Please wait a minute...

Current Issue

    15 October 2012, Volume 28 Issue 10
    Converged communications technology and Applications
    Research of Operation Mode and Implementation on Converged Communications
    Jianting Han,Xiangfei Hou,Zhengkai Zhang
    2012, 28(10):  1-7.  doi:10.3969/j.issn.1000-0801.2012.10.001
    Asbtract ( 288 )   HTML ( 6)   PDF (2448KB) ( 338 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article compares the current operation mode of telecom with the operation mode of the internet products. According to the analysis, it proposes that operating the converged communications with the internet mode by telecom is the approaching direction. Besides, this article proposes a management scheme to operate the converged communication based on the mobile internet and analyzes the concreted operation modes.

    Study of Key Technology to Promote Video Service Quality in Converged Video Communication
    Zhengkai Zhang,Wenda Ying,Jianting Han
    2012, 28(10):  8-13.  doi:10.3969/j.issn.1000-0801.2012.10.002
    Asbtract ( 185 )   HTML ( 1)   PDF (1842KB) ( 454 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To adapt the development of video communication under mobile internet, the paper studied the best video resolution transmitted in different network environment between different devices with different screens. Based on these studies, one method about video resolustion called screen adapting technology was proposed. We expect to promote user video phone experience effectively by using these means in existing conditions.

    Research of the Architecture and Key Technology of Converged Communication System Based on Short-Range Technology of Smart Phone
    Rui Liu,Jingxin Shen,Xianghui Liu
    2012, 28(10):  14-18.  doi:10.3969/j.issn.1000-0801.2012.10.003
    Asbtract ( 253 )   HTML ( 1)   PDF (1044KB) ( 537 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Today a tendency towards converged communication of short-range technology is very popular. The article analyzes the converged communication technology and its characteristics, and then proposes a solution of establishing Wi-Fi/Bluetooth connections based on NFC and introduces its advantages and shortcomings. At the end the article illustrates the future prospect of the application.

    Deeply Customization of Smart Phone to Realize Converged Communications on the Mobile Internet
    Jianyu Zhang,Yingchun Tang,Renxuan Wang
    2012, 28(10):  19-24.  doi:10.3969/j.issn.1000-0801.2012.10.004
    Asbtract ( 360 )   HTML ( 2)   PDF (2440KB) ( 425 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This article illustrates some basic methods of how to implement RCS, and analyzes the implementations based on handset customization. Then the article proposes a solution based on the deeply customized operating system on which can merge IM, SNS, SMS, telephone ability.

    Research and Analysis on Business Requirements and Development Strategies of Socialized Converged Communication
    Yi Luo,Jianting Han,Liang Wu
    2012, 28(10):  25-30.  doi:10.3969/j.issn.1000-0801.2012.10.005
    Asbtract ( 273 )   HTML ( 2)   PDF (1265KB) ( 358 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the days of mobile internet, the trend of converged communication service and SNS is becoming obvious. This article researches users' social psychology requirements and communication behavior requirements in terms of interpersonal relationship development, and proposes a socialized converged communication business requirement model. Based on this model, the article benchmarks the features of RCS and SNS, and proposes some development strategies of socialized converged communication.

    Research on Techniques of Cloud Service Applications in HTML5-Based Video Communication
    Zhiming Zhang,Wei Ke
    2012, 28(10):  31-37.  doi:10.3969/j.issn.1000-0801.2012.10.006
    Asbtract ( 285 )   HTML ( 5)   PDF (3125KB) ( 523 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of HTML5 technique increases user experience of web apps greatly, and tends to become the substitutions of native apps. This paper introduces main techniques of video communication, and proposes a solution for web techniques-based cloud service application in video communication by combining HTML5 and the existing IMS architecture. Then advantages of the solution are illustrated.

    Cloud computing column
    Towards SLA Management in Cloud Computing
    Qiongfen Qian,Chunlin Li,Jiajun Xiong,Qiang Li
    2012, 28(10):  38-45.  doi:10.3969/j.issn.1000-0801.2012.10.007
    Asbtract ( 239 )   HTML ( 3)   PDF (1511KB) ( 1354 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In cloud environment, customers' demands are changed and occurred autonomously and unpredictably, and they are out of control of the providers. Cloud providers have to meet the requirements. So, it is the key to enforce QoS guarantee for the future sustainable development of cloud computing technology, QoS guarantee is implemented by service level agreement enforcement. The SLA metrics classification in SLA management, resource metrics monitoring, and the SLA violation detection and avoidance management, SLA parameter mapping technologies are reviewed. Finally, the conclusion gives that the SLA-based resource management in cloud computing is the future direction of research.

    Optimal Configuration of Virtualized Resources in Cloud Computing Based on Continuous State-Space Approximation
    Yu Fu,Bo Yan,Xiaoping Wu
    2012, 28(10):  46-52.  doi:10.3969/j.issn.1000-0801.2012.10.008
    Asbtract ( 205 )   HTML ( 1)   PDF (2163KB) ( 245 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to deal with the difficulties in the configuration of virtualized resources in cloud computing, an optimal configuration method based on continuous state-space approximation is proposed. By the use of the time-extended LTS, the actions and state transition relations of the objects that participated in the process of virtualized resources applying and allocating could be precisely described. Then, according to the concurrency relation among the objects, a set of ODE is generated which can describe the variable trend of the objects during working time. By solving out the ODE, the amount of virtualized resources to meet the demand can be calculated out, and the virtualized resources could be dynamically configured according to the results, so as to realize the purpose of optimal configuration of virtualized resources.

    Study on User Capability Optimization Strategy of Desktop Cloud Based on SBC Model
    Bin Xu,Ningjiang Chen,Dandan Hu
    2012, 28(10):  53-57.  doi:10.3969/j.issn.1000-0801.2012.10.009
    Asbtract ( 258 )   HTML ( 2)   PDF (1169KB) ( 295 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The desktop cloud platform can allocate system resource for clients with good flexibility. But the efficiency of applications which run on the desktop cloud platform is restricted by the limited resource of the system. Through analyzing the specific characteristics of the desktop cloud SBC model, the strategy how to estimate the user capability based on SBC model is given. Based on the principle of calculating the maximum capability of the system, an algorithm which can optimize the policy of user capability is presented. It has been experimented in realistic business in telecom field, and the experimental results show that it can efficiently determine the most optimized user capability of the desktop cloud system.

    A Peer-to-Peer Traffic Classification System Model Based on Cloud Computing
    Yabin Xu,Yanping Li,Xizi Liu
    2012, 28(10):  58-63.  doi:10.3969/j.issn.1000-0801.2012.10.010
    Asbtract ( 291 )   HTML ( 5)   PDF (1588KB) ( 707 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Current proportion of P2P traffic in the network and the pressure to the network are analyzed in the first, and the problems of network traffic identification technology in practical applications are pointed out. Then,the realization of the principle of deep packet inspection and flow characteristics recognition technology are presented. A P2P traffic identification system model, which combines the deep packet inspection technology and the flow characteristics recognition technology, based on the open source cloud computing platform Hadoop and MapReduce distributed parallel computing architecture, is put forward. The experimental results show that, this model can effectively identify P2P traffic, and possesses a recognition speed faster than the single identification in the face of large flow.

    A Method for Radar Signal Sorting and Recognition Based on Cloud Model and Covering Algorithm
    Qiang Guo,Duo Yang
    2012, 28(10):  64-67.  doi:10.3969/j.issn.1000-0801.2012.10.011
    Asbtract ( 183 )   HTML ( 1)   PDF (1307KB) ( 276 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new method for radar signal sorting recognition based on cloud model and covering algorithm is proposed. In this method, firstly training for the radar signals with covering algorithm based on prior information, so radar signals are divided into different areas. Then it describes the membership relations between the test pulse signals and areas to achieve signal's sorting and recognition. This method solves the problem of radar signals which work in many different ways, and the uncertainty of overlap between different radar characteristic parameters in the current complex electronic environment. The computer simulation results show that, compared with the traditional radar signal sorting recognition, the proposed method is effective.

    System Architecture and Key Technology of Network Disk Based on Cloud Storage
    Yuexiang Yang,Wenping Deng,Jinsheng Deng,Yang Li
    2012, 28(10):  68-72.  doi:10.3969/j.issn.1000-0801.2012.10.012
    Asbtract ( 689 )   HTML ( 43)   PDF (1207KB) ( 2798 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network disk for mobile office and storage in enterprise networks or campus networks has a broad market, however, the traditional technology has various limitations in performance, security and scalability. To address these issues, a solution based on cloud storage is proposed: by using the distributed file system MooseFS, all data servers are integrated into a cluster;in terms of security, user rights management is implemented by SAMBA, the storage supports 128 bit AES encryption, and the transmission link is protected by SSH; finally, the system provides both Web and client application modes for users. The experimental results reveal that the system has significant advantages in performance, security, scalability and other aspects.

    A Rendering Cloud Frame Based on 3D-Graphics-Accelerating Technique for Virtualization
    Zonghui Wang,Shusu Shi,Wenzhi Chen
    2012, 28(10):  73-79.  doi:10.3969/j.issn.1000-0801.2012.10.013
    Asbtract ( 337 )   HTML ( 6)   PDF (2397KB) ( 697 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rendering cloud is one specific part of cloud computing. At the same time, as a typical example of the trend which extends compute-intensive applications to cloud, it has a bright future. The main works that are directly related to it now are classical rendering clusters and Nvidia's reality server platform. However, the former could not support virtualization, which is one of the bases of cloud computing, and the latter puts limitation on the hardware that a rendering cloud could use, plus it could not support different GPU to work together. This paper has an analysis on 3D graphics accelerating technique for virtualization, such as VMGL, VMware, Xen and VirtualBox. Then it compares the practicability of expanding 3D graphics accelerating solutions to rendering cloud. After that, the paper proposes a rendering cluster which is based on VMGL. At last, it has a further step on the rendering cluster and finally comes up with a flexible rendering cloud frame which is based on virtualization and can support different GPU to work together.

    research and development
    Research on the Packet Reordering in Transport Virtualization
    Yang Ge,Minghai Xu,Huan Chi
    2012, 28(10):  80-87.  doi:10.3969/j.issn.1000-0801.2012.10.014
    Asbtract ( 212 )   HTML ( 1)   PDF (2184KB) ( 185 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper introduces the problem of transport virtualization and the packet reordering on concurrent multipath transmissions for transport virtualization, analyzes the main reasons for the packet reordering from the point of static path selection mechanism, as well as dynamic packet scheduling model. A new path selection method based on round trip time(RTT) and a packet scheduling model based on weighted round-robin scheduling algorithm and delay equalizer technology are proposed. Theoretical analysis and simulation experiment results show that the scheme can significantly ease the packets reordering and effectively reduces the require of receiver buffer capacity.

    An OTP-Based Mechanism for Defending Application Layer DDoS Attacks
    Xi Ye,Wushao Wen,Yiru Ye
    2012, 28(10):  88-93.  doi:10.3969/j.issn.1000-0801.2012.10.015
    Asbtract ( 224 )   HTML ( 1)   PDF (1606KB) ( 426 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In this paper, we present the design and implementation of OTP-DEF, a kernel extension to protect web servers against application layer DDoS attacks. First of all, according to the load of web server, an OTP-DEF web server should fall into one of three following modes: normal, suspected attack or confirmed attack mode, and the OTP-DEF authentication mechanism shall only be activated when web server is in suspected attack mode. Secondly, we use OTP as our puzzle, which can automatically change at the certain time interval. It makes our proposal can defend copy attacks, replay attacks and Brute-Force Attack. Thirdly, OTP-DEF uses an intermediate stage to identify the IP addresses that ignore the test, and persistently bombard the server with requests despite repeated failures at solving the puzzles. Once these machines are identified, OTP-DEF blocks their requests, turns the tests off, and allows access to legitimate users who are unable or unwilling to solve tests. Finally, OTP-DEF requires no modifications to client software.

    Architecture Design and Realization of Dynamic Password System Based on the Mobile Phone
    Jianchang Guo,Maowen Guo,Yan Li
    2012, 28(10):  94-98.  doi:10.3969/j.issn.1000-0801.2012.10.016
    Asbtract ( 209 )   HTML ( 1)   PDF (1638KB) ( 435 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    This paper summarizes about the technology of dynamic password and the mobile phone token service. It analyzes and explores about the architecture, key technology and main business process of the carrier-class dynamic password system based on mobile phone. Finally, it representes about its application prospect.

    An Intelligent Device Controlling Model Based on RFID and HMM
    Chunyao Xu,Jiangong Zhang,Lun Yu
    2012, 28(10):  99-105.  doi:10.3969/j.issn.1000-0801.2012.10.017
    Asbtract ( 204 )   HTML ( 1)   PDF (2376KB) ( 328 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The devices in smart environments become more and more complex. Thus the users spend more time on configuration and correct usage. An intelligent device controlling model is discussed in this paper. By making use of sensor network including RFID-based location tracking system, the model can get the observation of user and device states. A task model is employed to decompose and describe user activities and the states of the device are annotated to sub-task as effect. The task mode is synthesized to a HMM by applying inference rules. When particular activities have been recognized, the sequences of device actions which are pre-defined in a state-action table will be executed by system.

    A Preliminary Exploration of Arising WebRTC Technology
    Zhenhua Qu,Huiyun Li,Haitao Zhang,Xianjun Long
    2012, 28(10):  106-110.  doi:10.3969/j.issn.1000-0801.2012.10.018
    Asbtract ( 634 )   HTML ( 35)   PDF (1404KB) ( 2002 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional way to acquire RTC ability is to install a software client or a browser plug-in. This may take an user some tedious steps and prevent the popularization of RTC applications. WebRTC is an arising new technology affiliated to the HTML5 standard which intends to provide pervasive access to RTC ability from an arbitrary browser. It works by integrating a fully functional audio/video RTC architecture into browsers. With this new technology, web application developers can implement powerful browser-based audio/video RTC applications by simply invoking a few JavaScript API. Currently, WebRTC is still at its early stage of development. This paper will give a preliminary exploration to WebRTC by addressing its background, current status, technical architecture, and the probable influence to the telecoms. It can give the reader a portrait of the development roadmap of WebRTC.

    Overview
    Research on Search Service for Physical Entities in the Internet of Things
    Haining Yu,Hongli Zhang,Binxing Fang,Xiangzhan Yu
    2012, 28(10):  111-119.  doi:10.3969/j.issn.1000-0801.2012.10.019
    Asbtract ( 259 )   HTML ( 3)   PDF (1670KB) ( 661 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The aim of internet of things is to integrate digital world and physical world seamlessly, search service for physical entities is one of key steps of the development of internet of things. Search service for physical entities enables users or applications to find those physical entities matching a set of requirements from huge amounts of dynamic physical entities. Physical entities, which are tightly bound to contextual information, not only contain static properties, but also real-time dynamic properties. Therefore, this paper proposes a metadata model to describe physical entity, its resource and entity service. Moreover, it considers characteristics used to estimate a search service for physical entities. Then, it refers to these characteristics to analyze and compare the representative search services for physical entities, and also discusses their advantages and disadvantages. Finally, it proposes open research issues and possible directions of future research related to the search service for physical entities.

    Survey on Socially Aware Based Cooperation Mechanisms in Delay Tolerant Network
    Huang Guo,Kun Wang,Yue Yu
    2012, 28(10):  120-127.  doi:10.3969/j.issn.1000-0801.2012.10.020
    Asbtract ( 228 )   HTML ( 1)   PDF (1630KB) ( 217 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Social selfishness of nodes is prevalent in delay tolerant network, which has negative impact on the efficiency and security of DTN performance. In recent years, since the first report of socially aware computing, more and more researchers propose to combine socially awareness, game theory and other methods with nodes' cooperation in DTN. Research on socially aware based cooperation mechanism in DTN becomes a hot issue both in academic and industrial communities. In this paper, we introduce the impact of socially selfish nodes on network performance. Moreover, we focus on the proposed cooperation mechanisms and categorized them into three kinds: game theory based, reputation based and virtual bank based. Each category is discussed in detail and the typical work is introduced. Especially, the features of these categories of cooperation mechanisms are analyzed and compared, which is helpful to both the academic researchers and DTN applications. Finally, future works about the socially aware based cooperation mechanisms in DTN are outlined.

    Shanghai Telecom "city optical network construction
    A New Loopback Detection Mechanism for Metro Optical Network
    Ming Jiang,Jie Zheng,Weijie Yang
    2012, 28(10):  128-132.  doi:10.3969/j.issn.1000-0801.2012.10.021
    Asbtract ( 191 )   HTML ( 2)   PDF (1152KB) ( 380 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Loopback is a critical failure in PON, especially in mass deployment of PON network. This article describes thetypical phenomenon in real network and provides the typical loopback failure model. Then the principle of loopback detectionand the disadvantages of current solution are analyzed. Finally, based on the hands-on experience in network management, wepropose a new loopback detection mechanism and the related procedure which are widely used in metro optical network ofShanghai Telecom.

    Operational Innovation Forum
    Building Telecommunication Enterprise-ClassApplications Using App Store Mode
    Yixiao Huang,Yong Liang
    2012, 28(10):  132-138.  doi:10.3969/j.issn.1000-0801.2012.10.022
    Asbtract ( 258 )   HTML ( 1)   PDF (2849KB) ( 337 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the signaling monitoring system’s building target “flexible data acquisition, unified data sharing,application quick copy”, to avoid the “chimney” signaling applications, learning from the currently popular “App Store mode” inthe individual market to structure the signaling monitoring systems. This article analyzes the root cause of the “chimney” system,then further analyzes the advantages of building enterprise-class applications on the App Store mode, preliminary discusses thekey point, the App Store architecture, application sharing and distributing processes.

    Design of University Dormitory Network in Shanghai
    Yongming Yan
    2012, 28(10):  139-143.  doi:10.3969/j.issn.1000-0801.2012.10.023
    Asbtract ( 320 )   HTML ( 12)   PDF (1230KB) ( 804 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The further development of informatization in university raises higher requirements on campus network. But, there’remany problems in existing campus network, such as low bandwidth, thin WLAN coverage, complexity of account maintenance.The paper presents the design scheme for new generation university dormitory network, including wired access, WLAN, BRAS,account maintenance and authentication, IPv6.

    Optical Fiber Fault Location for PON Based on OTDR
    Yu Yao,Jing Zhang,Le Zhang,Yanqin Wu
    2012, 28(10):  143-148.  doi:10.3969/j.issn.1000-0801.2012.10.024
    Asbtract ( 360 )   HTML ( 6)   PDF (2397KB) ( 1024 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Optical fiber fault location technology based OTDR is researched for the problems PON network is faced with. Basedon the location principle of OTDR, the test curve of OTDR will change because of optical fiber fault, then optical fiber faultlocation method for PON network is proposed and central measurement system is designed. Experimental platform has been builtto verify the effect and limitations of the method.

    An Accurate Method of Adding New Site Based on Monte-Carlo Simulation
    Hai Lin,Feilong Zhao,Jiangong Zhang
    2012, 28(10):  149-155.  doi:10.3969/j.issn.1000-0801.2012.10.025
    Asbtract ( 332 )   HTML ( 5)   PDF (2811KB) ( 301 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce CAPEX and avoid destructing the existing network, the operators pay more attention to improve the accurateness of add new site. In this paper, a new method of scattering users based on measurement report(MR)is present, which can promote position accuracy to 100 meter. After locating the weak coverage or high load areas, Monte-Carlo simulation is employed, and then users are scattered in these areas repeatedly, and the optimal setting and comprehensive value is calculated based on genetic algorithm, which can be used as threshold to decide to add a new site with optimal position and configuration. Then a case is used to validate the method at the end.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: