Please wait a minute...

Current Issue

    15 July 2010, Volume 26 Issue 7
    Topics:IPv6 technology and Applications
    Discussions of Network Convergence and IPv6 Deployment
    Yongqing Zhu,Jie Zou
    2010, 26(7):  1-5.  doi:10.3969/j.issn.1000-0801.2010.07.001
    Asbtract ( 211 )   HTML ( 5)   PDF (684KB) ( 449 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network convergence is an opportunity for IPv6 deployment and appliance. In this paper, we discuss the feasibility and the policy of the IPv6 deployment. At last, we analyze some issues in the process of IPv6 deployment.

    Research on Key Issues of Next Generation Network Evolution and Operation
    Huahong Zhu,Weihua Cao,Yongchang Yu,Yiqun Chen
    2010, 26(7):  6-9.  doi:10.3969/j.issn.1000-0801.2010.07.003
    Asbtract ( 308 )   HTML ( 1)   PDF (1044KB) ( 441 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    During the recent years, with the rapid development of Internet and mobile telecommunication, higher requirements on all kinds of services, such as voice, video, Internet access, game, location and so on, have been put forward. Internet of things is near the corner. Operators are facing many serious problems, for example, the drain of IP address and the less guaranty of network quality. First, generally description on the evolution of next generation network is presented in this paper. Then this paper discusses the large-scale use of IPv6 and some key problems related to the operation of the next generation network. Finally, the corresponding solutions on those problems mentioned above are put forward in this paper.

    Research of Telecom IPv6 Network Assurance System
    Shuai Wang,Jun Shen,Huamin Jin
    2010, 26(7):  10-13.  doi:10.3969/j.issn.1000-0801.2010.07.004
    Asbtract ( 417 )   HTML ( 11)   PDF (515KB) ( 1286 )   Knowledge map   
    References | Related Articles | Metrics

    With the launch of next-generation network researching and building based on IPv6, the process of telecom IPv4 network migrating to IPv6 network is accelerated, and IPv6 security issues have been putting on the agenda. In this paper, combining with IPv6 protocol security features, we analyze the security risks existing in telecom IPv6 network. On this basis, we investigate the key elements and components of telecom IPv6 network assurance system, and propose the building strategy of telecom IPv6 network assurance system.

    Research on PPPoE Access Technology Under IPv6 Environment
    Qi Chen
    2010, 26(7):  14-16.  doi:10.3969/j.issn.1000-0801.2010.07.005
    Asbtract ( 409 )   HTML ( 6)   PDF (678KB) ( 1160 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the course of IPv4 over to IPv6, the existing standard PPPoE support for IPv6 stack is not yet complete. And, in the IPv6 protocol configuration, network control protocol(NCP)does not define the configurations of IPv6 prefix, IPv6 address and IPv6 DNS address. In the current implementation of IPv6 protocol parameter configuration, PPPoE has to work with other protocols, with potential risks, and is not suitable for China Telecom's network to deploy. However, a new approach, increasing IPv6CP options to configure these parameters, can effectively avoid these risks, reduce the relevance between PPPoE and other protocols, save the time of broadband access configuration, and also meet the needs of China Telecomˊs network.

    Pre-commercial Deployment of Next Generation Internet in Hunan Telecom Network
    Huiling Zhao,Yunqing Chen,Jianping Kuang,Qian Liu
    2010, 26(7):  17-21.  doi:10.3969/j.issn.1000-0801.2010.7.006
    Asbtract ( 232 )   HTML ( 0)   PDF (1900KB) ( 499 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the background of the NGI deployment in Hunan province for the construction of the resource-economical and environment-friendly society. Also it shows the actual action in network, application and service, etc. The major innovation and achievement is listed in the last.

    IBE-XKMS: XML-Based IBE Key Management Service Infrastructure
    Tieming Chen,Wei Li,Jiamei Cai,Shilong Ma
    2010, 26(7):  22-31.  doi:10.3969/j.issn.1000-0801.2010.07.007
    Asbtract ( 443 )   HTML ( 5)   PDF (3500KB) ( 604 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper,the differences between PKI and identity-based encryption(IBE)are firstly analyzed,and the advantages of building XKMS infrastructure for IBE are in detail discussed. An XKMS-like service architecture for IBE, named IBE-XKMS, is then proposed, and the modules of system management, identity authentication, key generation and key management are designed, as well as the service component logic relationships are described. Next, the key management service interfaces of four categories are proposed. Besides the basic XKMS services, IBE-XKMS also provides two types of key involved operations to implement the IBE encryption envelope and signature service, which can be utilized to develop some IBE-enabled secure web application without code on client. It is noted that IBE-XKMS provides a service framework with full IBE application supported for the next generation network of web service. At last, a prototype of IBE-XKMS is developed, on which the tests on the service response performance and the SOAP message communication cost are conducted, comparing with that of PKI-enabled XKMS.

    A Network Architecture of Broadband Wireless Access for High-Speed Railway
    Xiaoxi Yu,Zhenhui Tan,Jiayi Zhang,Haibo Wang
    2010, 26(7):  32-36.  doi:10.3969/j.issn.1000-0801.2010.07.009
    Asbtract ( 274 )   HTML ( 2)   PDF (1403KB) ( 622 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid developed high-speed railway is a new and challenging environment to provide mobile broadband data services as well as voice service, therefore it is important to investigate wireless broadband access techniques for this scenario. In this paper, a novel broadband wireless access network architecture based on radio over fiber is proposed according to the specific characteristics of high-speed railway. Then the corresponding media access control scheme and the mobility management approach are described.

    An Fast Multi-Mode Decision Algorithm for Scalable Video Coding
    Qiyuan Lu,Bin Hu,Hongyang Chao
    2010, 26(7):  37-42.  doi:10.3969/j.issn.1000-0801.2010.07.011
    Asbtract ( 189 )   HTML ( 0)   PDF (1696KB) ( 334 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Scalable video coding(SVC)is a scalable extension of H.264/AVC that uses a single bitstream to provide multiple temporal, spatial and quality(SNR)resolution. This new standard employs many new modes for encoding a macro-block(MB)at the cost of high computational complexity in mode-decision. This paper proposes a fast mode decision algorithm for SVC. Firstly, the correlation among neighboring layers, frames and MBs is used to predict the most possible mode for current MB. Secondly, a merge and split strategy is further proposed to correct the prediction error. According to our experimental results, the proposed algorithm reduces the computational complexity significantly with negligible coding loss and bit-rate increases.

    Study on Flat Architecture for Mobile Network
    Feng Xu,Xueqiang Yan
    2010, 26(7):  43-49.  doi:10.3969/j.issn.1000-0801.2010.07.012
    Asbtract ( 309 )   HTML ( 4)   PDF (1897KB) ( 563 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile operator has been showing much concern for the topic of research on flat network architecture. Flat architecture can effectively resolve the dilemma involved by traffic increase without corresponding revenue increase. This paper briefly reviews the works in the area of network architecture contributed by several major international standardization organizations, and their latest progress.

    LTE/SAE Security Mechanism and Its Realization in UE
    Junhua Cao,Xiaowen Li
    2010, 26(7):  50-54.  doi:10.3969/j.issn.1000-0801.2010.07.013
    Asbtract ( 254 )   HTML ( 1)   PDF (1886KB) ( 808 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the recently released LTE/SAE R8 and R9 standard by 3GPP, first of all, the security function of LTE/SAE is summarized, then the security architecture and mechanism of SAE/LTE are particularly studied. Finally, in combination with the research work,the security mechanism of UE is designed and realized detailedly, and this solution is important for security of LTE/SAE. In the place of much services of network and new operations, lack of the security of LTE will be a true and utility system difficultly. Therefore, the design of security is vital.

    Fault-Tolerant Communication Method for Network-on-Chip
    Yiming Ouyang,Kai Guo,Huaguo Liang
    2010, 26(7):  55-60.  doi:10.3969/j.issn.1000-0801.2010.07.014
    Asbtract ( 296 )   HTML ( 1)   PDF (2228KB) ( 238 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper, we present a fault-tolerant communication method for network-on-chip. When router or link is failure, NoC can't effectively communication. In order to solve this problem, we set up the model of fault-tolerance through configuring the status register for the output port of each router which mark the status of router and link which is connected to this router, and use the reconfigurable routing algorithm when routing the data. The proposed method is simulated on the structure which is based on 5×5 2D-Mesh NoC. The experimental results show that this method could reduce the delay of data transmission, which is in the premise of ensuring the fault-tolerance.

    Overview of Study on Service Management Architecture of Telecom Operators
    Caixia Tao,Zhiming Yang,Haibo Tian,Haixia Wang
    2010, 26(7):  61-68.  doi:10.3969/j.issn.1000-0801.2010.07.016
    Asbtract ( 257 )   HTML ( 2)   PDF (4690KB) ( 1343 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Along with the rapid development of mobile service and value-added service, telecom operators are challenged as never before in the service management. In this paper, a comprehensive analysis of international standards organizations' research in related fields is provided. First, the ideas of service/product lifecycle management are introduced. Then the international viewpoints of service platforms for service management are discussed. Finally, the OSS architecture for NGN service management are analyzed.

    Survey on Localization Algorithms for Wireless Sensor Networks
    Yi Huang,Aiqun Hu
    2010, 26(7):  69-76.  doi:10.3969/j.issn.1000-0801.2010.07.018
    Asbtract ( 457 )   HTML ( 18)   PDF (1301KB) ( 1490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wireless sensor networks (WSN)is a multi-disciplinary field of study, with a very broad range of applications, meanwhile WSN localization is a very important research direction. Current researches in WSN localization algorithms are introduced, and these researches are summarized and concluded. According to distance measurement, location algorithms were divided into two categories, and in a specific algorithm following features were discussed, including anchor-based / anchor-free, centralized / distributed, fixed / mobile and so on.

    Effect of Polarization on Wireless Communication in Tunnel
    Peng Chen,Lufeng Liu
    2010, 26(7):  76-79.  doi:10.3969/j.issn.1000-0801.2010.07.019
    Asbtract ( 154 )   HTML ( 1)   PDF (793KB) ( 352 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Combined with special structure of tunnel and wireless signal transmission characteristics, and analysis of electromagnetic wave polarization,the paper present the measurements of wireless communication in tunnel,the height of tunnel is 3 m and the width of tunnel is 2 m, the testing frequency is 433 MHz, transmit power is from -30 dBm to -25 dBm, receive sensitivity is -105 dBm, the gain of linear polarization antenna is 2 dBi, the transform data is not coding. Through theoretical analysis on electromagnetic wave polarization and measurements, rectangular tunnel height is H and width is W, when H>W, the vertical polarization mode is better than horizontal polarization; when H<W, horizontal polarization mode is better than vertical polarization.

    A Video Encrypting Scheme Based on H.264 CABAC
    Xiaoju Li,Haina Hu,Li Liu
    2010, 26(7):  80-83.  doi:10.3969/j.issn.1000-0801.2010.07.021
    Asbtract ( 203 )   HTML ( 0)   PDF (752KB) ( 557 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Block-based digital video encoding generally include motion estimation, residual transformation and entropy encoding. Considering the traditional video encrypting schemes encrypt the coefficients of residual transformation, a new video encrypting scheme based on H.264 CABAC entropy coding is proposed in this paper. The proposed scheme makes the best of the advantage of stream cipher, and the process of encrypting is occurred in entropy encoding. Furthermore, CABAC encryption scheme uses flexible encryption modules and cipher feedback mode to increase the security. Theory analysis and experiment show that the proposed scheme has some advantages, such as low complex, high security, easy to implement and unchange the video format and compression efficiency.

    Based on S-MAC to Improve the Mechanism of Adaptive Duty Cycle
    Changbiao Xu,Zeyu Li,Lin Liu
    2010, 26(7):  84-87.  doi:10.3969/j.issn.1000-0801.2010.7.022
    Asbtract ( 245 )   HTML ( 0)   PDF (971KB) ( 268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a classical protocol based on wireless sensor networks MAC protocol, S-MAC has already aroused people's general concern. In terms of S-MAC fixed duty cycle mechanism, this paper provides DSMAC protocol, which based on load control of adaptive duty cycle adjustment MAC protocol. In DSMAC, set a node timer so as to dynamical adjust duty cycle through judging unit time load situation. This protocol aims at ameliorate S-MAC fixed duty cycle can not adapt to load variety, and excessive delay. We have simulated DSMAC through NS2, the results show that DSMAC can not only significantly improve the throughput, lower latency, but also effectively improve the energy efficiency, improve network performance while achieving energy saving purpose.

    Wireless Location Method and Its Application in Wireless Network Optimization Based on Call Detail Log
    Henghui Xiao,Xibin Lin,Jiongcheng Li,Yongxin Yi
    2010, 26(7):  88-93.  doi:10.3969/j.issn.1000-0801.2010.7.023
    Asbtract ( 333 )   HTML ( 1)   PDF (1493KB) ( 431 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper studies the wireless location method based on call detail log in the 3rd generation mobile communication systems. According to the characteristics of call detail logs from different mobile communication operators, we improve the existing wireless location algorithms. Finally, we show the important applications of our location methods in the wireless network optimizations.

    Research and Advance of Verifiably Encrypted Signature Schemes
    Hongbo Guan,Xiangjun Xin,Xueshao Qiu
    2010, 26(7):  94-98.  doi:10.3969/j.issn.1000-0801.2010.7.025
    Asbtract ( 341 )   HTML ( 3)   PDF (581KB) ( 679 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The verifiably encrypted signature schemes can be used to construct optimistic fair exchange protocols. By analyzing the research advance of verifiably encrypted signature schemes, some problems such as the combination of efficiency with security and the privacy protection in the research of verifiably encrypted signature scheme are pointed out. By demonstrating a forgery attack to Li et al.'s verifiably encrypted signature scheme, it is found that a verifiably encrypted signature scheme should has the propriety of strong unforgerity. At last, some problems have to be solved in the research of verifiably encrypted signature schemes and the research in the future are discussed.

    A Viterbi Decoding Algorithm Used in LTE System
    Xiaowen Li,Youbao Luo
    2010, 26(7):  99-103.  doi:10.3969/j.issn.1000-0801.2010.7.026
    Asbtract ( 442 )   HTML ( 4)   PDF (1153KB) ( 821 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Long term evolution(LTE)system used the tailbiting convolutional codes and the turbo codes to achieve forward error correction(FEC). Viterbi decoding is an outstanding convolutional code decoding algorithm, it is a maximum likelihood decoding method. Based on LTE tailbiting convolutional codes, this paper analysised several existing viterbi decoding algorithms, and proposed an improved algorithm to reduce the decoding computational complexity. The simulation results show that the improved decoding algorithm not only reduces the computational complexity of decoding,but also reduces the bit error rate, so it is very suitable for the decoding requirements of LTE system.

    A Residual Frequency Offset Correction Algorithm Based on the Quasi-Adaptive Short-Term Feedback in All-Digital Receiver
    Wensheng Sun,Ting Liu,Fuxin Xu
    2010, 26(7):  104-108.  doi:10.3969/j.issn.1000-0801.2010.7.027
    Asbtract ( 210 )   HTML ( 0)   PDF (1646KB) ( 342 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A residual frequency offset correction algorithm in all-digital receiver is introduced. The algorithm detects whether there is residual frequency offset by using of mean-square error criteria, and then makes a proper step to correct the residual frequency offset by the criteria of short-time feedback algorithm. It effectively improves the increasing BER problem caused by residual frequency offset accumulation effect. The simulation results show that the BER decreases obviously after the correction and the quality of received code improves significantly.

    Influence of Random Attack on the Stability of Deterministic Complex Networks
    Xingping Chang,Qinghua Xia
    2010, 26(7):  109-113.  doi:10.3969/j.issn.1000-0801.2010.7.028
    Asbtract ( 193 )   HTML ( 3)   PDF (1658KB) ( 561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The stability of the deterministic complexity network model was quantitativly analyzed, using random attack, the average path length, degree distribution and the group coefficient after the attack were calculated.The numerical results show that after random attack, the items calculated above can be keep good stability, without disturbance faced malicious interference.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: