Please wait a minute...

Current Issue

    20 January 2016, Volume 32 Issue 1
    Ressearch and development
    Scalable geometric routing scheme based on location-independent names
    Yanbin SUN,Yu ZHANG,Hongli ZHANG,Binxing FANG
    2016, 32(1):  1-10.  doi:10.11959/j.issn.1000-0801.2016001
    Asbtract ( 301 )   HTML ( 1)   PDF (2837KB) ( 320 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Name-based routing has become one of the hot topics in future network.However,due to the sustained growth of the size of nodes and information,the scalability issue is becoming one of the bottlenecks of name-based routing.As a new type of scalable routing,geometric routing provides both scalable routing tables and low routing paths,but it is difficult to support name-based routing.A universal scalable geometric routing scheme based on location-independent names(GRIN)was proposed.GRIN implemented a hybrid geometric routing(HGR)combining greedy routing with source routing,introduced a distributed name resolution using 2-level sloppy groups.Then the state and the path stretch upper bound of GRIN were analyzed.The simulation results show that GRIN guarantees scalability,low stretch and reliability.It outperformanced other similar routing schemes.

    Green virtual network embedding algorithm based on particle swarm optimization
    Hua QU,ANBin F,Ya GUO,Li WANG,Jihong ZHAO
    2016, 32(1):  11-17.  doi:10.11959/j.issn.1000-0801.2016002
    Asbtract ( 243 )   HTML ( 4)   PDF (1606KB) ( 320 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Green network is a hotspot in network research recent years,virtual network embedding(VNE)algorithm which focuses on saving energy,becomes very important in resource allocation in the network virtualization.A green VNE algorithm which applies swarm particle optimization(GVNE-PSO)was proposed,the evolution behaviors and parameters of each particle was redefined,and the number of nodes and links that could be switched off as the fitness function were considered,the optimum solution of green VNE in a low time complexity was achieved.The results show that compared to the exiting algorithm,it greatly reduced the time complexity offline,when online,it also raised the rate of virtual network acceptance,and the same with nodes and links that can be switched off,what's more,the performance period are shorter.

    Performance analysis of relay selection strategy with selective decode-and-forward protocol based on threshold decision
    Jianwu ZHANG,Jing JIANG,Jianrong BAO,Bin JIANG
    2016, 32(1):  18-24.  doi:10.11959/j.issn.1000-0801.2016003
    Asbtract ( 232 )   HTML ( 2)   PDF (1427KB) ( 346 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cooperative transmission can effectively overcome performance degradation caused by channel fading and thus improve diversity effect.In order to improve the spectral efficiency of all-time cooperative,relay selection strategy with selective decode-and-forward protocol based on threshold decision was mainly investigated.The performance was also analysed and the approximate expression of the outage probability and the spectrum efficiency with high signal-to-noise(SNR)were derived.Simulation results show that under low-SNR and few relays circulations,the outage probability under different thresholds are very close.If the collaboration threshold increases by 0.09,the spectral efficiency improves by 0.12.Under high-SNR and many relays circulations,the spectral efficiency under different thresholds are similar.When the system outage probability is 10-2,the collaboration threshold decreases by 0.9 and 1.1 dB SNR gain can be obtained.

    Performance of 256QAM in LTE-Hi indoor scenario
    Shan LIU,Cheng TAO,Liu LIU
    2016, 32(1):  25-33.  doi:10.11959/j.issn.1000-0801.2016004
    Asbtract ( 449 )   HTML ( 5)   PDF (3056KB) ( 915 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the traffic explosion of indoor and hotspots,LTE-Hi was put forward by 3GPP organization in Release12.Due to the coverage particularity of indoor and hotspots scenarios,the organization introduced 256QAM to improve system performance.According to the 256QAM constellation given in the standard,a soft demodulation algorithm based on border distance decision was deduced.Through a simulation of the UE SINR distribution in the LTE-Hi scenario,the feasibility of the 256QAM was proved and according to the CQI/MCS/TBS signaling table changed for 256QAM,link level simulation showed the 256QAM and 64QAM throughput in comparison under different EVM index.Finally,the system performance with and without the introduction of 256QAM under different scenarios was evaluated.

    A wideband spectrum sensing approach based on sub-band matching selection
    Yuzhi YAN,Youming LI,Mingchen YU,Caimei FU,Guili ZHOU
    2016, 32(1):  34-39.  doi:10.11959/j.issn.1000-0801.2016005
    Asbtract ( 265 )   HTML ( 1)   PDF (1444KB) ( 383 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Wideband spectrum sensing technology based on compressed sensing can effectively reduce the high sampling rate and the complexity of spectrum sensing.During the sensing process,in order to enhance the reconstruction performance of the spectrum signal,a modified OMP sub-band matching selection algorithm for wideband spectrum reconstruction based on the prior knowledge of boundary information and the block sparse characteristics of wideband frequency signal was proposed.This method can reduce the number of iterations in spectrum reconstruction with OMP algorithm and enhance stability of spectrum reconstruction.Simulation results show that the proposed method can not only improve the accuracy of spectrum reconstruction,but also effectively shorten spectrum sensing timeand achieve better wideband spectrum sensing performance.

    Node characteristic and propagation model in microblog forwarding network
    Jin LI,Zilong YANG
    2016, 32(1):  40-45.  doi:10.11959/j.issn.1000-0801.2016006
    Asbtract ( 300 )   HTML ( 6)   PDF (1260KB) ( 635 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Microblog is an important social network with rapid propagation speed and great influence.The network influence is determined by users' node characteristic.Nodes' degree and propagation model in microblog forwarding network were investgated.Firstly,microblog forwarding network was constructed through distinguishing information flow direction.Secondly,the mean and variance of out-degree and in-degree were discussed.The difference between out-degree and in-degree was clarified.Finally,the simulation shows that the direction characteristic of edge has significantly influence on information propagation.The propagation becomes harder and propagation range diminishes while percolation threshold rises in directed graph under the same probability.

    Multi-type spectrum resources joint distribution algorithm based on guaranteed QoS
    Ling LIU,Yongju XIAN,Jia ZHU
    2016, 32(1):  46-53.  doi:10.11959/j.issn.1000-0801.2016007
    Asbtract ( 264 )   HTML ( 1)   PDF (2262KB) ( 267 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The definition of the spectrum availability in terms of static spectrum,semi-static spectrum and dynamic spectrum and the definition of service requirement index based on M-LWDF QoS definition were proposed.A spectrum allocation method and a redistribution method combined with spectrum availability and subscriber requirement were presented.The main idea of the method is that subscriber requirement and availability of spectrum resource are quantified,and then spectrum resources are allocated to subscribers by a one-to-one mapping based on their quantified values in the same sequence.Compared with the random distribution scheme and the dynamic scheme following static allocation,simulation results show that the scheme presented can obviously improve system performance in average number of failure distribution and average total data rate.

    An improved clustering algorithm based on local density
    Xiaohui GUAN,Yaguan QIAN,Xinxin SUN
    2016, 32(1):  54-59.  doi:10.11959/j.issn.1000-0801.2016008
    Asbtract ( 250 )   HTML ( 4)   PDF (1537KB) ( 286 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Clustering analysis is an important and challenging research field in machine learning and data mining.A fast and effective clustering algorithm based on the idea of local density was proposed by Alex.But the number of clusters and cluster centers in the algorithm were determined by hand.Therefore,the candidates of cluster centers based on local density were firstly selected and then density connectivity method was used to optimize the candidates.The classes of samples are the same as the nearest center with bigger local density.Experiments show that the proposed method has a better cluster efficiency and can handle the problems of uncertain cluster number and cluster centers.

    Guided evolutionary game algorithm of unstructured P2P network
    Guohui ZHU,Chunlan LU,Rui ZHANG
    2016, 32(1):  60-65.  doi:10.11959/j.issn.1000-0801.2016009
    Asbtract ( 237 )   HTML ( 1)   PDF (1767KB) ( 231 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to promote the cooperation among the nodes which exist in dynamic and open peer-to-peer network,G-SLACER algorithm was provided by introducing pacesetter nodes.30% of network nodes were initialized to pacesetter nodes.In the process of topology reconstruction,a guided link to the most advantage node was added.To encourage studies between nodes,the payoff of the whole network was increased.The experimental results show that the G-SLACER algorithm has good generality for different sizes of networks,and it enhances the stability of CCP.Compared with other evolutionary game algorithms,cooperation state of P2P network formed by G-SLACER algorithm appears earlier and more stable.

    Trusted measure model for the communication network system
    Senxin ZHOU,Jianghong HAN,Yaohui ZHANG,Chao LI
    2016, 32(1):  66-75.  doi:10.11959/j.issn.1000-0801.2016010
    Asbtract ( 284 )   HTML ( 3)   PDF (3477KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The trusted measure model for communication was proposed by computing its value of security,control and survivability with continuous-time reward Markov method.The“state bomb”problem in traditional state analysis method was solved by the way of structural equation solution.The generic function optimization algorithm was used to reduce computational complexity.Simulation experiments show that the model is correct and feasible.

    Receiver scheme of rake equalization for 60GHz pulse communication system
    Xian CHEN,Xuehua LI
    2016, 32(1):  76-81.  doi:10.11959/j.issn.1000-0801.2016011
    Asbtract ( 261 )   HTML ( 1)   PDF (1709KB) ( 459 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Dispersion of the signal energy and the inter symbol interference(ISI)is caused by the multipath fading in 60GHz pulse communication environment.To solve this problem,the severity of the ISI in the system was analyzed,and the method to eliminate interference was studied.Based on the 60GHz wireless channel model established by IEEE 802.15.3c,the simulation platform of 60GHz pulse communication system was built.Theoretical analysis and numerical simulation of ISI in the system were carried out,and a receiver scheme of combining Rake receiver and equalizer was designed.Results show that,the two taps MRC-Rake receiver module combined with MMSE linear equalization module can not only improve the signal energy by multipath diversity,but also eliminate ISI.The performance of the system was improved without increasing the complexity.The scheme provides a reference for the design of 60GHz pulse communication system in the future.

    A discovery strategy for APT anomaly based on homologous behavior analysis
    Yihan YU,Yu FU,Xiaoping WU,Hongcheng LI
    2016, 32(1):  82-87.  doi:10.11959/j.issn.1000-0801.2016012
    Asbtract ( 351 )   HTML ( 11)   PDF (1493KB) ( 425 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As APT(advanced persistent threat)attacks are increasingly frequently,higher requirements for the detection of APT attacks were proposed.It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis.Aiming at the problem of low efficiency of data authentication caused by excessive data,the historical behavior database with data label technology was established and the database was stored in the cloud.Relying on the Hadoop platform and the aggregate computing ability of MapReduce and the pseudorandom permutation technique,the whole traffic parallel detection of the network was realized.In order to determine whether there was a APT attack behavior,the detection of APT attacks was implemented by comparing the data labels in the database.Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.

    Utility channel estimation algorithm with interference suppression in OFDM system
    Xiaoyang LAI,Lin DUO
    2016, 32(1):  88-92.  doi:10.11959/j.issn.1000-0801.2016013
    Asbtract ( 270 )   HTML ( 1)   PDF (1249KB) ( 519 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In OFDM system,the least square(LS)algorithm has the shortage of noise cancelling and interference suppressing.An utility channel estimation algorithm which took advantage of the time frequency characteristic in OFDM system was proposed.The new channel estimation algorithm realized noise cancelling and interference suppressing through time-frequency transform by three times.In view of time-frequency transform could be achieved by FFT/IFFT,the new channel estimation algorithm complexity was low.In the TU channel simulation,the new channel estimation algorithm has the high performance,which was 3 dB better than the LS algorithm.In the TU channel simulation with interference suppression,the new channel estimation algorithm has only 1.5 dB reduction in performance.

    Signal entropy feature extraction and simulation analysis of the armored target with passive millimeter wave
    Jianli FENG,Mingshi LUO,Xiaomin ZHANG
    2016, 32(1):  93-97.  doi:10.11959/j.issn.1000-0801.2016014
    Asbtract ( 238 )   HTML ( 2)   PDF (1484KB) ( 292 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the irregular fluctuation of the armored target's detection signal with passive millimeter wave,an armored target's recognition method which the feature is entropy was proposed.Based on the measured data,the validity of this method was demonstrated.Through simulation,the antenna temperature curve of armored target,dry sand,steel and water was obtained respectively.Then,the entropy feature of each one was extracted.The histogram and the average value of the entropy were analyzed.The results show that when the entropy was used as the feature,the armored target from the background and typical“interferences”can be effectively recognized and practical engineering significance was obtained.

    integrate IT application with industrialization
    Connotation,service system of internet and its integrating path to manufacture
    Juan DU,Feng WANG
    2016, 32(1):  98-104.  doi:10.11959/j.issn.1000-0801.2016015
    Asbtract ( 307 )   HTML ( 5)   PDF (2528KB) ( 774 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    After years of development,the internet continues to penetrate the economic and social fields and it has become an important infrastructure of information society,bringing increasingly influence and changes to the service industry,manufacturing industry and other traditional industries.The concept of“internet +”gradually gets into people's hearts.Internet service system was established based on analysis of connotation of internet,integrating path and its law to manufacture were researched systematically from industrial chain,value chain and enterprise production activities.

    Thinking about two fusion work in the new situation
    Mingfeng HUANG
    2016, 32(1):  105-107.  doi:10.11959/j.issn.1000-0801.2016016
    Asbtract ( 216 )   HTML ( 1)   PDF (456KB) ( 223 )   Knowledge map   
    References | Related Articles | Metrics

    First of all,the challenges of our country's economy and manufacturing industry were introduced.Secondly,the connotation of the integration of the two and the related concepts,such as intelligent manufacturing,the internet and industrial integration,were detailed presented,and finally suggestions on the implementation of the integration of the two were put forward.

    Impact of the upgraded version of German“industrial 4 platform”on China's manufacturing industry
    Siwei YANG
    2016, 32(1):  108-111.  doi:10.11959/j.issn.1000-0801.2016017
    Asbtract ( 308 )   HTML ( 13)   PDF (592KB) ( 507 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the organizational structure and positioning of German“Industrial 4 Platform”were introduced,and then the core research was focused on,such as research and innovation,reference system and standardization,network system security.Finally,we should draw on the advanced experience of German manufacturing field,and promote the development of intelligent manufacturing in China.

    Wide operating technology
    Modeling method of telecommunication network resources
    Yuan LIN,Yanbin WANG,Hui ZHANG,Jiahai YANG
    2016, 32(1):  112-118.  doi:10.11959/j.issn.1000-0801.2016018
    Asbtract ( 304 )   HTML ( 2)   PDF (2478KB) ( 478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the well designed resource information model,the telecom operators can effectively manage the telecom network resource.A resource modeling methodology was proposed.The modeling methodology was based on the network topology and the port.The modeling process was divided into seven sub-processes:network analysis,network node identification,connection identification,equipment description,ability description,space resource analysis and model expression.In addition,a discussion on the relationships between entities had been made.Based on the modeling methodology,the LTE resource information model was constructed.Therefore,the validity of the modeling methodology was proven.Moreover,the LTE resource information model was objectively evaluated through three aspects:the complexity of the class,the ratio of depth and width of the inheritance tree and the coupling degree between classes.Results show that this model is high-quality.

    5G-oriented information sharing mechanism within D2D clusters
    Shaomin WANG,Bin ZHOU
    2016, 32(1):  119-125.  doi:10.11959/j.issn.1000-0801.2016019
    Asbtract ( 367 )   HTML ( 2)   PDF (2068KB) ( 343 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Device-to-Device(D2D)communication is an important technology in 5G network.It helps to improve the transmission efficiency of data dissemination services.However,due to the extra signaling overhead caused by D2D communications,currently most of enhanced-multicast solutions cannot solve the contradiction between high-efficient data transmission and low-efficient signaling procedure,so as to reduce the overall performance gain.An intra-cluster D2D information sharing algorithm based on matrix analysis which includes centralized and distributed modes was proposed.The proposed algorithm could significantly reduce D2D retransmission times in clusters by adaptively selecting the optimal transmitters and data packets for D2D multicast retransmission,achieving the aim of reducing signaling overhead and transmission delay.

    Analysis on network scheme and resolution test of SDN/NFV technology co-deployed in cloud datacenter
    Rong GU,Ruixue WANG,Chen LI,Lu HUANG
    2016, 32(1):  126-129.  doi:10.11959/j.issn.1000-0801.2016020
    Asbtract ( 424 )   HTML ( 10)   PDF (1069KB) ( 1272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Traditional datacenters have been heavily impacted due to the development and large-scale deployment of cloud computing technology.Co-deployment of SDN and NFV technology shows its distinct advantages of vitualizing network resources in the scenario of cloud datacenter.Resolution tests aiming at co-deployment of SDN and NFV have directive significance.According to the resolution test,SDN and NFV technology were matured already for the commercial deployment in operators' network.Further research needs to be focused on the key problems found out in scheme designing and the resolution test.

    Architecture of service-oriented data analysis system
    Baoyou WANG,Cong WU,Jing QIAN,Xiaoying TAO
    2016, 32(1):  131-137.  doi:10.11959/j.issn.1000-0801.2016021
    Asbtract ( 352 )   HTML ( 7)   PDF (4603KB) ( 452 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the era of data technology,the higher requirements of telecom operators,such as business innovation and strong operation supporting,are being placed on data analysis system.Firstly,the requirement and challenge of the rising data analysis and the enhancing data value were expounded.Then,in order to realize open architecture and flexible operation support,the logical framework and technology architecture of the service-oriented data analysis system,as well as the data governance and the data security management were proposed.Finally,the service scenarios and the business value of the platform were introduced by an example.

    User identification model and empirical analysis of international roaming communication products
    Zhiwei SHEN,Ruiyuan CUI,Heng LV
    2016, 32(1):  138-143.  doi:10.11959/j.issn.1000-0801.2016022
    Asbtract ( 265 )   HTML ( 1)   PDF (1360KB) ( 672 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the use rate of international roaming communications products are too low,based on full volume data of mobile user in communication behavior and attribute,a method of combining statistical analysis and building recognition model was proposed.Using SPSS and Clementine tools,with high hit rate and wide coverage as the target,the user potential features of the international roaming communications products were extracted.Subsequently,the empirical analysis of the potential features also was given,and the very high accuracy rate was obtained.This has important reference value for operators to carry out international roaming service better.

    Application of SDN and NFV technology in the cloud data center
    Hui ZHAO,Ming DING,Qingsong CHENG,Ling LU,Chensheng KONG
    2016, 32(1):  144-151.  doi:10.11959/j.issn.1000-0801.2016023
    Asbtract ( 425 )   HTML ( 9)   PDF (2842KB) ( 1440 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Taking the cloud computing data center as the breakthrough point,firstly,the characteristics of overlay network,SDN controller and VxLAN in SDN field were presented.Secondly,two kinds of problems about general server performance and service chain were analyzed in NFV field.Finally,the early test progress of SDN/NFV technology and related conclusions were expounded,then VDC was discussed.

    Routing control method of hot standby BRAS in IP MAN
    Huanyi WANG,Guofu XIANG
    2016, 32(1):  152-158.  doi:10.11959/j.issn.1000-0801.2016024
    Asbtract ( 599 )   HTML ( 0)   PDF (1428KB) ( 664 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.

    Key technology and solution of intelligent resolution for the huge carrier DNS
    Wei PENG,Weihua CAO,Xiaodong HE
    2016, 32(1):  159-163.  doi:10.11959/j.issn.1000-0801.2016025
    Asbtract ( 503 )   HTML ( 10)   PDF (1353KB) ( 1300 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The principles and advantages of intelligent DNS resolution were mainly analyzed.The carrier DNS's intelligent resolution was studied,such as the key intelligent resolution techniques of cache server,recursion server and cache view.According to the characteristics of huge telecom carrier's network,a solution of intelligent resolution,which can provide reference for the development and optimization of huge telecom carrier DNS was proposed.

    Anti-spam system of new message business
    Zhigang DING,Ziyu XIAO,Xuefang LI,Xiangchuan JI
    2016, 32(1):  164-169.  doi:10.11959/j.issn.1000-0801.2016026
    Asbtract ( 207 )   HTML ( 2)   PDF (2552KB) ( 414 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the background of new business requirements,the monitory point selection for new monitoring business,anti-spam system architecture,the function of the system need and the key points that should pay attention to system deployment were analyzed.Finally a set of two level monitoring system architecture and deployment guidelines for monitoring system were put forward.

    Design and implementation of fast data application based on information aggregation platform
    Yanjie ZHAO
    2016, 32(1):  170-174.  doi:10.11959/j.issn.1000-0801.2016027
    Asbtract ( 263 )   HTML ( 1)   PDF (1288KB) ( 317 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    User behavior information contains great value.Telecom operators must collect and deal with this information to create new business growth point.Through the research of information collection and processing,the implementation scheme of fast data application was given.Services such as user care and information push were provided based on the behavior of position change and voice calls.The application was used in the new business field of China Telecom and achieved remarkable results.

    CMNet evolution based on SDN
    Quanze JIANG,Zhiyuan LAI
    2016, 32(1):  175-181.  doi:10.11959/j.issn.1000-0801.2016028
    Asbtract ( 386 )   HTML ( 4)   PDF (3429KB) ( 465 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    From the current development situation of SDN technology,characteristics of CMNet were analyzed.Then the CMNet evolution was divided into three stages:firstly,focused on the application of the key scenes in metro area; secondly,gradually expanded to the CMNet backbone network depended on the technology maturity and the perception of traffic engineering; thirdly,business analysis system,business system,third-party's system and other systems were linked to achieve the market adapting and stitchable SDN.

    An implementation of the“active-active”data center
    Hao FAN
    2016, 32(1):  182-187.  doi:10.11959/j.issn.1000-0801.2016029
    Asbtract ( 431 )   HTML ( 7)   PDF (2034KB) ( 1497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the transition of the traditional data center to cloud data center,government and financial industry's information system disaster recovery and backup becomes an important means to ensure services continuity and data availability.Active-active data center can enhance system availability and improve the utilization of equipment,becoming the future trend of data center construction.Active-active data center involves networking,virtualization,storage technology.These related technologies to achieve active-active in the data center were described,and the effectiveness of the technology was verified by the implementation of the governmental data center.

    TD-LTE and LTE FDD fusion networking strategy
    Lunsuo WANG
    2016, 32(1):  188-192.  doi:10.11959/j.issn.1000-0801.2016030
    Asbtract ( 342 )   HTML ( 2)   PDF (1966KB) ( 577 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of mobile internet,as well as the rapid expansion of the scale of 4G network,the frequency resources worldwide are increasingly scarce.Learning from the successful experience of the development of TD-LTE and LTE FDD fusion,the challenges faced by the development of the integration of networking strategy and TD-LTE international development were analyzed,the development mode and strategy of TDD and FDD were proposed,and the future development targeted recommendations of the communication operator network was put forward.The TD-LTE and LTE FDD convergence has become a big trend.As the strategic layout of the communications operators,4G network using LTE network approach,should be taken into account in the LTE master plan in advance.

    Self-service smart pipe capabilities offering based on electronic warrant
    Mingxue LI,Yilin LIN,Zhenwei HE
    2016, 32(1):  193-196.  doi:10.11959/j.issn.1000-0801.2016031
    Asbtract ( 278 )   HTML ( 0)   PDF (1352KB) ( 284 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The limitation of traditional smart pipe capabilities offering was focused,a new self-service network capabilities offering architecture based on the electronic warrant was proposed,including the main service flow,the key technical points and the test result of the current network.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: