Please wait a minute...

Current Issue

    07 February 2017, Volume 28 Issue 12
    special
    Architecture and Key Technologies for Internet of Vehicles
    Qun Wang,Huanyan Qian
    2012, 28(12):  1-9.  doi:10.3969/j.issn.1000-0801.2012.12.001
    Asbtract ( 1015 )   HTML ( 45)   PDF (2100KB) ( 3283 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet of vehicles(IoV)is considered to be an important branch of Internet of things(IoT),is the first application breakthrough in the IoT's area,is also a hot research topic for many years.Based on the research production of IoT,intelligent transportation systems(ITS)and Information network,the basic concept and architecture of IoV are described.At the same time,the research status of IoV is introduced.On this basis,the vehicular network architecture,communication mode,main function,application area and the technical difficulties are analyzed.Finally,consulted the IEEE 802.11p standard and the IEEE 1609 protocol stacks,the key technologies,protocols and communication standards of IoV's physical layer,MAC layer and the network layer are discussed.

    Analysis of the Technology Characteristics and Developing Trend of OTN
    Hailiang Li,Hong Zhang,Jingjing Zhang
    2012, 28(12):  10-15.  doi:10.3969/j.issn.1000-0801.2012.12.002
    Asbtract ( 415 )   HTML ( 4)   PDF (1910KB) ( 1935 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    this article analyzed the technology characteristics of the OTN and then put forward the developing direction of the OTN which included the development of the packet enhanced OTN,the development and the solution of the WSON,the development of PIC and the evolution trend of the beyond 100 Gbit/s.

    Chain Routing Algorithm of Wireless Sensor Networks for Streetlight Monitoring System
    Tiaojuan Ren,Yourong Chen,Zhangquan Wang
    2012, 28(12):  16-23.  doi:10.3969/j.issn.1000-0801.2012.12.003
    Asbtract ( 281 )   HTML ( 1)   PDF (1958KB) ( 455 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To save network node energy consumption and reduce data transmission delay in streetlight monitoring system,a chain routing algorithm for wireless sensor network(CRASMS)was proposed.The algorithm divided the monitoring region into several clustering regions according the information of nodes and monitoring region,successively and circularly selected a node to the cluster head node in each clustering region,established the star network in each cluster by the communication of cluster head node and sensor node.Finally,cluster head node received the data of sensor nodes,used the data fusion algorithm to reduce data redundancy,transmitted the fused data to sink node with multi-hop routing among cluster head nodes and transmitted the client's commands to the controlled nodes.The simulation results showed that:CRASMS algorithm kept the advantage of PEGASIS algorithm in terms of energy consumption and the advantage of LEACH algorithm in terms of data transmission delay,overcame the lack of PEGASIS algorithm in terms of data transmission delay and the lack of LEACH algorithm in terms of node energy consumption.It kept the average node energy consumption and the average data transmission delay at a low level.Under certain conditions,CRASMS algorithm outperforms LEACH and PEGASIS algorithms.

    LTE Terminal Analysis of Multi-mode Network Selection Key Technology
    Ping He,Hai Xiao,Zhaoyuan Liu,Zibin Zhao
    2012, 28(12):  24-27.  doi:10.3969/j.issn.1000-0801.2012.12.004
    Asbtract ( 271 )   HTML ( 1)   PDF (997KB) ( 1114 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the LTE multimode terminal products and future network selection problems,then the LTE multimode terminal network selection and key problems are analyzed,and proposes practical solutions on the basis of present situation,

    A Novel Integrate IT On-Line Operation Evaluation System Design
    Zhiguo Zhu,Lianyong Wu,Yi Sun
    2012, 28(12):  28-33.  doi:10.3969/j.issn.1000-0801.2012.12.005
    Asbtract ( 311 )   HTML ( 0)   PDF (851KB) ( 513 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IT system service quality evaluation is not purely a subjective evaluation.It also has a lot of objective evaluation index.Service quality assessment is not only to consider the business of the overall efficiency,but also consider the user's demand for quality of service.The traditional IT operation evaluation system has many problems.This paper presents the IT system on-line operation evaluation system design scheme,and analyzes its value.Based on the IT infrastructure,business process management carries out scientific and effective evaluation,make its business strategy and IT strategy effective.The implementation of IT on-line operation evaluation system can grantee the enterprise IT resources with high availability,reduce risk and improve the service quality of IT system.It also can optimize business processes,reduce total operation cost of enterprise and obtain customer's satisfaction.

    Shanghai Telecom "city optical network construction
    Development and Application of MONET Intelligent Operation and Maintenance Support Platform
    Guorong Wang,Yun Chen
    2012, 28(12):  34-39.  doi:10.3969/j.issn.1000-0801.2012.12.006
    Asbtract ( 278 )   HTML ( 0)   PDF (1789KB) ( 298 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    MONET is developing rapidly as the most critical information infrastructure of smart city,while also facing growing pressure of operation and maintenance.Through the construction of intelligent operation and maintenance support platform of MONET,China Telecom Shanghai has established a standard interface specification,broken through the technical bottleneck of the ODN fault location,realized the service forward of the cross-system collaboration and enhanced the service quality.This paper describes the designing ideas,the system architecture and applications,and looks into the distance.

    Study on Star-UE Full-Service Guarantee Strategy Based on DPI&PCC
    2012, 28(12):  40-45.  doi:10.3969/j.issn.1000-0801.2012.12.007
    Asbtract ( 231 )   HTML ( 0)   PDF (2011KB) ( 309 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As competition becomes more severely,major operators are devoted into a white-hot battle to gain more users,especially high-end ones,based on their own advantages.From the aspect of terminal devices,high-end devices can reflect the business characteristics of high-end users in a unique way,which provides an angle to study on those users.This paper proposed an idea to provide full-service guarantee strategy based on DPI and PCC frameworks,and explored the supporting operation for high-value usersˊ service guarantee and differentiation supporting service.

    special
    Automatic Recognition of Barrage Interference in Frequency-Hopping Communication
    Yunbin Yan,Houde Quan,Peizhang Cui
    2012, 28(12):  46-51.  doi:10.3969/j.issn.1000-0801.2012.12.008
    Asbtract ( 398 )   HTML ( 4)   PDF (1897KB) ( 690 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Analyzing the interference environment in which the frequency-hopping(FH)communication system is located can help both the participants in communication take corresponding anti-interference measurements for specific types of interference.Follower jamming and barrage jamming are very useful jamming method to the FH communication system.The existing jamming-resisted algorithms may work well for certain interference.the proper anti-jamming measures can be implemented for different interferences.In this article,it focuses on the barrage jamming recognition of the Frequency Hopping-Gaussian filtered minimum shift keying(FH-GMSK)communication system.Based on the interference characteristics extracted from the receiving signals in the view of time,frequency and time-frequency domains,a set of characteristic parameters was picked up,which were robust and insensitive to the recognition signal to jamming ratio(SNRR).And it can automatically identify the barrage jamming without the prior knowledge.And the simulation result proves that there is a much more accurate recognition rate for the FH communication system under the usual interferences with the different SNRR.

    Research on Development and Key Technology of New Media Video Open Platform
    Rongrong Yu,Jian Zhang,Chao Yuan,Hui Tian,Jianwei Wen,Lei Yang
    2012, 28(12):  52-61.  doi:10.3969/j.issn.1000-0801.2012.12.009
    Asbtract ( 259 )   HTML ( 5)   PDF (3856KB) ( 857 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Our society has entered the era of new media,the B2B mode has been the new developing blue ocean of the video industry.This paper described the development of the new media network video,including analysis of the video industry chain,the problems of the traditional mode,and the market prospects of the B2B mode,meanwhile analyzed the detailed user demand and video open platform development for B2B mode,and finally focused on China mobile as an example,researched the characteristics and key technologies of the video open platform.

    Direction Transmission Protocol of the Highway Traffic Information Assisted by Roadside-inFrastructure
    Jianghong Han,Fan Yang,Lei Shi,Zhengyu Liu
    2012, 28(12):  62-67.  doi:10.3969/j.issn.1000-0801.2012.12.010
    Asbtract ( 216 )   HTML ( 0)   PDF (1524KB) ( 331 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing VANET network broadcast transmission protocols had low channel utilization,and could easily lead to channel congestion and other issues,so this paper proposed improved protocol assisted by roadside-infrastructure.It used roadside-infrastructure to cluster the vehicle.In the clustering,every sending data frame added the vehicle number to its head and each vehicle node received and transmitted the packets selectively.The results show that the improved protocol can effectively improve the transmission channel usage,and the effective information transfer rate can be increased 20%.

    A Privacy Preserving Method in WSN
    Ping Qian,Meng Wu
    2012, 28(12):  68-76.  doi:10.3969/j.issn.1000-0801.2012.12.011
    Asbtract ( 224 )   HTML ( 1)   PDF (1195KB) ( 553 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A great challenge to wireless sensor networks(WSN)is how to protect privacy from disclosing during application in WSN as well as obtain accurate results.In recent years,researchers at home and abroad have done much work on privacy-preserving in WSN.This paper surveys the general privacy-preserving methods from two aspects of location privacy and data privacy in WSN and analyzes their theories and characteristics.A new method based on multi-notes phantom routing protocols and ECC homomorphic encryption is proposed in this paper,which can protect location privacy and data privacy at the same time.Compared to current methods,better privacy will be protected and less energy will be consumed.

    New Trend of Machine Learning in the Age of Big Data
    Kang Chen,Yong Xiang,Chao Yu
    2012, 28(12):  77-85.  doi:10.3969/j.issn.1000-0801.2012.12.012
    Asbtract ( 1529 )   HTML ( 102)   PDF (1023KB) ( 3681 )   Knowledge map   
    References | Related Articles | Metrics

    Recently,big data techniques and applications have attracted more and more concentrates.It can be concluded that machine learning plays an important role in analyzing the huge volume and various data to get the underlying knowledge which is one of the core task of big data analysis.This paper focused on the machine learning development trends and the era of big data,and discussed the core techniques of machine learning as well.

    Study on NoSQL Theory and Databases
    Fengxiao Li,Gaosong Luo
    2012, 28(12):  86-93.  doi:10.3969/j.issn.1000-0801.2012.12.013
    Asbtract ( 309 )   HTML ( 6)   PDF (999KB) ( 606 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    NoSQL is becoming a popular term among web developers of large corporations,and it seems to be universalization soon.This article focused on the basic concept of NoSQL,based on which a compare between RDBMS and NoSQL was given,then the choice of database in different context was discussed.At last,NoSQL benchmarking was showed to help users to choose NoSQL databases.

    Discussion on Deployment Technology of WLAN CPE
    Yongxin Wen
    2012, 28(12):  94-98.  doi:10.3969/j.issn.1000-0801.2012.12.014
    Asbtract ( 236 )   HTML ( 0)   PDF (810KB) ( 449 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the deepening of China's information technology,the broadband of urban and suburban places is increasingly mature,while the modernization of agriculture can not be separated from the information technology in rural areas and promoting broadband to rural areas is imperative.Rural basic cable network construction is relatively weak and operators adopt the wireless to achieve the “last mile”access of rural users via CPE devices.The text analyzes the selecting of the rural CPE devices and WLAN technology,as well as the deployment of the wireless network,so as to help the operator enhance the level of the rural information network construction.

    Energy Consumption Management in Cloud-Oriented Data Centers
    Yun-chang Liu,Er-rui Yang,Jian-xia Xu
    2012, 28(12):  99-105.  doi:10.3969/j.issn.1000-0801.2012.12.015
    Asbtract ( 240 )   HTML ( 3)   PDF (1176KB) ( 1455 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a new distributed computing technology,cloud computing becomes more and more popular.Cloud computing is rapidly changing the computing environment for various applications.However,as global energy price increases,the power consumption problem of cloud data centers becomes more and more serious.Since one major goal of cloud computing is to provide cheap but efficient services,the huge energy costs of these cloud services must be taken under consideration.How to improve energy efficiency becomes increasingly important throughout the cloud platform.The composition of energy consumption in cloud data center was analyzed,it thoroughly classifieds,analyzed and summarized the related work of energy consumption management.Finally,the paper summarized the research and pointed out future research directions.

    Analysis of STBC-SCFDE Systems with Multiple Transmit Antennas
    EZhuoying Y,UYuezong G,UJiang W,GENGGuotong ,
    2012, 28(12):  106-111.  doi:10.3969/j.issn.1000-0801.2012.12.016
    Asbtract ( 304 )   HTML ( 3)   PDF (2037KB) ( 337 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Space-time block coding combined with single carrier frequency domain equalization is an attractive technique to combat inter-symbol interference caused by frequency selective fading.In this paper,we firstly investigate the performance of the Alamouti code combined with single carrier frequency domain equalization,then the coding scheme and the corresponding detecting scheme in the receiver when the number of transmitting antennas are more than 2 are designed.Simulation results show that the space-time block coded single carrier frequency domain equalization system exhibits good performance,even when the maximum time delay is up to tens of symbol period.Therefore,this technique is likely to have broad prospect in high-speed wireless transmission.

    Application of the Logic Language Based on Reasoning Mechanism in Web Composite Service
    Yingying Zhao,Yun Zhang
    2012, 28(12):  112-117.  doi:10.3969/j.issn.1000-0801.2012.12.017
    Asbtract ( 215 )   HTML ( 0)   PDF (2258KB) ( 404 )   Knowledge map   
    References | Related Articles | Metrics

    In practical network applications,compared to the form of the client,people prefer to the platform which provide the services facilities and application is from a simple and convenient web browser.The success in doing the research about the web services portfolio management based on the availability of multi-stage will solve a variety of key problems in current environment.This text is aiming at the application and the development of the artificial intelligence language prolog in the project,using the situation calculus as the scene theory and describing the service content with the logic programming language,at the same time,extending to the Golog language on the basis of Prolog to make some inferences on the web services.

    Research of Improving IPTV HD Channels Video Quality
    Chuanfei Luo,Wei Zhang
    2012, 28(12):  118-123.  doi:10.3969/j.issn.1000-0801.2012.12.018
    Asbtract ( 230 )   HTML ( 1)   PDF (1659KB) ( 529 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper focused on the video quality,one of the most important factors of user quality of experience.On the one hand,it researched on the level of video quality of HD IPTV to meet the growing customer demand in the audiovisual entertainment,and on the other hand,worked on the strategy for China Telecom to promote the video quality and therefore to enhance the core competitiveness of China Telecom.After a panoramic measurement of the existing IPTV HD channels and cable digital TV HD channels,the recommendations to further improve the video quality of IPTV HD channels was proposed,and the feasibility and effectiveness of the proposals in the current network environment was verified.

    Optimization and Realization of Hadoop Load Balance Mechanism Based on a Multivariable Dynamic Evaluate Threshold Algorithm
    Juan Wu,Hai Huang,Feng Qian,Yongjun Li,Zhibin Shou
    2012, 28(12):  124-128.  doi:10.3969/j.issn.1000-0801.2012.12.019
    Asbtract ( 242 )   HTML ( 3)   PDF (1029KB) ( 902 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud computing system and Hadoop load balance mechanism were introduced particularly.When Hadoop system needs load balance,the user must call the system's balancer with the threshold being input in advance which restrict the performance of the balancer greatly.In this case,a multivariable dynamic evaluate threshold algorithm was used to optimize and realize the balancer.Multivariable dynamic evaluate threshold algorithm is one of the algorithm based on the current state of the cluster.It used the disk space utilization and cluster busy degree to dynamic evaluates the threshold of balancer.This algorithm not only can dynamic evaluates the balancer's threshold,but also can balance the desired balanced result and the running time by means of selection suitable weight parameters.Results of the experiment shows that comparing with the system default balancer,which needs a fixed threshold.The balancer using multivariable dynamic evaluate threshold algorithm would be more satisfactory.

    Power-Controlled Multi-Packet Reception Optimization Strategy
    Jianghong Han,Jie Gao,Lei Shi,Zhengyu Liu
    2012, 28(12):  129-134.  doi:10.3969/j.issn.1000-0801.2012.12.020
    Asbtract ( 275 )   HTML ( 0)   PDF (1102KB) ( 133 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Multi-packet reception use analytical algorithms and scheduling program to improve the network throughput of the wireless network on the basis of not changing the existing wireless network physical layer.In this paper,the SIC algorithm is used to achieve the model of each node energy-SNR law.We use the power adjustment manner to expand the feasible nodes set of the data that can be sent.Since energy adjustment of the node is linear change,while it is a discrete event that weather the node can be sent,the difficulty and complexity of solving optimal node combination increase.In this paper,the concept of node power level is proposed.We simplify the problems through the power level classification.The simulation shows that after using the power controlled Multi-Packet Reception protocol,the network transfer rate has been greatly improved.

    A QoS Evaluation Model for P2P File-Sharing Applications
    Jiyi Wu,Qifei Zhang,Tong Wang,Deren Chen,Jianlin Zhang
    2012, 28(12):  135-141.  doi:10.3969/j.issn.1000-0801.2012.12.021
    Asbtract ( 236 )   HTML ( 0)   PDF (1489KB) ( 461 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of P2P hierarchical architecture,QoS evaluation model for overlay network layer and application layer were proposed combined with P2P File-Sharing system applications,and the overall QoS evaluation model was further formed.The simulation analyzed how the factors impact on the QoS,including the joining and leaving of nodes,node capabilities and uploading strategy,node,cache size,and node caching strategies and other.In addition,the heat of the file is also an important factor to influence system QoS.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: