Please wait a minute...

Current Issue

    15 September 2011, Volume 27 Issue 9
    View the focus
    Research on Communication Standards Based on Integration of Industrialization and Informatization
    Jiandong Lv,Jianhua Liu,Ziyun Li
    2011, 27(9):  1-5.  doi:10.3969/j.issn.1000-0801.2011.9.001
    Asbtract ( 177 )   HTML ( 0)   PDF (1526KB) ( 140 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integration of industrialization and informatization is the economic development strategy goal central committee of the party proposed. The systematic and efficiency is the important criterion in integration of industrialization and informatization. The establishment of communication standard system is the most important safeguard measure of the integration. The paper begins with the essential process of the integration,and concludes the top layer structure of the integration communication standard system. Based on the analysis of each levelˊs major function,role and basic contents,the bone of China’s integration communication standards is acquired.

    Topic: the IMS technology and application
    Research in Characteristic and Implement of IMS Network Management System
    Afang Song,Wei Xu
    2011, 27(9):  6-10.  doi:10.3969/j.issn.1000-0801.2011.9.002
    Asbtract ( 235 )   HTML ( 0)   PDF (1051KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network management is an important issue that telecommunication carrier always pay attention to. As a new technology,the management of IMS network have some new characteristic. This paper pointed out new function requirement of IMS network management system and gived some suggestion for how to implement system.

    Research on the Technology of the Integrated Video Communication Based on IMS
    Hai Sun,Lei Shen
    2011, 27(9):  10-14.  doi:10.3969/j.issn.1000-0801.2011.9.003
    Asbtract ( 150 )   HTML ( 3)   PDF (1092KB) ( 250 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper discussed the key points of integrated video communication based on the IMS. Focusing on the main problems of core network structure,multi-type terminals video communication,flow accounting and roaming connected,provided several valuable suggestions and projects by study and practice. Our researches collected latest development and supplied new ideas for multimedia communication’s future.

    Research of Voice Service of FTTH Access to IMS
    Fei Zhao,Wenjun Zhang
    2011, 27(9):  15-20.  doi:10.3969/j.issn.1000-0801.2011.9.004
    Asbtract ( 200 )   HTML ( 2)   PDF (862KB) ( 518 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper discusses the differences between IMS and softswitch in capability of accessing a large number of small voice gateway,and provides strategy proposals for the FTTH voice services solution.Technology solutions to architecture,service delivery,management of terminal are proposed.

    Research on the Application of Separated SBC Used in IMS Network
    Ying Wang,Zhanyue Xi,Xuechun Yan
    2011, 27(9):  20-25.  doi:10.3969/j.issn.1000-0801.2011.9.005
    Asbtract ( 250 )   HTML ( 3)   PDF (1868KB) ( 317 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the architecture and function of the separated SBC used in IMS,and to explore the network model established with separated SBC,and finally the application of separated SBC technology is studied.

    Cloud computing column
    Research of Business Logic Framework for SaaS Software Service Based on Mass Customization
    Xiaoli Luo,Qinglie Wu
    2011, 27(9):  26-31.  doi:10.3969/j.issn.1000-0801.2011.9.006
    Asbtract ( 276 )   HTML ( 4)   PDF (1214KB) ( 1066 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mass customization is the key to the successful implementation of SaaS software service. In this paper,in order to meet diverse requirements of different customers and customers’ variable requirements in SaaS software service design,a business logic framework for SaaS software service based on mass customization is proposed,in which the business process is abstracted into software components,which are stored in the software component library. The framework builds the dynamic business process model based on customers’ requirements in order to find all of the customization points and their timing sequence by the algorithm of dynamic personalized customization,generates configuration document and designs the configuration engine realization algorithm,which searches for the corresponding business components in the software component library and assembles the components to be an application system for customers. Finally an example demonstrates the feasibility of the framework.

    Synchronization Strategy for Metadata Cache in Cloud Storage System Based on Change-Log
    Haijia Wu,Weiwei Chen,Peng Liu,Jiguang Dong
    2011, 27(9):  32-36.  doi:10.3969/j.issn.1000-0801.2011.9.008
    Asbtract ( 228 )   HTML ( 3)   PDF (1591KB) ( 411 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Client-side metadata cache is used in cloud storage system. It can not only reduce the work load of metadata server, solve the bottleneck problem of metadata server,and improve the expandability of cloud-storage system,but also reduce the response latency of client-side metadata request,improve client-side IOPS-performance greatly. This paper does research on synchronization mechanism of metadata caches in cloud storage system,puts forward the synchronization strategy based on change-log. This strategy is used to replace the original full-synchronization strategy in the cloud storage system named MassCloud. The results of test show that this stragety brings about 20~140 times performance improvement to MassCloud storage system.

    Analysis of Declarative Development Model for Sensor Networking
    Fang Wang,Yunyong Zhang,Bingyi Fang
    2011, 27(9):  37-41.  doi:10.3969/j.issn.1000-0801.2011.9.009
    Asbtract ( 162 )   HTML ( 0)   PDF (1044KB) ( 230 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The system-oriented development model has raised considerable programming challenges for sensor networks,involving data management and routing protocol deployment.To develop distributed applications over network in a declarative manner,even in global view,is considered critical for exploiting sensor networking to its full potential.Query languages offer a declarative approach to manage and query sensor network data.Recursive query language is especially used to define distributed applications such as routing protocols. This paper analyzes the status of declarative development model for sensor networking and gives some suggestions for further study.

    A Cooperation Incentive Mechanism for Computational Grid Based on Indirect Reciprocity
    Hu Yang,Dongge Zhang,Hao Liu,Tiansong Bai
    2011, 27(9):  42-47.  doi:10.3969/j.issn.1000-0801.2011.9.010
    Asbtract ( 182 )   HTML ( 0)   PDF (928KB) ( 367 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking computational grid as an evolutionary cooperating game network,an incentive mechanism is designed for better cooperation based on indirect reciprocity theory within computational grid. In order to encourage the resources owner to act as a cooperator in the computational grid,a three-dimensional reputation system and a reputation management mechanism are designed which can be used to distinguish “accidental deny of cooperation”from “deliberate deny of cooperation”. The“deliberate deny of cooperation”deed is punished rigorously to stabilize cooperative activity,and at the same time,the tolerant strategy is used to deal with the “accidental deny of cooperation”deed to avoid engaging in the worst “tit-for-tat”strategy. According to cooperative game theory,we find out that under the cooperation incentive mechanism,the dominant strategy of the resources owner is trying its best to share the spare resources and continuously performing as a cooperator to increase its cooperation credit value,which demonstratively shows that the incentive mechanism provides an effective result.

    Research on Application of Virtual Appliance
    Ying Cheng,Yunyong Zhang,Lu Liu,Xinghua Jia
    2011, 27(9):  48-51.  doi:10.3969/j.issn.1000-0801.2011.9.011
    Asbtract ( 175 )   HTML ( 0)   PDF (564KB) ( 275 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Virtualization makes computing resource pooling possible. However,the existing virtualization products do not have common interface and cann't be applied on unified platform,which seriously hinders management and interoperability. Therefore,standardization of package and deployment format is imperative. The concept and background of virtual appliance are described in this paper firstly. Furthermore,OVF is elaborated as implementation scheme of virtual appliance. Finally,the future application and development of OVF are prospected.

    Research of Cloud Survivability
    Gansen Zhao,Weidong Wang,Wei Sun,Tongkai Ji
    2011, 27(9):  52-59.  doi:10.3969/j.issn.1000-0801.2011.9.013
    Asbtract ( 220 )   HTML ( 6)   PDF (1980KB) ( 340 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article investigates the issue of cloudsˊ capability of surviving system exceptions. The need for cloud survivability is identified and a survivability mechanism is proposed. The survivability mechanism is built by incorporating the real-time monitoring of infrastructure-level operational status cloud services’ automatic migration,migration scheduling, automatic services recovery,pre-warning and alarming in the case of anomalies,and so on. The contribution of this thesis is as follows. Firstly,the survivability issue of private cloud infrastructures is identified. Secondly,a survivability mechanism based on virtual machine migration is proposed. Thirdly,the proposed mechanism is prototyped and tested in the vebula private cloud infrastructure platform.

    research and development
    Physical Layer Security:Survey and Future
    Hang Long,Guangxiang Yuan,Jing Wang,Yuanan LIU
    2011, 27(9):  60-65.  doi:10.3969/j.issn.1000-0801.2011.9.015
    Asbtract ( 329 )   HTML ( 20)   PDF (1079KB) ( 3257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Physical layer security is becoming an emerging research area of information security and wireless communications. In this paper,the background and state-of-the-art of physical layer security are reviewed and the future of research is pointed out. The variance and exclusion of wireless resource,as well as the development of physical layer transmission techniques,bring up plenty of opportunities for physical layer security. Based on the secrecy capacity research of the wire-tap channel,physical layer authentication/key generation/identification methods are the current popular research topics.

    Background Traffics Modeling Applied in Large-Scale Network Simulation
    Yaguan Qian,Bin Wang,Xiaohui Guan
    2011, 27(9):  66-72.  doi:10.3969/j.issn.1000-0801.2011.9.017
    Asbtract ( 311 )   HTML ( 3)   PDF (2280KB) ( 1603 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the large requirements of computing resources for large-scale simulation are becoming a challenge,it is needed to construct a proper background traffic model to overcome these difficulties. We proposed a background traffic model frame to realize the following objects:realistic,efficient and responsive. ON/OFF models are used to describe the user behaviors by two typical applications(Web and P2P). Traffic is abstracted as fluid to get more efficient than packet level presentation and the ODE(ordinary differential equation)is used to depict the congestion avoidance functionality. Finally,a prototype model was constructed and some experiments are conducted. The results imply that the aggregated traffic from the model presents expected self-similarity and the efficiency is more obvious than packet level traffic simulation.

    Study on Method for Estimating Synchronization Position in OFDM System
    Lihong Zou,Jianguo Yu,Xiangpeng Zhang
    2011, 27(9):  73-78.  doi:10.3969/j.issn.1000-0801.2011.9.019
    Asbtract ( 195 )   HTML ( 0)   PDF (2302KB) ( 107 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper we propose an estimation method of synchronization starting point based on the cyclic prefix from the aspect of orthogonal frequency division multiplexing technology. The purpose of the method is to enable estimation of synchronization immediately after receiving CP,and then CP is devived into two equal-length signals. Synchronization starting point of effective OFDM data signal can be detected by comparing of SNR of these two fragmented signals and by using recursive bisection method. This method has lower computing complexity and higher synchronization speed. Simulation results show that the proposed method can achieve higher precision than conventional methods.

    OFDM Signal Transmission Based on Broadband Optical Source
    Yao Li,He Wen,Xiaoping Zheng
    2011, 27(9):  79-83.  doi:10.3969/j.issn.1000-0801.2011.9.021
    Asbtract ( 170 )   HTML ( 0)   PDF (1391KB) ( 347 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel method on transmission of OFDM signal based on broadband optical source is proposed. A result of 1.0 GHz bandwidth OFDM signal with 16QAM-512 subcarrier and 2.0 Gbit/s centered at 3.0 GHz was accomplished experimentally. The EVM characterization and bias point of the system are also discussed.

    The Algorithm of Guarantee CCE Allocated Impartially in LTE System
    Hong Tang,Gang Shu,Linjun Zhao,Zhiling Yan
    2011, 27(9):  83-88.  doi:10.3969/j.issn.1000-0801.2011.9.022
    Asbtract ( 220 )   HTML ( 4)   PDF (837KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In LTE system,CCE(control channel element)is physical resource which transmits control information,it is used by uplink and downlink schedulers. If uplink schedule faster than downlink and it needs much CCE,then there is no or litter CCE providing to downlink,it must lead that resource blocks in PDSCH are wasted too many,whereas it also exists in PUSCH. To avoid this problem,a way is adopted to guarantee that CCE can be allocated impartially between uplink and downlink scheduler by restricting the maximum UE number which allocated in schedulers. It also provides the algorithm of calculating the maximum UE number to allocate CCE in uplink and downlink scheduler. The method is feasible via testified in an emulator.

    Error Resilient Coding for Video Transmission Based on Wireless
    Xingang Chai,Dongdong Zheng
    2011, 27(9):  89-92.  doi:10.3969/j.issn.1000-0801.2011.9.024
    Asbtract ( 236 )   HTML ( 0)   PDF (689KB) ( 299 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Joint video team(JVT)of ISO/IEC MPEG and ITU-T VCEG proposed scalable video coding(SVC). Scalable video coding can be realized fully flexible by space,time and quality. This combination of rate distortion optimization algorithm in scalable video coding coded as an error resilient tools. This paper introduces automatic retransmission mechanism that is decided by the different layers of data based on the B-D cost function. Reduce data loss and to improve the video quality. Simulation results show that the greatly enhanced video stream error resilience capability,to improve the robustness of video streaming.

    Server-Side Architecture Design of Mobile SNS Platform
    Tongguang Zhang,Jiguang Li,Longchang Zhang
    2011, 27(9):  93-100.  doi:10.3969/j.issn.1000-0801.2011.9.025
    Asbtract ( 302 )   HTML ( 0)   PDF (3523KB) ( 205 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile SNS platform includes a number of key technologies,in order to effectively improve the reuse rate of platform module and system flexibility,based on component technologies the server-side framework of mobile SNS is proposed,some server-side framework base functions are designed,component model is presented,the logical relationship between components is described,component size model is proposed,and mobile SNS server-side software architecture is presented. It develops a feasible method for the design of the server-side of mobile SNS system.

    Research on Standard Architecture of Sensing Layer in Internet of Things
    Hongxia Chen,Junyu Zhao
    2011, 27(9):  101-106.  doi:10.3969/j.issn.1000-0801.2011.9.027
    Asbtract ( 380 )   HTML ( 12)   PDF (1813KB) ( 1635 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the importance of sensing layer in Internet of things. Then it provides a standard architecture of sensing layer from both the common and the specific requirements and also describes each module in detail. Finally,it summarizes the directions of future research.

    ZigBee Network Construction and Routing Optimization in Intelligent Home
    Lijian Liu,Guangming Zhang,Guizhong Tang,Xianghua Wang
    2011, 27(9):  106-110.  doi:10.3969/j.issn.1000-0801.2011.9.028
    Asbtract ( 187 )   HTML ( 4)   PDF (899KB) ( 367 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    ZigBee technology is a low-cost,low power consumption,short-distance wireless communication technology,which is widely applied in intelligent home. This paper describes the ZigBee communications protocol and method of network address assignment. Aiming at the problem of RREQ packets flooding at routing discovery phase in AODVjr algorithm and only considering the parent and child node in Cluster-Tree algorithm,an improved routing algorithm for ZigBee networks is proposed. In this improved algorithm,neighbor tables are introduced,AODVjr algorithm and Cluster-Tree algorithm are combined to control the direction of the RREQ packets. At the same time,the minimum residual energy of nodes is also considered. The simulation results indicate that this improved algorithm reduce the routing cost,extend the survival time of nodes,and balance the network load.

    Design and Implementation of Wireless Video Transmission System
    Zhouyang Mao,Wei Jiang,Xiaojie Sun,Limin Meng
    2011, 27(9):  111-114.  doi:10.3969/j.issn.1000-0801.2011.9.029
    Asbtract ( 184 )   HTML ( 3)   PDF (1483KB) ( 205 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A real-time H.264 video stream transmission system that based on standard RFC is designed and implemented in this paper. In order to overcome the adverse factors as high bit error and low bandwidth through the wireless channel,this paper proposes UDP/RTP virtual links that under the cdma2000 EV-DO to ensure real-time transmission. At the meantime,in order to make up the lack of AIMD algorithm,this paper uses Gilbert channel model to estimate the effective bandwidth,and adjusts the sending rate by predicting the bandwidth. The results show that when the network congestion occurs,the system will automatically reduce the video frame rate to ensure real-time video transmission,since the RTCP feedback mechanism is added.

    Operational support technological innovation BBS
    Research and Practice on Put-of-Band Management for IT Equipment
    Xin Jin
    2011, 27(9):  115-121.  doi:10.3969/j.issn.1000-0801.2011.9.030
    Asbtract ( 207 )   HTML ( 1)   PDF (1615KB) ( 511 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address management and maintenance problems encountered,the urgent need to find effective techniques to improve maintenance quality,improve management efficiency and reduce human consumption. This article focuses on the introduction of out-of-band management for IT equipment to elaborate the idea,and sums up the experience in the implementation of out-of-band management. It is a reference to the management of IT equipment.

    Design and Realization of a Terminal Analysis System Supporting Customer Segment
    Rui Wang,Li Chen
    2011, 27(9):  122-126.  doi:10.3969/j.issn.1000-0801.2011.9.031
    Asbtract ( 180 )   HTML ( 0)   PDF (1406KB) ( 300 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper,the design and realization of a terminal analysis system was proposed. With data mining,based on the terminal information and consuming behavior for customers,the system can cluster the customer segments precisely and support the precision marketing and network operation.

    Operation and application of
    Fast Optimization of TD-SCDMA Indoor System
    Ji Fang,Le Huang,Xiaoyin Wang
    2011, 27(9):  127-133.  doi:10.3969/j.issn.1000-0801.2011.9.032
    Asbtract ( 197 )   HTML ( 0)   PDF (2803KB) ( 293 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the large scale of TD-SCMDA indoor system,there is a must of network optimization. Motivated by the deficits of current systems,our research proposes a new concept to fast optimize the TD-SCDMA indoor system and the corresponding methods. Theoretical analysis and real-data experiments both prove the reasonableness of our method. In our experiments,we further figure out the key elements of testing TD-SCDMA indoor system,which could act as a guide to the test of TD-SCDMA indoor system.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: