Please wait a minute...

Current Issue

    20 January 2013, Volume 29 Issue 1
    Viewpoint focusing
    Key Technologies and Trends for New Generation Transport Network
    Chengliang Zhang,Leping Wei
    2013, 29(1):  1-7.  doi:10.3969/j.issn.1000-0801.2013.01.001
    Asbtract ( 208 )   HTML ( 9)   PDF (1845KB) ( 823 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The main characteristics of new generation transport network were presented firstly, and transparent networking technologies, in particular OTN, as an initial transparent networking technology for new generation transport networks, were also analyzed. Additionally, focusing on the development and challenges of 100 Gbit/s and beyond 100 Gbit/s WDM systems, the development of optical fiber and fiber-based multiplexing technologies were discussed.

    research and development
    A Novel Networking Scheme for Hierachical Heterogenous Cellular Network Based on the Phantom Cell Architecture
    Yue Li,Mugen Peng
    2013, 29(1):  8-14.  doi:10.3969/j.issn.1000-0801.2013.01.002
    Asbtract ( 257 )   HTML ( 2)   PDF (1831KB) ( 458 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The deployment of hierarchical heterogeneous cellular network(HCN)using overlapping small cells is identified as one of the major components in solving future cellular capacity and energy efficiency problems. An enhanced networking scheme for future HCN was proposed, accomplished by adopting the phantom cell concept that splits the C-plane and U-plane. The goal is to achieve higher capacity using higher frequency bands over a range of deployment scenarios including mobility,network density,traffic handling and network complexity.The implementation related techniques and further extension of the scheme were also provided.

    Research on RTCWeb and Its Merging with IMS
    Lifeng Le,Jin Peng,Xiaodong Duan
    2013, 29(1):  15-22.  doi:10.3969/j.issn.1000-0801.2013.01.003
    Asbtract ( 246 )   HTML ( 0)   PDF (3282KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    RTCWeb is a key technology to realize free plug-in web client. Compared with traditional client, RTCWeb client enables more convenient operation, more flexible development, and detachment from the operating system and platform. It is a better choice for service developers, network operators and terminal users. This paper firstly introduced RTCWeb's communication model and key technologies, then proposed the conception of RTCWeb's merging with IMS and gave the specific solutions under the conception, finally gave a summery and a prospect for future evolution of IMS based RTCWeb system.

    A Privacy Preserving Method in WSN
    Ping Qian,Meng Wu
    2013, 29(1):  23-51.  doi:10.3969/j.issn.1000-0801.2013.01.004
    Asbtract ( 211 )   HTML ( 4)   PDF (1198KB) ( 473 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A great challenge to wireless sensor network(WSN)is how to protect privacy from disclosing during application in WSN as well as obtain accurate results. In recent years, researchers at home and abroad have done much work on privacy preserving in WSN. This paper surveyed the general privacy preserving methods from two aspects of location privacy and data privacy in WSN and analyzed their theories and characteristics. A new method based on multi-notes phantom routing protocols and ECC homomorphic encryption was proposed, which could protect location privacy and data privacy at the same time. Compared to current methods, better privacy will be protected and less energy will be consumed.

    Research and Implementation of SlAP Monitor in LTE Network
    Yan Li,Zhizhong Zhang
    2013, 29(1):  31-38.  doi:10.3969/j.issn.1000-0801.2013.01.005
    Asbtract ( 243 )   HTML ( 2)   PDF (5051KB) ( 942 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For realizing SlAP monitor in LTE network, the implementation scheme of SlAP protocol monitoring module was designed to cope with the insufficiency of protocol decoding and CDR synthesis research scheme effetiveness, on the base of introducing LTE network monitor software platform. The scheme adopted the thought of separating definition and realization for message decoding, improving the code independence and portability. The use of Hash index and overtime management mechanism of SlAP message synthesis ensured the accuracy and validity of synthesis. The scheme had been successfully applied to LTE network monitor. It has been proved to have a good effect by simulation data for testing.

    Optimization of Expression Matching for String Matching
    Tianlong Yang,Hongli Zhang
    2013, 29(1):  39-45.  doi:10.3969/j.issn.1000-0801.2013.01.006
    Asbtract ( 183 )   HTML ( 0)   PDF (1021KB) ( 241 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the requirement of network security application increases, more and more redundant patterns appear and the patterns' amount of intrusion detection system(IDS)raises. The redundant patterns affect the coefficient of utilization of system's resource, and the performance of IDS directly. The inclusion relationship for expression was classified, and the algorithms eliminating redundant expressions were proposed. Then, to optimize the BitCount algorithm, a theoretical O(1)algorithm(MaskVeri)for mask verification was designed. The experimental result shows that MaskVeri performs better than other programming realization.

    Adaptive Power Control Algorithm Based on Game Theory in Cognitive Radio
    Qing Peng,Hailin Xiao
    2013, 29(1):  46-50.  doi:10.3969/j.issn.1000-0801.2013.01.007
    Asbtract ( 211 )   HTML ( 0)   PDF (2137KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A non-cooperative power control algorithm based on game theory was proposed in cognitive radio systems, and its Nash equilibrium existence and uniqueness were also proved. However, some users'SINR is much larger than the target value in the proposed algorithm, causing power waste. Aiming at improving it, a feedback function was presented to design a mechanism of penalty factor self-adaptive adjustment on the basis of the algorithm. The numerical simulation results show that, compared with other distributed algorithms, the proposed algorithm, in the premise of meeting the primary user' QoS requirements, is able to ensure that all cognitive users' output SINR meet the threshold requirements, reduce the power consumption and overcome the near-far effect to achieve the purpose of the fair sharing of spectrum resources.

    A Project Designed by Cloud Storage Encryption Based on Separated Key
    Zhizhong Wang,Cheng Zhou,Yufei Mou
    2013, 29(1):  51-56.  doi:10.3969/j.issn.1000-0801.2013.01.008
    Asbtract ( 238 )   HTML ( 2)   PDF (1516KB) ( 651 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problems existing in the original cloud storage model has plagued the industry for many years, to realize the true sense of the data privatization in the static data encrypted storage process is able to ensure data security and protect data owners' interests. Cloud storage applications for the current secure storage of user data is able to improve data security. Taking Amazon S3 as an example, the general problem in static data security was analyzed. A new set of cloud static data encryption and storage solution, separated key S3, was designed, and a new key management method was also designed. The new technology absolutely accomplished the security of static data in the cloud. Additionally the data security analysis and prospect on next research was given.

    Direction Transmission Protocol of the Highway Traffic Information Assisted by Roadside-Infrastructure
    Jianghong Han,Fan Yang,Zhengyu Liu,Lei Shi,Li Zhang
    2013, 29(1):  57-62.  doi:10.3969/j.issn.1000-0801.2013.01.009
    Asbtract ( 209 )   HTML ( 0)   PDF (1562KB) ( 172 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing VANET network broadcast transmission protocols have low channel utilization, and easily lead to channel congestion and other issues, so improved protocol assisted by roadside- infrastructure was proposed. It used roadside-infrastructure to cluster the vehicle. In the clustering, every sending data frame added the vehicle number to its head and each vehicle node received and transmitted the packets selectively. The results show that the improved protocol is able to improve the transmission channel usage effectively, and the effective information transfer rate is able to be increased by 20%.

    A Wideband Compressive Spectrum Sensing Approach Based on Subspace Pursuit
    Jianwu Zhang,Jingxiu Chi,Xiaorong Xu
    2013, 29(1):  63-67.  doi:10.3969/j.issn.1000-0801.2013.01.010
    Asbtract ( 140 )   HTML ( 0)   PDF (1688KB) ( 236 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Spectrum sensing is the fundamental task for dynamic spectrum management in cognitive radio(CR). In order to overcome high requirement of sampling rate in traditional spectrum sensing algorithms, subspace pursuit(SP)reconstruction method in the compressed sensing(CS)theory was proposed to be applied in collaborative wideband compressive spectrum sensing. The scheme reconstructed signal spectrum via SP, fixed energy thresholds for each cognitive users, and then detected and identified the available spectrum holes by energy detection method. Simulation results show, the proposed method has better spectrum detection performance in the condition of lower compression ratio, and computational complexity is able to be reduced.

    Construction of Private Cloud Computing Platform Based on Open Source Software
    Yi Jiang,Weijun Wang,Li Cao,Kai Liu,Guiqiang Chen
    2013, 29(1):  68-75.  doi:10.3969/j.issn.1000-0801.2013.01.011
    Asbtract ( 353 )   HTML ( 5)   PDF (1545KB) ( 1945 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduced the application range of the private cloud, discussed the characteristics of the self-developed and business and open source solutions, and analyzed the main advantage of the open source solution, then compared the mainstream projects of the open source cloud computing, such as Eucalyptus, OpenStack, OpenNebula and Nimbus, studied the structure of OpenStack mainly. Based on this, this paper presented the construction example of private cloud computing platform based on OpenStack, which major processes included configuration of base environment, components installation of Nova, Glance, Swift, Keystone and Horizon, deployment of virtual machines, and finally discussed the platform application examples in the cloud computing software testing.

    Research on Semantic Based NGN Converged Service Composition Algorithm
    Rongqun Peng,Lianjun Zhang,Zhengkun Mi
    2013, 29(1):  76-81.  doi:10.3969/j.issn.1000-0801.2013.01.012
    Asbtract ( 217 )   HTML ( 0)   PDF (1813KB) ( 266 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Analyzing the disadvantage of the two existing propylene-based service composition algorithms used in the converged process between telecommunication services and web services, a novel semantic-based double-chaining automatic composition algorithm was presented. Also, a distinct virtue in less time cost and higher composition success rate of the proposed algorithm than that of these existing related algorithms was proved by discussing its performance in detail. Additionally, a composing scenario of converged service was given to support the proposed DCA algorithm.

    Chain Routing Algorithm of Wireless Sensor Networks for Streetlight Monitoring System
    Tiaojuan Ren,Yourong Chen,Zhangquan Wang
    2013, 29(1):  82-88.  doi:10.3969/j.issn.1000-0801.2013.01.013
    Asbtract ( 241 )   HTML ( 0)   PDF (1915KB) ( 272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To save network node energy consumption and reduce data transmission delay in streetlight monitoring system, a chain routing algorithm for wireless sensor network(CRASMS)was proposed. The algorithm divided the monitoring region into several clustering regions according the information of nodes and monitoring region, successively and circularly selected a node to the cluster head node in each clustering region, established the star network in each cluster by the communication of cluster head node and sensor node. Finally, cluster head node received the data of sensor nodes, used the data fusion algorithm to reduce data redundancy, transmitted the fused data to sink node with multi-hop routing among cluster head nodes and transmitted the client's commands to the controlled nodes. The simulation results show that CRASMS algorithm keeps the advantage of PEGASIS algorithm in terms of energy consumption and the advantage of LEACH algorithm in terms of data transmission delay, overcomes the lack of PEGASIS algorithm in terms of data transmission delay and the lack of LEACH algorithm in terms of node energy consumption. It keeps the average node energy consumption and the average data transmission delay at a low level. Under certain conditions, CRASMS algorithm outperforms LEACH and PEGASIS algorithms.

    Research on Wireless Internet of Things for Highway Intelligent Transportation System
    Henghui Xiao,Jiongcheng Li,Shengpei Ding,Guiyu Li
    2013, 29(1):  89-96.  doi:10.3969/j.issn.1000-0801.2013.01.014
    Asbtract ( 279 )   HTML ( 6)   PDF (3044KB) ( 450 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For increasing severe traffic conditions, the traditional transportation technology has lost its effectiveness. Intelligent transportation system is a transportation service system based on modern electronic information technology, which is able to use the existing transportation infrastructure effictively, reduce traffic load and environmental pollution, ensure traffic safety and improve transport efficiency. Hence, intelligent transportation system has become a hot spot of research. Based on the technology of LTE and IPv6, application technology of wireless internet of things for highway intelligent transportation system was studied. The detailed framework and implementation plan of highway wireless internet of things were presented, and the corresponding feasibility was demonstrated.

    A Performance Research on the Threshold-Based Decoding Algorithm in Cooperative Communications
    Chenjie Huo,Shuxin Chen,Hengyang Zhang
    2013, 29(1):  97-102.  doi:10.3969/j.issn.1000-0801.2013.01.015
    Asbtract ( 208 )   HTML ( 0)   PDF (2304KB) ( 341 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the cooperative communication systems, a threshold-based decoding algorithm was proposed. A method for threshold-settings was given based on the analysis of the probability distribution of equivalent noise. The operation complexity of the proposed algorithm was analyzed theoretically. Both the error rate performance and the operation complexity were then simulated, and compared with existing algorithms. Furthermore, a strategy of dynamic threshold-settings, which was given on the basis of the analyses and simulations above, was applied to the proposed algorithm. The simulation results show that the proposed algorithm based on the dynamic threshold-settings is able to alleviate the cost of decoding resources in low SNR and get the optimal error rate performance in high SNR.

    Automatic Recognition of Barrage Interference in Frequency-Hopping Communication
    Yunbin Yan,Houde Quan,Peizhang Cui
    2013, 29(1):  103-108.  doi:10.3969/j.issn.1000-0801.2013.01.016
    Asbtract ( 248 )   HTML ( 1)   PDF (1865KB) ( 908 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Analyzing the interference environment in which the frequency-hopping(FH)communication system is located can help both the participants in communication take corresponding anti-interference measurements for specific types of interference. Follower jamming and barrage jamming are very useful jamming method to the FH communication system. The existing jamming-resisted algorithms may work well for certain interference. The proper anti-jamming measures can be implemented for different interferences. It focused on the barrage jamming recognition of the frequency hopping-Gaussian filtered minimum shift keying(FH-GMSK)communication system. Based on the interference characteristics extracted from the receiving signals in the view of time,frequency and time-frequency domains, a set of characteristic parameters was picked up, which were robust and insensitive to the recognition signal to jamming ratio(SNRR). And it can automatically identify the barrage jamming without the prior knowledge. The simulation result proves that there is a much more accurate recognition rate for the FH communication system under the usual interferences with the different SNRR.

    Overview
    Cooperative Jamming Technique: Proposal, Survey and Future
    Hang Long,Jing Wang,Yueying Zhang,Wenbo Wang
    2013, 29(1):  109-114.  doi:10.3969/j.issn.1000-0801.2013.01.017
    Asbtract ( 318 )   HTML ( 6)   PDF (1275KB) ( 463 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the research of physical layer security, cooperative jamming is a special and novel research area. The artificial jamming signal is introduced into the wire-tap system to interfere the eavesdroppers and decrease their signal-to-interference-plus-noise ratios, then the system secrecy capacity can be improved. The background and state-of-the-art of cooperative jamming were reviewed and the future potential research topics were pointed out. Currently, the artificial jamming signal can be divided into four categories. Additionally, in the research of cooperative jamming, self-jamming and introducing jamming systems are investigated with simple and complex scenarios.

    Operational Innovation Forum
    Selection of LTE's Duplex Mode for CDMA Operator
    Leming Hu
    2013, 29(1):  115-117.  doi:10.3969/j.issn.1000-0801.2013.01.018
    Asbtract ( 178 )   HTML ( 0)   PDF (451KB) ( 417 )   Knowledge map   
    References | Related Articles | Metrics

    The issue of selection of LTE's duplex mode for CDMA operator was discussed. Based on detail analysis on involved factors, it was pointed out that CDMA operator might suffer some serious problems if TDD mode was selected.

    Study on the Application of OTN Based IP Offloading Technologies
    Ruiquan Jing
    2013, 29(1):  118-122.  doi:10.3969/j.issn.1000-0801.2013.01.019
    Asbtract ( 230 )   HTML ( 0)   PDF (1889KB) ( 287 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The basic concept of OTN-based IP offloading was introduced, then the characteristics and advantages of IP offloading were analyzed. The key technologies related to the IP offloading were also discussed, including internetworking interface, connection establishment mode and OAM. Additionally, the economics of OTN-based IP offloading was analyzed.

    Performance Evaluation Method of Online Charging System
    Jinjuan Zhang,Na Chen,Hong Hu,Xinyi Xu
    2013, 29(1):  123-129.  doi:10.3969/j.issn.1000-0801.2013.01.020
    Asbtract ( 197 )   HTML ( 0)   PDF (934KB) ( 306 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Online charging system is a complex system with multi-application scenarios, which has high demands on performance. The traditional performance evaluation mode with individual indexes can not reflect the advantages and bottlenecks of the overall performance of OCS. A set of performance evaluation method for different test scenarios of OCS was proposed, which provided an effective algorithm to evaluate the performance indicators of different test scenarios. With this method, testers are able to get the overall performance of OCS and locate the bottlenecks of OCS preliminarily.

    Construction of Basic Network in Data Center Based on SDN Technology
    Qiang Wu,Xin Xu,Guoyan Liu
    2013, 29(1):  130-133.  doi:10.3969/j.issn.1000-0801.2013.01.021
    Asbtract ( 303 )   HTML ( 7)   PDF (1057KB) ( 729 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By appling SDN technology in data center, the resource was aggregated to become an ability pool through abstracting the hardware resource by using the intelligent software, which makes network more like software and more agility, and provides automatic, safe, flexible and effective scheduling resources ability to meet the cloud computing data center. The solution makes up for the cloud computing in the short plate of network virtualization, makes calculation, storage and network more integrated, and realizes fully automated deployment of resource, real-time resource scheduling and rapid network troubleshooting, and has the potential to increase new business at any time, speeds up the network innovation rhythm, and provides a new option for cloud computing center operators to reduce the maintenance cost and improve user experience.

    Fusion of IDC Operation Support System Design and Analysis
    Huazhao Liu,Xuefeng Chen,Qian Yu
    2013, 29(1):  143-148.  doi:10.3969/j.issn.1000-0801.2013.01.022
    Asbtract ( 251 )   HTML ( 4)   PDF (1849KB) ( 814 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By the establishment of IDC space, network, cloud computing various levels of resource element model, fusion process, data, operation and service, a standard, and loosely coupled IT support fusion architecture was designed and built, which laid the foundation for IDC intensive operation. On the basis of depth study of the IDC resource model, service mechanism and characteristics of products, IDC resources centralized control system and multi-wave cross domain construction scheduling process were designed. The application of IDCIMS in IDC intensive operation was focused on.

    Research on Customized Telecommunication Product Structural Modeling and Configuration Based on Modular Product Family
    Wenya Chou
    2013, 29(1):  149-159.  doi:10.3969/j.issn.1000-0801.2013.01.024
    Asbtract ( 344 )   HTML ( 2)   PDF (2118KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the plurality and individuation of the customers'demands, a customized telecommunication product configuration model was established on the basis of the modular product family structure GBOM. The configuration modules were categorized as basic configuration modular, essential modular and optional modular complying with the configurability of telecommunication products. Five-element information expression model was also constructed. Additionally, the attributes and variable of the module, module configuration rules and the match of module variables were analyzed. Based on customers' demands, the customized telecommunication product configuration was completed by determining and assigning values to the parameters of each configuration module in GBOM and constraint solving.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: