By Topic

Communications, China

Issue 2 • Date Feb 2014

Filter Results

Displaying Results 1 - 17 of 17
  • [Front and back cover]

    Publication Year: 2014 , Page(s): c1 - c4
    Save to Project icon | Request Permissions | PDF file iconPDF (633 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): i - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (2484 KB)  
    Freely Available from IEEE
  • Guest editorial: Software defined networking

    Publication Year: 2014 , Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (1995 KB)  
    Freely Available from IEEE
  • A packet I/O architecture for shell script-based packet processing

    Publication Year: 2014 , Page(s): 1 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (985 KB)  

    We propose a new scripting model for rapid and easier development of packet processing using shell scripts. In this paper we present EtherPIPE, a character network I/O device, that allows the programmer to access network traffic data as a file through UNIX commands. By setting a UNIX pipe "|" from or to EtherPIPE's output or input with UNIX commands, packets can be easily processed, executing functions such as packet filtering, packet capturing, generating arbitrary packets, and rewriting header information. In order to prove the utilities of our model, we have developed FPGA-based EtherPIPE adapter using a commodity FPGA card and a character device driver featuring new offloading functions. With our prototype implementation, packet scripting works at 1Gbps wire-speed, receiving packets with precise hardware timestamps. This paper argues for use cases of the EtherPIPE, and discusses enhanced formats of character devices for easier network scripting.). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel floodless service discovery mechanism designed for Software-Defined Networking

    Publication Year: 2014 , Page(s): 12 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2998 KB)  

    The low-cost, self-configuration capability and "plug-and-play" feature of Ethernet establishes its dominant position in the local area networks (LAN). However, it is hard to extend to large scale because of the legacy broadcast-based service discovery mechanism. Therefore, to solve this problem, a new split network architecture named Software-Defined Networking (SDN) is introduced in this paper, and a novel floodless service discovery mechanism (FSDM) for SDN is designed. For the FSDM, the widespread broadcast messages for Dynamic Host Configuration Protocol (DHCP) and Address Resolution Protocol (ARP) are considered especially, respectively. Then the DHCP relay and ARP proxy are proposed to handle DHCP broadcast messages and ARP broadcast messages, respectively. The proposed FSDM in this paper can eliminate flooding completely, reserve the auto-configuration characteristics. Particularly, there is no need to change the existing hardware, software and protocols of hosts for the proposed scheme. Finally, the simulation results are demonstrated to show that our proposed model allows redundant links existed in network and has the property of scalability, which can significantly reduce network traffic in data plane and control traffic in control plane, and decrease the overhead of control plane. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivable Virtual Network Mapping using optimal backup topology in virtualized SDN

    Publication Year: 2014 , Page(s): 26 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1822 KB)  

    Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks. However, for this hypervisor plane, how to map a virtual network to the physical substrate while guaranteeing the survivability in the event of failures, is extremely important. In this paper, we present an efficient virtual network mapping approach using optimal backup topology to survive a single link failure with less resource consumption. Firstly, according to whether the path splitting is supported by virtual networks, we propose the OBT-I and OBT-II algorithms respectively to generate an optimal backup topology which minimizes the total amount of bandwidth constraints. Secondly, we propose a Virtual Network Mapping algorithm with coordinated Primary and Backup Topology (VNM-PBT) to make the best of the substrate network resource. The simulation experiments show that our proposed approach can reduce the average resource consumption and execution time cost, while improving the request acceptance ratio of VNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reliability-optimized controller placement for Software-Defined Networks

    Publication Year: 2014 , Page(s): 38 - 54
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2846 KB)  

    By decoupling control plane and data plane, Software-Defined Networking (SDN) approach simplifies network management and speeds up network innovations. These benefits have led not only to prototypes, but also real SDN deployments. For wide-area SDN deployments, multiple controllers are often required, and the placement of these controllers becomes a particularly important task in the SDN context. This paper studies the problem of placing controllers in SDNs, so as to maximize the reliability of SDN control networks. We present a novel metric, called expected percentage of control path loss, to characterize the reliability of SDN control networks. We formulate the reliability-aware control placement problem, prove its NP-hardness, and examine several placement algorithms that can solve this problem. Through extensive simulations using real topologies, we show how the number of controllers and their placement influence the reliability of SDN control networks. Besides, we also found that, through strategic controller placement, the reliability of SDN control networks can be significantly improved without introducing unacceptable switch-to-controller latencies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On generality of the data plane and scalability of the control plane in software-defined networking

    Publication Year: 2014 , Page(s): 55 - 64
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2085 KB)  

    The control and data planes are decoupled in software-defined networking (SDN), which enables both planes to evolve independently, and brings about many advantages such as high flexibility, programmability, and rapid implementation of new network protocols. However, in order to improve the scalability of the control plane at present, some control functionalities are added to the data plane, which is probably to impact on the generality of the data plane. The key challenge of adding control functionalities to the data plane is to strike a careful balance between the generality of the data plane and the scalability of the control plane. We propose some basic principles that both control and data planes should comply with, based on the evolutionary trend of SDN. Moreover, we take two approaches for reference according to the principles, viewed from the control messages in OpenFlow-based SDN. Our evaluations demonstrate that the approaches can maintain the generality of the data plane and improve the scalability of the control plane. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SDN based next generation Mobile Network with Service Slicing and trials

    Publication Year: 2014 , Page(s): 65 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1997 KB)  

    Software-Defined Network (SDN) empowers the evolution of Internet with the OpenFlow, Network Virtualization and Service Slicing strategies. With the fast increasing requirements of Mobile Internet services, the Internet and Mobile Networks go to the convergence. Mobile Networks can also get benefits from the SDN evolution to fulfill the 5th Generation (5G) capacity booming. The article implements SDN into Frameless Network Architecture (FNA) for 5G Mobile Network evolution with proposed Mobile-oriented OpenFlow Protocol (MOFP). The Control Plane/User Plane (CP/UP) separation and adaptation strategy is proposed to support the User-Centric scenario in FNA. The traditional Base Station is separated with Central Processing Entity (CPE) and Antenna Element (AE) to perform the OpenFlow and Network Virtualization. The AEs are released as new resources for serving users. The mobile-oriented Service Slicing with different Quality of Service (QoS) classification is proposed and Resource Pooling based Virtualized Radio Resource Management (VRRM) is optimized for the Service Slicing strategy with resource-limited feature in Mobile Networks. The capacity gains are provided to show the merits of SDN based FNA. And the MiniNet based Trial Network with Service Slicing is implemented with experimental results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method of peak detecting for nanosecond pulse in optical performance monitoring system

    Publication Year: 2014 , Page(s): 78 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1362 KB)  

    In optical performance monitoring system, the analog to digital converter is needed to detect the peak of nanosecond pulse and get the signal envelope. A scheme based on a designed anti-aliasing filter and analog to digital converter is proposed to broaden the nanosecond pulse and make it easier for the analog to digital converter to catch the peak of the nanosecond pulse. The experimental results demonstrate that, with the proposed scheme, the optical performance system needs less time to get the recovered eye-diagram of high speed optical data signal, and is robust to phase mismatch in the analog to digital converter circuit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does amplify-and-forward cooperative relay improve OFDM/OFDMA ergodic capacity?

    Publication Year: 2014 , Page(s): 83 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1268 KB)  

    The ergodic information rate for Orthogonal Frequency-Division Multiplexing / Orthogonal Frequency-Division Multiple Access with amplify-and-forward (AF) relaying systems in the presence of frequency offsets is evaluated. Unlike previous work, per-subcarrier adaptive power allocation is performed on each relay to optimize the system ergodic information rate. For a given frequency offset and total number of relays M, the AF ergodic information rate is proven to be a monotonically increasing function of a (the ratio of the power allocated to the source node and the total transmit power), implying that the maximum ergodic information rate can be obtained at α=1 (i.e., there is no cooperative relay). Furthermore, the proof of "cooperative relays cannot improve the AF ergodic information rate in a quasi-static wireless channel" is also provided in this letter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized multicast routing algorithm based on tree structure in MANETs

    Publication Year: 2014 , Page(s): 90 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1556 KB)  

    Mobile Ad hoc Networks (MANETs) play an important role in emergency communications where network needs to be constructed temporarily and quickly. Since the nodes move randomly, routing protocols must be highly effective and reliable to guarantee successful packet delivery. Based on the data delivery structure, most of the existing multicast routing protocols can be classified into two folders: tree-based and mesh-based. We observe that tree-based ones have high forwarding efficiency and low consumptions of bandwidth, and they may have poor robustness because only one link exists between two nodes. As a tree-based multicast routing protocol, MAODV (Multicast Ad hoc On-demand Vector) shows an excellent performance in lightweight ad hoc networks. As the load of network increases, QoS (Quality of Service) is degraded obviously. In this paper, we analyze the impact of network load on MAODV protocol, and propose an optimized protocol MAODV-BB (Multicast Ad hoc On-demand Vector with Backup Branches), which improves robustness of the MAODV protocol by combining advantages of the tree structure and the mesh structure. It not only can update shorter tree branches but also construct a multicast tree with backup branches. Mathematical analysis and simulation results both demonstrate that the MAODV-BB protocol improves the network performance over conventional MAODV in heavy load ad hoc networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RSSI gradient-based AP localization algorithm

    Publication Year: 2014 , Page(s): 100 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1564 KB)  

    Recent rapid rise of indoor location based services for smartphones has further increased the importance of precise localization of Wi-Fi Access Point (AP). However, most existing AP localization algorithms either exhibit high errors or need specialized hardware in practical scenarios. In this paper, we propose a novel RSSI gradient-based AP localization algorithm. It consists of the following three major steps: firstly, it uses the local received signal strength variations to estimate the direction (minus gradient) of AP, then employs a direction clustering method to identify and filter measurement outliers, and finally adopts triangulation method to localize AP with the selected gradient directions. Experimental results demonstrate that the average localization error of our proposed algorithm is less than 2 meters, far outperforming that of the weighted centroid approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommending friends instantly in location-based mobile social networks

    Publication Year: 2014 , Page(s): 109 - 127
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3179 KB)  

    Differently from the general online social network (OSN), location-based mobile social network (LMSN), which seamlessly integrates mobile computing and social computing technologies, has unique characteristics of temporal, spatial and social correlation. Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN. However, the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world. In this article, we analyze users' check-in behavior in a real LMSN site named Gowalla. According to this analysis, we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity, offline behavior similarity and friendship network information in the virtual community simultaneously. This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community. Finally, we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Microblog dissemination law in view of forwarding

    Publication Year: 2014 , Page(s): 128 - 137
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1621 KB)  

    Forwarding is a major means of information dissemination on the Microblog platform. The article, combining static analysis and dynamic analysis, takes Microblog forwarding as the object of study, and studies the network topology of grass-roots Microblog forwarding users. It also studies the correlation between characteristic quantity and forwarding times of Microblog network topology. Furthermore, it conducts modification on virus transmission model, builds and verifies the Microblog forwarding dynamical model. The study finds out that Microblog postings present qute strong dissemination capacity on the initial stage, and some Microblog postings with many forwarding times and long duration of forwarding process due to the dynamic growth of the forwarding user network and the joining of strong nodes make network infection density decrease in some phases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative analysis of China ICT regulation effectiveness based on an IEP framework

    Publication Year: 2014 , Page(s): 138 - 147
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2285 KB)  

    In order to conduct a comparative analysis on China's Telecommunications/ICT regulation effectiveness to make up the omission of international researches, and to find out the difference between China and other countries and try to improve China's ICT regulation effectiveness, this paper developed an extended, integrated ICT regulation effectiveness assessment framework, with a name of IEP framework that consists of three assessment directions, namely regulation institution, regulation enforcement and industry performance. Based on this framework and by using Entropy Method, the paper then selected 10 sample countries, including China, six developed countries, and other three developing countries, and made a comprehensive comparison evaluation for those countries. Finally, by focusing on China's results of ranking 10 in institution, 6 in enforcement, 5 in performance and 8 in total ranking, the paper gave the explanation and presented improvement suggestions for the future ICT regulation in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust management mechanism for Internet of Things

    Publication Year: 2014 , Page(s): 148 - 156
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1056 KB)  

    Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P, Grid, ad hoc network and so on. However, few researches about trust mechanism for Internet of Things (IoT) could be found in the literature, though we argue that considerable necessity is held for applying trust mechanism to IoT. In this paper, we establish a formal trust management control mechanism based on architecture modeling of IoT. We decompose the IoT into three layers, which are sensor layer, core layer and application layer, from aspects of network composition of IoT. Each layer is controlled by trust management for special purpose: self-organized, affective routing and multi-service respectively. And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy. Finally, we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism, the result of which provides a general framework for the development of trust models of IoT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

China Communications is a technical journal published by China Institute of Communications with the objective of providing a global academic exchange platform involved in information and communications technologies (ICTs) sector.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Chen Junliang