Please wait a minute...

Current Issue

    20 June 2017, Volume 33 Issue 6
    Topic:5G
    Buffer-aided multiple-antenna relay strategy for 5G systems
    Jun ZHAN,Qifa YAN,Xiaohu TANG
    2017, 33(6):  2-10.  doi:10.11959/j.issn.1000-0801.2017201
    Asbtract ( 375 )   HTML ( 5)   PDF (1413KB) ( 1001 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Buffer-aided multiple-antenna relay technology can provide the 5G communication system with wide coverage,and improve the system throughput performance effectively.A three-node multiple-antenna buffer-aided relay system was investigated and thus an optimal buffer-aided relay strategy,namely joint adaptive link selection and power allocation protocol,which maximizes the average throughput of system was proposed.The analytical results indicate that the optimal link selection policy depends only on the current instantaneous channel state information and the statistical channel information of related links,and the optimal power allocation scheme has equal power allocation for the transmitted data flows.The simulation results show that buffer used in relay could significantly improve the throughput of relay system compared to the relay system without buffer.In addition,the MIMO technique can achieve the multiplexing gain by multiple antennas,and then improve the throughput of buffer-aided relay system further.

    Development trend and technological challenges of millimeter-wave wireless communication
    Shiwen HE,Yongming HUANG,Haiming WANG,Wei HONG
    2017, 33(6):  11-20.  doi:10.11959/j.issn.1000-0801.2017202
    Asbtract ( 954 )   HTML ( 78)   PDF (1871KB) ( 1445 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the bottleneck problem of the scarcity of the traditional spectrum resource and the demand of wireless business that increases explosively,millimeter-wave (mmWave) communication with rich available spectrum resources become a promising way for the next generation broadband wireless cellular communication.However,the features of the large propagation path loss and severe oxygen and water molecules absorb of mmWave bring great challenge to the mmWave communication technology research.After analyzing the propagation properties of mmWave communication,a comprehensive analysis and summary of the research progress and radio front end were given out.Challenges of mmWave communication were profoundly analyzed and the corresponding research direction was put forward.

    An overview of low resolution quantization in wireless communication system
    Dan QIAO,Chaokai WEN,Feifei GAO,Shi JIN
    2017, 33(6):  21-33.  doi:10.11959/j.issn.1000-0801.2017203
    Asbtract ( 472 )   HTML ( 7)   PDF (902KB) ( 1076 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Compared to the 4th generation (4G) mobile communication technology,the 5th generation (5G) mobile communication technology will provide tens of times of peak rate increase,reaching up to several thousands megabit per second.The coming wireless communication systems face the problems of expensive hardware cost and high power consumption,which is becoming a bottleneck of high-rate communication systems.To cope with these problems,redesigning communication systems with the receiver using finite precision analog-to-digital converters (ADC) is one possible approach.The analysis of recent information theory for the AWGN channel shows that the performance loss due to 2~3 bit ADC acceptable.The application of low resolution quantization in wireless communication systems was focused on,an overview of the channel capacity and receiver design under low-precision ADC was provided.

    Green 5G ultra-dense wireless heterogeneous networks:guidelines,techniques,and challenges
    Yuzhou LI,Tao JIANG,Yang CAO,Zan LI
    2017, 33(6):  34-40.  doi:10.11959/j.issn.1000-0801.2017197
    Asbtract ( 1013 )   HTML ( 59)   PDF (758KB) ( 1768 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Ultra-dense wireless heterogeneous network (Ud-HetNet) has been recognized as one of the most promising 5G network-organization techniques to significantly improve the wireless capacity and thus solve the 1 000× data challenge faced by cellular networks.However,counter to the expected 5G vision,although benefiting from the spectrum efficiency (SE) improvement,ultra-dense network deployment significantly increases system energy consumption and thus decreases network energy efficiency (EE).The key theories and techniques for energy-efficiently deploying Ud-HetNet were investigated from two aspects of macroscopic network matching and microscopic resource aggregation by exploiting their overall network management capabilities and network diversity effects.Specifically,the overall design guidelines for green evolution were introduced firstly,and then three techniques,namely load-aware base station on/off switching,proactive caching,and interference-aware cross-network resource allocation,were proposed to improve the network EE.Open issues and challenges that need to be further explored were also discussed.

    Computational communication for three-dimensional dense coverage in 5G systems:architecture,approach and gain
    Jinkun CHENG,Wei CHEN,Yuanming SHI
    2017, 33(6):  41-53.  doi:10.11959/j.issn.1000-0801.2017118
    Asbtract ( 477 )   HTML ( 5)   PDF (4365KB) ( 850 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An integrated mobile computational communication architecture for three-dimensional dense coverage in indoor environment was proposed,and the proposed network architecture thus unified the computational electromagnetics,computational information theory and large-scale optimization into computational communication theory.Moreover,the implementation of the architecture was introduced.Specifically,the dense heterogeneous distributed radio access network was served as the wireless radio access network for the proposed computational communication architecture.Furthermore,computational electromagnetics based on channel propagation computing was implemented in parallel using the distributed computation resources.Given the exact channel propagation coefficients,the computational information theory based on channel capacity computation,as well as large-scale optimization based on multiuser network resource allocation were also achieved by the powerful computation resources.The proposed computational communication theory can thus compute the channel capacity and design power allocation scheme directly from propagation environment.

    Edge computing and network slicing technology in 5G
    Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
    2017, 33(6):  54-63.  doi:10.11959/j.issn.1000-0801.2017200
    Asbtract ( 1309 )   HTML ( 83)   PDF (1109KB) ( 6800 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.

    research and development
    Fast and live virtual machine migration in data center networks
    Teng MA,Yuxiang HU
    2017, 33(6):  64-72.  doi:10.11959/j.issn.1000-0801.2017129
    Asbtract ( 317 )   HTML ( 2)   PDF (1154KB) ( 641 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In data center networks,virtual machine live migration causes large volume of data transfer on core links of the network,which leads to performance degradation of the baring application and other background services.Based on inheriting the existing memory page de-duplication technique,a new search structure was presented composed of a counting Bloom filter with each bucket pointing to a link list,which overcame the problem of false positive of memory page lookup.Furthermore,a pruned algorithm was proposed to reduce the length of each link list and accelerate the lookup as much as possible to accomplish live and fast virtual machine migration in rack level.Experiment results show that the proposed method transfers less data on core links,takes less time to finish migration,and decreases the degradation of network applications caused by migration.

    Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
    Cong PENG,Jiangbo QIAN,Huahui CHEN,Yihong DONG
    2017, 33(6):  73-85.  doi:10.11959/j.issn.1000-0801.2017100
    Asbtract ( 330 )   HTML ( 2)   PDF (959KB) ( 569 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.

    Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud
    Jianhua LIU,Minglu LI,Dazhi LI,Luqun LI
    2017, 33(6):  86-96.  doi:10.11959/j.issn.1000-0801.2017125
    Asbtract ( 365 )   HTML ( 1)   PDF (968KB) ( 1066 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
    Guoyong DAI,Weiyuan SHI,Kezhen YING,Qingzhang CHEN,Keji MAO
    2017, 33(6):  97-104.  doi:10.11959/j.issn.1000-0801.2017184
    Asbtract ( 331 )   HTML ( 0)   PDF (732KB) ( 670 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.

    A feature selection method based on instance learning and cooperative subset search
    Xiaoyuan XU,Li HUANG
    2017, 33(6):  105-113.  doi:10.11959/j.issn.1000-0801.2017122
    Asbtract ( 295 )   HTML ( 1)   PDF (588KB) ( 456 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Feature subset selection is a key problem in such data mining classification tasks.In practice,the filter methods ignore the correlations between genes which are prevalent in gene expression data,additionally,existing methods are not specially conceived to handle the small sample size of the data which is one of the main causes of feature selection instability.In order to deal with these issues,a new hybrid,filter wrapper was proposed,and a cooperative subset search(CSS),was then researched with a classifier algorithm to represent an evaluation system of wrappers.The method was experimentally tested and compared with state-of-the-art algorithms based on several high-dimension allow sample size cancer data sets.Results show that the proposed approach outperforms other methods in terms of accuracy and stability of the selected subset.

    Blind recognition of short linear block code based on the weight of common polynomial
    Lihua SHEN,Jianlin ZHANG
    2017, 33(6):  114-120.  doi:10.11959/j.issn.1000-0801.2017194
    Asbtract ( 362 )   HTML ( 1)   PDF (797KB) ( 451 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the problem of a short linear block code in communication signal processing,an algorithm based on the maximal weight of common polynomial was proposed.Firstly,the received code sequence was divided with different lengths.Then the common polynomial of code words and xn+1 was obtained and filtered.The code length was estimated by the number of common polynomials.The weight was defined according to the probability of polynomial,and the generator polynomial was recovered according to the maximal weight.The validity and the performances of the blind recognition method were illustrated by the computer simulation results.The correct recognition rate of the algorithm is higher than that of the existing algorithms under the same bit error rate,and the method is applicable for both short codes and normal codes.

    Realization of smart home key management mechanism based on ECC
    Wenbin CHENG,Jia LIU
    2017, 33(6):  121-128.  doi:10.11959/j.issn.1000-0801.2017195
    Asbtract ( 336 )   HTML ( 3)   PDF (564KB) ( 754 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.

    A secure authentication method based on hash function for RFID system
    Chuan LI,Xuejun LI
    2017, 33(6):  129-137.  doi:10.11959/j.issn.1000-0801.2017108
    Asbtract ( 225 )   HTML ( 3)   PDF (756KB) ( 104 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Limited by the tag chip resource of a radio-frequency identification (RFID) system,the data and information security has been an important issue of an RFID system.The one-way Hash function provides an efficient and reliable approach for the identification and authentication of the RFID system.Based on the analysis of several typical Hash authentication protocols,a novel secure authentication protocol based on the Hash function was proposed.The protocol was intended to tackle the identification among the handheld RFID reader,tags and server.Specifically,the protocol utilizes the Hash function to achieve the mutual authentication between the above three objects.The performance analysis shows that the proposed protocol can resist the most known attacks with reduced storage capacity and lower computation overhead.Therefore,the proposed strategy effectively ensures the data and privacy security of the RFID system,achieving the bidirectional anonymous authentication between the terminal and server,which is very suitable for the distributed large-scale RFID system.

    Mobile RFID system authentication protocol based on one-way pseudo random function
    Biyuan JIAN,Daowei LIU
    2017, 33(6):  138-145.  doi:10.11959/j.issn.1000-0801.2017187
    Asbtract ( 311 )   HTML ( 3)   PDF (737KB) ( 779 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the cost,efficiency and security of mobile RFID system authentication,a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work,the agreement suffered counterfeit,desynchronization and other attacks was avoided.Finally,the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.

    summarize
    Development status and trends of cable TV networks
    Cui ZHAO,Cheng ZHANG,Feng OUYANG
    2017, 33(6):  146-153.  doi:10.11959/j.issn.1000-0801.201782
    Asbtract ( 729 )   HTML ( 19)   PDF (959KB) ( 1154 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    After bi-directional renovation,cable TV network not only transmits broadcasting TV signals,but also carries bidirectional broadband services.It’s the basic network that cable network operators achieve business development and transformation.Cable access network is the key point of cable network’s development,and bounds up with subscriber’s bandwidth requirement and cable access technologies.The current situations of domestic and international cable TV networks,cable access technologies and standards was surveyed,then the develop trends of cable access network was analyzed.Finally,an indigenously-developed gigabit coaxial cable access technology——HINOC was introduced.

    Operation technology wide Angle
    Traffic offloading technology in LTE network using MEC
    Jianmin ZHANG,Weiliang XIE,Fengyi YANG,Zhouyun WU
    2017, 33(6):  154-163.  doi:10.11959/j.issn.1000-0801.2017082
    Asbtract ( 1319 )   HTML ( 48)   PDF (717KB) ( 1497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the current demand of low-delay and local traffic in some vertical industries,a technical scheme of LTE local shunt based on MEC was proposed,and the feasibility of the scheme was analyzed.Compared with LIPA/SIPTO scheme in 3GPP,MEC-based local streaming scheme could realize the transparent deployment of MEC platform,and the terminal does not need to support multiple APN connections,so as to provide users with a“virtual LTE local area network”experience.Finally,the problems and challenges in the application of the scheme were discussed,which could provide reference for the follow-up research and development.

    L2/L3 equipment deployment scheme in PTN network architecture
    Xu DENG
    2017, 33(6):  164-170.  doi:10.11959/j.issn.1000-0801.2017130
    Asbtract ( 722 )   HTML ( 6)   PDF (1291KB) ( 710 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Relying on technological superiority,packet transport network(PTN)technology has become the main force in the construction of the transport network.In the early PTN network architecture,the L2/L3 equipment was deployed in the core layer.Therefore,it will face two challenges of poor security and low network performance.Based on China Mobile’s current network,the new PTN architecture which L2/L3 equipment deployed in the convergence layer was proposed,and compared the network security and load capacity with L2/L3 equipment deployment in different level.The result shows that the new PTN architecture is better in terms of network security and efficiency.

    Research and implementation of network architecture of LSN DCI EVPN VxLAN
    Yongming YAN,Liang ZUO,Bin XU,Haifeng XU,Kechuang YE
    2017, 33(6):  171-178.  doi:10.11959/j.issn.1000-0801.2017199
    Asbtract ( 583 )   HTML ( 17)   PDF (1183KB) ( 1275 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rise of virtualization technology,the architecture of traditional data center is disrupted.There exit a large number of interconnected needs among the data centers,such as data center active-active,data center redundancy,data synchronous backup,data migration,integrated data store,shared virtual resource pool,virtual machine drift and so on.Thereby,a large amount of east-west flow was generated,it is necessary to build a reliable,flexible,secure,and easy to deploy layer-2 and layer-3 network to meet the requirement of DCI (data center interconnection).The network architecture of EVPN VxLAN was analyzed,there hasn’t been successful large-scale business case for implementation of multi-vendor DCI EVPN VxLAN networking.Combined with current status of LSN data center of Shanghai Telecom,the deployment of DCI via existing network was proposed and achieved.

    Basic architecture and ways of deployment of NFV
    Zhenhui ZHAI,Wei QIU,Lihua WU,Qian WU
    2017, 33(6):  179-185.  doi:10.11959/j.issn.1000-0801.2017183
    Asbtract ( 663 )   HTML ( 19)   PDF (522KB) ( 1640 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of NFV,NFV deployment by telecom operators has become an inevitable trend.The ETSI NFV architecture and the requirements of interface function was analyzed,three ways of the NFV deployment were compared,and the requirements for the opening interface in the NFV were analyzed.At last,some suggestions and goals for the NFV deployment were presented.

    Analysis of software defined security model and architecture
    Chunmei GUO,Jun MA,Hao GUO,Xueyao BI,Ruhui ZHANG,Shaomin ZHU,Congyi YANG
    2017, 33(6):  186-192.  doi:10.11959/j.issn.1000-0801.2017074
    Asbtract ( 532 )   HTML ( 16)   PDF (1071KB) ( 1284 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.

    Exploration of automation of laboratory testing and management
    Huifang WANG
    2017, 33(6):  193-200.  doi:10.11959/j.issn.1000-0801.2017114
    Asbtract ( 249 )   HTML ( 2)   PDF (553KB) ( 650 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Laboratory testing is a high technical work and need to obey lots strict requirements in all aspects to ensure the accuracy of the work.In order to ensure the quality of laboratory work and improve the efficiency of work,laboratory testing and management system was explored and completed.The system improved the efficiency of the work,completed a large amount of repeated artificial work and reduced the error rate of the detection.Based on this,a test database was formed and a variety of functions were expanded.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: