Please wait a minute...

Current Issue

    15 November 2012, Volume 28 Issue 11
    SDN, Key Trend of the Future Network Evolution
    Zhao Huiling,Feng Ming and Shi Fan
    2012, 28(11):  1-5. 
    Asbtract ( 1181 )   Knowledge map   
    Related Articles | Metrics
    Now the SDN becomes the hot topic in the telecom world. It is based on the separation of the control plane and data plane, also introducing the programming between network and service. So SDN can promote the network virtualization and device uniformity, as help to reduce the CAPEX/OPEX and release time for new service. SDN is the key trend for the future network evolution obviously even in its early stage now. The OpenFlow, which is the typical protocol in SDN is maturing step by step with the work in ONF. Also some R&D related with SDN is in progress all over the world, indicating the right future of the SDN.
    LTE-Hi——Evolution Towards Wireless Mobile Broadband
    Chen Shanzhi and Qin Fei
    2012, 28(11):  6-12. 
    Asbtract ( 2266 )   Knowledge map   
    Related Articles | Metrics
    With the explosion of mobile broadband (MBB) data traffic requirement, small cell solutions, such as LTE-Hi, for the indoor/hotspot scenarios become the hot topic in 3GPP. The development trends of wireless mobile broadband, including services and applications trends, marketing requirements were firstly analyzed. And then the target and the position of LTE-Hi in the mobile network were given, considering the relation of LTE-Hi and Marco coverage network. Privileges of LTE-Hi related to other technologies were also discussed. Based on the target and position, the general technical requirements and some of the key technology features of LTE-Hi were listed. In the end, standard and industry development routes of LTE-Hi were provided.
    Study on Heterogeneous Network Technologies
    Chen Xiaodong,Wu Jinlian and Wang Qingyang
    2012, 28(11):  13-18. 
    Asbtract ( 1003 )   Knowledge map   
    Related Articles | Metrics
    Since the mobile broadband traffic is growing rapidly, but the frequency and station for mobile network have more and more shortage. Heterogeneous networks are efficiency means of offload traffic in hotspots, and will become the long term development trend of the radio networks. When as HetNet brings interference and mobility problem at the same time. This article studied the network solution and key technical issues of HetNet, provided advices on network deployment and the applications of technologies.
    Study on LTE-CDMA Inter RAT SON Solutions
    Wu Jinlian,Xiong Shangkun and Wang Qingyang
    2012, 28(11):  18-22. 
    Asbtract ( 948 )   Knowledge map   
    Related Articles | Metrics
    Considering that LTE and 3G network will be long-term coexistence, inter LTE-3G SON will bring many benefits. For example, the ability of load balance will help to offload LTE traffic from/to 3G network. Automatic neighbor relationship will accelerate the LTE network deployment, and MRO can help to improve the handover performance between LTE and 3G. This article studied the inter RAT SON function for LTE-CDMA scenario, including the usecase requirements, the potential solutions and the problems need to be solved.
    Scheme of Load Balance in Idle State Between eHRPD and E-UTRAN
    Li Lupeng,Xiong Shangkun and Wang Qingyang
    2012, 28(11):  22-28. 
    Asbtract ( 995 )   Knowledge map   
    Related Articles | Metrics
    The necessity of load balance in idle state was put forward firstly. Then it introduced various schemes of load balance between eHRPD and E-UTRAN,and analyzed the advantages and disadvantages of various schemes. Finally, the reasonable proposal about it was put forward.
    Analysis of the Policy of PCC Deployment for Service Control in LTE
    Yuan Penghui,Long Biao and Chen Jie
    2012, 28(11):  29-31. 
    Asbtract ( 913 )   Knowledge map   
    Related Articles | Metrics
    The PCC architecture and function were introduced firstly, and then the capability and mechanism of service assurance based on PCC architecture were analyzed and the service assurance procedures were shown for a classical video service owned by operators. Finally, suggestions on the deployment of PCC in LTE was presented.
    Study on Broadband Trunking System Evolution and Key Technology Based on LTE
    Chen Yuan
    2012, 28(11):  32-36. 
    Asbtract ( 872 )   Knowledge map   
    Related Articles | Metrics
    The development of trunking system was reviewed and three evolution paths for the broadband trunking system were proposed firstly. Based on the analysis, a superposition of trunking system and LTE may be the best one. The key technology and its application suggestions related to the path were also discussed.
    Analysis on Key Factors of the Mobile Device During the Evolution of CDMA Towards LTE FDD
    Dai Guohua,Zhang Ting,Liu Zhaoyuan and Zhao Zibin
    2012, 28(11):  36-41. 
    Asbtract ( 866 )   Knowledge map   
    Related Articles | Metrics
    This paper introduced the development progress of LTE multimode mobile devices, analyzed the critical problems that may be present during the evolution of CDMA towards LTE FDD, and proposed practical solutions on the basis of present situation.
    Research on Efficient and Reliable Service Composition in Mobile Ad Hoc Networking Based on Risk Analysis
    Hu Haiyang,Lv Qian,Yu Dongjin and Zhao Gehua
    2012, 28(11):  42-51. 
    Asbtract ( 922 )   Knowledge map   
    Related Articles | Metrics
    In the mobile ad hoc networks, the reliability of service composition is always less than the one in static network environment because of the mobility of nodes and the dynamics of network topology. In order to improve the reliability of service composition, current research works mainly focus on minimizing times of interruption and the services re-composition, and pay little attention to estimating the reliability before composition. By taking advantages of the mobility prediction for mobile nodes, this paper proposed approaches to find the service composition scheme with low failure risks before the composition is performed. It proposed a failure risk model to estimate the reliability of service composition, and then presented three algorithms for performing service compositions based on the reliability estimated. Finally, by comparing with the optimal scheme, we conducted experiments to evaluate the features of our methods.
    Evaluation Method for Future Network Quality of Service Based on Multi-Layer Federation
    Chen Xiaoming,Wang Huiqiang,Lv Hongwu and Zhu Qiang
    2012, 28(11):  52-59. 
    Asbtract ( 914 )   Knowledge map   
    Related Articles | Metrics
    Accounting for the diversity and complexity of future network applications, an evaluation method for future network quality of service(QoS) was proposed based on the existing QoS metrics of transport layer and the network layer. And then a multi-layer federation evaluation system was created. On this basis, the QoS of each layer was assessed on the use of improved analytical hierarchy process. Furthermore, D-S evidence theory was used for the reduction of the overall evaluation system proposed. Finally, the experiments showed that the evaluation method was effective and feasible.
    Design and Implementation of IVI Translation Mechanism Based on Netfilter Framework
    Wang Xianglin,Zhu Chen,Shen Qingzi and Chen Guofeng
    2012, 28(11):  60-66. 
    Asbtract ( 1018 )   Knowledge map   
    Related Articles | Metrics
    The transition of IPv4 to IPv6 needs to experience a long period of time. Therefore, a suitable IPv6 transition strategy for the intranet must be researched to ensure the normal communication between IPv4 network and IPv6 network. On the basis of several common transition technologies, this paper uses Netfilter expansion module in conjunction with Xtables-addons plug-ins, in order to achieve the program of the IVI mechanism quickly and efficiently. Then a detailed analysis to the concrete realization of the IVI matching module and IVI object module in this program is given. And it is applied to the test in a real network. IVI translation mechanism can effectively solve the communicate problem between IPv4 host and IPv6 host. It provides practical application reference to deployed intranet transition network widely.
    SaaS Software Development Model with App Store and Web Mashup
    Feng Xiang,Yin Yueming and Wu Yonghe
    2012, 28(11):  67-73. 
    Asbtract ( 884 )   Knowledge map   
    Related Articles | Metrics
    Compared to the success and innovation of SaaS software delivery model, SaaS software develop model need a breakthrough to meet the different needs of the changing and personalized requirement for various business domains. By applying web mashup technology, this paper proposed a software composition architecture which adds a new composition layer in web front-end. In this architecture, web pages were treated as fine grained software entities which are loosely coupled;they were designed to run in both of standalone and mashup model, and could be composited on-demand at runtime. The software entity could be provided by different providers, and could be distributed anywhere on the internet. This paper also introduced third-party contribution mechanism and application store model to enhance individual needs for SaaS application with developers’ wisdom. The prototype system could verify the feasibility and practicality of the model.
    XSeluge: A Secure Online Code Dissemination Algorithm Based on Network Code
    Xie Mande and Zhang Guoping
    2012, 28(11):  74-80. 
    Asbtract ( 964 )   Knowledge map   
    Related Articles | Metrics
    According to the drawbacks of the existing secure online code dissemination, a secure online code dissemination algorithm, called XSeluge, was proposed. XSeluge bases on XOR network code and employs the secure framework of Seluge. In XSeluge, the base station firstly divides the program image into a series of pages which are further divided into the packets with fixed-size and computes the hash value of each packet and places it in the proper position. Next, the base station begins the code dissemination with a digital signature. To maximize the number of packets which can be encoded successfully in a time slot, the node chooses the optimal code scheme by the neighbor node table introduced in this paper. Upon receiving the data packet, the node decodes and authenticates it by computing and comparing its hash value. To defense against the attacker where vicious nodes request continuously a data packet from some nodes and send continuously some forged data packet to some nodes, XSeluge expands the structure of original neighbor node table. Based on the new neighbor node table, a receiving counter and sending counter are introduced. The experiment results show XSeluge has similar secure performance with Seluge. Furthermore, XSeluge can reduce total the transmitted data packet during the code dissemination.
    Warehouse Delay Tolerant Network Routing Algorithm Based on Location Information
    Zhang Yonghui,Lin Zhangxi,Liu Jianhua and Liang Quan
    2012, 28(11):  81-85. 
    Asbtract ( 952 )   Knowledge map   
    Related Articles | Metrics
    Warehouse network must deal with frequent network disruption and network segmentation, which can be solved with DTN. However, scheduled ferry mobility is of probabilistic uncertain, so that the knowledge oracle in warehouse network, that DTN routing algorithms need, shows complex. So a space-based routing algorithm with location information is proposed to eliminate it. Access router information matrixes in path predictable environment are designed to decided k-anycast router aggregate, so that the generalized k-anycast can moderate traffic explosion. Utility maximization model allocates bandwidth resources to k eligible access routers in access period, with DTN custody transfer, can be transmitted packets simultaneously to multiple destination. Simulations show that it gains better transmission performance and robustness and more flexibility to support warhouse network topology changes.
    Research and Implementation of Web Service Registration Method Based on Petri Network
    Zhang Zhengming,Ma Bingxian and Xiang Dongming
    2012, 28(11):  86-91. 
    Asbtract ( 867 )   Knowledge map   
    Related Articles | Metrics
    From the point of software implementation, and considering the question that how Petri network of web service composition can be automatically generated, the method of web service registration based on Petri network was proposed in this paper in order to make Petri network theory and method widely applied in service composition. Firstly, on the basis of the ontology which had been established, the parameter names of the web services were unified. Secondly, according to the input and output of web service, the Petri network could be drawn. Meanwhile, the semantic information was added to the places in Petri network of web service to create the PNML+OWL file. Finally web services’ related information and PNML+OWL file were transmitted to the server-side to be registered and saved. This method can laid the foundation for the automatic generation of Petri network of web service composition, and is further illustrated in this paper, using the flight ticket query service and tourism composite service.
    Quantum Proxy Signature Scheme with EPR Entangled States
    Zhang Jun
    2012, 28(11):  92-97. 
    Asbtract ( 847 )   Knowledge map   
    Related Articles | Metrics
    The proxy signature provides that the original signer can delegate his signing permission to a proxy signer, and the proxy signer can replace the original signer to sign the message. It can ensure the information secure and data protection in cloud computing. Until now, almost all the traditional proxy signature schemes were based on the mathematic difficulty problems, once the quantum computers are invented someday, these schemes can be broken out easily. This paper proposes a new quantum proxy signature scheme, which is based on the quantum one-time pads and quantum teleportation protocol. Comparing with the traditional proxy signature, the new scheme can resist the Shor’s algorithm by using of quantum encryption; comparing with other quantum signature, the scheme can avoid being disavowed by the receiver; the new scheme uses a special quantum encryption to ensure the receiver cannot forge the signature.
    Research of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wirless Mesh Network
    Xiong Xiaofeng,Yin Fei,Yue Guangxue and Liu Jiansheng
    2012, 28(11):  98-102. 
    Asbtract ( 1081 )   Knowledge map   
    Related Articles | Metrics
    According to the existence of restrict and mutually dependent of channel and interfaces of node, the “ripple effect” leading to the link invalid and the relation of presence of temporal between the main business node in network. This paper proposes an spatial-temporal multi-channel algorithm for wireless mesh network based on greedy algorithm by taking the influence of the allocated channel of previous subset timing on the next subset timing channel allocation into account. According to the principle of the greedy algorithm, this algorithm makes the channel work in parallel to increase overall network throughput by allocating unallocated channel and trying not to change the allocated channel to reduce the time of switching channel. According to experimental simulation, it compares static multi-interface multi-channel allocation algorithm which can inhibit the “ripple effect” and the invalid link and spatial-temporal multi-interface multi-channel allocation algorithm. The results show that the throughput of entire mesh network is improved obviously and increased with the decrease of the number of network service node and the increase number of available channels.
    A Scheme of Multi-User Searchable Encryption in Cloud Storage
    Wang Yingkang and Luo Wenjun
    2012, 28(11):  103-107. 
    Asbtract ( 1217 )   Knowledge map   
    Related Articles | Metrics
    Searchable encryption can be used to search the encrypted data which is stored in the cloud. By using searchable encryption, we can guarantee the security of the data without losing operability. Multi-user searchable encryption enables users to share their data to others without revealing their data to the cloud server. In our scheme, we make the encrypted data re-encrypted when the data is required, but not every time the user sends data to the cloud server. That can make our scheme more efficient. We use a different way to generate the trapdoors, and the trapdoors in our scheme is easy to compute and shorter than the existed scheme.
    Design and Implementation of Data Synchronization Module of OMP Management Subsystem
    Chen Yicheng,Li Wei and Wang Jing
    2012, 28(11):  108-111. 
    Asbtract ( 948 )   Knowledge map   
    Related Articles | Metrics
    OMP(open mobile platform) management subsystem is mainly responsible for data maintenance and management between platform’s subsystems. The data synchronization module is an important part of the management subsystem. A low coupling and high performance architecture for the data synchronization module is designed, and the module is implemented with Axis2, Java which is applied to the practical subsystem.
    Optical Fiber Communication Tapping Methods and Precautions
    Zhang Ruirui
    2012, 28(11):  112-115. 
    Asbtract ( 1254 )   Knowledge map   
    Related Articles | Metrics
    In recent years, with the rapid development of optical fiber communication network tapping technology, optical fiber communication security is facing new challenges. There are a number of known tapping methods of extracting or injecting information into a fiber link, while avoiding detection. Therefore, it is necessary to study optical fiber network tapping technology and its defensive measures. In this paper, the tapping cases in recent years were summarized. Optical fiber network tapping methods, both invasive and non-intrusive, were introduced. Optical fiber network security myths were analyzed. Finally, some measures to prevent fiber tapping or to nullify the significance of information tapped from fiber were also discussed.
    Researching Review on Routing Technologies of Next Generation Satellite Network
    Mao Tengyue,Xu Zhengquan,Zhu Rongbo and Hou Rui
    2012, 28(11):  116-120. 
    Asbtract ( 953 )   Knowledge map   
    Related Articles | Metrics
    The various challenges encountered by routing technology of next generation satellite networks had been analyzed. The routing technologies development of next generation satellite networks had been explored and discussed. The researching hot-topics and future works of the next generation satellite networks had been concluded and prospected.
    Investigation on Abnormal Light Emitting ONU Detection Mechanism in MONET
    Liang Yi,Jiang Ming and Yang Weijie
    2012, 28(11):  121-125. 
    Asbtract ( 1032 )   Knowledge map   
    Related Articles | Metrics
    In the large scale MONET(metro optical network) construction, one of the critical issues may crash PON network stability is, software or hardware failures resulting in abnormal light emitting ONU, which impact the quality of services carried by PON severely. Therefore, it’s important to find out an effective approach to detect the abnormal light emitting ONU and get rid of it. This is significant to the development of FTTH as well. This paper described a creative fault detection mechanism based on the thorough analysis to root causes of abnormal light emitting ONU.
    Key Technologies and Network Structures of Application Channel Service in FTTH Network
    Zhang Jianping,Chen Yi and Zhang Jiexin
    2012, 28(11):  126-131. 
    Asbtract ( 948 )   Knowledge map   
    Related Articles | Metrics
    It analyzed new demands from customers and carriers in this paper. And some key technologies of application channel services in MONET were studied and several problems in the deployment of application channel were summarized. Finally, it is introduced that application channel was implemented in Shanghai Telecom MONET.
    Five-Dimensional Model of Application Monitoring
    Xu Yangfan
    2012, 28(11):  131-135. 
    Asbtract ( 845 )   Knowledge map   
    Related Articles | Metrics
    The paper explained the development trend of information technology characteristics, the analysis of IT management challenges, sumed up “three levels” of application monitoring, researched and put forward “five-dimensional model” of application monitoring,and verified the feasibility by examples.
    Discussion on IMS Technology Advantage in the IP Applications
    Zeng Chunxiang,Yi Jiangjun and Ji Hong
    2012, 28(11):  136-141. 
    Asbtract ( 941 )   Knowledge map   
    Related Articles | Metrics
    In the conditions of triple play, and full service operation of the complicated competitive environment,the domestic carriers choose IP multimedia subsystem (thereafter shortened by IMS) as a mainstream to transform full service and evolve next generation network. Successively, they begin to exploit IMS construction, provide government, enterprises, family and person with IP integration service based on the advantages of IMS technology. In this paper, it described the advantages of IMS technology which would offer people the improvement of information and experience.
    Performance Analysis of Smart Antenna in TD-LTE
    Ma Ying,Jin Jing and Liu Guangyi
    2012, 28(11):  142-147. 
    Asbtract ( 1018 )   Knowledge map   
    Related Articles | Metrics
    Multiple input and multiple output(MIMO) is a key technology to provide high data rate and high spectrum efficiency for mobile communication system. LTE system has defined many MIMO transmission modes to adapt to different application scenarios. Beamforming based on the non-codebook pre-coding is the core technology of TD-LTE, which can make full use of TDD uplink and downlink channel reciprocity characteristics, and significantly improve the system throughput and spectrum efficiency. This paper theoretically presents the performance gap between the two-antenna and eight-antenna in TD-LTE system, and analyzes the possible challenges when eight-antenna beamforming is deployed in commercial mobile network. Then based on the product implementation, the broadcasting beam optimization, compensated channel quality estimation, coordinated SRS, modified multiuser pairing algorithm and receiver enhancement are proposed to improve the system performance, and the 10% to 30% performance gain is achieved.
    Research on Scalable and Adaptable Server-Provisioning-Data Configuration & Activation Method and Application
    Hu Jungang and Liu Shufeng
    2012, 28(11):  148-153. 
    Asbtract ( 797 )   Knowledge map   
    Related Articles | Metrics
    Telecom industry faces a rapid growth and the telecom service providers keep enhancing the requirement for the operation system. As one of the most important factors of OSS, the single service fulfillment method is difficult to adapt to full-service-operation. To rapidly support the new tele-service provisioning process and full-service product provider, it is necessary to build up a server-provisioning system, based on the network resources system and service fulfillment system. The method and application of scalable and adaptable server-provisioning through the combination of different provisioning scenes in the full-service-operation environment are explained in the paper.
    Research of End to End Service Quality Indicator System Establishing and Evaluating Method
    Li Jiazi and Wen Tao
    2012, 28(11):  154-159. 
    Asbtract ( 1021 )   Knowledge map   
    Related Articles | Metrics
    An end to end service quality indicator system model was brought out from telecommunication operator’s point, including user experience, service performance, network capabilities and etc. Also every layer of indicators establishing and using method was given.
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: