Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

  • Papers

    • An EnergyEfficient MAC Protocol for DelayTolerant
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 1-4. DOI:10.13190/jbupt.2009s1.1.lij
    • Abstract ( 1988 )     HTML       
    • For delaytolerant mobile sensor networks with highly dynamic and sparse topology, an energyefficient medium access control (MAC) protocol called delaytolerant MAC (DTMAC), used in asynchronous duty cycle, adopted with a transfer mode initiated by the receiver, and minimal active exploration packet with multifunction introduced, is proposed. Via reducing retransmission rate and control packets costs, the energy consumption is efficiently controlled. Experiments on wireless sensor networking platform indicate that DTMAC can achieve energy efficiency, and also improve the performance both in onehop latency and the network throughput.
    • References | Supplementary Material | Related Articles
    • An Information Model for IT Configuration ManagementDatabase Based on Hierarchical Domain
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 5-9. DOI:10.13190/jbupt.2009s1.5.liwj
    • Abstract ( 1925 )     HTML       
    • The information technology(IT) infrastructure library(ITIL) does not give a comprehensive definition of the configuration management database(CMDB), and information models in other fields such as shared information data(SID), common information model(CIM) are not directly applicable to build a CMDB. In this case, the main requirements of CMDB are analyzed, and a modeling method of CMDB based on hierarchical domain is presented. Thereafter, an information model for CMDB is given. In the information model, the configuration item classes and the relationships between them are identified and defined. The model extracts the merit of other models and expands some special items from ITIL (including e.g. IT service management(ITSM) processes records, life cycle status etc.). It is proved that this information model can efficiently present relationships between configuration items, provide important and accurate information for ITSM processes, and support configuration management function.
    • References | Supplementary Material | Related Articles
    • New Generation Network Management Based on the NETCONF Protocol
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 10-14. DOI:10.13190/jbupt.2009s1.10.xuh
    • Abstract ( 3212 )     HTML       
    • In order to implement new generation network management based on extensible markup language (XML), the network configuration (NETCONF) protocol is developed. The design of NETCONFbased XML agents (especially the support of NETCONF capabilities) is demonstrated, and related problems on NETCONFbased data modeling are discussed according to current situation of the NETCONF content layer being not standardized. They will guarantee the commonality of XML technologies in network management domain to some extent since the NETCONF protocol is a XMLbased network management standard proposed by the Internet engineering task Force. Applications in developing new generation network management platforms verify the feasibility of this method.
    • References | Supplementary Material | Related Articles
    • Operation Process Complexity Modeling and Validation Verification
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 15-19. DOI:10.13190/jbupt.2009s1.15.hanf
    • Abstract ( 1880 )     HTML       
    • An information system operation process complexity model based on complexity theory is proposed. Five metrics included operation complexity, parameter complexity, context complexity, interaction complexity, and parallel complexity are defined, The formal definition and calculation method of metrics are presented. Furthermore, the normalization function is proposed, it can process metrical data and compare the single metric influence in total complexity. The model validation is verified by constructing an Email service system. This model can be not only used to measure the complexity degree of information system operation process and search operation hotspot, but also to evaluate and optimize the operation process in order to improve the operation quality and efficiency.
    • References | Supplementary Material | Related Articles
    • Capacity Based Relative Least Influence Resource Assignment Algorithm
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 20-23. DOI:10.13190/jbupt.2009s1.20.quh
    • Abstract ( 2231 )     HTML       
    • The capacity based relative least influence (CBR) wavelength resource assignment algorithm is presented based on the research and analysis of existing algorithms. The CBR analyzes the influence on channel numbers of each paths at each wavelength after current assigning wavelength through defining capacity based influence factor. So the influence about influenced paths capacity from current assigning wavelength more accurately can be described. Simulation shows that the new algorithm will reduce the blocking probability and improve the utilization ratio of network resource.
    • References | Supplementary Material | Related Articles
    • Automatic Calibration Method for PTZ Camera
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 24-29. DOI:10.13190/jbupt.2009s1.24.lib
    • Abstract ( 2018 )     HTML       
    • Considering that the intrinsic and extrinsic parameters of road side pan/tilt/zoom (PTZ) camera are variable, the absolute distance of object to camera is difficult to solve. An automatic calibration method for PTZ camera based on analyzing traffic video is presented. A model of traffic camera is given. By using the relative distances of points on road, a method is established to solving all the unknown parameters in the model. An automatic calibration implementation procedure is given. Experiment shows the calibration errors. During the procedure, only images of the traffic scene are needed without any manual intervention and configuration. This method has advantage of simple calculation and good flexibility, the demand of intelligent transportation surveillance system can be satisfied.
    • References | Supplementary Material | Related Articles
    • A Converged Network Based ValueAdded Service Creation Pattern
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 35-39. DOI:10.13190/jbupt.2009s1.35.lijl
    • Abstract ( 2136 )     HTML       
    • A new valueadded service creation pattern for convergence network, capability injection (CI), is presented. The resourceoriented architecture model is adopted in the CI pattern to abstract network capabilities into resources, thus the unified resource control could be used for capability control, while in traditional service creation, different interfaces and different invocation rules would lead to different state control process. Therefore, value added service creation is greatly simplified, and the flexibility, the extensibility and the security of value added service creation in web 2.0 environment are enhanced. Applications in China telecom short message value added service systems verify the feasibility of this pattern.
    • References | Supplementary Material | Related Articles
    • Research of Constructing Algorithm to Create D2FA
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 40-43. DOI:10.13190/jbupt.2009s1.40.zhouh
    • Abstract ( 2196 )     HTML       
    • Delayed input deterministic finite automata (D2FA) reduces the transition edges of deterministic finite automata (DFA) by introducing default edges. The relevance between DFA(X)and DFA(X) is analyzed to improve the efficiency of constructing algorithm to create D2FA. A constructing algorithm is presented to create D2FA from DFA. The algorithm expresses the state of DFA(X) with the state sequence of DFA(X), hence the choice of default edges is relayed on the state sequence, rather than creating actual DFA(X). Experiments show that the algorithm greatly reduces the complexity of constructing D2FA, meanwhile it ensures a lower time bounds of pattern match and capacity of reducing state transition.
    • References | Supplementary Material | Related Articles
    • ModelBased Method for Web Service Performance Testing
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 44-48. DOI:10.13190/jbupt.2009s1.44.chenyh
    • Abstract ( 2277 )     HTML       
    • Software performance testing is one of the important techniques used to assure the quality of web services. In order to improve the efficiency and automatization of web service performance testing, a modelbased method for web service performance testing is proposed. Web service performance testing models built by distinct layers are presented. The layers of testing models includes test step model layer, test transaction model layer and test scenario model layer from the bottom up. The lower layer models were reusable for the higher layer model building. Furthermore, a web service performance testing tool is implemented, and an efficient solution is provided for modelbased automatic performance testing.
    • References | Supplementary Material | Related Articles
    • 〗Design and Performance Analysis of a Parallel Decision Tree Algorithm on Data Mining Grid
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 49-52. DOI:10.13190/jbupt.2009s1.49.chenp
    • Abstract ( 2264 )     HTML       
    • Working on the group of personalcomputers and servers, a parallel C4.5 decision tree algorithm is proposed. This algorithm made the parallel date mining run on the data mining grid efficiently. A partition of vertical and horizontal method is introduced to parallel the procedure of recursive algorithm. The algorithm is scalable and solves the situation of lack of efficient parallel algorithm so far. The analysis and experiment for the parallel decision tree prove that the computing efficiency is affected by several parameters and the algorithm has high performance and high computing speedup. Guides to enhance the efficiency are proposed as well.
    • References | Supplementary Material | Related Articles
    • Study on Call Relation Model and Service View of Softswitch
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 53-57. DOI:10.13190/jbupt.2009s1.53.shuangk
    • Abstract ( 1904 )     HTML       
    • 〗Present call model and service view can not satisfy all complex controlling requirements required by multiparty multimedia services. A signaling and bearer separated call relation model (SBSCRM) of softswitch and a general service view (GSV) based on SBSCRM are proposed. SBSCRM/GSV, which is built on multiparty calls, supports the separation of signaling control and media control and provides three service views independently to the service logic: call party view, media link view, and media link relation view. Therefore, SBSCRM/GSV provides multigranularity control capabilities to service. GSV can be adapted to parlay/IN CV by adding a view translation layer between them. The softswitch system with SBSCRM illustrates the practicability and efficiency of SBSCRM/GSV.
    • References | Supplementary Material | Related Articles
    • Model for Trust Propagation in VANETs
    • WANG Jian;LIU Yanheng;JIAO Yu
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 62-65. DOI:10.13190/jbupt.2009s1.62.wangj
    • Abstract ( 1842 )     HTML       
    • A scheme to enhance trust propagation in vehicular Ad hoc networks (VANETs) is proposed. By introducing the concept of attribute similarity, the trust routing is achieved to find some potential friendly nodes among strangers. Based on similarity degree, a new forwarding behavior is put forward. Also the recommendatory methods to calculate the similarity degree of attribute are given. Simulation results show the proposed trust propagation scheme is precise.
    • References | Supplementary Material | Related Articles
    • Security Mechanism of Big Scale, Operational,Network Video Surveillance System
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 66-72. DOI:10.13190/jbupt.2009s1.66.045
    • Abstract ( 1974 )     HTML       
    • A security mechanism is presented for the networkbased, largescale, operational video surveillance system: virtual private network (VPN) and session initiation protocol (SIP) are used to build up a flexible closedusergroup to provide authentication and access control; dynamickey based media stream encryption solution helps to avoid exposing raw video data in networks; simple network management protocol version 3 (SNMPv 3)based management subsystem is offered to ensure the security of management information.
    • References | Supplementary Material | Related Articles
    • A Network Traffic MonitorNode SelectionAlgorithm Based on Triple Tag
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 73-76. DOI:10.13190/jbupt.2009s1.73.043
    • Abstract ( 1977 )     HTML       
    • Based on flowconservation law, a network traffic monitornode selection algorithm is proposed to effectively select the network traffic monitornode. The problem of the monitornode selection is regarded as a problem to find out the weak vertex cover of a graph. This algorithm marks all of the network nodes with the triple tags and recursively compares and replaces those triple tags. The network traffic monitornodes are selected by the final triple tags. Simulations show that the algorithm needs not to know the whole network topology. It can dynamically eliminate the unavailable network nodes to effectively solve the problem of the monitornode selection.
    • References | Supplementary Material | Related Articles
    • Terminal Management System Architecture andService Flows in the Next Generation Network
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 77-83. DOI:10.13190/jbupt.2009s1.77.ruill
    • Abstract ( 2168 )     HTML       
    • 〗In order to realize remote monitoring and self management of ubiquitous and heterogeneous terminal network of next generation network(NGN), and meet the requirements in the context of terminal network and public communication network unified management model, an architecture of NGN terminal management system is presented, the components and their functions are analyzed in detail. In the architecture, the status monitoring and the service assurance of terminal network are supported. The contextaware management and the policy management are proposed to realize pervasive communication under environment of heterogeneous terminals. The remote management of terminal network and devices is supported. The integrated management of terminal network and public communication network is realized by collaborating with other operation supporting systems. Service fulfillment process and convergence service seamless handover process are analyzed to illustrate the service flows of the terminal management system.
    • References | Supplementary Material | Related Articles
    • Embedded SelfOrganized Communication ProtocolStack for Wireless ensor Networks
    • ZHENG Jie;QU Yu gui;ZHAO Bao hua
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 84-87. DOI:10.13190/jbupt.2009s1.84.zhengj
    • Abstract ( 1967 )     HTML       
    • An embedded protocol stack is designed for adapting to most of the current wireless sensor network node platform, in which distribution and simplicity of protocol are taken into account. The protocol stack can quickly construct the network systematically, and realize data communication. This protocol stack adopts many ways of routing and network formation,and it will provide network communication interface for application directly. Simulation shows that the new protocol stack can realize hundreds of sensor nodes fast constructing network and multihop communication.
    • References | Supplementary Material | Related Articles
    • Energy Saving Route Finding Mechanism inUnderwater Acoustic Sensor Networks
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 88-92. DOI:10.13190/jbupt.2009s1.88.yanggs
    • Abstract ( 1615 )     HTML       
    • An energyefficient routing scheme is presented for underwater acoustic sensor networks (UWASN). Firstly, the factors affecting energy consumption in UWASN are analyzed in light of underwater channels, the relationship between numbers of relay nodes and energy consumption is obtained for given sourcedestination distance. The directed diffusion routing scheme is modified in the initial diffusion phase to find the optimal route based on the geographic information between a sink node and its neighboring nodes. Simulation shows that the proposed scheme can reduce the flooding cost, select an energyefficient route, and save more energy.
    • References | Supplementary Material | Related Articles
    • Inference of Network Bottleneck Link Based on End-to-End Loss Measurements
    • XU Xin,HE Jing sha,SHI Heng hua
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 93-96. DOI:10.13190/jbupt.2009s1.93.xux
    • Abstract ( 1936 )     HTML       
    • A statistical model for packet transmission probability is proposed to detect network bottleneck link in the field of statistical inference of network linklevel loss. The model adopts cumulant generating function to analyze pathlevel packet transmission probability from endtoend measurements and estimate linklevel packet transmission probability. Due to the relationship between network packet transmission probability and the loss probability, the linklevel packet loss information can be indirectly obtained. Simulations show that the model can accurately infer network linklevel packet transmission probability information without highload probe traffic and detect network bottleneck link in terms of Chernoff bound.
    • References | Supplementary Material | Related Articles
    • Anycast Routing Supporting MPLS Traffic Engineering
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 97-101. DOI:10.13190/jbupt.2009s1.97.songl
    • Abstract ( 1940 )     HTML       
    • The network load balance of anycast service is studied. An anycast routing algorithm(ART) supporting multiprotocol label switching (MPLS) traffic engineering is presented. In ART, based on the minimum interference schema, MPLS constraint routinglabel distribution protocol (CRLDP) is used to establish a label switching path (LSP) from anycast server to client, meantime, the bandwidth is reserved on the LSP. Simulations show that ART can balance the load of networks, optimize the network resource utilization of anycast service, and reduce delay and data loss during data transfer.
    • References | Supplementary Material | Related Articles
    • An Extensible Mechanism of Active BusinessInformation Service Based on ECA
    • WU Jianlin
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 102-105. DOI:10.13190/jbupt.2009s1.102.wujl
    • Abstract ( 1634 )     HTML       
    • In order to provide the right person with the right business information at the right time, an extensible mechanism of active business information service is given. The mechanism can capture the changing data that are transformed into the message queue in realtime by means of multiagent technology. And then the messages in the queue are converted into the fact by the rule engine. They are matched with the eventconditionaction(ECA) rules compiled by the business aralysts. When the ECA rule is triggered. The action within it is executed. The business information can be created in realtime and pushed to the aralysts actively in this mechanism, so it can support the routine decision automatically.
    • Supplementary Material | Related Articles
    • Research on Grid Resource Scheduling Based onImproved Ant Colony Algorithm
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 111-114. DOI:10.13190/jbupt.2009s1.111.huangwm
    • Abstract ( 2444 )     HTML       
    • For the distributed resources sharing of grid, an improved ant colony algorithm is proposed to apply to grid resource scheduling. First, trust value is applied to the algorithm as the important pheromone of the ant remnants. Through the evaluation of the trust value, the algorithm can effectively improve the search ability and the reliability of grid resource. Secondly, a local and global pheromone updating mechanism is designed to realize load balance at each resource node. Finally, GridSim is used to simulate the strategy of campus grid resource scheduling based on the improved ant colony algorithm by choosing some appropriate parameters. Experiment shows the that, with the aid of the algorithm, the utilization rate of grid resources and success rate of task committing is increased, and the execution time of grid resource scheduling is reduced , the performance of the grid system is thereafter improved.
    • References | Supplementary Material | Related Articles
    • The Design and Implementation of Alarm RealTimeDisplay System Based on Web
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 115-119. DOI:10.13190/jbupt.2009s1.115.chenxy
    • Abstract ( 2223 )     HTML       
    • To improve the realtime performance of browser/server(B/S) system for alarm monitoring, after depth analyzing three means of communications, i.e., synchronous, asynchronous and "subscribe/publish", comparing asynchronous JavaScript and XML (AJAX), Comet and Flex, a method of implementing,a webbased alarm realtime display system with the use of Flex technology is presented. The average response time is tested on the Client/Server(C/S) alarm realtime display system and the B/S alarm realtime display systems with the use of AJAX, Comet or Flex. The results show that this method can improve the realtime performance of B/S system for alarm monitoring effectively.
    • References | Supplementary Material | Related Articles
    • Research and Implementation of a RoleBased IAM System
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 123-128. DOI:10.13190/jbupt.2009s1.123.zhangm
    • Abstract ( 1979 )     HTML       
    • In order to raise information safety in enterprise authority managemen, as combined with the so called account, authentication, authorization, audit (AAAA) technology, a model of rolebased identify and access management(IAM) system is designed. The unified management of the account, the certification, the authorization, the audition and single sign on (SSO) are realized as results. The deficiencies possibly apppeared in information safety can be made up. So the system can run normally therefore in a safe and efficient environment.
    • References | Supplementary Material | Related Articles
    • Based on Stochastic Process Algebra OverlayNetwork QoS Performance Evaluation
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 129-133. DOI:10.13190/jbupt.2009s1.129.pany
    • Abstract ( 1880 )     HTML       
    • The arguments on the necessary for quantized evaluation toward quality of services (QoS) of multicast in Overlay networks are given. The concept of twodegree homeomorphism reduction multicast tree is introduced, extend Bowman’s method for evaluating QoS of unicast dataflow by using stochastic process algebra (SPA) is promoted, a modeling scheme is proposed for quantized evaluating QoS of concrete multicast instances in Overlay networks with simulation tool PEPA workbench. Simulation suggests that the jitter of IP multicast is lighter than the jitter of Overlay multicast, and the latter is further lighter than the jitter of multicast by using unicast technique.
    • References | Supplementary Material | Related Articles
    • Interface of Configuring the Data Network Equipments and Application Scheme
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 140-143. DOI:10.13190/jbupt.2009s1.140.042
    • Abstract ( 1857 )     HTML       
    • The current status of the network management interface for the data network is analyzed. Four key points about how to evaluate the network management configuration interface for data network are presented. A kind of configuration protocol, Netconf and its function are introduced. An application scheme is given, it describes a eXtensible markup language(XML) based framework about how to implement the configuration process using in a unified method based on Netconf and command line. And the basic application scheme in the network management system of this framework is presented.
    • References | Supplementary Material | Related Articles
    • Research and Implementation of Terminating Call ofNonStandard ValueAdded Service in CDMA Network
    • Journal of Beijing University of Posts and Telecommunications. 2009, 32(s1): 144-148. DOI:10.13190/jbupt.2009s1.144.044
    • Abstract ( 2057 )     HTML       
    • To solve the problem of restricted development of nonstandard valueadded services in code division multiple access network. A call model of terminating party of nonstandard service is analyzed with help of an examplesingle international mobile subscriber identification number(IMSI) multiple mobile station international integrated services digital network numbers(MSISDN) service.Combined with call forwarding no answer service based on switching control point, a new call model of terminating party based on transform of basic call state model (BCSM) is presented.Experiments verify the validity of the proposed call model to implement nonstandard valueadded services with the transform attribute of called party number.
    • References | Supplementary Material | Related Articles