Please wait a minute...

Current Issue

    20 December 2019, Volume 35 Issue 12
    Topic:IPv6 technology and applications
    Research and practice of SRv6 for integrated carrying of video cloud
    Chongfeng XIE,Wenjie JIANG,Chenhao MA,Hao YAN,Sifei WANG,Cong LI,Yunqing CHEN
    2019, 35(12):  2-7.  doi:10.11959/j.issn.1000-0801.2019291
    Asbtract ( 337 )   HTML ( 35)   PDF (1468KB) ( 923 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    SRv6 is newly emerging,source routing-based technology,which aims to realize network programmability by steering a packet through an ordered list of instructions in the IPv6 extension header,so as to meet multiple requirements,such as fast service provisioning.Based on the field trial of SRv6 in the production network in Sichuan province,the SRv6 solution for integration the video clouds in multi-domain networks was illustrated,which had shown the advantages of SRv6 in service agility,secure separation,bandwidth elasticity and inter-domain deployment.In addition,the challenges of SRv6 were listed and development policy was given in the end.

    A general way to assign IPv6 trusted address under portal authentication
    Jiang ZHOU,Hewu LI
    2019, 35(12):  8-14.  doi:10.11959/j.issn.1000-0801.2019288
    Asbtract ( 213 )   HTML ( 9)   PDF (808KB) ( 323 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.

    IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
    Peng KUANG,Ying LIU,Lin HE,Gang REN
    2019, 35(12):  15-23.  doi:10.11959/j.issn.1000-0801.2019289
    Asbtract ( 340 )   HTML ( 16)   PDF (1080KB) ( 305 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.

    Survey on IPv6 address scanning technology based on seed sources
    Guo LI,Lin HE,Guanglei SONG,Zhiliang WANG,Jiahai YANG,Zimu LI
    2019, 35(12):  24-37.  doi:10.11959/j.issn.1000-0801.2019296
    Asbtract ( 530 )   HTML ( 34)   PDF (849KB) ( 680 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Nowadays,the state-of-the-art technologies can spend a very short time to scan the whole IPv4 space,but these methods cannot be applied to the huge IPv6 space easily.Therefore,many researchers propose different heuristic algorithms for the sake of IPv6 scanning.The common way of these algorithms is to input collected IPv6 seed addresses and output new most likely active IPv6 addresses as candidates for later scanning.These methods greatly reduce the scanning range of the active address area.These technologies based on seed addresses were classified,analyzed and summarized,and detailed analysis of the advantages and disadvantages of each method was given.And the several challenges faced by the methods were discussed.73M seed addresses were collected in total from two sources,including published IPv6 datasets in papers and Beijing Node of China Education and Research Network.Through the proposed experiments,time performance and hit rate of four IPv6 address scanning technologies based on seed addresses was compared.Finally,the own thoughts on this field and some future research directions were proposed.

    IPv6 based SD-WAN deployment
    Wei WANG
    2019, 35(12):  38-42.  doi:10.11959/j.issn.1000-0801.2019295
    Asbtract ( 373 )   HTML ( 41)   PDF (1548KB) ( 710 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development background of SD-WAN and the current SD-WAN scheme based on IPv4 was introduced,the scheme of applying IPv6 to SD-WAN scenario was put forward,the changes that need to be made at the existing underlay and overlay levels to realize the SD-WAN scheme based on IPv6 were analysed,and the feasibility of using IPv6 technology to realize SD-WAN was discussed.

    Research and application of the IBN for the next generation internet
    Xin ZHANG
    2019, 35(12):  43-48.  doi:10.11959/j.issn.1000-0801.2019293
    Asbtract ( 200 )   HTML ( 15)   PDF (701KB) ( 257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Faced with the new business needs and complex market environment,traditional manual methods can no longer meet the existing needs,and more intelligent solutions are urgently needed.With the development of artificial intelligence and big data technology,IBN has become a means to solve the current problem.The background and research progress of the IBN were introduced,and the application of the IBN in the next generation internet was analyzed.

    Energy-efficiency maximization scheme for data collection in wireless power communication networks
    Haijiang GE, Zhanwei YU, Kaikai CHI
    2019, 35(12):  49-56.  doi:10.11959/j.issn.1000-0801.2019270
    Asbtract ( 240 )   HTML ( 10)   PDF (819KB) ( 146 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    WPCN composed of multiple RF energy sources and sinks was studied.The energy efficiency of data collection were maximized by jointly optimizing the transmission power of energy sources,the time allocation of wireless energy transfer and the time allocation of nodes’ data transmission.Specifically,the energy efficiency maximization problem was modeled firstly.Then,the optimal value of transmitted power was obtained,and the monotonicity of energy-efficiency function and the convexity of throughput function were further deduced.Finally,based on these properties,an efficient algorithm which combines golden-section search and bisection search was designed to get the optimal solution quickly.The simulation results show that the proposed optimal algorithm can significantly improve the energy efficiency compared with the baseline scheme.

    Research and development
    Error performance of CE-OFDM based AF systems with relay selection
    Tao JIANG,Guangqiu LI,Jianhui CAI
    2019, 35(12):  57-66.  doi:10.11959/j.issn.1000-0801.2019283
    Asbtract ( 148 )   HTML ( 6)   PDF (817KB) ( 109 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Constant envelope (CE) orthogonal frequency division multiplexing (OFDM) can develop the advantages of OFDM,and eliminate the shortcomings of high peak-to-average power ratio (PAPR) and sensitivity to non-linear distortion of power amplifiers.The error performance of OFDM based amplify-and-forward (AF) cooperative system with relay selection will be deteriorated due to feedback delay and other factors.Minimum mean square error (MMSE) Wiener channel predictor can alleviate the deterioration of error performance of wireless systems caused by feedback delay.For this reason,the CE-OFDM based AF cooperative system with relay selection and MMSE channel prediction which can overcome the shortcomings of OFDM and the influence of feedback delay was proposed,and its lower bound expressions for the average bit error rate (ABER) of rectangular quadrature amplitude modulation over Rayleigh block fading channels were derived.The numerical calculation and simulation results show that the lower bound expressions for the ABER of the above system has high accuracy when the modulation coefficients are small and can be used to design the AF cooperative system with CE-OFDM,channel prediction,and relay selection.

    A compressive data gathering method based on El Gamal cryptography
    Xiaohan YU,Keming DONG,Xia LI,Chao CHEN
    2019, 35(12):  67-78.  doi:10.11959/j.issn.1000-0801.2019284
    Asbtract ( 172 )   HTML ( 10)   PDF (1015KB) ( 101 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a hot researching area,compressive sensing has advantages in signal process,image processing and data gathering and analysis.How to effectively and safely apply compressive sensing technology to collect data in wireless sensor networks is studied.Conventional compressive sensing technology based data collection method does not consider the security issue.Furthermore,every nod in the network must participate in the process of collecting measurements.The El Gamal cryptography and sparse matrices based compressive sensing technology were combined,and the El Gamal based sparse compressive data gathering (ESCDG) method was proposed.Theoretical analysis and numerical experiments show that ESCDG not only decreases the network resource consumption but also be able to defense the internal and external attacks.

    End-to-end audiovisual speech recognition based on attention fusion of SDBN and BLSTM
    Yiming WANG,Ken CHEN,Aihaiti ABUDUSALAMU
    2019, 35(12):  79-89.  doi:10.11959/j.issn.1000-0801.2019290
    Asbtract ( 283 )   HTML ( 14)   PDF (1463KB) ( 186 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An end-to-end audiovisual speech recognition algorithm was proposed.In algorithm,a sparse DBN was constructed by introducing mixed l<sub>1/2</sub>norm and l<sub>1</sub>norm into Deep Belief Network with bottleneck structure to extract the sparse bottleneck features,so as to reduce the dimension of data features,and then a BLSTM was used to model the feature in time series.Then,a attention mechanism was used to align and fuse the lip visual information and audio auditory information automatically.Finally,the fused audiovisual information was classified and identified by a BLSTM with a Softmax layer attached.Experiments show that the algorithm can effectively identify visual and auditory information,and has good recognition rate and robustness in similar algorithms.

    Social-aware caching and forwarding for video streaming in information-centric 5G VANET
    Tengfei CAO,Cuili JIANG,Zhiqiang LIU,Xiaoying WANG
    2019, 35(12):  90-98.  doi:10.11959/j.issn.1000-0801.2019297
    Asbtract ( 214 )   HTML ( 11)   PDF (2138KB) ( 177 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m2).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.

    Summarize
    A survey of video behavior recognition based on deep learning
    Duoduo ZHAO,Jianwu ZHANG,Chunsheng GUO,Di ZHOU,ABDUSHARAFALHAKIMI MOHAMMED
    2019, 35(12):  99-111.  doi:10.11959/j.issn.1000-0801.2019286
    Asbtract ( 450 )   HTML ( 35)   PDF (1465KB) ( 622 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years,the deep learning method of automatic learning features has been continuously explored in the field of video behavior recognition.The traditional behavior recognition methods and the underlying principles of deep learning were outlined.Then a number of behavior recognition methods based on different input content and different deep networks was compared and analyzed.Finally,the development of deep learning in the field of behavior recognition was concluded and its future development trend was prospected.

    Operation technology wide Angle
    Research on the big data planning model of mobile wireless network
    Yu CHEN,Xiaodong CHEN,Yue LIU
    2019, 35(12):  112-121.  doi:10.11959/j.issn.1000-0801.2019292
    Asbtract ( 132 )   HTML ( 10)   PDF (922KB) ( 268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of big data technology in recent years,various industries have strengthened their research and application in their professional field.For the wireless network planning specialty of mobile operators,it will effectively improve the accuracy and automation level of network planning by combining the market,network,terminal,base station,planning and other data sources owned by enterprises.For the existing large data planning platforms,there are generally problems that do not fully consider the discrimination of scenario or regional types,which have a certain impact on the planning results.Firstly,the data sources,processing application architecture and implementation method which the large data planning model of mobile wireless network needed were analyzed.Then,the standards,algorithms and parameter settings of the three coverage planning models of surface,line and point were studied after the key steps and model analysis of the big data planning in mobile wireless network.Finally,some ideas and suggestions were put forward for the construction and application of the big data planning model in mobile wireless network.

    Wireless network planning of typical SG-IoT
    Yue MA,Bingsong LI,Quangui HU
    2019, 35(12):  122-130.  doi:10.11959/j.issn.1000-0801.2019282
    Asbtract ( 202 )   HTML ( 10)   PDF (943KB) ( 322 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A SG-IoT wireless network planning method was proposed,the characteristics and differences of multiple wireless technology systems were analyzed in terms of coverage,capacity,networking mode,etc.,and its adaptability to different SG-IoT applications was demonstrated.A basis for the SG-IoT and comprehensively support the construction of the SG-IoT was provided.

    Virtualized deployment of DPI based on Docker
    Jie PAN,Zhao XUE
    2019, 35(12):  131-136.  doi:10.11959/j.issn.1000-0801.2019294
    Asbtract ( 467 )   HTML ( 32)   PDF (685KB) ( 528 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    DPI is a kind of dedicated device for traffic identification and processing in the network of telecom operators,and a large number of DPI devices have been deployed in the network currently.However,the traditional DPI deployment brings the coexistence of multiple DPI systems,duplication of functions,and complicated maintenance and management,and it isn’t conducive to the rapid deployment of a large number of standardized DPI applications.With the development of NFV technology,virtualizing DPI deployment is a trend to solve this problem,and Docker is a container-level virtualization technology,DPI can be deployed based on it.Docker and the underlying data packet processing technology DPDK which was related to DPI deployment was described,and the Docker-based DPI virtualization deployment proposals was given.

    Value prospect and technical characteristics of 6G
    Xiaomin NIU
    2019, 35(12):  137-141.  doi:10.11959/j.issn.1000-0801.2019287
    Asbtract ( 331 )   HTML ( 40)   PDF (603KB) ( 285 )   Knowledge map   
    References | Related Articles | Metrics

    Combined with the value identification for 5G,the prospect of 6G values was made,and the characteristics of coverage,openness,security and independence of 6G were analyzed.It concludes that if 6G is viewed as the fundamentals for developing both the technological innovation and business mode innovation and is put into the top priority satisfying the expectations for experiencing applications and contents of 6G,the 6G may be far better than 5G,not just 1G advantage,numerically.

    Comprehensive evaluation and hierarchical management method of operator’s communication room based on users and business
    Chenggui ZHOU
    2019, 35(12):  142-147.  doi:10.11959/j.issn.1000-0801.2019272
    Asbtract ( 132 )   HTML ( 5)   PDF (703KB) ( 162 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The growing network scale of operators makes the network maintenance strength and cost more limited.How to use the limited cost to carry out high-quality network operation and maintenance has become a new challenge.As the important core resource of operator network,the fine management of communication roomsare is very necessary.A user-oriented and business-oriented hierarchical operation and maintenance management idea for operators’ communication room was presented.The multi-factor weighting method was used to evaluate the communication rooms comprehensively by the user and business data carried by the communication rooms.The communication rooms were classified according to the user and business distribution.

    User image construction framework based on big data fusion background for power grid business travel
    Changhao ZHANG,Zhiyong YU,Zhen ZHOU,Ruijie SHI,Xinyong WANG
    2019, 35(12):  148-154.  doi:10.11959/j.issn.1000-0801.2019285
    Asbtract ( 331 )   HTML ( 22)   PDF (2758KB) ( 677 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Business travel planning decisions based on big data analysis are an important part of controlling travel dynamics and developing travel specifications.Based on the information of the national network business travel information,aiming at the optimization of the travel mode during the travel process and the personal preference of hotel accommodation,a user portrait framework technology was constructed to realize the rapid and accurate identification of sensitive customer groups.Firstly,the user's sensitivity was predicted by two-channel modeling for different characteristics of users.Secondly,users were characterized by business approval,travel control,hotel evaluation,time characteristics,numerical characteristics,etc.,and users’ multi-source feature system was constructed.Finally,business travel data was fully utilized.Multi-source,create a multi-view fusion model based on double-layer XGBoost,improve classification accuracy,and verify the effectiveness of the method by comparing experiments.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: