Please wait a minute...

Current Issue

    20 October 2019, Volume 35 Issue 10
    Topic:data network technology and application
    Future network application scenarios and network capability requirements
    Linghao WANG, Miao WANG, Yawen ZHANG, Yujun ZHANG
    2019, 35(10):  1-12.  doi:10.11959/j.issn.1000-0801.2019223
    Asbtract ( 217 )   HTML ( 40)   PDF (934KB) ( 219 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The TCP/IP based internet had evolved into an important infrastructure for current information society.However,with the rapid growth of network traffic and the appearance of various emerging applications,the existing network architecture had become increasingly prominent in all aspects.Analyzing and clearing the performance needs of emerging Web applications could provide a clearer direction for the research on network architecture.The application scenarios of typical future network applications were analyzed such as immersive experience applications,IoT applications,tactile internet applications and intelligent transportation applications.The future network applications’ requirements for future networks were summarized,and key network performance indicators were derived.

    Network layer protocol architecture for many-nets internetworking
    Guangpeng LI, Sheng JIANG, Chuang WANG
    2019, 35(10):  13-20.  doi:10.11959/j.issn.1000-0801.2019224
    Asbtract ( 340 )   HTML ( 17)   PDF (1650KB) ( 179 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.

    5G/B5G oriented intelligent cloud network architecture
    Xu ZHOU, Zhuo LI, Yifang QIN
    2019, 35(10):  21-30.  doi:10.11959/j.issn.1000-0801.2019222
    Asbtract ( 314 )   HTML ( 36)   PDF (859KB) ( 285 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The emergence of 5G/B5G technology has greatly improved the key capabilities of mobile networks including bandwidth,latency and connectivity.Faced with the prosperous development of mobile access side capabilities,the existing centralized architecture for internet cloud service was prone to bottlenecks and could not fully exploit the advantage of 5G/B5G.The technology named Network 5.0 was proposed to address the demand for data networks from future typical network applications through a complete set of innovative protocol systems and control management architecture.A new type of intelligent cloud network based on the protocol system of Network 5.0 was proposed,which could bridge the gap between the internet service model and 5G/B5G access capability through the deep integration of cloud network,and promote further the continuous evolution of the network.

    A survey of key protocol and application scenario of time-sensitive network
    Peizhuang CONG, Ye TIAN, Xiangyang GONG, Xirong QUE, Wendong WANG
    2019, 35(10):  31-42.  doi:10.11959/j.issn.1000-0801.2019227
    Asbtract ( 550 )   HTML ( 73)   PDF (944KB) ( 466 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of information technology,the demand for scenarios with objects as the main body of communication is increasing,such as factory automation control,automatic driving,etc.The time delay requirements of such communication for data transmission far exceed the controllable range of traditional ethernet,then time-sensitive network have emerged.Time-sensitive network is a standardized technology that provides deterministic information transmission based on standard ethernet.It minimizes jitter through time-aware scheduling mechanism and provides reliable guarantee of data transmission for time-sensitive applications.The core characteristics and mechanism of time-sensitive network were introduced through the description of IEEE standards and its application scenarios were analyzed in vehicle network,industrial internet,aircraft data network and mobile fronthaul network.

    New transport layer technology
    Junjie WAN, Taixin LI
    2019, 35(10):  43-50.  doi:10.11959/j.issn.1000-0801.2019225
    Asbtract ( 239 )   HTML ( 32)   PDF (696KB) ( 184 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of future applications poses new challenges to network capabilities.As a medium for the application layer and the network layer,it is no longer sufficient of improving network resource utilization limited to this layer for future applications.Based on the background of holographic type communication,the characteristics of future network transmission was analyzed,the capabilities that the new transport layer should face for future applications were described,and a multi-transport layer architecture based on two-level scheduling mechanism was proposed.A flexible,scalable transport model was provided to meet the network challenges of future applications.

    Next generation intelligent converged metro network
    Chang CAO, Shuai ZHANG, Xiongyan TANG
    2019, 35(10):  51-59.  doi:10.11959/j.issn.1000-0801.2019228
    Asbtract ( 172 )   HTML ( 9)   PDF (1484KB) ( 180 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    First of all,the main issues in current operator metro network were analyzed,the background of why intelligent metro network and the main technologies of the application were introduced.Then the network deployment plans and service organization plans according to the scale of the metro network and the timeline for introduction of all related technologies were introduced.At last,a stage-by-stage exposition regarding to the fusion mode of communication cloud and intelligent converged metro network during deployment process was presented.Based on a series of analysis,it was pointed out that the construction of intelligent metro network played a very important role in the process of SDN/NFV network reconfiguration and cloud network fusion.It’s of great value to bear existing metro network services synthetically and cope with future services on the collaboration of cloud,network and edge.It’s necessary to accumulate operation experiences continuously in the deployment process.

    Trustworthy network based on blockchain technology
    Cong LI, Bo LEI, Chongfeng XIE, Yunhe LI
    2019, 35(10):  60-68.  doi:10.11959/j.issn.1000-0801.2019226
    Asbtract ( 289 )   HTML ( 45)   PDF (1283KB) ( 208 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the frequent occurrence of network security issues,the industry had not satisfied the patch-based external security solution,and it was hoped that the endogenous security could be realized from the network architecture layer.The decentralized trustworthy network architecture was proposed.Based on the research of the security of existing network underlying protocol,a trustworthy network architecture based on decentralization technology was proposed,such as blockchain technology,which could effectively solve the problem of lack of endogenous security in existing networks.Layers implement network security to avoid malicious network attacks or network failures caused by configuration errors.

    research and development
    Application and performance of full-duplex cooperative multicast in NOMA system
    Qiao WANG, Yanguo ZHOU, Xinjie YANG, Youming LI, Wei SHI, Bo CHEN
    2019, 35(10):  69-76.  doi:10.11959/j.issn.1000-0801.2019220
    Asbtract ( 92 )   HTML ( 2)   PDF (846KB) ( 56 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The application of cooperative multicast in a non-orthogonal multiple access (NOMA) system and its performances was studied where a mixed service scenario consisting of a number of the multicast users and one unicast user was employed.In such a system,a cooperative relay path selection strategy was used and a best channel conditioned multicast user was selected as relay user to relay the unicast user’s signal.The unicast user outage probability and the relay user’s capacity in closed-form were then derived.Mont Carlo simulation results validate the analysis and show that the proposed scheme significantly enhances outage probability for unicast user while maintaining the same ergodic capacity for the relay user.

    A method for shorting of the system Polar code based on bit-reverse permutation
    Shunlan LIU, Haibo BIAN, Aiming HU
    2019, 35(10):  77-83.  doi:10.11959/j.issn.1000-0801.2019157
    Asbtract ( 138 )   HTML ( 5)   PDF (915KB) ( 48 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Polar code,as a channel coding scheme in 3GPP standard,has good error correction performance.In order to further improve performance of the BER of the punctured Polar code,the shortening algorithm based on bit-reverse permuation was applied to the system Polar code,and a shortened system polar code was proposed.Simulation results show that in the AWGN channel,under the condition of high code rate,the performance of the BER of the proposed method is better than both the punctured system Polar code and the shortened Polar code.When the code rate is 3/4 and the BER is 10-4,the proposed method can obtain a gain of about 0.5 dB than the shortened Polar code,and a gain of about 0.25 dB than the punctured system Polar code.

    Indoor sensing technology based on channel state information
    Zhefu WU, Han WANG, Cheng CHEN, Zhongyou WANG, Wei HUANG
    2019, 35(10):  84-91.  doi:10.11959/j.issn.1000-0801.2019211
    Asbtract ( 222 )   HTML ( 10)   PDF (769KB) ( 166 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The wide spread wireless network has brought about tremendous development of mobile internet business services and has become one of the infrastructures of modern society.The basic principles and implementation methods of wireless sensing technology were expounded from the perspective of wireless channel state analysis.The technological innovation in the field of wireless sensing in recent years was discussed,especially channel state information based human body posture detecting and environmental monitoring.Finally,the future development trend of sensing technology based on wireless communication network was analyzed in order to provide reference for related research.

    Pilot allocation based on users’ location and user classification in massive MIMO system
    Haiyan CAO, Zichang MA, Xiaohui YANG, Wenjuan HU, Fangmin XU, Xin FANG
    2019, 35(10):  92-99.  doi:10.11959/j.issn.1000-0801.2019191
    Asbtract ( 98 )   HTML ( 3)   PDF (1084KB) ( 64 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of pilot contamination in massive MIMO systems,a pilot allocation scheme based on users’ location and user classification was proposed.The scheme designed the objective function and reasonable threshold based on path loss and angle of arrival.By comparing the user’s objective function with the threshold,all users in the system were divided into two types:high interference and low interference,and the low-interference users multiplex pilot sequences and extra orthogonal pilot sequences were assigned to high interference users to mitigate pilot contamination.Simulation results show that the scheme improves the performance of the communication system.

    summarize
    A survey of attack and defense on human-computer interaction security
    Kaiqiang GE, Tieming CHEN
    2019, 35(10):  100-116.  doi:10.11959/j.issn.1000-0801.2019196
    Asbtract ( 180 )   HTML ( 11)   PDF (780KB) ( 255 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.

    Operation technology wide Angle
    Construction and application of telecom operator IoT customer operation analysis system
    Xun ZHANG, Chunhui ZHAI, Chengyu ZHANG, Jie JIA, Yue LONG
    2019, 35(10):  117-129.  doi:10.11959/j.issn.1000-0801.2019141
    Asbtract ( 136 )   HTML ( 16)   PDF (1362KB) ( 106 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    China Unicom’s challenges and appeals in the operation capabilities of IoT customers were briefly analyzed.Combined with the big data analysis capabilities of China Unicom Research Insitute,a complete standard system was built.The scale of IoT applications was promoted and the goal of IoT customer operations big data was realized.Based on the practical experience of the IoT operating model in the telecom industry,how to implement more refined enterprise customer operations for operators based on big data capabilities was described.To achieve the accuracy and efficiency of customer service services from the perspective of technological innovation,how to use data analysis capabilities to build accurate customer support systems was explored.Finally,the important value of big data applied in customer operation scenarios and the prospect of customer operation were described.

    Research and application of new method based on MDT intelligent analysis of LTE radio interference
    Qizhu ZHONG, Xiuquan WU, Yaoman LUO
    2019, 35(10):  130-136.  doi:10.11959/j.issn.1000-0801.2019189
    Asbtract ( 163 )   HTML ( 5)   PDF (808KB) ( 70 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the traditional LTE (long term evolution) wireless interference judgment analysis method has insufficient user dimension data,insufficient correlation of quality reasons,and too much dependence on manual analysis.A new method based on MDT (minimized drive test) technology for intelligent analysis of LTE radio interference was proposed.Firstly,the user’s wireless quality data and latitude and longitude information were collected by using MDT and MR (measurement report),and then DBSCAN (density-based spatial clustering of applications with noise) and adaptive clustering algorithm were used to collect the wireless coverage indicators and the latitude and longitude and other data were used for cluster analysis.Finally,the clustered data was imported into the self-built wireless interference judgment model,and the interference type was analyzed to realize the intelligent analysis of LTE wireless interference.Compared with the traditional interference analysis method,the proposed method can avoid the complicated road test process and improve the accuracy of the analysis.Data acquisition clustering and model analysis experiments show that the new method improves the efficiency and location accuracy of data collection,and effectively reduces the time of manual investment while the results are more accurate.

    Deployment and application of “5G+MEC”enabled intelligent manufacturing
    Lingyi KONG
    2019, 35(10):  137-145.  doi:10.11959/j.issn.1000-0801.2019207
    Asbtract ( 531 )   HTML ( 24)   PDF (1724KB) ( 172 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As one of the key techniques of 5G,MEC can localize the application and promote the deep integration of networks and services.In order to realize the application of “5G+MEC” in vertical industry,the 5G core network with service-based architecture was deployed by using NFV technology,and the MEC for intelligent manufacturing was deployed in Zhengzhou Gree Manufacturing Park,the coverage of 5G in the park was realized by standalone network,so the 5G MEC network with “computing + connection” was built.Through the 5G+MEC applied in the intelligent manufacturing,the network,information and intelligence of industrial manufacturing were realized.Further more,the production data were processed on the edge of the network without uploading to the core network,which reduced the network delay and realized the closed loop of intelligent manufacturing data.

    Accurate analysis method of network element performance and service data characteristics
    Xuanyu GUO
    2019, 35(10):  146-150.  doi:10.11959/j.issn.1000-0801.2019205
    Asbtract ( 109 )   HTML ( 10)   PDF (944KB) ( 116 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of telecommunication network was usually analyzed by the KPI of network management system.If there was something wrong with the KPI,it needed the network optimization personnel to position problems.The efficiency of analyzing result depended on the quality of the network optimization personnel.Meanwhile,the analysis of data performance was rough estimated.As the unified deep packet inspection could show out the smaller granularity of the service status and channel quality,the analysis method of service data and node performance was discussed.By data slice and data association of control plane XDR and user plane XDR,the performance was analyzed with smaller granularity to show the quality of the network and the experience of users.So the user experience was showed out by different applies and services with different scenes,and the data characteristics of the XDR were more clearly.Finally,it improves the efficiency of network optimizing,the user feeling and the capability of data realization.

    Scheme of enhancing real-time business processing capabilities based on Kudu for the big data platform
    Feiyang GU, Ying KONG
    2019, 35(10):  151-156.  doi:10.11959/j.issn.1000-0801.2019158
    Asbtract ( 180 )   HTML ( 9)   PDF (731KB) ( 200 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the difficulty of real-time business processing capability of Hadoop big data platform,the theory of the most advanced Kudu column storage was studied as an effective complement of HDFS block storage,and the use of primary key index and memory acceleration provided by Kudu and Spark was illustrated to effectively solve the big data platform cannot support the technical implementation methods of business pain points such as real-time warehousing,incremental update and SQL-related query.The experimental results prove the effect of the method on improving the real-time business processing capability of the big data platform.

Copyright Information
Sponsor:China Institute of Communications
Posts and Telecom Press Co., Ltd.
Eidtor:Telecommunications Science magazine Office(F8,You Dian Publisher Building,No.11 Chengshousi Road,Fengtai District,Beijing 100078,CHina)
General Distribution Office:Beijing Newspapers and Periodicals Distribution Office
Overseas Distributor:China International Book Trading Gorporation(P.O.Box 399,Beijin,China)
Tel:010-81055443 010-81055459
E-mail:dxkx@ptpress.com.cn
Postal code:2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: