Please wait a minute...

Current Issue

    15 July 2013, Volume 29 Issue 7
    The Way Towards Transformation of Intelligent Pipeline
    Zhang Linfeng and Mei Yuping
    2013, 29(7):  1-4. 
    Asbtract ( 683 )   Knowledge map   
    Related Articles | Metrics
    The background of smart pipe strategy of China Telecom was introduced, the objects and contents of smart pipe were explained, the implementation technique was analyzed, the future was described, and the key to success was pointed out.
    Practice, Challenge and Solution of Smart Pipe Strategy for Telecom Operator
    Wang Lei and Xiao Sheng
    2013, 29(7):  5-9. 
    Asbtract ( 631 )   Knowledge map   
    Related Articles | Metrics
    Smart pipe is widely used at home and abroad, while also facing a series of problems and challenges. The key measures of domestic and foreign operators in the implementation of the smart pipe strategy were analyzed. It was defined that the domestic operator’s challenges in business development, customer demand, customer perception and personalized marketing. The other issues that the operators need to consider were also focused, such as the ability to integrate the existing network, optimize to enhance the product experience and develop innovative business models.
    Refining the Operation Strategy of Global Internet Service Based on Regional Routes
    Huang Zhuojun and Lu Quan
    2013, 29(7):  10-13. 
    Asbtract ( 638 )   Knowledge map   
    Related Articles | Metrics
    Theory and practice of the transformation from crude pipeline to smart pipeline is an important reform of the operator. Based on the characteristics of internet market and the difference of global resources, the operator can apply different strategies and qualities to the global internet service according to customer’s routing requires. By identifying the internet traffic with different regional routes, combined with the QoS policy deployment, the operator can give priority to safeguard the key resources and further provide billing distinguishing traffic flow to realize intelligent, difference operation.
    Study on Smart Pipe Enabler Based Network Capabilities Offering
    Lin Yilin,Zhang Linfeng,Wang Qingyang and Cai Kang
    2013, 29(7):  14-19. 
    Asbtract ( 779 )   Knowledge map   
    Related Articles | Metrics
    With the popularity of smartphones and the development of internet applications, operators are facing the risk of becoming a pipeline, making the network smarter is a crucial means for the network operators to defuse the crisis into an opportunity. Based on the study of fixed and mobile broadband network policy control system, a network capabilities offering architecture based on smart pipe enabler was proposed. With this architecture, the application can quickly call the pipeline capacity, simple access to the network resources, and provide important technical means for operator’s business model innovation.
    Network Load Balance for Performance Enhancement of HRPD Network
    Ruan Gongqin,Wang Yuezhen,Yin Ke and Liang Jiansheng
    2013, 29(7):  20-23. 
    Asbtract ( 664 )   Knowledge map   
    Related Articles | Metrics
    As one of key technologies of HRPD smart network, network load balance (NLB) could solve the load-imbalance phenomenon of network, which improving network performance and users experience. The network influence was analyzed when NLB technology was applied to HRPD network, including network capacity gains and users experience gains. The analysis results show that NLB could reduce the load of heavy load cell, and improve network performance.
    Studies on Traffics Analysis and Prediction Technology for Carrier-Grade IP Network
    Ou Liang,Chen Xun,Shen Chen,Huang Xiaoying and Lv Yi
    2013, 29(7):  24-29. 
    Asbtract ( 778 )   Knowledge map   
    Related Articles | Metrics
    Main-stream approaches used in traffics analysis and prediction for large-scale carrier-grade IP network were briefly introduced. Based on experiences in traffics engineering and network planning, a causation based loop-back prediction model was proposed which could reflect the factors of user behaviors, traffics distribution and economics level. Moreover, it can not only evaluate long-term tendency for traffics in backbone network, but also provide an important design tool for the carrier’s intelligent infrastructure.
    Simulation Research for PCI Automatic Allocation in LTE-Advanced System
    Sun Chengdan,Zhang Hongyan,Wei Yao,Li Yuan and Peng Mugen
    2013, 29(7):  30-36. 
    Asbtract ( 700 )   Knowledge map   
    Related Articles | Metrics
    With many low-power nodes deployed in the network, LTE-Advanced system becomes more complicated. PCI automatic allocation, as a key step before system operation, plays an important role in network planning and promoting system performance. Reasonable PCI is of great importance to cell search and synchronization. A PCI automatic allocation method, which is based on the nearest-distance and farthest-distance simultaneously, was proposed. By this method, PCI could be allocated reasonably, and synchronization signal interference could be avoided efficiently, with system performance promoted. System level simulation results show that,the proposal method performs much better in terms of both sector average spectrum efficiency and cell edge user’s spectrum efficiency, compared with the classical sequential PCI allocation.
    Mining Periodic Behaviors Based on GPS Data
    Fang Binxing and Liu Wei
    2013, 29(7):  37-42. 
    Asbtract ( 770 )   Knowledge map   
    Related Articles | Metrics
    The fast development of positioning technology and mobile computing is changing the way people live. People can connect the internet anytime and anywhere and it brings us amounts of GPS data representing the users’ location histories. A system was designed to mine periodic behaviors on GPS data. In the stage of data collection, smartphones running on Android will be used to collect GPS data and then the data will be sent to a HTTP server at regular intervals. In the data mining stage, it is aimed to mine reference spot and understand the periodic pattern based on different users’ GPS data. Also, stay points were used to represent the behaviors of users. With the sequence of stay points, frequent periodic patterns were mined and then these patterns were summarized. Finally, the experiments indicate our system shows efficient and stable performance with large numbers of GPS data.
    Research of Neighbor Discovery Security in IPv6 Network Protocol
    Wang Xianglin,Zhu Chen,Sun Dongmei,Li Mingyue and Shen Qingzi
    2013, 29(7):  43-48. 
    Asbtract ( 777 )   Knowledge map   
    Related Articles | Metrics
    According to the security flaws exposed by IPv6, the research based on open source Snort platform was introduced. The research was based on the characteristics of the IPv6 and adopted IPv6 analysis technology. Aiming at solving the problem that the attack behavior of discovery protocol for IPv6 network neighbors cannot be detected in the current open source intrusion detection system Snort. The HDU_IPv6_IDS intrusion detection system was researched and designed which could detect the attacks of neighbor discovery protocol in IPv6.
    A Unified Identification Service Network Model Based on P2P Network
    Sun Hanlin and Liu Jianhua
    2013, 29(7):  49-53. 
    Asbtract ( 638 )   Knowledge map   
    Related Articles | Metrics
    Searching and locating a service is one of the major challenges in the unified identification service. A novel identification service network model based on P2P (peer to peer) network was proposed. The model consists of two separated P2P networks, that are service querying network (SQN) and identifier querying network (IQN). Both are formed by identification service providers. SQN is used to search the unified identifier of a service, which support user access by its unified identifier, according to service keywords. IQN is used to find the related information of a unified identifier, and a user can select and access the service with the found information. The procedure of unified identifier registering, publishing, and service publishing was described. The whole procedure that a client visits an application service by its unified identifier was given as well. The topology of a unified identification service network in this model is concise, and the network is good at scalability and robustness.
    Research on Receive Scheme of Signal Data Based on SDTP
    Hu Rurong,Luo Jiangtao and Luo Peng
    2013, 29(7):  54-58. 
    Asbtract ( 790 )   Knowledge map   
    Related Articles | Metrics
    Aiming at the structure of signaling monitor system after evolution of standard, the receive scheme of signal data is suitable for the open interface between share platform and capture layer. The scheme was based on SDTP and designed sort and distribute functions. It solved the share problem of original signal data. Through the testing verification, it was feasible and efficient. It was used in A+Abis signaling monitor system for GSM networks.
    A Wireless Mesh Network Channel Assignment Based on Game Theory
    Zheng Pengyu,He Shibiao,Dai Haofeng and Zhang Hui
    2013, 29(7):  59-65. 
    Asbtract ( 756 )   Knowledge map   
    Related Articles | Metrics
    The channel assignment could affect the performance of wireless mesh network (WMN) greatly. In order to solve the problem of channel assignment, a game-based channel allocation algorithm was proposed. The algorithm modeled the nodes as the players, whose strategies were the allocations of channels, and the entire network’s throughput was regarded as the target of the utility function. The physical meaning of utility function is the successful transmission traffic given a traffic demand matrix. In order to optimize the utility function, the player could maximize the throughput of the network. Then an improved algorithm named GBCA-TP was proposed, which aimed at the insufficiency of GBCA. Simulation results based on NS2.34 show that GBCA and GBCA-TP have quite good performances on convergence, loss rate and throughput.
    A Distributed Public Opinion Analysis System Architecture
    Huang Yupeng,Yuan Chang,Hao Zhifeng,Cai Ruichu,Xiao Xiaojun and Lu Yu
    2013, 29(7):  66-71. 
    Asbtract ( 878 )   Knowledge map   
    Related Articles | Metrics
    With the rapid growth of internet data, system architecture based on distributed platform to effectively crawl was proposed and the data was analyzed. The architecture consists of three modules, crawler module, Web module and distributed platform module. Among them, the crawler module is responsible for data collection, Web module processes the simple job and gives a visual display for the analysis result, and the distributed platform module is for data storage and complicated job computing. The combination of three modules provides an excellent solution for mass data collection, storage and analysis on the internet. The effectiveness of the proposed framework was verified in the development of a public opinion mining system.
    Study of Optical Communication Network Access Ports by Using Intelligent Recognition Method
    Shen Yue,Shen Qidong and Zhou Zurong
    2013, 29(7):  72-77. 
    Asbtract ( 656 )   Knowledge map   
    Related Articles | Metrics
    The passive components of optical communication network access port is“blind spot” in communication network operation and control, which results in that a large number of optical fiber resources can’t be managed and utilized effectively, causes the maintenance and management of network is inefficient. Based on the analysis and study of the optical communication network access port, a solution was proposed by the using of the electronic label, intelligent electronic tags were used to replace the current paper labels in optical networks, which makes the optical communication network access port has the simple, convenient, accurate and reliable intelligent management capabilities.
    Study on Enhancements of LTE System for Diverse Data Applications
    Li Jinyong and Ouyang Huangbing
    2013, 29(7):  78-82. 
    Asbtract ( 769 )   Knowledge map   
    Related Articles | Metrics
    With sharply increased number of smart phone in current radio communication networks, there are wide varieties of data applications, of which the ratio of small data applications is increasing. Large problems to LTE systems in network efficiency and user experience were introduced. Due to the design principle of LTE is for high data rate, it is necessary to enhancement the ability of the networks to support small data applications. The discussion was based on the study of eDDA in 3GPP LTE R11. Firstly, the impacts of small data applications to LTE networks were illustrated. Then, it was discussed that discontinued reception and setting of RRC states transition were two of the most important techniques to improve the network ability. The possible further eDDA researches in LTE R12 work were also introduced at last.
    WLAN and WSN-Based Heterogeneous Network Collaborative Localization
    Yu Qin,Xiao Zhihui and Jiang Wei
    2013, 29(7):  83-88. 
    Asbtract ( 713 )   Knowledge map   
    Related Articles | Metrics
    Aiming at the specialties of the large building complex environment indoor positioning, the basic algorithm model of various wireless indoor positioning system was analyzed, and the realization method of several typical wireless indoor positioning system and its advantages and disadvantages were analyzed, in order to overcome the limitations of the mobile terminal in separatly positioning by using WLAN or WSN, and to realize accurate positioning navigation. Several indoor positioning researches both in and abroad in recent years were showed. The key problems of heterogeneous network based on WLAN and WSN in the study of collaborative localization algorithm were summarized. According to terminal location environment, the searching of WLAN and WSN at the same time and the improved network fusion localization algorithm were pointed out. A good foundation for the further research was made. On this basis, the research prospect of colocation method was also discussed.
    Research and Application of IoT in State-Owned Resources Management
    Chen Bin,Ai Haojun and Li Jingsheng
    2013, 29(7):  89-94. 
    Asbtract ( 668 )   Knowledge map   
    Related Articles | Metrics
    Along with the unceasing development of information technology, the internet of things(IoT) gradually becomes one of the important means for all walks of life to realize intelligent management. On the basis of the concept of IoT and the content of state-owned resources management, the applying methods and major contents of IoT in the field of state-owned resources management were deeply analyzed, and an overall design think, an architecture and main contents of smart state-owned resource information decision platform were put forward. The objective is to provide a direction for the development of smart state-owned resources management in the near future, and improve state-owned resources scientific management level and the efficiency of supervision.
    Research and Implementation of a Communication Software Practice Training Base in a University
    Zhang Xiaoyan,Cheng Baozhong and Sun Yi
    2013, 29(7):  95-97. 
    Asbtract ( 638 )   Knowledge map   
    Related Articles | Metrics
    Building a communication software practice training base at Beijing University of Posts and Telecommunications is an important step to cultivate engineering oriented and innovative communication software talent. The planning, construction of the training base, as well as the contents of the training course were described. The practice training results show that the building of the communication software practice training base has indeed cultivated and improved students’ software engineering ability and innovation ability.
    A Survey of Security for Satellite Communication System
    Guan Hannan,Yi Ping,Yu Minjie and Li Jianhua
    2013, 29(7):  98-105. 
    Asbtract ( 1128 )   Knowledge map   
    Related Articles | Metrics
    The security mechanisms for terrestrial network are not appropriate for satellite communication due to the particularity of space environment. The state of the art in security for satellite communication systems was surveyed. Firstly, the security vulnerabilities of satellite communication systems were presented. Secondly, various possible threats and countermeasures were analyzed among physical layer, data link layer, network layer and transport layer. Particularly, representative solutions for survivability, anti-jamming, authentication and key management were illustrated, and a comparison and assessment of their merits and faults were made. Finally, the research was presented which was still worth to do in the future.
    Recent Advances in Quality-Driven Video Delivery over IEEE 802.11 WLAN
    Wang Haidong
    2013, 29(7):  106-111. 
    Asbtract ( 644 )   Knowledge map   
    Related Articles | Metrics
    Quality-driven video delivery is the key to ensure the quality of service for video transmission over IEEE 802.11 WLAN. The goals of traditional communication technology are to reducing packet loss, increasing throughput, and so on. However, the feature of video flows and experience of users fail to considerate in these targets. The enhancements for QoS support being defined in the IEEE 802.11 standard draft were introduced first. The state-of-the-art scheduling algorithms based on polling and based on contention were described in detail.
    Discussion on Key Requirements to Optional Package Implementation of Electronic Channels of Operator in the Trend of MVNO
    Sun Kai,Zhou Ersheng and Guo Tao
    2013, 29(7):  112-116. 
    Asbtract ( 641 )   Knowledge map   
    Related Articles | Metrics
    In the background of open policy trend of MVNO, the traditional operator is beginning to launch optional package in the electronic channels. The traditional operators need to think about how to cope with the future competition from MVNO whose product is simple, flexible, low cost, and operation is efficient. Based on research of the development of optional package in the electronic channels of the domestic and foreign operators, the key requirements of optional package implementation of electronic channels of operator were analyzed, and then the positioning, evolution path, implementation strategy recommendations were proposed.
    Design and Implementation of Intelligent Processing Tool of Network Resource Data Acquisition
    Lin Wenfeng
    2013, 29(7):  117-124. 
    Asbtract ( 695 )   Knowledge map   
    Related Articles | Metrics
    Through establishing the mechanisms to collect device information from network and reconcile with the data in IRMS, the data quality of resource management system can be significantly improved. A more intelligent processing method for IP network was presented which could collect detail device information from network and generate more accurate resource data to correct the data errors in IRMS, and also a new topology discovery method to discover the logical circuits between the network elements through different network protocols was presented.
    Analysis of Ticketing Application Based on Mobile Internet
    Lin Ke,Luo Xuan and Tan Hua
    2013, 29(7):  125-130. 
    Asbtract ( 619 )   Knowledge map   
    Related Articles | Metrics
    Ticketing application based on mobile internet service, which also called moving electronic ticketing application, is an advanced branch of electronic commerce rising in recent years. It aims to provide convenient services to the users query, seat selection, ticket booking, payment and collection. It was given that comprehensive analysis from aspects of application features, platform architecture, technology, and cooperation and business models, to analyze the general model of ticketing application services, providing reference for the application service-related operators, investors and developers.
    Research on Automatic Software Download Technology of LTE eNode B System
    Zhu Xiaoguang
    2013, 29(7):  131-135. 
    Asbtract ( 671 )   Knowledge map   
    Related Articles | Metrics
    Automatic software download technology of LTE eNode B system was discussed, including its self- organizing network architecture, implementation process flow and software download planning automatical loading function. Through the X2 interface between the LTE eNode Bs to realize parallel software download, the LTE eNode B could load the adjacent LTE eNode B to improve the software automatic download efficiency of LTE network system and reduce the software download dependency for O&M system.
    A Novel Approach to Establish the Association Between cdma2000 1x Ev-Do Cells and Wi-Fi Hotspots
    Xiong Yinghui and Chen Ming
    2013, 29(7):  136-140. 
    Asbtract ( 676 )   Knowledge map   
    Related Articles | Metrics
    C+W wireless broadband service is one of the important services which are provided by China Telecom to keep its differentiative competitiveness. China Telecom has confirmed to use the strategy of adapting Wi-Fi to reduce cdma2000 1x Ev-Do networkflow and synergize cdma2000 1x Ev-Do development. However, it is still difficult to establish the association between Wi-Fi hotspots and cdma2000 1x Ev-Do cells accurately and promptly. So an accurate and economic approach to establish this association was reported. Moreover, it had been applied to improve C+W cooperative work successfully. Therefore, not only a most accurate shunt information and suggestion,but also improved distribution efficiency for C+W synergetic development and shunt was provided.
    Research of Resource Management Various Support Means and Strategies for Enterprise Intensive Operation
    Xiao Nan,Huang Yanyan,Sun Ling,Li Yuhong and Li Fei
    2013, 29(7):  141-147. 
    Asbtract ( 624 )   Knowledge map   
    Related Articles | Metrics
    On the basis of supporting enterprises intensivet operation, and combined with the present situations of enterprise operation and resource management system, the resource management various support means and strategies for enterprise intensive operation were proposed and a reference for the building of resource management system in other provinces was provided .
    Unified Interface Platform Used in China Telecom WDM Network Management System
    Liang Yihan,Zhou Han,Wang Jinlong and Li Fei
    2013, 29(7):  148-152. 
    Asbtract ( 689 )   Knowledge map   
    Related Articles | Metrics
    Based on the analysis of the problems in current multi-vendor network management system NBI(north-bound interface) model,the UIP (unified interface platform) was proposed and used in China Telecom WDM network management system. UIP can resolve the difference and incompleteness of NBI developed by different vendors with different models through the unified interface model, which can also reduce the difficulty and cost of development in system upgrading and maintenance. By using UIP, WDM network manangement system, configurated in different circumstances, needn’t develop many interfaces for different vendors and EMS versions. The new network can be monitored as quick as possible, and the time of removing the fault and costs of software development and maintenance can also be reduced.
    Collection Platform Plug-In Development Technology Acquisition Adaptation and Implementation
    Guo Taofeng,Zhang Yuan and Zhang Panxiang
    2013, 29(7):  153-156. 
    Asbtract ( 591 )   Knowledge map   
    Related Articles | Metrics
    Existing professional network management system exists the problems that duplication of data collection, much interface which hard for standardization management, and the scalability, reusability limited cause high IT costs and other issues. A unified collection platform based plug-in technology was built to capture adapter plug means to achieve the automatic loading and unloading, to improve collection adapter scalability and reusability, unified management collection adaptation, automatic matching and scheduling, to reduce the burden on the network element connections. That platform could improve collection quality and reduce the network management data collection system’s overall costs.
Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: