Please wait a minute...

Current Issue

    15 June 2010, Volume 26 Issue 6
    Viewpoint focusing
    Thinking on Strategy and Tactics for Development of Next Generation Internet
    Leping Wei
    2010, 26(6):  1-7.  doi:10.3969/j.issn.1000-0801.2010.06.001
    Asbtract ( 751 )   HTML ( 15)   PDF (969KB) ( 467 )   Knowledge map   
    References | Related Articles | Metrics

    The article starts with urgent situation on IPv4 address shortage and current status and conditions of the transition towards to IPv6.Then the article presents fundamental transition tactics,global development strategy,service and application cutting points,network evolution strategy,security issues and major challenges when moving towards to IPv6.Finally the article presents some strategic thinking on the development of the next generation Internet.

    From Public Communication Network to Public Computing Communication Network
    Xiaoyu Tong,Yunyong Zhang,Yuanshun Dai
    2010, 26(6):  7-17.  doi:10.3969/j.issn.1000-0801.2010.06.002
    Asbtract ( 753 )   HTML ( 13)   PDF (3373KB) ( 567 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Today public communication network is developing in the direction that networks are widely interconnected using communication network infrastructure as backbone and Internet protocols; at the same time,cloud computing,a computing paradigm in the ascendant,provides new service modes.Communication technology has the trend of developing towards computing technology and applications,and computing technology and applications have the trend of developing towards service providing.Communication technology and information technology truly comes to a convergence.Telecom operators put forward the strategy to be providers of comprehensive information services in succession.To adopt cloud computing technology not only facilitates the upgrade of their communication network technology,service platform and supporting systems,but also facilitates the construction of the infrastructure and operating capacity of providing comprehensive information services.In this paper,the development processes of public communication network and computing are reviewed.Then a new concept of public computing communication network(PCCN)is proposed and analyzed in detail.The inevitable evolution of public communication network into PCCN is elaborated.The architecture,entities and key technologies of PCCN are discussed in detail.

    Topics:cloud computing and response
    Research of the Application of Cloud Computing in Telecommunication Industry
    Wenyu Pan,Yong Duan
    2010, 26(6):  25-29.  doi:10.3969/j.issn.1000-0801.2010.06.005
    Asbtract ( 997 )   HTML ( 21)   PDF (940KB) ( 760 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is considered as the third IT revolution and the general trend of development of the Internet following the personal computer and the Internet.According to the characteristics of cloud computing,this paper proposed the architecture of the cloud computing,and presented the adaptability criterions of cloud computing,then aiming at the telecommunication industry,we analyze the status of the IT systems in the telecommunication industry,furthermore,we propose the application and implementation recommendations of the cloud computing in the telecommunication industry.

    Application Research in Cloud Computing of Data Analysis and Business Intelligence Analysis for Telecommunication
    Dezhi Gong,Yong Duan
    2010, 26(6):  30-35.  doi:10.3969/j.issn.1000-0801.2010.06.007
    Asbtract ( 802 )   HTML ( 18)   PDF (1164KB) ( 412 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article states cloud computing technology in data analysis and business intelligence analysis research and analysis framework,discusses its application model,technical difficulties and prospects of application,combines with cloud computing the advantages and characteristics by analyze telecommunications data analysis and business intelligence analysis system.

    Research on Security Policies of the Infrastructure as a Service in IDC
    Yong Duan,Yuan Zhu
    2010, 26(6):  36-41.  doi:10.3969/j.issn.1000-0801.2010.06.008
    Asbtract ( 794 )   HTML ( 16)   PDF (1251KB) ( 521 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is a new technology and business model,the infrastructure as a service(IaaS)can provide customers the Internet-based IT infrastructure services,effectively improve the profitability of IDC-related products and increase the customers.However,the "Internet-based" feature brings ease of use at the same time,the higher security requirements must be considered for the business support platform.According to the characteristics of infrastructure cloud platforms,we propose the security framework and the security countermeasures for the new risks as the introduction of the new technology——cloud computing.

    Research on the Cloud-Based Computing Service Platform for the Mega Eyes
    Jianfeng Wen,Yirong Shi
    2010, 26(6):  42-48.  doi:10.3969/j.issn.1000-0801.2010.06.009
    Asbtract ( 1069 )   HTML ( 18)   PDF (1994KB) ( 408 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The research is focusing on the realization of the cloud-based computing services platform for the Mega Eyes of telecommunication,including the analysis of service model,business architecture,functional requirement,technical architecture and physical schema of the cloud-based computing architecture of the Mega Eyes.Finally,this paper sets forth the evolution of the cloud-based computing services platform for the Mega Eyes of telecommunication.

    Developing the Cloud Platform Supporting the Operations of the Internet of Things
    Jun Zhao
    2010, 26(6):  48-52.  doi:10.3969/j.issn.1000-0801.2010.06.010
    Asbtract ( 1388 )   HTML ( 81)   PDF (657KB) ( 1693 )   Knowledge map   
    References | Related Articles | Metrics

    Since the inception of the concept of “Internet of things”,how to promote the development of the Internet of things has received a lot of attention from various fields.From the perspective of telecom operators,in order to lead the development of Internet of things and create cross-industry,cross-region information processing centers for the Internet of things,we need to consider the adoption of cloud computing technology and the construction of a cloud platform for the operations of the Internet of things.This paper studied the requirements of constructing an operation platform for the Internet of things including the characteristics of cloud computing,based on the analysis of the system architecture of the Internet of things.Furthermore,it proposed a design and implementation strategy for developing the cloud platform supporting the operations of the Internet of things for telecom operators.

    Briefly Discuss on the Security of Cloud Computing
    Yuan Zhu,Jianfeng Wen
    2010, 26(6):  53-57.  doi:10.3969/j.issn.1000-0801.2010.06.012
    Asbtract ( 851 )   HTML ( 22)   PDF (1157KB) ( 668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing is the hottest technology discussed in the Internet recently,and it is considered as the development trend of the Internet.With the further implementation of cloud computing,the security issues of cloud computing become the one focus of the most dramatic.This article introduces the basic concept and characteristic of cloud computing,combined with the characteristics of cloud computing,focuses on threats and countermeasures of data security management,application management and virtualization security management in the cloud environment.

    Application of Private Cloud in Large Scale Enterprises
    Lei Huang
    2010, 26(6):  58-60.  doi:10.3969/j.issn.1000-0801.2010.06.013
    Asbtract ( 867 )   HTML ( 14)   PDF (423KB) ( 529 )   Knowledge map   
    References | Related Articles | Metrics

    “Private cloud”indicates the virtualized infrastructure owned by particular customer,it's the customer who decided the environment which the application run in.By building the “private cloud”,the enterprises can raise the utilization ratio of IT resources and reduce the overall costs of IT servers.This paper analyzes the predicament which large scale enterprises may face in IT development,presents how to resolve the problems just like the complicated infrastructure and utilization ratio of IT resources,and suggests how to build the private cloud.

    Analysis for Cloud Computing Technologies Applied in Ubiquitous Network
    Liang Ou,Yongqing Zhu,Xiaoming He,Jie Zou
    2010, 26(6):  61-66.  doi:10.3969/j.issn.1000-0801.2010.06.003
    Asbtract ( 831 )   HTML ( 14)   PDF (1122KB) ( 681 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Ubiquitous and mass features for ubiquitous application require a high efficient information processing methods to guarantee its implementation.Firstly,we analyze the primary requirements coming from ubiquitous network and its applications related to computing and networking resources.After estimating distributed processing capabilities for cloud computing technologies,we also suggest some new research directions for the cloud computing technologies deployed in ubiquitous network.And then,we propose an ubiquitous network architecture based on cloud computing,which explores a new territory for the research of cloud computing technologies comparing with previous research.

    Research on Cloud Computing Security
    Laifu Wang,Jun Shen,Huamin Jin
    2010, 26(6):  67-70.  doi:10.3969/j.issn.1000-0801.2010.06.015
    Asbtract ( 1017 )   HTML ( 43)   PDF (543KB) ( 1859 )   Knowledge map   
    References | Related Articles | Metrics

    As a new business model of Internet applications,the applications of cloud computing have been developed rapidly,and the security is the prime consideration for the customer to adapt cloud computing,and it's also the basis to be developed healthily and sustainably.The paper analyzes cloud computing threats facing the technical and legal compliance risks,and gives the security policy and recommendations from the perspective of cloud computing service provider and the customer.

    Analysis of Network Problems in Development of Cloud Storage Service by Telecom Operator
    Xiaoming Lu,Weihua Cao,Yongchang Yu
    2010, 26(6):  71-75.  doi:10.3969/j.issn.1000-0801.2010.06.016
    Asbtract ( 841 )   HTML ( 17)   PDF (1108KB) ( 556 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    All the cloud computing services are based on IP network and directly affected by network QoS parameters.Telecom operators possess rich and controllable network resources and have advantages on developing cloud computing services.The ecloud service,as the first cloud storage service of China Telecom,is analyzed in this paper.The paper analyzes the influence of the quality of cloud storage service in different network condition based on the user's perspective.In order to promote cloud storage service,we also offer some suggestions on how to deploy and develop cloud storage service.

    A PCA-based Network Anomaly Detection System Using MapReduce Method
    Zhilan Huang,Shengyong Ding,Guoliang Yang,Songfeng Luo
    2010, 26(6):  76-80.  doi:10.3969/j.issn.1000-0801.2010.06.018
    Asbtract ( 967 )   HTML ( 20)   PDF (1417KB) ( 624 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    PCA is an effective method for network anomaly detection in high dimensional data space.It can analyze traffics and detect anomalies from network-wide perspective.When analyzing the carrier's whole network traffic,we have to think of the massive property.How to derive the statistic matrix from massive netflow records for PCA analysis is one of the biggest difficulties.MapReduce is a new distributed computation paradigm coming with cloud computing technologies.It takes full use of computer processing power of clusters,thus could handle data analysis tasks over large scale data.In this paper,we proposed a new approach based on MapReduce model for large scale PCA network anomaly detection.The experiment result shows MapReduce based PCA implementation can effectively handle the whole network traffics

    Research and development
    A Novel Antenna Array Synchronization and Beamforming System Based on Matrix Pair Orthogonal Projection Analysis in DS-CDMA
    Peng Wang,Jian Wang,Jianshu Chen,Xiuming Shan
    2010, 26(6):  81-85.  doi:10.3969/j.issn.1000-0801.2010.06.019
    Asbtract ( 785 )   HTML ( 10)   PDF (1481KB) ( 280 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper,we propose a novel antenna array system based on covariance matrix pair analysis,including PN synchronization followed by a beamforming process.Generally,conventional blind beamformers in DS-CDMA systems generally have either unreliable convergence rate or signal cancellation problems in practical signal environment.In our method,we use an orthogonal projection scheme to realize both the synchronization and beamforming,which requires neither the direction of the desired signal nor the array geometry information.Actually we are capable of acquiring antenna vector in the synchronization part,and constructing the corresponding beamformer as a by-product.The promising advantage of our scheme is that,by utilizing a small number of signal-free interference samples,the beamformer has a high convergence rate and is independent of signal strength.Simulation results prove that it has better performance than the pre and post correlation(PAPC)scheme and filter pair (FP)scheme,especially under strong multiple access interference(MAI)and jammings.

    Implementation to Layered Model Based on Evolutionary Theory in Trusted Computing Environment
    Yi Zhou,Xuefeng Zheng,Yike Yu
    2010, 26(6):  86-94.  doi:10.3969/j.issn.1000-0801.2010.06.020
    Asbtract ( 766 )   HTML ( 12)   PDF (2560KB) ( 292 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the dissertation,after analysis and rigorous logic about the trusted computing,used formal methods and learned from theories on biology,economics,the social sciences and other related disciplines to establish the trust model in the trusted computing environment.Through the definition to trusted chain and trusted layer as well as description of credibility in three main attributes,the logical structure is realized.Through trusted root broadcasting based on legal rights and obligations in broadcast networks,and establishing trusted root based on trusted storage in trusted terminal,physical structure in trusted computing environment is achieved.The implementations make the common computing platform suitable for trusted computing environment,solved the external and fairness issues in trusted computing environment,and reduced validation overhead brought from proactive of trusted terminal.Eventually,in this way,could achieve the maximize use of existing computing environments,at the same time implement the trusted computing environment with a smaller price.

    Architecture and Key Techniques of Broadband Wireless Access System for High Speed Railway
    Cheng Tao,Liu,Qiu Liu,Jiahui ,Zhenhui Tan
    2010, 26(6):  95-101.  doi:10.3969/j.issn.1000-0801.2010.06.022
    Asbtract ( 953 )   HTML ( 21)   PDF (1151KB) ( 1392 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Service requirements and characteristics of broadband wireless access system for high speed railway are summarized in this paper first.Then merits and shortcomings of existing wireless access methods are analyzed.A novel system architecture Himocell is proposed,and some key techniques are present.

    Telecommunications Agent Management System Application Based on OSGI and Ext JS
    Zhiyong Yang,Zejiang Wen
    2010, 26(6):  102-107.  doi:10.3969/j.issn.1000-0801.2010.06.023
    Asbtract ( 826 )   HTML ( 13)   PDF (1532KB) ( 374 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to help telecommunications companies to gain more customers in the fierce competition,telecom agents integrated management system based on B/S model was brought about by adopting three-tier model and some techniques such as OSGI,Ext JS.The system had some advantages such as high safety,maintainability,and interface with third-party high cohesion low coupling,which means it could accomplish the management at different levels of the agents and seamless integration of the third-party system as well as solve some customer problems such as the requests in asynchronous,dynamic interaction and long cycle and high cost of systems development.

    Discussion on E-DCH SPS Initial Link Adaptation Technology of TD-SCDMA HSPA+ CPC
    Naihua Yuan,Jian Xiao
    2010, 26(6):  108-111.  doi:10.3969/j.issn.1000-0801.2010.06.025
    Asbtract ( 931 )   HTML ( 14)   PDF (463KB) ( 269 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the deployment of TD-SCDMA,hardware of the equipment from TD-Tech supports HSPA,and can support HSPA+ with software update.As to the currently configured HSPA parameter configuration,the UE is assigned associated dedicated physical channel(ADPCH),which leads to the limitation of the admitted users.With the HSPA+ continuous packet connectivity(CPC),the E-DCH semi-persistent scheduling can be configured instead of ADPCH to transfer the signaling or data.Without the limitation of ADPCH,the number of admitted user can be increased.In the paper,based on the analysis of E-DCH semi-persistent scheduling technology,with the PCCPCH RSCP,the ISCP of the uplink slot,the path loss and the capability of UE,MAC-ehs in Node B can initially adapt the link quality and assign the semi-persistent scheduling resource more precisely.With the above initial link adaptation,it will decrease the possibility of reconfiguration of the semi-persistent scheduling resource,and increase the channel code usage and network performance.

    Architecture Design Principles and Practice of Campus Network for High Education
    Dandong Zhang,Junwen Dai
    2010, 26(6):  112-115.  doi:10.3969/j.issn.1000-0801.2010.06.026
    Asbtract ( 795 )   HTML ( 14)   PDF (911KB) ( 643 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper presents a solution for preventing virus and ARP attack from the view of network architecture,aiming at campus network collapsed by virus and ARP attack which is a general phenomena in campus network for high education.The solution makes each access user isolated and prevents virus and ARP attack by virtual LAN(VLAN)technology.This solution is imployed in campus network of China University of Political Science and Law and this practice shows that the solution is economical and effective.Finally,we give some suggestion on design of campus network based on our practice and actual situation of campus network.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: