Please wait a minute...

Current Issue

    20 January 2014, Volume 30 Issue 1
    View the focus
    Development and Trend of Technology, Standard and Industry of TD-LTE-Advanced
    Shanzhi Chen
    2014, 30(1):  1-7.  doi:10.3969/j.issn.1000-0801.2014.01.001
    Asbtract ( 260 )   HTML ( 1)   PDF (1924KB) ( 473 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The key technologies, standard evolution, industry chain development and its commercialization in the world of TD-LTE-Advanced were introduced from the point-view of the evolution of TD-SCDMA. The commercialization's propulsion to China IC industry development was analyzed, and the future development, technology and standard evolution beyond TD-LTE were discussed. It could be used as reference for research on TD-LTE, follow-up technology and standard evolution, such as 5G.

    Research and development
    Research on the Networking Strategy in Indoor Visible Light Communication
    Yang Liu,Hua Zhao,Kaizhi Huang,Xinsheng Ji
    2014, 30(1):  8-14.  doi:10.3969/j.issn.1000-0801.2014.01.002
    Asbtract ( 227 )   HTML ( 2)   PDF (1746KB) ( 728 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The correlation studies mainly focus on the fields of elements design, physical layer communication, system planning and design on VLC network have not obtained enough attention yet. Therefore, the technical features of VLC and the typical network architecture were discussed, according to the evolution and development trend of the wireless communication system, some networking strategies for the indoor visible light networking were proposed, such as hierarchical cell coverage, control plane and user plane separation, distributed model and client-server model coexist in strategy. The key technologies of VLC system about the layout of lighting, network handover and access control were analyzed.

    A Fine-Grained Mobile Data Security Model
    Yubin Yang,Liming Cheng
    2014, 30(1):  15-23.  doi:10.3969/j.issn.1000-0801.2014.01.003
    Asbtract ( 267 )   HTML ( 0)   PDF (4315KB) ( 338 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A kind of fine-grained security model for mobile data was proposed, tagged the mobile data and mobile applications in the intelligent terminal and the mobile access gateway/server, to control the operation of mobile data, and achieve the purpose of mobile data security isolation. Thus fine-grained security for mobile data management capabilities were achieved. The model was consisted of mobile data management module and the label control management module. The mobile data management module identified the user permissions and level of data privacy through the label to control the operation of mobile application of mobile data. The creating, modifying, storing and transmitting of the data label and application label were controlled and managed by the label control management module. Experiments on the Android device were carried out, and the security of the model was confirmed.

    Research on Multi-Function Pipeline Integrate Cloud Computing Monitoring System Based on OpenStack Structure
    Lei Li,Lianwen Jin,Desheng Li,Wanwan Tang
    2014, 30(1):  24-30.  doi:10.3969/j.issn.1000-0801.2014.01.004
    Asbtract ( 295 )   HTML ( 0)   PDF (2076KB) ( 434 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To deal with the increasing of computer clusters which the increasing needs of cloud computing brings and guarantee stability and reliability of the service, a cloud computing monitoring system based on OpenStack structure to satisfy the needs of cloud computing monitor was designed. The system structure and key technologies were described, including factory model, Paste Deploy, pipeline, Eventlent green thread and object-oriented SQL Alchemy model, so the system has modularity, layering and pipeline. The advantage of the system includes multi-function integrating, easy deploy, high expansibility and redeveloping easily. The experimental result proves that the system has high stability, accurate data acquisition and high integration with the third client, and it can implement cloud computing monitoring informatization more effectively.

    An Efficient Distributed Forensic System Based on Hadoop:Principle and Method
    Songyang Wu,Xizhe Zhang,Xupeng Wang,Xiangxue Li
    2014, 30(1):  31-38.  doi:10.3969/j.issn.1000-0801.2014.01.005
    Asbtract ( 244 )   HTML ( 2)   PDF (3538KB) ( 481 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development and popularization of information technology and intelligence device, the diversity of different device making forensic analysis of existing equipment cannot meet today's networking and storage technology requirements, and exhibit complex operation, low efficiency, on high speed disk image storage and massive data correlation. An efficient distributed forensics system based on Hadoop technique, which can support multiple concurrent media scene forensics work, was designed and implemented, and through the dispatch control services would be evidence of different data storage media to a different distributed data storage server, each forensic task runtime could monopolize a forensic medium to achieve a parallel multiple media forensic analysis. Data show that responsible acknowledge duration will be 0.1 s for a 2~4 GB text file.

    Research on Software Defined Storage Technology for the Next-Generation Data Center
    Zhenzheng Sun,Jing Gong,Yong Duan,Junzhi Lei
    2014, 30(1):  39-43.  doi:10.3969/j.issn.1000-0801.2014.01.006
    Asbtract ( 351 )   HTML ( 7)   PDF (997KB) ( 1274 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of internet technology and the explosive growth of data, the storage system tightly coupled hardware and software design is limiting the development of storage technology severely, and unable to meet the rapidly changing needs in the mobile internet and big data era increasingly. Software defined storage as a new storage system architecture is more suitable for the development of the next-generation data centers. The SDS research status was described, started from the definition of SDS, and then SDS reference architecture combined with the SDS system requirements was proposed, finally the evolution of ideas were put forward.

    Research and Implementation of Synthesis Modulefor Parlay X in Monitoring System Platform of Value-Added Service
    Peng Luo,Jiangtao Luo,Chengchao Xiang,Zunyi Chen
    2014, 30(1):  44-49.  doi:10.3969/j.issn.1000-0801.2014.01.007
    Asbtract ( 185 )   HTML ( 1)   PDF (2441KB) ( 367 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integrated access gateway northbound interface of Parlay X 2.0 interfaces were described in detail. The signaling procedures in Parlay X interfaces of value-added business platform were deeply analyzed and studied. It also took the MMS business processes as an example, which conducted CDR synthesis scheme in the Parlay interfaces service classification and process analysis with Hash indexing algorithm. The algorithm was tested and validated with capturing network data, which obtained good results.

    Joint Relay Assignment and Power Allocation in Multi-Pairs Multi-Relays Two-Way Decode-and-Forward Network
    Sijia Lou,Longxiang Yang
    2014, 30(1):  50-56.  doi:10.3969/j.issn.1000-0801.2014.01.008
    Asbtract ( 206 )   HTML ( 1)   PDF (2781KB) ( 391 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A joint power allocation and relay assignment algorithm for multi-pairs multi-relays two-way cooperative networks to improve system performance and decrease computation complexity was proposed. The proposed algorithm select best relays for each pair, then the selected relays use network coding to assist users exchanging signals. Meanwhile, this algorithm allocates power between all nodes participated in transmission under the total transmit power constraint.The expressions of bit error rate(BER)were derived in closed-form,and were verified by simulation. Numerical result shows that it has a performance improvement compared to the conventional equal power allocation scheme.

    Research on Application of Big Data Technique in Electricity Power Industry
    Yunshan Zhao,Huanhuan Liu
    2014, 30(1):  57-62.  doi:10.3969/j.issn.1000-0801.2014.01.009
    Asbtract ( 956 )   HTML ( 67)   PDF (2093KB) ( 3667 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of information technology, the ubiquitous sensor network, high-speed communication network, and the high performance distributed computing system have been commonly implemented. The massive data, which is generated anytime, with the mass storage, heterogeneous structure, and requiring on-time process, is bringing our society into the age of big data. The electricity big data includes the information of production, transportation, marketing, enterprise operation and management in the electricity power enterprise. Therefore, how to collect, transfer, store, and analyze the big data so as to conduct the production, and serve the electricity end users turns to an important research subject for the power industry. An overview was given about the features of the age of big data from three aspects: the definition, development trend, and the key technology of big data. Then, a summary of the research and typical application of the existing big data technology in the electric power industry was described. Finally, the challenges of big data technology in the future for the electric power information were concluded.

    Anti-Cycle-Slip LDPC Decoding Algorithm for BPSK System
    Dazhong Wu,Haidong Wu
    2014, 30(1):  63-66.  doi:10.3969/j.issn.1000-0801.2014.01.010
    Asbtract ( 229 )   HTML ( 5)   PDF (1152KB) ( 527 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    When cycle-slip occurs in BPSK modulation system, sign of information sequence which is input of LDPC decoder is opposite to the original one. This problem will lead to decoder failure. Anti-cycle-slip LDPC decoding algorithm based on belief propagation was proposed. Modified algorithm modifies initial likelihood ratio information according to information between check nodes and variable nodes by an iterative decoding computation. Modified algorithm can eliminate the influence of cycle-slip and ensure normal function of LDPC decoder. Simulation result shows that modified decoding algorithm has the same performance with traditional decoding algorithm without cycle-slip, which means that the modification of initial likelihood ratio doesn't lead to decoding performance loss. When cycle-slip happens, traditional decoding algorithm fails. Decoding LDPC of odd check node degree by anti-cycle-slip algorithm will overcome the impact of cycle-slip totally. Modified algorithm has the same decoding performance no mater cycle-slip happens.

    review
    Research on SSDF Attack and Defense for Cooperative Spectrum Sensing
    Jingyu Feng
    2014, 30(1):  67-72.  doi:10.3969/j.issn.1000-0801.2014.01.011
    Asbtract ( 276 )   HTML ( 3)   PDF (1245KB) ( 508 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cooperative spectrum sensing is the core of cognitive radio technologies to utilize spectrum resources effectively. However, cooperative spectrum sensing schemes are vulnerable to abuses by false sensing data, and thus offering opportunities for malicious users. By launching the spectrum sensing data falsification attack, some of them can make a well cognitive radio system useless. To further understand the SSDF attack and its current research situation and development trend, the types of SSDF attack were analyzed in the form of three aspects, and several typical security methods were concluded. Meanwhile, the current problems of SSDF attack and research trends in this area were discussed.

    Research and Analysis of Mobility Enhancement in Small Cell
    Dongjun Wang,Yuanke Fu,Lun Tang,Qianbin Chen
    2014, 30(1):  73-82.  doi:10.3969/j.issn.1000-0801.2014.01.012
    Asbtract ( 238 )   HTML ( 2)   PDF (2395KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Small cell network is a multi-layer cell network formed by low-power nodes whose base stations transmit power is lower than conventional macrocell base stations. More and more industry attention is pained to the development of small cell which is considered as an important part of LTE-Advanced technology study. The performance of a variety of mobile state estimation scheme in mobility management was analyzed and evaluated and the same work was done on the protection scheme of the switching instruction involved in a cellular switch. A summary was made about challenge and future research directions of small cell mobility management finally.

    Operating technology wide-angle
    Research on Operators Mobile Malware Protection Architecture and Key Technologies
    Tao Chen,Peng Gao,Xuetao Du,Shan Xue,Manzhi ang
    2014, 30(1):  83-88.  doi:10.3969/j.issn.1000-0801.2014.01.013
    Asbtract ( 242 )   HTML ( 3)   PDF (2375KB) ( 374 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years, there is a rapid growth of malware on operators network. It severely threats security of mobile internet. Based on reviewing of existing malware protection technologies, mobile malware protection architecture including both network side and terminal side technology and their interaction mechanism was proposed. Some key implementation technologies for engineer's reference were also studied.

    Business Innovation and Platform Evolution of Carriers in LTE Era
    Bohan Liang
    2014, 30(1):  90-94.  doi:10.3969/j.issn.1000-0801.2014.01.014
    Asbtract ( 185 )   HTML ( 0)   PDF (1468KB) ( 559 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of worldwide LTE operators and the business support capabilities of LTE network were described and several business and business model innovation directions were summarized, including tariff changes, OTT competing, big data traffic management and information push with rich media, and so on. Finally, the evolution demand of the business platform in the future was presented.

    Research and Application of Network Virtualization Technology Based on OpenFlow
    Hongguang Guan,Yizhen Yang,Wanli Ren,Zhijie Han,Yimu Ji,Yanfei Sun
    2014, 30(1):  96-102.  doi:10.3969/j.issn.1000-0801.2014.01.015
    Asbtract ( 218 )   HTML ( 1)   PDF (1691KB) ( 699 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the advent of OpenFlow, SDN technology research institutions at home and abroad have invested a great deal of research effort, such as the deployment of fully controllable and customizable network experiment platform. The programmable routing technology virtualization and the hardware devices of OpenFlow network have made certain progress. The OpenFlow technology research results based on the network virtualization field related were reviewed and compared briefly with the NFV technology. Else, a prospect of the OpenFlow technology application in the future research field and research direction was put forward.

    Research and Application Analysis of Scenario-Based Electronic Channels for Enterprise Customers
    Meng Zhao
    2014, 30(1):  103-109.  doi:10.3969/j.issn.1000-0801.2014.01.016
    Asbtract ( 207 )   HTML ( 2)   PDF (2942KB) ( 1170 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the research of enterprise customer electronic channels based on different scene modes, the development of electronic channels for enterprise customers and the applications in telecom carriers were analyzed. The situation with the inter industry were compared, and the development and application mode of scenario-based electronic channels for enterprise customers was put forward.

    Research and Application of Intelligent Terminal Network Performance and Problem Location Method
    Huiyu Yang,Haobin Zheng,Jinsheng Li,Hanxin Lv
    2014, 30(1):  110-115.  doi:10.3969/j.issn.1000-0801.2014.01.017
    Asbtract ( 177 )   HTML ( 1)   PDF (2122KB) ( 250 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the effects on network performance of terminal user perception, a kind of high efficient positioning terminal performance issues called five steps was put forward, and through the real log data billed experiment, the effectiveness and efficiency of this method was verified. Theoretical analysis and experimental results show that, the “five steps”save the multifarious dimension analysis, and it has the advantages such as simple and clear, strong objectivity, low computing duplication, strong practicability, and so on. Expanding the system after the flat design can be billed in the data type, in order to meet the different needs of the business.

    Constructionof Security of Monitoring Platform in Electric Power Dispatching Internal Network
    Lin Yuan,Xiasheng Gao,Tianhong Zhao
    2014, 30(1):  116-121.  doi:10.3969/j.issn.1000-0801.2014.01.018
    Asbtract ( 182 )   HTML ( 1)   PDF (2838KB) ( 327 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Power dispatching internal network contains of a large amount of safety equipments, but lacks of centralized monitoring, statistical analyzing and unified managing tool. A platform for monitoring the security of electric power dispatching internal network was constructed. The platform acquires realtime security equipments operating status, alarms, and logs information, through standardized data processing, analysis and calculation, to achieve centralized monitoring, integrated alarm, hidden danger reminder, statistical analysis, report generation and decision functions.

    Research on Solution of Mobile Application Always Keeping Online Without Heartbeat
    Yao He,Rong Zhang
    2014, 30(1):  122-127.  doi:10.3969/j.issn.1000-0801.2014.01.019
    Asbtract ( 189 )   HTML ( 5)   PDF (1865KB) ( 561 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Abastract:Along with the mobile application of the increasingly rich, especially widely used as WeChat, QQ and Weibo, the wireless network air interface signaling resource consumption issues highlighted, while the terminal energy consumption. Based on the analysis of the same industry solution, a new no heartbeat solution which can still maintain a mobile application always online was proposed, the wireless command consumption problem was solved.

    Application Method of Smart Dynamic DNS in Huge e-Commerce
    Zhiwei Shen,Bingyi Fang
    2014, 30(1):  128-134.  doi:10.3969/j.issn.1000-0801.2014.01.020
    Asbtract ( 200 )   HTML ( 2)   PDF (2581KB) ( 315 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the scale of e-Commerce users and individual demand is increasing, the existing framework of e-Commerce has been unable to provide users with a complete solution. First the e-Commerce network architecture was put forward, and a detailed discussion was made on each part of the network architecture, a kind of smart dynamic domain name system and the optimal routing method of user access of e-Commerce were designed, at last the user access to electronic commerce exchange process was given.

    Research on Classification Technology for Customer Characteristic in Mobile Internet Scene
    Qing Zhang
    2014, 30(1):  136-141.  doi:10.3969/j.issn.1000-0801.2014.01.021
    Asbtract ( 813 )   HTML ( 4)   PDF (2637KB) ( 574 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of the characteristic of customer classification theory, the current mainstream webpage classification technology was summarized, and common mining algorithms and applicable scene of customer classification were deeply analyzed. Finally, the classification process of customer characteristic was discussed to provide practical reference for developing customer feature classification work under mobile internet.

    Application of Data Quality Management Platform in Inner Mongolia Power Company
    Yu Zhang,Hongfang Pan
    2014, 30(1):  142-147.  doi:10.3969/j.issn.1000-0801.2014.01.022
    Asbtract ( 660 )   HTML ( 0)   PDF (3250KB) ( 565 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The data quality management platform was designed and constructed while the data center was building, which could help to realize scientific and effective data management and quality control. In addition, the trusted data could provide reliable decision support for decision makers. Based on these systems, it was further analyzed that how to build a set of quality management system from two aspects, such as information technology and management control. With the help of reliable data and quality analysis system, the quality of enterprise data was significantly improved, and the accurate scientific data was ensured to be provided by data center systems.

    Construction of Information Security System of Power Generation Enterprise
    Ying Yu
    2014, 30(1):  148-152.  doi:10.3969/j.issn.1000-0801.2014.01.023
    Asbtract ( 195 )   HTML ( 0)   PDF (1070KB) ( 300 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jintang Generation Co., Ltd., on behalf of units of power generation enterprises, were analyzed. Based on this analysis, a five-level business system, as the network management, border security protection, mobile access security, host security, application security, was designed for power generation enterprise security reinforcement. By introducing the construction process of advanced security system of Guodian Chengdu Jintang Generation Co., Ltd., the references were provided for other power generation enterprise information safety construction.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: