When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun...When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.展开更多
The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. Howev...The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities.展开更多
The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tr...The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term.展开更多
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni...Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.展开更多
This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also descri...This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also described.展开更多
To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public En...To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode,展开更多
Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photogr...Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photograph of Earth from a record distance of about 6 billion kilometers, all these and many other incredible achievements would have been impossible without the increasingly advanced space communication and network technologies [1]. Nowadays, these emerging space technologies have made their ambitious move toward commercialization and have been anticipated as an indispensable enabling component of the sixth-generation (6G) communications networks. For instance, numerous enterprises have envisaged massive deployment of low Earth orbit (LEO) constellations to complement the terrestrial networks and provide ubiquitous connectivity through their global footprint [2,3]. Nevertheless, entangled by terrestrial and aerospace components, the sophisticated 6G networks will involve new challenges and paradigm shifts in architectural, management, operational, and signal processing design [4–6].展开更多
The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it ca...The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .展开更多
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp...Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.展开更多
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth...With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.展开更多
The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks th...The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission.展开更多
The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity...The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved .展开更多
This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing proto...This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing protocols are discussed and compared. A proposal of applying the simple IEEE 802 MAC protocol into the wireless sensor network is introduced. In addition, in order to improve the system capacity, a multi-channel strategy for the sensor nodes is presented for decreasing the blocking probability and suppressing the accessing time delay. It is concluded that there are still a number of problems to be solved, including decreasing power consumption, improving capacity and avoiding access collision, to promote the successful commercial application of wireless sensor network.展开更多
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Divi...It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.展开更多
Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting...Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.展开更多
The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing a...The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing and self-maintaining management for heterogeneous networks. With the Multi-Radio Access (MRA) architecture, the Ambient Networks take full advantage of multiple access technologies to provide all users with the 'Always Best Connected' services.展开更多
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw...The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.展开更多
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris...The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.展开更多
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro...As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.展开更多
文摘When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks.
文摘The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities.
文摘The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term.
文摘Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.
文摘This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also described.
文摘To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode,
文摘Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photograph of Earth from a record distance of about 6 billion kilometers, all these and many other incredible achievements would have been impossible without the increasingly advanced space communication and network technologies [1]. Nowadays, these emerging space technologies have made their ambitious move toward commercialization and have been anticipated as an indispensable enabling component of the sixth-generation (6G) communications networks. For instance, numerous enterprises have envisaged massive deployment of low Earth orbit (LEO) constellations to complement the terrestrial networks and provide ubiquitous connectivity through their global footprint [2,3]. Nevertheless, entangled by terrestrial and aerospace components, the sophisticated 6G networks will involve new challenges and paradigm shifts in architectural, management, operational, and signal processing design [4–6].
文摘The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge .
基金the Jiangsu Natural Science Foundation under Grant No.BK2007236Jiangsu Six-Categories Top Talent Fundunder Grand No.SJ207001
文摘Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
文摘With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services.
基金This work was funded by Special Standardization Foundation of the Science and Technology Commission of Shanghai Municipality under Grant 07DZ05018the Natural Science Foundation of Shanghai Municipality under Grant 07ZR14104
文摘The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission.
文摘The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved .
文摘This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing protocols are discussed and compared. A proposal of applying the simple IEEE 802 MAC protocol into the wireless sensor network is introduced. In addition, in order to improve the system capacity, a multi-channel strategy for the sensor nodes is presented for decreasing the blocking probability and suppressing the accessing time delay. It is concluded that there are still a number of problems to be solved, including decreasing power consumption, improving capacity and avoiding access collision, to promote the successful commercial application of wireless sensor network.
文摘It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems.
文摘Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks.
基金the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20040013010
文摘The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing and self-maintaining management for heterogeneous networks. With the Multi-Radio Access (MRA) architecture, the Ambient Networks take full advantage of multiple access technologies to provide all users with the 'Always Best Connected' services.
文摘The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.
基金This work was funded by the National Natural Science Foundation of China under Grant60473090.
文摘The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.
基金supported by the National Natural Science Foundation of China under Grant No.60772110.
文摘As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization.