Please wait a minute...

Current Issue

    20 November 2021, Volume 37 Issue 11
    Comprehensive Review
    Research on the development and business trend of holographic technology under 6G network
    Wenjun HOU, Bing BAI, Benzhi YANG
    2021, 37(11):  1-10.  doi:10.11959/j.issn.1000-0801.2021254
    Asbtract ( 409 )   HTML ( 68)   PDF (1671KB) ( 342 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Research on 6G has been carried out on a global scale.Focusing on holographic interactive services under 6G, the requirements for future network performance by studying holographic interactive scenarios and services were analyzed.A basis for business requirements for the design and research and technological evolution of 6G networks was provided.The holographic technology and application status, holographic communication and holographic interaction scenarios, as well as the technical indicators and network performance requirements of the scene business were studied.The holographic technology development stage, development maturity, holographic industry chain under 5G, and holographic technology application field distribution were defined.A holographic scene pool and scene characteristics were constructed, and six types of application scenes were formed based on the characteristics.Through the calculation of technical indicators, the bandwidth performance requirements of holographic portrait transmission were proposed.

    Research and Development
    On-demand intelligent routing technology for deterministic network
    Zhongli WU, Yuanyuan CAO, Wenrui HUANG, Bin DAI, Yijun MO
    2021, 37(11):  11-16.  doi:10.11959/j.issn.1000-0801.2021245
    Asbtract ( 309 )   HTML ( 53)   PDF (424KB) ( 384 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Deterministic network needs to ensure the deterministic transmission requirements of different applications in terms of delay, packet loss rate, jitter, throughput, and reliability.In response to the differentiated and deterministic network transmission requirements of applications, an on-demand intelligent routing framework OdR for deterministic network was proposed.Under the OdR framework, an on-demand intelligent routing algorithm named OdR-TD3 based on deep reinforcement learning was proposed, which generates routing strategies based on the deterministic QoS requirements of application traffic, to satisfy the applications’ requirements of deterministic network.The experimental evaluation results show the OdR-TD3 algorithm has a significant advantage over the DV algorithm and the SPF algorithm in terms of the achievement rate of deterministic QoS requirements.

    Construction of DDoS attacks malicious behavior knowledge base construction
    Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU
    2021, 37(11):  17-32.  doi:10.11959/j.issn.1000-0801.2021257
    Asbtract ( 327 )   HTML ( 45)   PDF (2759KB) ( 318 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed based on the knowledge graph, and contains two parts: a malicious traffic detection database and a network security knowledge base.The malicious traffic detection database detects and classifies malicious traffic caused by DDoS attacks, the network security knowledge base detects DDoS attacks from traffic characteristics and attack frameworks model malicious behaviors, and perform inference, tracing and feedback on malicious behaviors.On this basis, a distributed knowledge base was built based on the DDoS open threat signaling (DOTS) protocol to realize the functions of data transmission between distributed nodes, DDoS attack defense, and malicious traffic mitigation.The experimental results show that the DDoS attack malicious behavior knowledge base can effectively detect and mitigate the malicious traffic caused by DDoS attacks at multiple gateways, and has the knowledge update and reasoning function between the distributed knowledge bases, showing good scalability.

    A lightweight and trusted communication protocol for IoT
    Junfeng MA, Zhiruo LIU, Guanwen LI, Fei YANG, Juanna DANG
    2021, 37(11):  33-40.  doi:10.11959/j.issn.1000-0801.2021229
    Asbtract ( 201 )   HTML ( 27)   PDF (1352KB) ( 147 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the era of the internet of things (IoT), the protocol stack conversion scheme based on the application-layer’s gateway has problems such as poor performance and end to end security that can’t be guaranteed.A lightweight and trusted IoT IP communication protocol was proposed, which was the main research direction of Protocol and Interface Group in Network 5.0 Industry and Technology Innovation Alliance, the deployment costs of protocol conversion gateways was decreased, the computing and storage overhead of IoT devices was reduced, and end to end communication security was ensured.

    Research on resource allocation algorithm of centralized and distributed Q-learning in machine communication
    Yunhe YU, Jun SUN
    2021, 37(11):  41-50.  doi:10.11959/j.issn.1000-0801.2021244
    Asbtract ( 192 )   HTML ( 20)   PDF (815KB) ( 96 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Under the premise of ensuring partial machine type communication device (MTCD)’s quality of service (QoS) requirements, the resource allocation problem was studied with the goal of maximizing system throughput in the massive machine type communication (mMTC) scenario.Two resource allocation algorithms based on Q-learning were proposed: centralized Q-learning algorithm (team-Q) and distributed Q-learning algorithm (dis-Q).Firstly, taking into account MTCD’s geographic location and multi-level QoS requirements, a clustering algorithm based on cosine similarity (CS) was designed.In the clustering algorithm, multi-dimensional vectors that represent MTCD and data aggregator (DA) were constructed, and MTCDs can be grouped according to the CS value between multi-dimensional vectors.Then in the MTC network, the team-Q learning algorithm and dis-Q learning algorithm were used to allocate resource blocks and power for the MTCD.In terms of throughput performance, team-Q and dis-Q algorithms have an average increase of 16% and 23% compared to the dynamic resource allocation algorithm and the greedy algorithm, respectively.In terms of complexity performance, the dis-Q algorithm is only 25% of team-Q algorithm and even below, the convergence speed is increased by nearly 40%.

    Fault diagnosis and auto dispatchin of power communication network based on unsupervised clustering and frequent subgraph mining
    Jihua WU, Pengyu ZHU, Zichen WU, Bin GU, Tao HONG, Bo GUO, Jing WANG, Jingyu WANG
    2021, 37(11):  51-63.  doi:10.11959/j.issn.1000-0801.2021253
    Asbtract ( 164 )   HTML ( 10)   PDF (1024KB) ( 319 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fault diagnosis is one of the most challenging tasks in power communication.The fault diagnosis based on rules can no longer meet the demand of massive alarms processing.The existing approaches based on the supervised learning need large sets of the labeled data and sufficient time to train models for processing continuous data instead of alarms, which are far behind the feasibility of deployment.As for alarm correlation and fault pattern discovery, a self-learning algorithm based on the density-based clustering and frequent subgraph mining was proposed.A novel approach for automatic fault diagnosis and dispatch were also introduced, which provided the scalable and self-renewing ability and had been deployed to the automatic fault dispatch system.Experiments in the real-world datasets authorized the effectiveness for timely fault discovery and targeted fault dispatch.

    A robust audio steganography algorithm based on differential evolution
    Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU
    2021, 37(11):  64-74.  doi:10.11959/j.issn.1000-0801.2021246
    Asbtract ( 152 )   HTML ( 11)   PDF (1111KB) ( 115 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.

    SDN security prediction method based on bayesian attack graph
    Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG
    2021, 37(11):  75-85.  doi:10.11959/j.issn.1000-0801.2021212
    Asbtract ( 167 )   HTML ( 17)   PDF (862KB) ( 142 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.

    Research and implementation of text classification method for customer service orders based on multi-model fusion
    Liang ZHANG, Xiaoju DAI, Rong ZHENG, Tongze He
    2021, 37(11):  86-96.  doi:10.11959/j.issn.1000-0801.2021236
    Asbtract ( 221 )   HTML ( 29)   PDF (965KB) ( 307 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the large amount of order categories and their hierarchical associations, traditional manual order classification method of customer service in telecom call center has the problems of long archiving time, low efficiency and unsustainable accuracy.To solve this problem, a novel text classification algorithm based on multi-model fusion was proposed, which intelligently classify orders with multiple models based on data characteristics and their hierarchical associations, the effectiveness of this method was verified.The current manual operation process was optimized and operation efficiency was enhanced, which support the intelligent transformation and upgradation of existing customer service system.

    Engineering and Application
    Research on 5G private networking schemes for industry
    Shilei DONG, Jingbo ZHAO
    2021, 37(11):  97-103.  doi:10.11959/j.issn.1000-0801.2021250
    Asbtract ( 253 )   HTML ( 57)   PDF (776KB) ( 247 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G network with large bandwidth, and the advantages of wide coverage, low latency, the interpersonal communication, extended to the communication between the people and things, things and objects, open everything connected age, but as a result of network planning and design and safety, management and other reasons, the existing 5G network does not apply to 2C industry enterprises.Therefore, the major operators are striving to build 5G 2B private network.In particular, enabling 5G to traditional industries can promote the intelligence, digitization and networking of traditional industries, and effectively improve production efficiency and quality.Based on the research of 5G key technology, combined with the actual industrial scene of a domestic factory, the solution of deep integration of 5G private network and traditional industrial manufacturing field was explored, so as to realize the intelligent transformation of the factory.

    Remote surgery based on 5G medical customized network practice and thoughts
    Yingzhong LI
    2021, 37(11):  104-114.  doi:10.11959/j.issn.1000-0801.2021251
    Asbtract ( 306 )   HTML ( 53)   PDF (1053KB) ( 429 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the accelerated implementation of the “new infrastructure”, all sectors of society are seizing the favorable opportunity, giving full play to the institutional advantages, concentrating, accelerating the construction of 5G network, promoting the solid implementation of 5G applications, building 5G into an important engine to accelerate China's digital transformation process and boost high-quality economic development, and pressing the fast forward key for 5G wise information technology of med.Firstly, the case background of 5G remote surgery were introduced.Then, combined with the project practice, the practical results of 5G remote surgery were introduced, then combined with the application practice, the application scenario, needs and pain points, research concept, design and implementation, technology and methods of 5G remote surgery were analyzed, and a practical analysis was completed.Finally, the corresponding thinking and future prospects were given.

    Research on the design and policy of national number portability service plan
    Wei DAI
    2021, 37(11):  115-127.  doi:10.11959/j.issn.1000-0801.2021258
    Asbtract ( 163 )   HTML ( 10)   PDF (908KB) ( 122 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The 2019 government work report proposed to make the service of number portability officially in effect nationwide.The preparation works had encountered many challenges, such as upgradation of network, changes of rules, and regulations.Firstly, an complete implementation plan from two aspects was proposed: service interaction and system support, including portability procedure, user interface, system structure and service enquiry.Secondly, operational regulations and policies related to number portability was analyzed and researched, and optimized suggestions were put forward.Finally, the present portability development status was summarized and the future development trend was predicted.China Telecom has maintained the leading position, the lowest complaints and system failures in the industry.Proposed policies regarding supervision have been adopted by the industry.

    Research and practice of telecom integrated grid management based on digital transformation
    Mingying ZHU, Zhuxuan HUA, Meng SHI
    2021, 37(11):  128-134.  doi:10.11959/j.issn.1000-0801.2021252
    Asbtract ( 426 )   HTML ( 34)   PDF (815KB) ( 140 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the understanding of digital transformation, a scheme of digital transformation in the integrated grid management of telecom was put forward.By analyzing the overall business process of telecom, the digital transformation requirements of telecom core elements in integrated grid management were summarized, and the implementation scheme was explained in detail.Based on it, taking the specific business scenario as an example, the scheme was verified, and the practice of digital transformation was given, which provided a new idea for improving the core competitiveness of telecom in enterprise business activities.

    Identification technology for city freeway users based on XDR big data analysis
    Baoyou WANG, Saibin YAO, Jiucheng HUANG, Hui PAN
    2021, 37(11):  135-142.  doi:10.11959/j.issn.1000-0801.2021214
    Asbtract ( 175 )   HTML ( 22)   PDF (1103KB) ( 233 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the scene of city freeway, the driving speed is relatively faster, the flow of people is denser, and the customers have higher requirements for communication experience.Firstly, the architecture of big data platform for mobile network quality control was introduced.Then, the identification algorithm for city freeway users based on XDR big data analysis was proposed.Finally, through XDR big data analyzing and processing, the user track on freeway was output, which followed by matching with the fingerprints database of freeways.The identification accuracy for city freeway users was improved, and wireless network quality monitoring of city freeways was supported.

    Research on business oriented 5G base station energy saving system based on AI deep learning
    Mengqiang XU
    2021, 37(11):  143-151.  doi:10.11959/j.issn.1000-0801.2021249
    Asbtract ( 330 )   HTML ( 28)   PDF (1186KB) ( 392 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the needs of 5G business development, the number of 5G base stations has increased, resulting in a sharp increase in the electricity cost of operators.Energy saving and consumption reduction has become the sustainable development demand of operators.Based on the research of mainstream 5G base station energy-saving mode and multi-directional 5G energy-saving scheme, a 5G base station energy-saving system based on a variety of AI algorithms was proposed.Through the high-precision service identification at the level of single SIM card, the best strategy of 5G base station flexible energy-saving was realized on the basis of ensuring the stable operation of 5G important services and other types of services.

    Study on interference problems between 5G base stations and adjacent frequency systems
    Jianming YAO
    2021, 37(11):  152-158.  doi:10.11959/j.issn.1000-0801.2021242
    Asbtract ( 246 )   HTML ( 24)   PDF (3524KB) ( 175 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the interference problems in frequency sharing and geographical coexistence between 5G base stations and the adjacent frequency systems such as satellite earth stations, the different situations consisting of the interferences to 5G base stations and the interferences to other stations were analyzed, and the solutions to improve interference positioning efficiency including analyzing the same frequency signal using real-time spectrum function, identifying the signal using 5G NR demodulation function, and locating the interference source combined with same-frequency multiple radio source positioning method were presented.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: