification.However,due to the limited coverage and higher density of small cell,the problems of frequent handover and inter-cell interference become intractable,which degrade the system capacity and user experience.Therefore,in order to satisfy the challenges of coverage and capacity simultaneously,the architecture of 5G ultra dense network was proposed,which was characterized as the separation of control and user planes and cluster-based centralized control.Besides,regarding to the UDN scenarios of macro-micro and micro-micro,different solutions were presented,respectively.In addition,the problems and challenges of the architecture of 5G ultra dense network were also discussed in detail,providing reference for future research and development.

    Key technology of network self-organization in 5G ultra-dense scenario
    Yiming LIU,Xi LI,Hong JI
    2016, 32(6):  44-51.  doi:10.11959/j.issn.1000-0801.2016168
    Asbtract ( 449 )   HTML ( 6)   PDF (1722KB) ( 916 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The ultra dense deployment and the coexistence of multi-system networks make the fifth generation(5G) mobile communications ultra-dense network operation complexity and cost increase greatly.Network self-organization has been as a key technology in 5G ultra-dense network for its excellent performance on enhancing the network management efficiency and reducing the operating costs.The network self-organization technology and its function,such as self-configuration,self-optimization and self-healing were introduced.Moreover,the technology challenges and the trends were analyzed for further research.

    Smart city converged and accessed network based on 5G mobile communication system
    Dapeng WU,Junjie YAN,Peng YANG
    2016, 32(6):  52-57.  doi:10.11959/j.issn.1000-0801.2016160
    Asbtract ( 376 )   HTML ( 13)   PDF (1630KB) ( 536 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development and construction of smart cities largely depend on the communication network infrastructure,and the latest 5G mobile communication system can sufficiently facilitate the revolution of communication network infrastructure for smart cities.The 3-layer network architecture for smart cities was introduced and the key issues of converged networks,such as the relationship evaluation,trust management and reliability assurance were holistically analyzed.Lastly,the corresponding solutions were given,which could enhance the application bearing capabilities of smart city communication networks.

    New services and development trend in 5G environment
    Zhenjiang DONG,Hao DONG,Wei WEI,Shoufu DU,Ming LIU,Feng JI
    2016, 32(6):  58-64.  doi:10.11959/j.issn.1000-0801.2016181
    Asbtract ( 1096 )   HTML ( 114)   PDF (4439KB) ( 3021 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G and its related technologies have been the research focuses in the mobile telecommunication industry.The services and applications,their related technologies and development trends were studied.The requirements of mobile bandwidth,the current service limitationand the service development trends were analyzed and described in aspects of multi-media services,internet of things services cloud computing and artificial intelligence technology.

    A look at 5G and future mobile communication development trend from the point of WRC-19 agenda items
    Jian FANG,Ying ZHU,Na ZHENG,Pengpeng LI
    2016, 32(6):  65-72.  doi:10.11959/j.issn.1000-0801.2016161
    Asbtract ( 527 )   HTML ( 16)   PDF (2244KB) ( 852 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,global 5G development status was outlined.And the relationship between world radio communication conference(WRC)and mobile communication development was introduced.Based on the application scenarios in the ITU-R recommendation of 5G visions,two important 5G scenarios,mobile internet and internet of things were analyzed.Then those WRC-19 agenda items which related to 5G were sorted out combined with the results of WRC-15.The background and core tasks were illustrated.Finally,the global technology and spectrum status of research were summarized and the future study tendency was pointed out.

    research and development
    True 2-D 5/3 wavelet transform and its application for CT image lossless compression
    Nini XU,Mingming ZHANG,Jianming WANG
    2016, 32(6):  73-82.  doi:10.11959/j.issn.1000-0801.2016122
    Asbtract ( 411 )   HTML ( 19)   PDF (2058KB) ( 990 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wavelet transform is widely used in the field of digital image processing,and it usually processes image by separating the row and column,which can’t meet the human visual system(HVS)completely.To address this situation,a kind of true 2-D 5/3 wavelet transform was constructed,which was more consistent with HVS.Firstly,1-D 5/3 wavelet filter bank constructed the true 2-D Lazy wavelet filter bank by McClellan transform,and it was implemented by lifting scheme.Then,this lifting scheme was nested with the true 2-D Lazy wavelet filter bank to implement true 5/3 wavelet transform of image.To facilitate engineering applications,the transformation procedure was given.The experiments of true 5/3 wavelet transform used in CT image lossless compression,the experiment shows that,for 512×512 size CT image true 5/3 wavelet transform has better compression effect when compared with two dimensional separable 5/3 wavelet transform and can save 1 989.9 byte per piece on average.

    Analysis of the throughput in full-duplex WLAN
    Chen ZHAO,Yunzhou LI,Xibin XU,ANGJing W
    2016, 32(6):  83-92.  doi:10.11959/j.issn.1000-0801.2016172
    Asbtract ( 334 )   HTML ( 3)   PDF (2332KB) ( 576 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    WLAN is one of the important ways of accessing mobile internet.However,the performance of WLAN declines rapidly as the number of users increases.Improving the performance of WLAN with high density deployment is an important research direction of WLAN technology.Distributed coordination function(DCF)which was the basic media access method of IEEE 802.11 in infrastructure-based networks was modeled and the bottleneck of downlink throughput was pointed out.Taking advantage of full-duplex technology where there was a breakthrough in recent years,a new MAC protocol was designed and analyzed.By providing the AP full-duplex transmitting ability and simple modifications to traditional DCF protocol,the new protocol made the downlink throughput breaking through the bottleneck in infrastructure-based WLAN and increased the total throughput by more than 60%.

    Test case minimizing based on combination chaos genetic algorithm
    Qing SHEN,Yunliang JIANG,Zhangguo SHEN,Jungang LOU
    2016, 32(6):  93-102.  doi:10.11959/j.issn.1000-0801.2016178
    Asbtract ( 407 )   HTML ( 8)   PDF (2338KB) ( 794 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Test case minimizing is one of the most important research fields in software testing.Uniformly distributed Chebyshev and Logistic chaos sequence were introduced in the selection,crossover and mutation of genetic algorithm.Chaos disturbance was also added in genetic testing suite to address the common problems of weak ability in local search and premature convergence,thus to optimize the test result.Experiments were conducted in randomly generated test suites and Siemens test suites.Comparisons were also made with classical methods regard to the scale of production of test suite and the execution time of the algorithms.The results of the experiment indicate that based on the same execution time of the algorithms,a smaller scale test suite can be produced by introducing chaotic sequence in genetic testing suite selection.

    AODV-HE routing algorithm based on minimum hop and energy of node
    Xiang YU,Zhi PENG,Shiyan WANG,Li LIU
    2016, 32(6):  103-109.  doi:10.11959/j.issn.1000-0801.2016123
    Asbtract ( 387 )   HTML ( 7)   PDF (1955KB) ( 716 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    AODV routing protocol takes the minimum hop as the only basis in route selection,causing the uneven allocation of resources and reduction in network lifetime.A routing algorithm based on minimum hops and energy of node(AODV-HE)was proposed.By integrating both minimum hop and residual energy of each node,the algorithm optimized the routing mechanism and presented a selection weight of reverse routing,based on which the best route was chosen.Simulation results show that the algorithm can effectively increase packet delivery ratio and reduce the end-end delay,and it can also improve the allocation of network resources and extend network lifetime.

    Improvement of identity adaptive recognition algorithm in visual sensor network
    Na LI,Xiaoning ZHANG,Fang’e ZHU
    2016, 32(6):  110-115.  doi:10.11959/j.issn.1000-0801.2016171
    Asbtract ( 208 )   HTML ( 1)   PDF (1773KB) ( 341 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    When recognizing the identity in visual sensor network,it’s easily to be interfered with facial expression,illumination condition and shelter,so as to reduce the recognition accuracy.An identity adaptive recognition algorithm based on the improved minimum gray difference tree in visual sensor network was put forward.After gray processing,the minimum gray difference was used to enhance the quality of the image;cost function based on gray level was defined,the match price of each corresponding pair of gray of the image to be recognized and the specified face image were achieved,minimum gray difference tree model was set up,after two image similarity were calculated,the nearest neighbor matching algorithm was directly applied to obtain the image identity corresponding to minimum matching cost in the visual sensor network registration gallery,it was viewed as the identity to be recognized,the adaptive identity recognition was achieved in visual sensor network.Simulation results show that the proposed algorithm has high identification accuracy.

    Data aggregation in wireless sensor network for optimizing network lifetime
    Qifen DONG,Hongyu CHEN,Guojun LI,Kang WANG,Zhen HONG
    2016, 32(6):  116-123.  doi:10.11959/j.issn.1000-0801.2016139
    Asbtract ( 277 )   HTML ( 1)   PDF (1892KB) ( 288 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking target tracking in wireless sensor network(WSN)as application background,data aggregation for optimizing network lifetime based on extended Kalman filter method was researched,and an algorithm which considered both tracking accuracy and node energy to real-time schedule node groups involved in the data integration was designed.Simulations show that the proposed algorithm makes the tracking results do not deviate from the trajectory of target as long as the target speed is within a certain speed range.In addition,compared with the Random method and the All method,the proposed algorithm greatly prolongs network lifetime.

    Image steganography based on nonsubsampled Contourlet transform and Hill cipher
    Shuliang SUN
    2016, 32(6):  124-128.  doi:10.11959/j.issn.1000-0801.2016170
    Asbtract ( 273 )   HTML ( 3)   PDF (1305KB) ( 476 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2k correction was applied to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.

    Performance analysis of multi-relay DF cooperative communication system based on directional antenna
    Mingwei WANG,Huisheng ZHANG,Lixin LI,Lifeng HE
    2016, 32(6):  129-135.  doi:10.11959/j.issn.1000-0801.2016180
    Asbtract ( 297 )   HTML ( 2)   PDF (1995KB) ( 527 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve reliable communication in multi-relay cooperative communication,the directional antenna combining multi-relay cooperative communication system and optimal relay selection decode-and-forward cooperative strategy was presented.Firstly,the theoretical closed form of outage probability of the communication system using directional antenna operating in the three modes of DT-DR,DT-OR and OT-OR were presented.Then for three kinds mode,the collaboration communication system interrupt probability and signal-to-noise ratio,the number of relay nodes,the antenna gain channel fading efficiency and relationship between the channel capacity were analyzed in numerical simulation.These findings reveal that excellent performance of cooperative communication system with directional antennas could be achieved such as smaller outage probability and improved by best relay nodes and optimal power allocation coefficient.

    Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
    Jie ZHAO,Huarong ZHANG
    2016, 32(6):  136-142.  doi:10.11959/j.issn.1000-0801.2016116
    Asbtract ( 346 )   HTML ( 5)   PDF (1467KB) ( 582 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.

    Internet traffic classification method based on behavior feature learning
    Zhen LIU,Ruoyu WANG
    2016, 32(6):  143-152.  doi:10.11959/j.issn.1000-0801.2016152
    Asbtract ( 462 )   HTML ( 32)   PDF (3577KB) ( 712 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The connection graph based internet traffic classification method can reflect the connectivity behavior between hosts.Thus,it has high stability.But the heuristic rules summarized for traffic classification are generally incomplete,and they difficultly obtain high classification accuracy.Host communication behavior model and BOF method was researched,and a set of host connection related behavior features (HCBF)was extracted from the multiple flows with the same {destination IP,destination port and transport protocol}.To evaluate the performance of HCBF,it was compared with the existing feature set on the respect of basic classification performance and classification stability.The experiments were carried out on the traffic collected in the traditional and mobile networks.Results show that HCBF out performs existing feature sets.

    summarize
    Research progress of triangle counting in big data
    Hongqiao JIN,Yihong DONG
    2016, 32(6):  153-162.  doi:10.11959/j.issn.1000-0801.2016169
    Asbtract ( 406 )   HTML ( 9)   PDF (1872KB) ( 883 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Counting triangles in a graph is an important step to calculate the clustering coefficient and the transitivity ratio of the network,which is widely used in important role identification,spam detection,community discovery,biological detection etc.Counting triangles algorithm is mainly faced with two major problems of space-time consumption and accuracy.The representative algorithm of the counting triangles in the big graph was introduced.There existed two kinds of algorithms,which were exact counting algorithm and approximate counting algorithm.Exact counting algorithms were divided into internal memory algorithm,external memory algorithm and distributed algorithm.The space-time consumption or I/O consumption of exact counting algorithm was very large.Approximate counting algorithms were divided into auxiliary algorithm,static algorithm and streaming algorithm.In the end,the counting triangles algorithms were summarized.

    Wide operating technology
    Working procedure for SEP and key problems in practice
    Yufeng YAO
    2016, 32(6):  163-166.  doi:10.11959/j.issn.1000-0801.2016166
    Asbtract ( 482 )   HTML ( 21)   PDF (1126KB) ( 1746 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The working procedure for SEP was analyzed,patent disclosure policy and FRAND principle of SSO were described.Based on the actual case analysis,some key problems of SEP in practice were analyzed,including patent licensing rates,relief under FRAND principle,antitrust law regulation of the abuse of SEP.

    Research and implementation of multi-protocol association scheme on Uu interface in LTE-Advanced network
    Lei LI,Zhizhong ZHANG,Bing XI
    2016, 32(6):  167-176.  doi:10.11959/j.issn.1000-0801.2016177
    Asbtract ( 358 )   HTML ( 2)   PDF (3139KB) ( 504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the explosive growth of mobile data services in LTE-Advanced network and the low efficiency of multi-protocol association analysis process,on the basis of traditional signal monitoring system,a multi-protocol association analysis system of Uu interface in LTE-Advanced network was proposed by using big data technology (storage,processing and analysis)and multi-protocol association analysis technology.Firstly,Layer 1,Layer 2 and Layer 3 of Uu interface data business processes were processed efficiently and analyzed accurately.Then,the user data signaling process and service data flow were related to analyze.Finally,the proposed system was applied to the real network testing of Uu interface data in LTE-Advanced network.Test results show that the multi-protocol association analysis system described above achieves the expected effect and it is meaningful for improving user experiences,efficiently processing big data analytics and the promotion of precision marketing area.

    Service security monitoring mechanism for application server cluster
    Hongyao JU
    2016, 32(6):  177-185.  doi:10.11959/j.issn.1000-0801.2016173
    Asbtract ( 293 )   HTML ( 1)   PDF (1806KB) ( 338 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For an application system,the workloads on the application servers’ key hardware and the working state of the application software are important factors affecting the system’s safety.Based on studies of the monitoring techniques for CPU,RAM,network traffic,software directories and software files of application servers,dynamic comprehensive monitoring,safety review and application software intelligent recovery were integrated,and an intelligent monitoring system was constructed for the application systems.The mechanisms and methodology of the monitoring system were illustrated.The system realized intelligent monitoring the working state of hardware and software,achieved the goal of automatic alarming,fault locating upon abnormal working states of the hardware or software and automatic recovery upon attacks to the software.

    Study on segment routing network and its application in traffic engineering
    Xiaoming HE,Quan LU,Liang XING
    2016, 32(6):  186-194.  doi:10.11959/j.issn.1000-0801.2016179
    Asbtract ( 624 )   HTML ( 21)   PDF (1598KB) ( 1304 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Segment routing network is the inheritance and innovation of IP routing technology,which has many unique advantages in the realization of network virtualization,fast re-routing,network programming,load balancing and traffic engineering,and so on.Segment routing mechanism was studied in depth,and the protocol extensions of interior gateway protocols (IGP)and border gateway protocol (BGP)for segment routing were introduced and analyzed in detail.Furthermore,the realization of traffic engineering for segment routing in typical application scenarios of the operator networks was explored.With the maturity of technology and standardization,segment routing network will promise to have broad application prospects.

    Discussion on the deployment solution of comprehensive traffic management
    Yizhi DING,Hongwei LV,Yingxia NIU,Shaoping LI
    2016, 32(6):  195-200.  doi:10.11959/j.issn.1000-0801.2016164
    Asbtract ( 249 )   HTML ( 3)   PDF (1598KB) ( 461 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traffic management have been proposed for many years,operators have done a lot of pilot projects and make traffic management platform.Deepen the promotion of traffic management from scale to value is imperative.Typical business scenes of traffic management were analyzed,and the deployment solution of comprehensive traffic management was proposed.The solution was mainly composed of traffic growth in the value of the solution,the system architecture and implementation steps,including the key technology and process.Application and practice results show that this scheme can effectively stimulate the growth of traffic value.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: