Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers ...Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC.展开更多
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ...The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.展开更多
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of...With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.展开更多
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g...Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.展开更多
The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem app...The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.展开更多
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
The rapid growth of cloud computing and mobile Internet services has triggered the emergence of mobile cloud services. Among many challenges,QoS management is one of the crucial issues for mobile cloud services. Howev...The rapid growth of cloud computing and mobile Internet services has triggered the emergence of mobile cloud services. Among many challenges,QoS management is one of the crucial issues for mobile cloud services. However,existing works on QoS management for cloud computing can hardly fit well to the mobile environment. This paper presents a QoS management architecture and an adaptive management process that can predict,assess and ensure QoS of mobile cloud services. Furthermore,we propose an adaptive QoS management model based on Fuzzy Cognitive Maps ( FCM) ,which suitably represents the causal relationships among QoS related properties and cloud service modes. We evaluate the proposed solution and demonstrate its effectiveness and benefits based on simulation work.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,t...A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.展开更多
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person...In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.展开更多
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also...With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.展开更多
In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks ...In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks and network cooperation issues emerge accordingly. This paper gives the solutions to the abovementioned problems: The video signal enhancer is used to improve the image quality and reduce power consumption; the radio frequency interference is reduced by avoiding interference caused by in-band leakage and by out-of-band block; and the effective cooperation between dual networks can be fulfilled by re-designing communication architecture, processor, service logic and User Interface (UI).展开更多
Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterpri...Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterprise customers. Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node (INON)/Distributed Service Network (DSN). The core network will be flat, with an evolution route from Internet High Speed Packet Access (I-HSPA) to System Architecture Evolution (SAE), and even the Internet can be used as the core network. The low-cost mobile phone can be accessed to HTTP Internet by using 'client end software + portal'model with cloud computing. Flat rate will be the only fee model to be accepted by customers, and cheap and reasonable prices will contribute to the development of mobile Internet.展开更多
This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the...This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the online application software store is becoming an important platform for service delivery. The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world. Based on the smart terminal, the competition for platform system from the hardware platform to the operation system, the middleware and the applications platform have been in shape globally. The competition in the terminal platform of mobile Internet is moving from close to open, from uni-controlled by one company to open and cooperated by the whole industry. China should forge a terminal platform system and the ecosystem for the mobile Internet industry, and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal. The breakthrough should start from the application software, stepping from the top to the bottom platform, to extend the industry chain.展开更多
Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, t...Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, the key technologies for the smart phone, such as the application security management framework, application software authentication mechanism, interoperating capability and dynamic power management should be paid much attention to. The mobile phone vendors are gradually transforming into platform providers who will offer the support for services, including hardware, protocol stacks and storage, instead of providing specific services. Meanwhile, operators and Internet service providers will become the main body of service development.展开更多
On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and ...On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and research goals in this field. It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols, structural characteristics of changing networks, multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.展开更多
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three...The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.展开更多
With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The devel...With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The development of new technologies such as Mashup and mobile widgets will enable better service for users and new business models, bringing benefits for the industrial chain members including operators, vendors, Content Providers/Service Providers (CPs/SPs) and Internet application providers. The mobile Internet and the traditional Internet not only compete for contents and services, but also cooperate with each other; and the mobile Internet services should focus on mobile applications to avoid the homogenization with traditional Internet service.展开更多
The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application sof...The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.展开更多
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
文摘Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC.
基金This manuscript has sponsored by(531-541009)from the Advanced Institute of Finance,Sun Yat-sen University.
文摘The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.
基金partially supported by the Zhejiang Provincial Natural Science Foundation of China(No.LY16F020010)the Zhejiang Key Discipline Fund of Computer Applied Technology(No.pd2013457)the Hangzhou Science&Technology Development Project of China(No.20140533B13)
文摘With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.
基金supported by the National Natural Science Foundation of China under Grants No. 61100208,No. 61100205the Natural Science Foundation of Jiangsu Province under Grant No. BK2011169+1 种基金the Foundation of Beijing University of Posts and Telecommunications under Grant No. 2013RC0309supported by the EU FP7 Project REC-OGNITION:Relevance and Cognition for SelfAwareness in a Content-Centric Internet
文摘Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO.
基金supported by the China Fundamental Research Funds for the Central Universities under Grant No.BUPT2012RC1011
文摘The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
文摘The rapid growth of cloud computing and mobile Internet services has triggered the emergence of mobile cloud services. Among many challenges,QoS management is one of the crucial issues for mobile cloud services. However,existing works on QoS management for cloud computing can hardly fit well to the mobile environment. This paper presents a QoS management architecture and an adaptive management process that can predict,assess and ensure QoS of mobile cloud services. Furthermore,we propose an adaptive QoS management model based on Fuzzy Cognitive Maps ( FCM) ,which suitably represents the causal relationships among QoS related properties and cloud service modes. We evaluate the proposed solution and demonstrate its effectiveness and benefits based on simulation work.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.
基金Item Sponsored by Doctoral Program of Higher Education of China(97014515)
文摘A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.
基金The author is very grateful for the financial support of the new retail virtual reality technology(2017TP1026)of the key laboratory in Hunan Province.
文摘In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.
基金supportedin part by Sub-project "Mobile Internet Architecture and Key Technology Research" of National Core Electronic Devices,High-end Generic Chips and Basic Software (CHBS) Project "Development Strategy and Planning ofMobile Internet System Hardware and Software Technology and Service" under Grant No.2012ZX01039003Sub-project "IPv6 Application and Demonstration of Mobile Internet inCampus Environment" of National Sci-Tech Major Special Item Project "IPv6 Applicationand Demonstration of Mobile Internet" under Grant No. 2012ZX03002015-003A New Network Architecture:Address Driven Network Architecture and Technology Research and Development under Grant No. CNGI-12-03-001
文摘With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.
文摘In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks and network cooperation issues emerge accordingly. This paper gives the solutions to the abovementioned problems: The video signal enhancer is used to improve the image quality and reduce power consumption; the radio frequency interference is reduced by avoiding interference caused by in-band leakage and by out-of-band block; and the effective cooperation between dual networks can be fulfilled by re-designing communication architecture, processor, service logic and User Interface (UI).
文摘Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterprise customers. Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node (INON)/Distributed Service Network (DSN). The core network will be flat, with an evolution route from Internet High Speed Packet Access (I-HSPA) to System Architecture Evolution (SAE), and even the Internet can be used as the core network. The low-cost mobile phone can be accessed to HTTP Internet by using 'client end software + portal'model with cloud computing. Flat rate will be the only fee model to be accepted by customers, and cheap and reasonable prices will contribute to the development of mobile Internet.
文摘This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the online application software store is becoming an important platform for service delivery. The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world. Based on the smart terminal, the competition for platform system from the hardware platform to the operation system, the middleware and the applications platform have been in shape globally. The competition in the terminal platform of mobile Internet is moving from close to open, from uni-controlled by one company to open and cooperated by the whole industry. China should forge a terminal platform system and the ecosystem for the mobile Internet industry, and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal. The breakthrough should start from the application software, stepping from the top to the bottom platform, to extend the industry chain.
基金funded by the National High Technology Research and Development Program of China ("863" Program) under Grant No.2002AA1Z2306
文摘Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, the key technologies for the smart phone, such as the application security management framework, application software authentication mechanism, interoperating capability and dynamic power management should be paid much attention to. The mobile phone vendors are gradually transforming into platform providers who will offer the support for services, including hardware, protocol stacks and storage, instead of providing specific services. Meanwhile, operators and Internet service providers will become the main body of service development.
文摘On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and research goals in this field. It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols, structural characteristics of changing networks, multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.
基金supported by the National HighTechnology Research and Development Programof China ("863" Program) under Grant No.2008AA01A204
文摘The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
文摘With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The development of new technologies such as Mashup and mobile widgets will enable better service for users and new business models, bringing benefits for the industrial chain members including operators, vendors, Content Providers/Service Providers (CPs/SPs) and Internet application providers. The mobile Internet and the traditional Internet not only compete for contents and services, but also cooperate with each other; and the mobile Internet services should focus on mobile applications to avoid the homogenization with traditional Internet service.
基金Supported by Projects of Science Technology Department of Zhejiang Province(2014C23003,2015C02048,2017C03035)Major Projects of Zhejiang Meteorological Bureau(2015ZD10,2015ZD11)
文摘The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.