Please wait a minute...

Current Issue

    15 July 2011, Volume 27 Issue 7
    Viewpoint focusing
    Discussion on the Comprehensive Evaluation System of Regional Broadband Development
    Jie Song
    2011, 27(7):  1-9.  doi:10.3969/j.issn.1000-0801.2011.07.001
    Asbtract ( 756 )   HTML ( 8)   PDF (2400KB) ( 255 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As broadband services in Chinaˊs rapid development and the upcoming release of broadband national strategy,the establishment of a unified national broadband development comprehensive evaluation system is conducive to scientific evaluation the level of countries and regions broadband development.The traditional and single broadband penetration rate index cannot fully reflect the broadband development level in different areas,to develop a multi-input and single output comprehensive index system has important significance.This paper makes a detailed analysis on the four most representative broadband development indexes in foreign country,and how to formulate comprehensive index to region broadband development is discussed.

    Innovation and application of mobile Internet
    Next-Generation Integrated Service Delivery Platform for Mobile Internet
    Bin Dong,Wei Ke,Ping Yang,Yixin Zou
    2011, 27(7):  10-15.  doi:10.3969/j.issn.1000-0801.2011.07.003
    Asbtract ( 862 )   HTML ( 11)   PDF (1706KB) ( 697 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rapid development of mobile Internet has created challenges to the traditional way of telecom-services definition.Some standards organizations,such as 3GPP has begun to define service capability feature instead of service procedure.And open interface(API)of network capability are provided to the third party developers.In this paper,service delivery platform discussed in 3GPP and OMA was introduced.Then we proposed the features of next-generation SDP and a potential architecture.

    Research on the Rich Communication Suite Architecture and Key Technologies in the Mobile Internet
    Wei Ke,Jianting Han,Wenjun Zhou
    2011, 27(7):  16-22.  doi:10.3969/j.issn.1000-0801.2011.07.004
    Asbtract ( 857 )   HTML ( 14)   PDF (2126KB) ( 857 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article analyses the changes of the telecommunication service in the mobile Internet age and the main characteristics of the RCS services.The converged architecture of IMS and Internet realization is suggested to the service requirement.Furthermore,this article gives deep research of the technologies of the synchronization protocol of address book,presence,unified message and service capability discovery.

    Mobile Internet Business Model and Typical Cases
    Yiming Li
    2011, 27(7):  23-28.  doi:10.3969/j.issn.1000-0801.2011.07.006
    Asbtract ( 996 )   HTML ( 30)   PDF (936KB) ( 1909 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The article describes the mobile Internet business model has been used,discusses what is the value proposition of a more competitive business model,then proposes some valuable opportunity for telecom operators with success cases of Twitter,Foursquare,APP store in the mobile field.

    Performance Analysis on Discontinuous Reception Mechanism to the Mobile Internet Services in Next Generation Mobile Network
    Jun Luo,Chen Liu,Zhen Shao
    2011, 27(7):  29-34.  doi:10.3969/j.issn.1000-0801.2011.07.007
    Asbtract ( 975 )   HTML ( 6)   PDF (1968KB) ( 461 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of mobile Internet services require frequent signaling interactions between network and terminals,which causes the excessive waste of the UE energy consumption and wireless signaling resources.This paper focuses on the discontinuous reception(DRX)mechanism of the next generation mobile network in the 3GPP standards.The impact on DRX to the network performances of the typical mobile Internet services are analyzed in terms of energy consumption,packet delay and wireless signaling overhead.Furthermore,the optimization for the setting of the DRX parameters is discussed to improve the network performance.

    From Micro-Blogging to See Information Flow,Data Flow and Bear Flow of the Mobile Internet Service
    Tao Zhou,Feng Zhou,Yuping Zhang
    2011, 27(7):  35-39.  doi:10.3969/j.issn.1000-0801.2011.07.008
    Asbtract ( 976 )   HTML ( 11)   PDF (1107KB) ( 575 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper conducts a research on the micro-clogging,an emerging mobile Internet service,analyzing the features and processes of the service,testing all the interactive processes to qualify every data flow and their direction.Based on the test results,the impact to the network of each process is evaluated.By the way of typical service analysis of micro-blogging,we could observe the relationship between the information flows,data flows and the bearing flows of the mobile Internet service,in order to explore the pressure to the mobile network by the development of future mobile Internet services.

    Analysis About Traffic Congestion of Instant Message Application and Discussion on the Strategies of Telecom Operator
    Lihong Xue,Jianting Meng,Yi Luo,Tao Zhou
    2011, 27(7):  40-45.  doi:10.3969/j.issn.1000-0801.2011.07.010
    Asbtract ( 905 )   HTML ( 6)   PDF (1298KB) ( 814 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the typical mobile Internet traffic characteristics,this thesis assess pressure on telecommunication network among different application.Then,focuses on congestion mechanism about the register and hang procedure of instant message application,and analyses the economic benefits of application.Finally,put forward some recommendation for telecom operator from the technique optimization and marketing policy.

    Research on Push Techniques of Mobile Internet Based on BCMCS
    Zhiming Zhang,Xianghui Liu
    2011, 27(7):  46-51.  doi:10.3969/j.issn.1000-0801.2011.07.011
    Asbtract ( 819 )   HTML ( 6)   PDF (1592KB) ( 445 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the main push techniques of mobile Internet.By analyzing the different kinds of push techniques and combining the framework of BCMCS,a push technique of saving Internet bandwidth for application and content is proposed,and its application for future is illustrated.

    research and development
    A Feasibility Study on Regulation of Vulgar Internet Content Based on Game Theory Model
    Qiang Song,Gang Li
    2011, 27(7):  52-58.  doi:10.3969/j.issn.1000-0801.2011.07.012
    Asbtract ( 791 )   HTML ( 7)   PDF (945KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To analyze the Internet supervision in China based on game theory model is to figure out whether the government can prevent the “vulgar”content on the Internet by enhancing administration and supervision.Chapter four analyzes the sources of the“vulgar”content-Internet content provider(ICP)and Internet presence provider(IPP),and the regulator-the government and administrative departments from a game theory perspective.To build the game theory model respectively for the above-mentioned three parties,this essay will reveal the feasibility of the Internet supervision through the analysis of the equilibrium solution.The answer is positive,that is,the regulator and ICP can keep a state of equilibrium,which means no inspection and no violation,and they can also avoid the other two equilibrium states-no inspection while violation,and inspection while violation.Although the equilibrium state has not achieved in China,we can prevent the violation conducted by Internet service provides through various supervision measures.

    Virtual Host Cloud Storage System VCloudStorage and File Transfer Protocol VCFTP
    Xiaohua Chen,Chunzhi Li,Pengyu Zhang
    2011, 27(7):  59-66.  doi:10.3969/j.issn.1000-0801.2011.07.014
    Asbtract ( 928 )   HTML ( 8)   PDF (2440KB) ( 616 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud storage systems provide Web Service API,file-based API,block-based API and other API to transfer and manage file over the WAN.But it's necessary to install client programs to call the API.It was found that if many people transferred files at the same time,failure rate was higher in the experiments.This paper designed the file transfer protocol VCFTP based on Web Service,HTTP and Flash technology,and realized VCloudStorage,a cloud storage system based on virtual host.First of all,SaaS service model was established,and virtual host storage interfaces were created by the HTTP data stream storage technology.And it established the model of virtual host transmission,storage and price capacity,then created integer programming model and presented optimization algorithm based the virtual host transmission model and users transmission requests.Finally,transmission control protocol VCFTP was created.Using Flash's cross-platform and rich client technology features,VCFTP could transfer and manager files without installing other programs in the client.Authorized users could transfer files by optimization transmission capacity way in accordance with the transmission request,the storage requirements,service levels and the virtual host current state,etc.The experimental results showed that the VCFTP have high performance and stability,and total throughput,average transmission rate and file transmission success rate of VCloudStorage is superior to Microsoft's SkyDrive storage,Tencent QQ mailbox store and a single virtual host storage.The VCFTP protocol enhances file transmission performance and stability,and is an effective way that improves the performance of storage system in WAN.

    Content Scheduling Model Design Based on Genetic Algorithm
    Jing Liu,Qiwei Shen
    2011, 27(7):  67-73.  doi:10.3969/j.issn.1000-0801.2011.07.016
    Asbtract ( 855 )   HTML ( 9)   PDF (1959KB) ( 453 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Content scheduling is a hot problem that is about order-based media resource benefits maximizing planning,relies in the content type and mobile advertising service supported content management system(CMS).This article builds media resource as a carrier business model,which is composed by the three dimensions of template split space,timeline and subscribers.Moreover,this article proposes a multi-objective optimization problem(MOP)model named content scheduling model,based on the constraints of order requirements,targeted to achieve efficient resource utilization and accurate precision delivery time.Then,the article designs a parallel genetic algorithm and simulation to verify the validity of the model.

    Research for CR Dynamic Spectrum Access Based on Optimal Channel Reservation Mechanism
    Changbiao Xu,Wei Yuan,Yongju Xian,Kun Zhang
    2011, 27(7):  74-79.  doi:10.3969/j.issn.1000-0801.2011.07.017
    Asbtract ( 763 )   HTML ( 9)   PDF (2638KB) ( 506 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In cognitive radio network,how to improve secondary userˊs performance is the hot spot in the current research.This paper focuses on the research and analyses of the Hierarchical overlay spectrum access model.Dynamic spectrum handoff process is accounted,modeling the three-dimensional of continuous time Markov chains.We calculate the handoff probability,the blocking probability,the dropping probability and comprehensively analyse various parameters for the influence of these probabilities.In the meantime,presented the optimal channel reserved scheme for primary user,the numerical results show that the scheme can effectively reduce the handoff probability and the dropping probability,making the handoff probability,the dropping probability,and the blocking probability more balanced in secondary users system and improving the access capacity of secondary system.

    Near-Perfect-Reconstruction Cosine Modulated Filter Banks Optimization Design Based on Quantum-Behaved Particle Swarm Optimization Algorithm
    Fangqing Tan,Tianqi Zhang,Chunxia Gao,Liechao Huang
    2011, 27(7):  80-85.  doi:10.3969/j.issn.1000-0801.2011.07.018
    Asbtract ( 797 )   HTML ( 6)   PDF (2114KB) ( 418 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the paper,a new design method of near-perfect-reconstruction cosine modulated filter banks is proposed,the prototype filter is designed by optimization method which fixes the prototype filter stopband cutoff frequency,takes passband cutoff frequencyas a parameter variable,optimizes the target function which meets reconstruction condition,designs indirectly the prototype filter,and then obtains the cosine modulated filter banks by modulation.It appropriately relaxes the limit conditions of perfect reconstruction of CMFB,so obtains lower complexity and computing time.The simulation results demonstrate that the method proposed is simple and effective,can obtain high stopband attenuation,low aliasing distortion and reconstruction error banks.

    A Image Lossless Compression's Algorithm Based on the Improved SOFM
    Shanxue Chen,Jiaguo Wang,Juan Peng,Benqiang Zhang
    2011, 27(7):  86-89.  doi:10.3969/j.issn.1000-0801.2011.07.020
    Asbtract ( 970 )   HTML ( 8)   PDF (827KB) ( 530 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The theories of vector quantization(VQ)and self-organizing feature mapping(SOFM)neural networks are introduced in this paper firstly.Some aspects are improved based on VQ of SOFM.The lossless compression algorithm is researched and simulated on the improved SOFM.Codebook design time is reduced by about 70%,and effect of coding image quality is also improved.The compression ration increases 40% in comparison with differential pulse code modulation(DPCM).The results of the experiment illustrate the rationality and efficiency of the algorithm.

    A Batch Veifiable ID-Based Blind Signature Scheme
    Chengyuan Song,Chuanrong Zhang,Shuai Cao,Jingyi Bai
    2011, 27(7):  90-94.  doi:10.3969/j.issn.1000-0801.2011.07.021
    Asbtract ( 739 )   HTML ( 2)   PDF (760KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Blind signature and batch verification are two important concepts in the current cryptolgy.The blind signature and batch verification are implemented effectively.This paper presents a batch veifiable ID-based blind signature scheme by bilinear pairings on the base of blind signature and batch verification,which existed the blind signature scheme proposed by Guowen Li.Analysis shows that the proposed scheme has provable security properties of blindness,unforgeability and robustness.Furthermore,it is more efficient compared with the previous schemes.

    A Telecom-Grade Network Fax Operation System Based on ICT Mid-Ware Technology
    Xiaoyong Lin,Zhenkun Mi,Kang Zhao,Qi Zhang
    2011, 27(7):  95-99.  doi:10.3969/j.issn.1000-0801.2011.07.023
    Asbtract ( 871 )   HTML ( 9)   PDF (2396KB) ( 345 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The faxing behaviors have been investigated and analyzed for conventional enterprises and individuals,A novel central-mode and telecom-level network fax operation system(FOS)is implemented for operator's valued-added service(VAS),the system is schemed by ICT(information communication technology)mid-ware technology which separate the specific upper applications from the complex lower driven devices,the varying applications can quickly be ordered by the ICT SCE(service creation environment)even for a short-time trainee,the ICT Flow solves the service flow and state scheduling,the ICT Engines drive the different devices of multi-venders in heterogeneous networks.The SIB(service independence block)are designed and classified,the GSL(general service logic)describes detailed logical relationship between SIB from the POI(point of initiation)to POR(point of return),FOS has a telecom-level redundancy deployment of load-sharing,key techniques also are interpreted including virtual fax number,online stamps and virtual print.The statistics proved it an efficient solution for the conventional and neglected fax service on a low-carbon and green earth under the summons of energy saving and emission reduction.

    Operation Architecture of MIPv6 Based on AAA
    Xin Liu,Feifei Liu,Xinying Wang,Demin Wang
    2011, 27(7):  100-103.  doi:10.3969/j.issn.1000-0801.2011.07.024
    Asbtract ( 805 )   HTML ( 10)   PDF (1492KB) ( 268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It needs a complete operation architecture to distribute and manage network resources reasonably,with the development of IPv6 network.It presents an operation architecture based on AAA,using a globally unique IPv6 address as the identity sign,which can make the smooth transition for operators,and realize the interaction gradually.The operation mode is flexible,compatible.It is transparent to the user,and provides real-time online services.It also obtains massive log information for operators,which makes the services and network controllable.

    Research of Trust-Based Trade-Off of the Wireless Sensor Network Security
    Cheng Wang,Zuchang Zhang
    2011, 27(7):  104-108.  doi:10.3969/j.issn.1000-0801.2011.07.025
    Asbtract ( 887 )   HTML ( 9)   PDF (1294KB) ( 345 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this Paper,we had summed up the current problems of the wireless sensor network security based on the research of others.And with our research results,we had gave out a access model of trust-based trade-off mechanism for wireless sensor network.We also described the relevant theory,experimental methods and conclusions of the modal in detail.We hope to provide a new idea for wireless sensor network security research.

    Operational support technology innovation forum
    Application of Petri Net in the Control of Telecom Billing System Disaster Recovery
    Xiaoming Bu
    2011, 27(7):  109-116.  doi:10.3969/j.issn.1000-0801.2011.07.026
    Asbtract ( 1001 )   HTML ( 9)   PDF (3177KB) ( 413 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fast and stable switch-over is one of the key elements of any high performance disaster recovery system.But it is not an easy task because of the complexity and unpredictability during the switch-over process,especially when there are several systems which may exchange data between them.Petri net has been widely used in system control based on real-time status in many industries,but not in China's telecommunication industry.In order to improve the disaster recovery performance of China Telecom's billing systems,for the first time,a middleware based on Petri net is introduced and the best RTO in China's Telecommunication industry is achieved.

    Study on Billing Framework Supporting Credit Control of Converged Businesses
    Shuping Chen,Zhitao Du,Pan Xie,Jun Niu
    2011, 27(7):  117-122.  doi:10.3969/j.issn.1000-0801.2011.07.028
    Asbtract ( 935 )   HTML ( 11)   PDF (2478KB) ( 1120 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Converged business requirements have become urgent after the reorganization of telecom operators.The credit control of converged businesses is the technical problem that has bothered the telecom operators for years.By in-depth studying the framework problem of the existing billing systems,a converged billing framework based on IPBF was proposed,also a unified solution for converged billing process was given.The effect of the distributed blade-server platform based billing system has been preliminary validated by the POC test for 1 year.

    Operation and Application
    Research on PTN LTE-Backhaul Solution and Verification
    Da Sun,Yi Han
    2011, 27(7):  123-127.  doi:10.3969/j.issn.1000-0801.2011.07.029
    Asbtract ( 1436 )   HTML ( 7)   PDF (1441KB) ( 718 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article first analyzes the demand of LTE-backhaul network,and focuses on two main solutions: PTN + CE,PTN L3-VPN,then based on the PTN L3-VPN verification solution and result leading by China Mobile Group Shanghai Co.,Ltd.,discusses the possibility of PTN L3-VPN meeting the demand of LTE-backhaul.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: