Please wait a minute...

Current Issue

    20 August 2019, Volume 35 Issue 8
    Topic:advanced data networks
    Current situation and development trend of data network
    Lintao JIANG
    2019, 35(8):  1-15.  doi:10.11959/j.issn.1000-0801.2019202
    Asbtract ( 1194 )   HTML ( 466)   PDF (722KB) ( 1289 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technological innovation of network is the basis and enabling condition of new application and business innovation.The industrial internet,5G and the ICT infrastructure had put forward new requirements and challenges to the data network,including deterministic transmission,differentiated access services,ubiquitous mobile support,the credible internal security,and autonomous operation and maintenance.The existing problems of data network were analyzed,the research ideas of data network generation were pointed out,some key technologies of network 5.0 were put forward,and the problems involved in the construction of network innovation platform was dicussed.

    Analysis on the requirements of future data network
    Xiuli ZHENG, Jiayao TAN, Sheng JIANG, Chuang WANG
    2019, 35(8):  16-25.  doi:10.11959/j.issn.1000-0801.2019204
    Asbtract ( 535 )   HTML ( 82)   PDF (1955KB) ( 640 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet is the hub of information exchange.The innovation of network technology is the basis and enabler for innovation of new applications and business.The design of the future internet is expected to base on assumptions and visions for a future intelligent society.The new requirements of data networks for novel forward-looking applications in the future were firstly introduced,then the technological gaps of current data networks were analyzed,and new capabilities of data networks in the next 8~10 years were finally defined,aiming to provide guidance for the design of future data networks.

    Technical requirement of future industrial internet
    Junwen WANG
    2019, 35(8):  26-38.  doi:10.11959/j.issn.1000-0801.2019201
    Asbtract ( 733 )   HTML ( 92)   PDF (2204KB) ( 2981 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Firstly,the scope of research was expanded,the development trend of future internet and forward-looking application were analyzed,including the 5G era and beyond 5G era,and the overall architecture of future internet with its key technologies was proposed.Then the technical requirement for industrial internet in the 5G era was researched,including future industrial internet architecture,industrial edge cloud,deterministic delay industrial connection,future industrial internet cloud platform,digital transformation,network security,industrial identification and resolution.

    A survey on future networks:application scenarios and requirements analysis
    Bin DAI,Yuanyuan CAO,Yijun MO
    2019, 35(8):  39-48.  doi:10.11959/j.issn.1000-0801.2019197
    Asbtract ( 439 )   HTML ( 58)   PDF (795KB) ( 492 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Faced with the severe challenges of today’s network in terms of scalability,mobility,QoS guarantee and manageability,the essential capability requirements of future networks were summarized by analyzing application scenarios of future networks,and the key functional requirements and performance indicators of future networks were proposed.Finally,the development trend of the future networks was forecasted.

    Application’s needs and challenges for future networks
    Yuhong LI,Peng ZHANG,Di JIN,Yingchao ZHOU
    2019, 35(8):  49-64.  doi:10.11959/j.issn.1000-0801.2019203
    Asbtract ( 330 )   HTML ( 62)   PDF (1433KB) ( 289 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of technology and the need for comprehensive digital and intelligent society in the future make a variety of new network applications possible.The large-scale use of these applications will put extremely high demands on the transmitting networks while satisfying users’ requirements of the ultimate “immersive experience”,high-speed interaction and precise control.The typical emerging applications including the technical methods for realizing the applications,user experience and performance requirements of the applications were analyzed.The evolution trends of the networking applications were summarized by comparing the characteristics of current and emerging applications,aiming at analyzing the challenges of the emerging applications on the future networks and predicting the requirements on the future networks.

    Fixed features of future networks based on future applications
    Yawen ZHANG,Miao WANG,Linghao WANG,Hanwen ZHANG,Yujun ZHANG
    2019, 35(8):  65-73.  doi:10.11959/j.issn.1000-0801.2019198
    Asbtract ( 268 )   HTML ( 33)   PDF (1532KB) ( 261 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    More and more network applications place higher demands on the network functions and performance.Internet of vehicles requires the network to support low latency and high reliability,telemedicine requires it with deterministic latency and security assurance,the industrial internet requires networks to meet large connections and high reliability,AR/VR applications require low latency and high bandwidth,quantum computing also brings new challenges to network security.Due to the limitations of its own architecture,existing IP networks only provide best-effort services that cannot meet the needs of future network applications.Future network applications in the next 20 years were investigated,the functional and performance of the future network were analyzed.By describing the application scenarios of internet of vehicles,telemedicine,industrial internet AR/VR and quantum computing,the network performance to meet the needs of these scenarios was analyzed and the performance indicators of future networks were obtained.

    Decentralized internet infrastructure
    Bingyang LIU,Fei YANG,Shoushou REN,Xinpeng WEI,Xue YANG,Chuang WANG,Zhiwei YAN
    2019, 35(8):  74-87.  doi:10.11959/j.issn.1000-0801.2019200
    Asbtract ( 652 )   HTML ( 67)   PDF (1455KB) ( 997 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between different internet entities.However,these infrastructures are all designed based on a centralized system architecture or a trusted model,which suffers from many vulnerabilities.An architecture called decentralized internet infrastructure (DII) based on decentralization techniques was proposed.The DII architecture consists of three layers.The underlying layer was the distributed ledger layer,providing decentralized trusted foundation for DII.The intermediate layer,called name space management layer,fulfills the management of internet core resources (such as IP addresses,AS numbers and domain names) and provides trustworthy mapping information between different resources.The top layer was an open application layer that could support trustworthy decentralized internet applications.

    research and development
    Schedule-aware power management for energy-efficiency improvement in IEEE 802.11u WLAN
    Di ZHANG
    2019, 35(8):  88-96.  doi:10.11959/j.issn.1000-0801.2019193
    Asbtract ( 452 )   HTML ( 12)   PDF (673KB) ( 287 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A mobile terminal supporting the IEEE 802.11u standard can automatically access a wireless local area network within the coverage of a network service provided by a wireless local area network.Aiming at the characteristics of IEEE 802.11u WLAN,a time series sensing based PSM (S-PSM) scheme was proposed.The transmission sequence information was broadcasted using a generic advertisement service (GAS) defined in the IEEE 802.11u standard,and all terminals controlled their own operating states according to the sequence information.In order to reduce the collision probability of the contention channel,a response contention window was introduced.When there was no data packet in the access point (AP),the AP broadcasted the GAS frame and activated the idle timer.All terminals went to sleep until the idle timer expires.The simulation results show that compared with the proposed traditional PSM,the scheme can significantly reduce power consumption and improve terminal energy-efficiency.

    Application of cayley differential unitary space-time code in multiple-input multiple-output power line communication
    Jiaxin DING,Liangfang NI,Yi WANG,Huijie DAI
    2019, 35(8):  97-103.  doi:10.11959/j.issn.1000-0801.2019194
    Asbtract ( 233 )   HTML ( 5)   PDF (766KB) ( 313 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The application of Cayley differential unitary space-time code in MIMO power line communication system was studied.The linear space of complex skew-Hermitian matrices was mapped to isotropic unitary matrix constellations represented by highly non-linear Stiefel manifolds,by which signals were transmitted through a block fading multiple input multiple output power line channel with in a differential mode.Finally,based on the unconstrained solution of the Cauchy random by which data streams were represented,the approximate linear maximum likelihood estimation of the transmitted signal was induced.Simulation results show that although the performance of the proposed scheme is slightly lower than that of the system based on orthogonal differential space-time code in terms of bit error rate and diversity gain,it can ensure high-speed and reliable communication at higher signal-to-noise ratios,and is suitable for multi-input multi-output power line communication systems requiring high-speed data transmission.

    Analysis of 5G NR coverage capability at 2.6 GHz
    Xinkai CUI,Hao LI,Xiangchuan GAO,Huan YANG
    2019, 35(8):  104-110.  doi:10.11959/j.issn.1000-0801.2019181
    Asbtract ( 568 )   HTML ( 38)   PDF (980KB) ( 872 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The current research on 5G new air interface is mainly concentrated in the middle and high frequency bands.The low frequency band re-cultivation used by 4G is of great significance for 5G-scale contiguous networking,but there are few studies.On the basis of discussing the factors affecting the radio transmission capability,the urban outdoor non-line-of-sight propagation model of 3GPP TR38.901 was selected,and the current mainstream air interface parameters were used to simulate the multi-system main physical channel propagation capability.By comparing the coverage capabilities of the same physical channels in the 4G and 5G NR bands,the 5G NR primary channel coverage capability in the 2.6 GHz band can achieve contiguous coverage on the existing 4G basis.

    Secure performance analysis of relay systems with multi-relay and multi-user selection
    Tingjie REN,Guangqiu LI,Ying CHENG
    2019, 35(8):  111-119.  doi:10.11959/j.issn.1000-0801.2019153
    Asbtract ( 210 )   HTML ( 12)   PDF (648KB) ( 155 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The exact expressions for the non-zero secrecy capacity probability,secrecy outage probability of AF relay systems with transmit antenna selection and receive maximal ratio combining and its asymptotic secrecy outage probability at high signal to noise ratios over Rayleigh fading channel were derived respectively.The numerical results of the non-zero secrecy capacity probability and secrecy outage probability of AF relay systems with multi-relay and multi-user selection match well with their corresponding simulations,which proves the correctness of the above theoretical analysis.The analysis result of the asymptotic secrecy outage probability of AF relay systems with multi-relay and multi-user selection indicates that its secrecy diversity gain is the minimum value between the product of the number of transmit antennas at source,the number of receive antennas at the optimal relay node,and the number of relay nodes,and the product of the number of transmit antennas at the optimal relay node,the number of receive antennas at the optimal destination node,and the number of destination nodes,which is independent of the eavesdropper channel.

    High-efficient RPL routing for analyzing mobility of nodes
    Huibin XU
    2019, 35(8):  120-127.  doi:10.11959/j.issn.1000-0801.2019164
    Asbtract ( 198 )   HTML ( 2)   PDF (945KB) ( 180 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To deal with the mobility of nodes in low-power and lossy network(LLN),the adaptive transmission rate based game-theory mobile RPL (GT-mRPL) was proposed.GT-mRPL uses variable transmission rate-based game theory to achieve higher packet delivery ratio and better throughput.In a mobile environment,a game was designed for nodes competing to send data.The payoff function was defined to assess the profit gained from increasing data transmission rate (utility function) against the cost induced by the presence of mobile nodes (mobility function).Other factor was also taken into account in formulating the payoff function including the energy consumption.Simulation results show that in the presence of mobility,GT-mRPL reduces the packet lost ratio and improves the throughput.

    summarize
    Research progress of ARAIM technology
    Ershen WANG,Di YANG,Chen HONG,Pingping QU,Xiaoyu LAN,Chuanyun WANG,Tao PANG
    2019, 35(8):  128-138.  doi:10.11959/j.issn.1000-0801.2019172
    Asbtract ( 329 )   HTML ( 25)   PDF (803KB) ( 789 )   Knowledge map   
    References | Related Articles | Metrics

    With the development of multi-constellation satellite navigation systems and dual-frequency technology,it has become possible to apply advanced receiver autonomous integrity monitoring(ARAIM) to higher-level vertical precision approaches.Firstly,three important contents related to ARAIM were introduced:integrity performance requirements,integrity support information,threat types and mitigation methods.Then,ARAIM related technologies research at home and abroad were summarized:fault classification,constellation configuration and ARAIM availability.Finally,combined with the current development of ARAIM,the future research was expected.

    Operation technology wide Angle
    Communication,navigation and IoT integration 5G indoor communication network
    Xinwang ZHANG,Jia DONG,Sichen ZOU,Dong WANG,Wei DENG,Haiyu DING
    2019, 35(8):  139-146.  doi:10.11959/j.issn.1000-0801.2019175
    Asbtract ( 409 )   HTML ( 36)   PDF (1247KB) ( 545 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the 4G era,operators have become data service pipelines,while they will actively seek business transformation in the 5G era.According to research institutes,the indoor positioning and IoT market have broad prospects,and operators are working hard to expand vertical industry applications in related fields.However,the existing indoor communication network has a single function and cannot effectively support indoor positioning and IoT services.A communication,navigation and IoT integration 5G indoor communication network was proposed.By integrating the bluetooth module inside the indoor antenna,it achieved some new functions,such as downlink bluetooth positioning,advertisement information push,path loss detection,uplink IoT collection and uplink bluetooth positioning.The proposed technical solution can be applied to smart medical scenarios,such as smart consultation,equipment management,security management,logistical support and one-click alarm.

    Key technology and deployment strategy of 5G fronthaul transport networks
    Fengchao FU,Peng WANG,Yu MAO,Yongmei HUANG,Yuanbao XIE,Aihua ZHANG,Guoqiang LIN
    2019, 35(8):  147-151.  doi:10.11959/j.issn.1000-0801.2019151
    Asbtract ( 729 )   HTML ( 57)   PDF (825KB) ( 657 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As one of the frontier communication technology,5G mobile communication technology has attracted much attention in China and abroad.Before large-scale deployment of 5G base station,the transport network must be planned and ready in advance.Four kinds of mainstream 5G fronthaul schemes were introduced and compared from the perspective of construction cost,technical maturity,construction difficulty and so on.Finally,considering 5G evolution in the existing network,some suggestions for the selection of 5G fronthaul schemes in different scenarios were given.

    Analysis of LoRaWAN security echanism
    Xiaobo YU,Hongru ZHU,Dapeng LIU,Qing AN
    2019, 35(8):  152-157.  doi:10.11959/j.issn.1000-0801.2019190
    Asbtract ( 428 )   HTML ( 23)   PDF (754KB) ( 605 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    LoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes was carried out.The future research direction of LoRaWAN security mechanism was also pointed out.

    Locating causes of abnormality of EPG experience based on decision tree
    Xiaomin TAN,Ai FANG,Bing LIANG,Haojie YANG
    2019, 35(8):  158-164.  doi:10.11959/j.issn.1000-0801.2019087
    Asbtract ( 278 )   HTML ( 17)   PDF (708KB) ( 377 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Improving user experience has always been the focus of IPTV operation.However,IPTV network is relatively complex,including multiple scheduling links such as set-top box,access network,EPG page,EPG server and media server.Once the abnormality occurs,monitoring indicators of each link will be checked to locate the cause of abnormality by human experience.The operation mode relies on professionals,which is inefficient and unable to stop losses quickly.Thus,to solve the problem above,based on big data technology,decision tree was implied to locate the cause of abnormality according to the classification rule of the tree model.Decision tree model has been used in actual networks of IPTV and helps to find out the cause of abnormality,which improves the efficiency of operation.

    Knowledge graph and data application:intelligent recommendation
    Jing ZHOU,Ximin SUN,Xiaokun YU,Xinning BIAN
    2019, 35(8):  165-172.  doi:10.11959/j.issn.1000-0801.2019064
    Asbtract ( 784 )   HTML ( 55)   PDF (1877KB) ( 985 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Knowledge graph technology is an emerging internet technology with good forward-looking and strong technological advancement,and has broad application prospects.Knowledge graph technology provides the ability to analyze problems from the “relationship” perspective.It can deeply mine data,transform natural language into computer language,and display the value of data to the greatest extent.It can serve intelligent search,intelligent recommendation,risk early warning,intelligent operation,intelligent customer service,public opinion monitoring,equipment early warning and other businesses,greatly improving the production efficiency of enterprises.The comprehensive clustering algorithm,SVD decomposition algorithm,commodity-based collaborative concerns recommendation algorithm,user-based collaborative concerns recommendation algorithm and commodity similarity algorithm were studied.Combined with recommendation strategy,an intelligent recommendation system based on knowledge graph data application was proposed.It proves the feasibility and deployability of the data application with knowledge graph as the basic tool,which can fully meet the user’s demand for information on the internet platform.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: