期刊文献+
共找到63篇文章
< 1 2 4 >
每页显示 20 50 100
Wireless Network Technologies Supporting M2M Applications
1
作者 Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China) 《ZTE Communications》 2005年第1期6-9,共4页
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun... When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks. 展开更多
关键词 ZIGBEE UWB Wireless network technologies Supporting M2M Applications RFID WiFi
在线阅读 下载PDF
The impact of network technologies on Higher Education Management and Countermeasures
2
作者 Yuexin CUI 《International Journal of Technology Management》 2014年第11期66-68,共3页
The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. Howev... The 21 st century is an era of information technology, network technology is in all areas of life and production and also higher education administration began to apply network technology and network management. However, in the rapid development of information technology today, due to network with their own information technology, high-speed, information-based features are widely used in educational management in universities, so that some common problems on the network has infiltrated into university education management, making College Educational management in the New face new problems and challenges. Through the influence of network technology for Higher Education Management of the research on network technology we make a few constructive suggestions on education management application and Universities. 展开更多
关键词 network technologies Higher Education Management Information Technology
在线阅读 下载PDF
Internet and Telecom Network Technologies Study
3
作者 Jiang Lintao (China Academy of Telecommunication Research of MIIT, Beijing 100083, P. R. China) 《ZTE Communications》 2008年第4期1-5,共5页
The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tr... The existing Internet technologies and the original Internet design concept cannot meet the requirement of development, due to the fast development of the Internet, great changes of the Internet user groups and the tremendous transformation of the Internet external environment. The Internet is at a development crossroad; and its direction of development has attracted great attention from the world. On the other hand, the telecom industry is in a rather passive position as the result of the great impact the Internet technology has posted on it. The telecom industry has failed in defining its own developing direction and technology breakthrough; therefore, it is also at a crossroad. The development of both the Internet and the telecom networks will lead to the development of Next Generation Network (NGN) technologies. Industrial attention and research should be focused on the key NGN technologies, solutions to problems in the development of these technologies, and their commercialization in a short term. 展开更多
关键词 Internet and Telecom network technologies Study
在线阅读 下载PDF
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
4
作者 Ackim Lutepo Kai Zhang 《Communications and Network》 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence network Technology Internet of Things (IoT) CYBERSECURITY Mobile Communication
在线阅读 下载PDF
Photonic MPLS Network Technologies to Create Bandwidth-Abundant IP Networks
5
作者 Atsushi Watanabe 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期665-666,共2页
This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also descri... This paper describes the prototypes of the Photonic MPLS router that can create bandwidth-abundant IP networks in a cost-effective manner. The characteristics of and recent advances in these prototypes are also described. 展开更多
关键词 MPLS on ET in OLSP Photonic MPLS network technologies to Create Bandwidth-Abundant IP networks IP
原文传递
Research on the Application of Multimedia and Network Technologies in Higher Vocational Public English Reading Teaching
6
《International English Education Research》 2013年第12期23-25,共3页
To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public En... To find out an effective way to improve higher vocational college students' reading abilities, the author designs an experiment that applying the multimedia and network technologies in the higher vocational public English reading teaching to test whether the multimedia teaching mode is more effective than the traditional teaching mode in enhancing vocational college students' reading performance. The contrastive experiment is done for one semester and the experiment shows that if applying multimedia and network technologies in higher vocational public English reading teaching, creating authentic language environment, it can improve the classroom efficiency, improve students' English reading ability, thus forming the student-centered modem higher vocational public English reading teaching mode, 展开更多
关键词 Multimedia and network technologies Higher vocational public English reading Teaching mode
在线阅读 下载PDF
Emerging Space Communication and Network Technologies for Sixth-Generation Ubiquitous Connectivity
7
作者 Zhen Gao De Mi +3 位作者 Chunxiao Jiang Symeon Chatzinotas Qihui Wu Qing Guo 《Space(Science & Technology)》 2024年第1期20-21,共2页
Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photogr... Seeing Apollo 11 land on the Moon, downloading Pluto’s pictures from New Horizons, receiving scientific data on 67-p/Churyumov-Gerasimenko comet from Rosetta, commanding Voyager 1 to turn its camera to take a photograph of Earth from a record distance of about 6 billion kilometers, all these and many other incredible achievements would have been impossible without the increasingly advanced space communication and network technologies [1]. Nowadays, these emerging space technologies have made their ambitious move toward commercialization and have been anticipated as an indispensable enabling component of the sixth-generation (6G) communications networks. For instance, numerous enterprises have envisaged massive deployment of low Earth orbit (LEO) constellations to complement the terrestrial networks and provide ubiquitous connectivity through their global footprint [2,3]. Nevertheless, entangled by terrestrial and aerospace components, the sophisticated 6G networks will involve new challenges and paradigm shifts in architectural, management, operational, and signal processing design [4–6]. 展开更多
关键词 sixth generation apollo land moon network technologies receiving scientific data space communication commanding voyager turn its camera take photograph earth emerging space technologies downloading pluto s pictures new horizons
原文传递
Wireless Mesh Networks and Cooperative Relaying Technologies 被引量:2
8
作者 Jiang Xiaokui (Wireless Pre- research Department of ZTE Corporation, Xi’an 710065, China ) 《ZTE Communications》 2008年第2期20-24,共5页
The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it ca... The Wireless Mesh Network (WMN) has become a focus in research of wireless broadband communications . In a switching technologies - based wireless Mesh network, the entire network is regarded as an IP subnet, so it cannot be applied in situations where large coverage is required . The use of cooperative relaying technologies can improve the transmission rate and reliability of wireless link; while the wireless Mesh network, once integrated with cooperative relaying technologies and routing technologies , can improve its spectrum efficiency and cover a wide area . However, there are many problems to be solved with respect to standardization, key technologies research and industrialization. Therefore , the application of cooperative relaying technologies in wireless Mesh networks is still a great challenge . 展开更多
关键词 MESH Wireless Mesh networks and Cooperative Relaying technologies WMN
在线阅读 下载PDF
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
9
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key technologies of Wireless Heterogeneous network Security NODE WLAN
在线阅读 下载PDF
Ultra-Dense Networking Architectures and Technologies for 5G 被引量:1
10
作者 victor c.m.leung zhang haijun 《ZTE Communications》 2018年第2期1-2,共2页
With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth... With the continuous enrichment of mobile communication application scenarios in the future, the traditional macro-cellular-based mobile communication network architecture will be difficult to meet the explosive growth in demand for communications services. 展开更多
关键词 In Ultra-Dense networking Architectures and technologies for 5G
在线阅读 下载PDF
Scalability Technologies for Wireless Mesh Networks 被引量:1
11
作者 Hu Honglin (Shanghai Research Center for Wireless Communications , Shanghai 200050, China ) 《ZTE Communications》 2008年第2期11-14,共4页
The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks th... The continuous increase of data transmission density in wireless mobile communications has posed a challenge to the system performance of Wireless Mesh Networks (WMNs ). There is a rule for wireless Ad hoc networks that the average node capacity decreases while the number of nodes increases , so it is hard to establish a large - scale wireless Mesh network. Network scalability is very important for enhancing the adaptive networking capability of the wireless Mesh network. This article discusses key scalability technologies for Mesh Base Stations (BSs ) and Mesh Mobile Stations (MSs ), such as channel allocation, intelligent routing , multi- antenna , node classification, Quality of Service (QoS) differentiation and cooperative transmission. 展开更多
关键词 MESH QOS Scalability technologies for Wireless Mesh networks WMNS
在线阅读 下载PDF
Key Technologies of Wireless Mesh Network 被引量:1
12
作者 Wu Fan, Mao Yuming, Zhang Ke (University of Electronic Science and Technology of China , Chengdu 610054, China ) 《ZTE Communications》 2008年第2期25-29,共5页
The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity... The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved . 展开更多
关键词 MESH WMN Key technologies of Wireless Mesh network
在线阅读 下载PDF
Investigation of Architecture and Essential Technologies of Wireless Sensor Network 被引量:1
13
作者 Peng Mugen, Wang Yingjie, Wang Wenbo (School of Telecommunications Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2005年第4期25-32,共8页
This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing proto... This paper introduces the architecture of wireless sensor networks, presents a cross-layer network management and control mechanism. The key technologies, such as Medium Access Control (MAC) and wireless routing protocols are discussed and compared. A proposal of applying the simple IEEE 802 MAC protocol into the wireless sensor network is introduced. In addition, in order to improve the system capacity, a multi-channel strategy for the sensor nodes is presented for decreasing the blocking probability and suppressing the accessing time delay. It is concluded that there are still a number of problems to be solved, including decreasing power consumption, improving capacity and avoiding access collision, to promote the successful commercial application of wireless sensor network. 展开更多
关键词 IEEE WSN Investigation of Architecture and Essential technologies of Wireless Sensor network NODE MAC
在线阅读 下载PDF
Networking Technologies Based on IEEE 802.16 and WiMAX
14
作者 Wang Bin L Dengfang Ma Fengguo (Institute of Xi’an, Central Academy of ZTE Corporation, Xi’an 710065, China) 《ZTE Communications》 2006年第2期23-28,共6页
It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Divi... It is a difficult problem to improve network performance and resource utilization efficiency in wireless communications. As a standard of broadband wireless access systems, IEEE 802.16 adopts Orthogonal Frequency Division Multiplexing (OFDM) and multi-modulation/coding techniques at the physical layer, combines contend and pre-contract mechanisms at the Medium Access Control (MAC) layer. Based on the QoS-related concepts such as connection and service flow, IEEE 802.16 optimizes network entry and initialization, and frame format in order to improve network throughput, reduce network delay, and increase the flexibility of network configuration. Based on IEEE 802.16, WiMAX adopts Point-to-Multipoint (PMP) network topology to realize flexible networking. It is a typical application technology of broadband wireless access systems. 展开更多
关键词 IEEE networking technologies Based on IEEE 802.16 and WiMAX MAC
在线阅读 下载PDF
WiMAX Networking Technologies and Solutions
15
作者 Liu Hongchun (CDMA Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期21-25,共5页
Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting... Based on the introduction of the WiMAX standards, relevant technologies and applications, three essential factors for WiMAX networking are analyzed. They are the frequency plan, Authentication Authorization Accounting (AAA) and the mobility management. Networking solutions for the fixed and mobile applications are presented respectively. It is noted that the evolution of wireless WiMAX networking will go through four phases: the outdoor access phase, the indoor access phase, the seamed roaming phase and the seamless mobility phase. It is predicted that WiMAX will eventually converge with the NGN and the mobile cellular networks. 展开更多
关键词 WiMAX networking technologies and Solutions MODE
在线阅读 下载PDF
Ambient Network and Its Key Technologies
16
作者 Cheng Jie,Feng Chunyan(Institute of Communication Networks Integrated Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2008年第3期40-43,共4页
The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing a... The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing and self-maintaining management for heterogeneous networks. With the Multi-Radio Access (MRA) architecture, the Ambient Networks take full advantage of multiple access technologies to provide all users with the 'Always Best Connected' services. 展开更多
关键词 RADIO MRA Ambient network and Its Key technologies MAC ACCESS
在线阅读 下载PDF
Study on Security Technologies for Wireles Network Integration
17
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 SECURITY USA WLAN NODE IEEE IPSEC Study on Security technologies for Wireles network Integration
在线阅读 下载PDF
Research on Traffic Identification Technologies for Peer-to-Peer Networks
18
作者 Zhou Shijie Qin Zhiguang Wu Chunjiang(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,Sichuan 610054,China) 《ZTE Communications》 2007年第4期14-18,共5页
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris... The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed. 展开更多
关键词 PEER NODE Research on Traffic Identification technologies for Peer-to-Peer networks UDP TLI PAIR TCP
在线阅读 下载PDF
ZTE to Highlight Latest Network Solutions and Technologies at Global Workshops
19
《ZTE Communications》 2005年第3期1-1,共1页
关键词 ZTE to Highlight Latest network Solutions and technologies at Global Workshops line
在线阅读 下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
20
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC Key MAC Layer technologies of Cognitive Radio network RADIO
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部