The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technica...The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technical routes of railway next-generation mobile communication determined by China State Railway Group Co.,Ltd.From the aspects of work objectives,principles,technical routes and innovative working methods,the paper elaborates the ideas of railway 5G scientific and technological research,puts forward the contents and plans of scientific and technological research on railway 5G private network,systematically organizes the achievements in the scientific and technological research stage of railway 5G private network,and sets forth the key contents of next-step scientific and technological research.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr...Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .展开更多
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth...With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.展开更多
The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radi...The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.展开更多
The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It...The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies...The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies are introduced into the Metropolitan Area Network(MAN).Ring network control protocols and ring network protection technologies are applied to guarantee manageability and reliability required in the telecom networks.The Ethernet Ring Protection(ERP) and Resilient Packet Ring(RPR) are two different ring protection technologies.The Transport Multi-Protocol Label Switching(T-MPLS) network uses the T-MPLS Shared Protection Ring(TM-SPRing) technology to provide ring protection.Carriers can expand the protection as needed and use appropriate ring technologies to meet the requirements of Carrier Ethernet(CE).展开更多
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Divi...It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.展开更多
Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting...Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.展开更多
The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technolog...The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technology and cognitive theory, the evolution from existing radio networks to future reconfigurable radio networks with the cognitive ability becomes possible. Nowadays the research aspects of E2R include the system architecture of reconfigurable radio networks and some key technologies for their evolution.展开更多
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the...Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.展开更多
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ...With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.展开更多
Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evo...Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evolution and convergenceof current communication networks. It also fol-展开更多
As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been stan...As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then t...This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.展开更多
This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of...This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of determining the structure of the chaotic neural network,the number of input layer nodes of the network is calculated by reconstructing phase space and computing its saturated embedding dimension,and then the number of hidden layer nodes is estimated by trial and error.Finally,this model is applied to predict the retail prices of eggs and compared with ARIMA.The result shows that the chaotic neural network has better nonlinear fitting ability and higher precision in the prediction of weekly retail price of eggs.The empirical result also shows that the chaotic neural network can be widely used in the field of short-term prediction of agricultural prices.展开更多
The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it ca...The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .展开更多
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp...Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.展开更多
文摘The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technical routes of railway next-generation mobile communication determined by China State Railway Group Co.,Ltd.From the aspects of work objectives,principles,technical routes and innovative working methods,the paper elaborates the ideas of railway 5G scientific and technological research,puts forward the contents and plans of scientific and technological research on railway 5G private network,systematically organizes the achievements in the scientific and technological research stage of railway 5G private network,and sets forth the key contents of next-step scientific and technological research.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
基金This work was funded by the Natural Science Foundation of China under Grant 60572066
文摘Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .
文摘With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.
基金the Natural Science Foundation of Jiangsu Province under Grant No.BK2007729
文摘The heterogeneous network convergence is the trend of future network development. However, many bottlenecks exist in the converged system such as high time delay, high energy consumption, and low data rate. Multi-Radio Cooperation (MRC) technology is specially designed to overcome these bottlenecks and to satisfy the requirements of heterogeneous network convergence. MRC can improve network capacity, reduce the energy consumption of radio devices, and decrease handover latency between heterogeneous networks by the cooperation of multiple radios, and by efficient management and feasible allocation of multi-radio resources. MRC makes real seamless heterogeneous network convergence possible.
文摘The Packet Transport Network(PTN) technology includes Transport Multi-Protocol Label Switching(T-MPLS) and Provider Backbone Transport(PBT).T-MPLS is the simplified and reformed Multi-Protocol Label Switching(MPLS).It drops MPLS’connectionless features and its transport-unrelated forwarding processing,but adds the network model of the transport layer,protection switching and Operation,Administration and Maintenance(OAM) functionality.PBT enforces both OAM and protection functions,adds Time Division Multiplexing(TDM) business simulation and clock functions,and strengthens multi-service support capability.But PBT has no functions of traditional Ethernet address learning,address broadcast and Spanning Tree Protocol(STP).Both T-MPLS and PBT can well satisfy the requirements of packet transport.Compared to PBT,T-MPLS has better OAM functions.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
基金supported by the National High-Tech Research and Development Plan of China ("863" Program) under Grant No.2006AA01Z246.
文摘The fast development of IP services forces the traffic flow in the networks to move gradually from Time Division Multiplexing(TDM) services to packet data services.To adapt to the change,low-cost Ethernet technologies are introduced into the Metropolitan Area Network(MAN).Ring network control protocols and ring network protection technologies are applied to guarantee manageability and reliability required in the telecom networks.The Ethernet Ring Protection(ERP) and Resilient Packet Ring(RPR) are two different ring protection technologies.The Transport Multi-Protocol Label Switching(T-MPLS) network uses the T-MPLS Shared Protection Ring(TM-SPRing) technology to provide ring protection.Carriers can expand the protection as needed and use appropriate ring technologies to meet the requirements of Carrier Ethernet(CE).
文摘It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.
文摘Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.
基金supported by the National Natural Science Foundation of China under Grant No. 60632030the E3 Project(FP7-ICT-2007-216248) with in Community’s Seventh Framework Program.
文摘The End-to-End Reconfigurability (E2R) project aims at realizing the convergence of the heterogeneous radio networks and the optimal utilization of the radio resources. With the continuous development of E2R technology and cognitive theory, the evolution from existing radio networks to future reconfigurable radio networks with the cognitive ability becomes possible. Nowadays the research aspects of E2R include the system architecture of reconfigurable radio networks and some key technologies for their evolution.
文摘Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.
文摘With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology.
文摘Softswitch technology integrates the su-periorities of both an intelligence net-work and the Internet, which embodiesits maturity and advancement. With ahierarchical network model, it effectivelysolves problems of evolution and convergenceof current communication networks. It also fol-
文摘As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘This paper takes a college English Academic teaching mode based on computer network technology as the research object.Firstly,the Challenges of Academic English writing for Chinese College Students are analyzed.Then the advantages of college English autonomous learning dynamic teaching mode under computer network technology are discussed.After that,it demonstrates a case study of a Computer-assisted English teaching model in academic writing.
基金financially supported by the National KeyTechnology R&D Program during the 12th Five-Year Plan period(2012BAH20B04)the 948 Program of Ministry of Agriculture,China(2013-Z1)
文摘This paper establishes a short-term prediction model of weekly retail prices for eggs based on chaotic neural network with the weekly retail prices of eggs from January 2008 to December 2012 in China.In the process of determining the structure of the chaotic neural network,the number of input layer nodes of the network is calculated by reconstructing phase space and computing its saturated embedding dimension,and then the number of hidden layer nodes is estimated by trial and error.Finally,this model is applied to predict the retail prices of eggs and compared with ARIMA.The result shows that the chaotic neural network has better nonlinear fitting ability and higher precision in the prediction of weekly retail price of eggs.The empirical result also shows that the chaotic neural network can be widely used in the field of short-term prediction of agricultural prices.
文摘The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .
基金the Jiangsu Natural Science Foundation under Grant No.BK2007236Jiangsu Six-Categories Top Talent Fundunder Grand No.SJ207001
文摘Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.