Please wait a minute...

Current Issue

    20 July 2020, Volume 36 Issue 7
    Viewpoint Focus
    Core idea、technical architecture and strategic significance of “5G+” system
    Kang CAI,Xiaohong LIAO,Hua TAN
    2020, 36(7):  1-9.  doi:10.11959/j.issn.1000-0801.2020191
    Asbtract ( 449 )   HTML ( 50)   PDF (940KB) ( 611 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the investigation of digital native evolution and case analysis,the concept framework of “5G+native” was put forward to describe the application scenarios and enterprises highly dependent on 5G high-performance network connection,its core idea was discussed,including link as a service,5G network and digital capability aggregation,embedded 5G,5G network platformization,etc,and the technical system was designed composed of layers:native access capability,native network capability,native service capability and native application scenario,then its strategic significance was described.The main conclusion is that “5G<sup>+</sup>native” is an important way for 5G to empower the social and economic development deeply.It is a strategic choice for operators to adapt to customer needs for digital transformation,to establish differentiated competitive advantages,and to build a new convergent ecosystem.Therefore,the construction of the technical and business system should be speed up correspondingly.

    Topic:Novel Network
    Reflections on data network technology
    Lintao JIANG
    2020, 36(7):  10-17.  doi:10.11959/j.issn.1000-0801.2020190
    Asbtract ( 145 )   HTML ( 24)   PDF (627KB) ( 359 )   Knowledge map   
    References | Related Articles | Metrics

    The history of data network development and standardization was reviewed,and the idea ofsub-generational development concept for future network was put forward.It was pointed out that there were two technical routes in network design:the development technology route with users and business applications as the core,the gradual increase of network capabilities according to the needs of users and applications,and the development technology route with network as the core and the main body of capacity responsibility.Network 5.0 adopts “network as the core design concept”.A detailed description of three important capabilities of network 5.0 was given:endogenous credibility and security,endogenous network resource perception,deployment and control,and endogenous network certainty.

    Key technologies and application of optical transport network for leased line services
    Xiongyan TANG,Haijun WANG,Hongbo YANG
    2020, 36(7):  18-25.  doi:10.11959/j.issn.1000-0801.2020200
    Asbtract ( 336 )   HTML ( 24)   PDF (808KB) ( 733 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid development of leased line services has transformed the optical transport network from operator's basic network to leased line service network.With the withdrawal of MSTP,OTN has become the main network technology for high-value leased lines.Several key technical solutions and evolution of OTN carrying leased line were analyzed and researched.The problem of cascade protection in multi-domain OTN was researched.Interoperability of different venders’ equipment was researched and solved.SDN and OTN were proposed as the development direction for high-quality leased lines.ACTN-based SD-OTN controller northbound interface standard and YANG model,technical requirements of management and control for access OTN equipment were promoted in IETF and CCSA separately,which would promote decoupling of OTN network.China Unicom’s leading experience of development and deployment of SDN orchestrator on OTN for high quality leased line was shared.

    A flexible and secure protocol framework for industrial internet of smart things
    Zhe CHEN,Sheng JIANG,Chuang WANG
    2020, 36(7):  26-33.  doi:10.11959/j.issn.1000-0801.2020194
    Asbtract ( 206 )   HTML ( 17)   PDF (719KB) ( 448 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The IP has achieved remarkable results in the past 50 years,which is an indispensable part of our life.However,with the wide usage of the internet,original design flaws of the IP were increasingly exposed,making it difficult to meet the requirements of future network.The scenarios and key technical challenges for internet in 2030 were discussed,and a flexible and secure protocol framework was proposed for industrial internet of smart things.The proposed protocol framework not only achieves the global reachability and high survivability,but also enables new network capabilities such as ManyNets (interconnection of everything and networks),deterministic services,intrinsic security,high-throughput transmission,and user-definable networking.

    Research and application of MEC service continuity technology
    Lei MAO,Weibin WANG,Jian LUO
    2020, 36(7):  34-41.  doi:10.11959/j.issn.1000-0801.2020193
    Asbtract ( 300 )   HTML ( 32)   PDF (1065KB) ( 555 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The current mobility problems and feasible solutions were analyzed,and the existing service continuity capabilities and key features on the network-side which were defined by 3GPP were studied,including SSC mode,uRLLC,traffic routing and so on.A network-side and application-side collaboration mechanism was proposed to satisfy the low latency services involving cross-MEC handover for fast mobility at the edge scenarios.The general idea of the follow-up study on mobility management and the path of phased implementation were also proposed.

    Novel network virtualization architecture based on the convergence of computing,storage and transport resources
    Bo LEI,Jianglong WANG,Qianying ZHAO,Yongzhi YU,Mingchuan YANG
    2020, 36(7):  42-54.  doi:10.11959/j.issn.1000-0801.2020196
    Asbtract ( 366 )   HTML ( 35)   PDF (1578KB) ( 935 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of 5G and edge computing,the multi-level and distributed deployment of basic IT resources such as computing resources and storage resources becomes mainstream.The way to provide users with more convenient and customized services to improve resource utilization becomes a new interest in network.The characteristics and development of the network virtualization,interworking trend and development of various resources,as well as the new requirements of emerging services for resource supply were analyzed.On the basis of the analysis,a network virtualization architecture based on multi-dimensional resource interworking was proposed.That is,multi-party and heterogeneous resources were integrated into a unified resource plane by introducing the process of resource discovery and resource transaction,and then resource slicing and virtualization were performed according to user requirements to meet the flexible resource requirements of emerging services.Resource utilization efficiency was improved effectively and operating cost was reduced.Since the joint optimization of resources involves multiple research fields,the network virtualization architecture will be constantly improved with the development of user requirements and business models,playing an important role for future services.

    Convergence of telco cloud and bearer network based computing power network orchestration
    Chang CAO,Shuai ZHANG,Ying LIU,Xiongyan TANG
    2020, 36(7):  55-62.  doi:10.11959/j.issn.1000-0801.2020197
    Asbtract ( 621 )   HTML ( 106)   PDF (805KB) ( 864 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the combination of computing and network connection in the future network,and the development trend of computing and network integration,a computing power network orchestration model based on centralized and distributed control schemes was proposed.From the perspective of solution analysis,the computing power network orchestration scheme based on the convergence of telco cloud and bearer network can meet the future business needs of mobile edge computing (MEC) site better.With scheduling capabilities coordinated for both computing and networking,the network’s perception of services can be optimized.The specific choice of centralized or distributed control scheme is closely related to the operator’s telco cloud capabilities and the evolution stage of the bearer network.

    View of the technical innovation of cloud-network convergence
    Fan SHI
    2020, 36(7):  63-70.  doi:10.11959/j.issn.1000-0801.2020195
    Asbtract ( 364 )   HTML ( 43)   PDF (604KB) ( 562 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of the demand for the construction of a new generation of information infrastructure,how to break the traditional closed and independent form of cloud and network,and build a cloud-network convergence information infrastructure has become the focus of the industry.Based on this trend,the main points of cloud-network convergence technical innovation were discussed from the three dimensions of network following the cloud,network cloudification and cloud capability improvement:firstly,the network architecture that should be centered on DC to achieve multi-cloud interconnection was proposed,and service-oriented and differentiated network guarantee capabilities were provided; secondly,the problem of cloudization and software deployment of network element forms should be solved,and cloud-side collaboration and software-defined service capabilitieswere provided;finally,how to upgrade platform services to enable developers,end users and vertical industries was also introduced.

    Research on future space-ground integrated information network based on edge-intelligence collaborative
    Xu ZHOU,Taixin LI,Yifang QIN,Junping SONG
    2020, 36(7):  71-79.  doi:10.11959/j.issn.1000-0801.2020192
    Asbtract ( 215 )   HTML ( 12)   PDF (1508KB) ( 786 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increase of needs for application,how to provide efficient network services in heterogeneous networking environment and large scale of time and space becomes a new challenge.A future space-ground integrated information network architecture was proposed based on the analysis of future needs,which was called edge-intelligence collaborative-based heterogeneous space-ground integrated identifier network.Three key technologies were introduced:service ID modeling and distribution,resource self-awareness in heterogeneous network,and integration of space-ground heterogeneous network.Finally,the application scenarios in high-speed railway,civil aviation,inclusive services,and military were introduced.

    SDN resolve space-ground integrated network based on end side computing
    Jinglin LI,Xiaolan WAN
    2020, 36(7):  80-91.  doi:10.11959/j.issn.1000-0801.2020198
    Asbtract ( 190 )   HTML ( 7)   PDF (1114KB) ( 478 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There is a complex network structure of space-ground integrated network.And this kind of network has heterogeneous network,dynamic topology,intermittently connected node height exposure,and so on.There are many limitations in traditional SDN implementation.A method of SDN implement based on end side computing and a space-ground integrated network based on SDN were presented,which separated space network control and data,using the computing power of the communication terminal (mobile terminal and fixed ground backbone network),unloading the calculation of SDN controller in space-based plane,thus simplifying the data forwarding plane.A practical and effective verification method was also proposed.

    Comprehensive Review
    A survey of image object detection algorithm based on deep learning
    Tingting ZHANG,Jianwu ZHANG,Chunsheng GUO,Huahua CHEN,Di ZHOU,Yansong WANG,Aihua XU
    2020, 36(7):  92-106.  doi:10.11959/j.issn.1000-0801.2020199
    Asbtract ( 861 )   HTML ( 100)   PDF (1714KB) ( 1266 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Image object detection is to find out the objects of interest in the image and determine their classifications and locations.It is a research hotspot in the field of computer vision.In recent years,due to the significant improvement in the accuracy of image classification with deep learning,image object detection models based on deep learning have gradually became mainstream.Firstly,the convolutional neural networks commonly used in image object detection were briefly introduced.Then,the existing classical image object detection models were reviewed from the perspective of candidate regions,regression and anchor-free methods.Finally,according to the detection results on the public dataset,the advantages and disadvantages of the models were analyzed,the problems in the image object detection research were summarized and the future development was forecasted.

    Operation Technology
    Backscatter communication assisted vehicular positioning technology with ultra-high accuracy
    Kaifeng HAN,Tiezhi LIU
    2020, 36(7):  107-117.  doi:10.11959/j.issn.1000-0801.2020160
    Asbtract ( 304 )   HTML ( 12)   PDF (964KB) ( 333 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The accurate vehicular positioning technology has been the fundamentalfunction for safer auto-driving and vehicular-to-everything networks.One research trend focuses on enabling the low-cost,reliable,and accurate vehicular positioning in high-density cities,tunnels,and underground where the GPS or cellular positioning can’t work due to the signaling blocking.To this end,a novel backscatter communication assisted vehicular positioning system was proposed where a backscatter-reader (with two antennas) was deployed on vehicle and at least one backscatter-tag is deployed along a roadside,based on which the location of vehicle could be estimated with ultra-high reliability and accuracy.Through simulation verification,BackCom vehicle positioning technology can achieve extremely high positioning accuracy.At the same time,BackCom’s vehicle positioning technology is very easy to expand.By increasing the number of antennas in its positioning reader,it could further improve its positioning accuracy.BackCom vehicle positioning technology has the advantages of low cost,low power consumption,high accuracy,high reliability,and easy deployment.It is suitable for various driving environments and has extremely high theoretical research value and commercial value.

    Systematic construction of operator’s intelligent customer service
    Bin DONG
    2020, 36(7):  118-125.  doi:10.11959/j.issn.1000-0801.2020137
    Asbtract ( 250 )   HTML ( 25)   PDF (745KB) ( 476 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Starting from the intelligent development of operators’ important voice customer service and WeChat customer service,the problems and challenges in traditional operator customer service were analyzed firstly.The key technologies in the intelligent customer service objectively were evaluated,and how to combine artificial intelligence with operator customer service was systematically put forward.According to the actual situation of an operator's existing network,the key technology solutions of intelligent voice customer service and WeChat robot were proposed,and then how to promote practice in operators’ actual environment was introduced,including programs and effects about network reconstruction,AI capabilities open and intelligent application deployment.Finally,the application future prospects of intelligent customer service were outlooked.

    Design of the strategy and architecture of different enterprises’ middle platform
    Yinghui LIU,Nan LIU,Yixin CAI,Yunyong ZHANG,Jinwu WEI
    2020, 36(7):  126-135.  doi:10.11959/j.issn.1000-0801.2020165
    Asbtract ( 343 )   HTML ( 29)   PDF (1029KB) ( 1915 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the national economic transition and rapid development of technology,enterprises need digital transition.How to accelerate transition through IT architecture upgrading has become a new research topic for enterprises.The definition,function and common types of middle platforms were stated.The strategy and architecture of different enterprises’ middle platforms which differ in service chain length were also compared and analyzed.The concept of planning middle platform was proposed on the basis of decoupling production from operation.Considering the current situation of operators,some suggestions were put forward on how to design the middle platform and which type to choose.

    An LSTM auto-encoder based anomaly detection for industrial system
    Xiaojun SHEN,Yanan GE,Zhihao SHEN,Yangdan NI,Mingqi LV,Zhengqiu WENG
    2020, 36(7):  136-145.  doi:10.11959/j.issn.1000-0801.2020188
    Asbtract ( 436 )   HTML ( 24)   PDF (761KB) ( 1202 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the context of the industrial internet,automatic and effective anomaly detection methods are of great significance to the safe and stable production of industrial systems.Traditional anomaly detection methods have the disadvantages of requiring a large number of labeled samples,and not adapting to high-dimensional time series data.Aiming at these limitations,an industrial system anomaly detection method based on LSTM (long short-term memory)auto-encoder was proposed.Firstly,to address the limitation of relying on labeled samples,an encoder used to learn the features and patterns of a large number of normal samples in an unsupervised manner.Then,anomaly detection was performed via reconstructing samples and calculating the reconstruction error.Secondly,to adapt to high-dimensional time series data,a BiLSTM (bidirectional LSTM) was used as an encoder,and then the potential characteristics of multi-dimensional time series data were mined.Experiments based on a real paper industry data set which demonstrate this method has improved the existing unsupervised anomaly detection methods in various indicators,and the overall accuracy of the detection has reached 93.4%.

    Big data architecture analysis and data security fusion technology
    Xiaojun LIU,Juan WU,Xiaoqing XU
    2020, 36(7):  146-155.  doi:10.11959/j.issn.1000-0801.2020052
    Asbtract ( 195 )   HTML ( 17)   PDF (712KB) ( 485 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    First of all,the general technical architecture of big data was deeply analyzed,and the relevant processes of data processing were further summarized,Through the analysis and comparison of the two modes of data middle platform and hierarchical construction,the relevant business scenarios,management architecture,construction difficulty,technical requirements,data processing,etc.were summarized,and their adaptation scope,advantages and disadvantages were summarized.The multi-level architecture mode was focused on according to the security fusion technology problems.Then the corresponding solutions were put forward.Finally,for the industry big data construction mode,useful reference was provided.

    Load balancing based on clustering analysis and deep learning for multi-frequency and multi-mode network
    Yaxing QIU,Xidong WANG,Sen BIAN,Lei YUE
    2020, 36(7):  156-162.  doi:10.11959/j.issn.1000-0801.2020159
    Asbtract ( 206 )   HTML ( 8)   PDF (593KB) ( 433 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Load balancing is a huge challenge for LTE multi-frequency and multi-mode network.Hundreds of parameters are involved in load balancing for the complex network structure.Therefore,it is difficult to perform precise and meticulous configuration only relying on human experience.In order to cope with the challenge,a load balancing scheme based on clustering analysis and deep learning was proposed.Firstly,the key indicators were selected to identify the network scenes,and then big data and deep learning technologies were used to mine the relationship between data.Finally,the optimum system parameters for different network scenes were found.It has been proved that machine learning technology can greatly improve the accuracy and the efficiency of parameter configuration.

    A quantifiable cloud computing platform security evaluation model
    Jian XU,Li JIN
    2020, 36(7):  163-167.  doi:10.11959/j.issn.1000-0801.2020185
    Asbtract ( 162 )   HTML ( 12)   PDF (646KB) ( 326 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A quantifiable security assessment model for accessing different clouds based on a consistent API was proposed.The evaluation system includes a security scan engine module,a security recovery engine module,a security quantitative evaluation module,and a visual display module.The progress of safety assessment and remediation was proposed,and simulation verification was carried out based on the G-Cloud platform.The results show that the proposed model can display the dynamic security scan scores of one or more clouds through visual graphics,which can guide electricity users to modify configurations,improve operations,repair vulnerabilities,and improve the security of cloud electricity resources.

    Performance and key issues of 5G multi-channel joint transceiver technology
    Yi PAN,Huihui LI,Lei ZENG,Weiwen CAI
    2020, 36(7):  168-174.  doi:10.11959/j.issn.1000-0801.2020201
    Asbtract ( 195 )   HTML ( 16)   PDF (4266KB) ( 273 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the explosive growth of data services,5G indoor coverage has become the top priority.Deploying 5G indoor subsystem is one of the important means to solve the problem of 5G indoor coverage.An upgrading scheme of 5G indoor subsystem based on multi-channel transceiver technology was introduced.This scheme can achieve double flow with single feeder and four flow with double feeder,and improve the performance of 5G with low cost.The main construction of the scheme includes:adding shaft cable,adding combiner,adding coupler,without changing the flat floor network structure.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: