Please wait a minute...

Current Issue

    20 July 2022, Volume 38 Issue 7
    Review
    Critical thinking and suggestions on C-V2X with the developments of intelligent connected vehicles
    Shanzhi CHEN
    2022, 38(7):  1-17.  doi:10.11959/j.issn.1000-0801.2022154
    Asbtract ( 530 )   HTML ( 109)   PDF (890KB) ( 869 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    C-V2X (cellular vehicle-to-everything) is the international standards dominated by China’s enterprises for V2X wireless communications.Based on a brief review of C-V2X, it was indicated that C-V2X could provide capabilities such as low-latency and high-reliability for communications between vehicles and the surrounding traffic elements.C-V2X has demonstrated an obvious surpassing international technological trend and industrial competitions because of technical advantages.The related concepts of V2X, the relationship between 5G and C-V2X, the relationship between V2X and vehicle-infrastructure cooperation, the relationship between V2X and self-driving vehicles as well as the relationship between individual vehicle with intelligence and connected vehicles with cooperative intelligence, were clearly clarified.The insights about the development of C-V2X and intelligent connected vehicles (ICV) were presented.Facing the great strategic opportunities of global automobile industry revolution and China’s transportation industry reform, the innovative development mode of vehicle-infrastructure-cloud cooperation based on “5G+C-V2X” was proposed accordingly.Finally, the industrial progresses and problems were discussed with corresponding policy suggestions.

    Topic: Future Optical Communication Technology
    Network architecture and key technologies of intelligent optical networks driven by data and model
    Zhiqun GU, Jiawei ZHANG, Yuefeng JI, Hao YU, Taleb Tarik
    2022, 38(7):  18-30.  doi:10.11959/j.issn.1000-0801.2022163
    Asbtract ( 372 )   HTML ( 56)   PDF (2199KB) ( 342 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the expanding scale of the networks and the emerging applications of ultra-massive connection, ultra-high bandwidth and ultra-low delay, higher requirements are proposed for the utilization of optical transmission network resources and network differentiated services, which makes the network and configuration mode driven by the traditional approaches face challenges.Based on the idea of data and model collaborative driving, the intelligent optical network technologies of three-layerthree-cycle architecture and three functions were proposed, and the implementation technology was studied.The performance of the proposed algorithms was evaluated based on the designed intelligent transmission network platform.The validation results show that the transmission performance of intelligent optical network driven by collaborative data and model has been effectively improved, which provides theoretical and technical support for the realization of network intelligence.

    Weakly-coupled real-time SDM technology for short-reach optical transmission
    Yuyang GAO, Juhao LI, Yongqi HE, Zhangyuan CHEN
    2022, 38(7):  31-36.  doi:10.11959/j.issn.1000-0801.2022165
    Asbtract ( 195 )   HTML ( 22)   PDF (1235KB) ( 253 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The capacity upgrade of short-reach optical fiber transmission has received more and more attention.Spatial division multiplexing provides two new dimensions of fiber core and mode, which can greatly increase the transmission capacity of a single fiber.However, the crosstalk between spatial channels severely limits the practical application of space division multiplexing technology.To address the problem, a weakly-coupled space-division multiplexing fiber was firstly designed, in which perturbed rings were introduced in the core to increase the effective refractive index difference between LP modes.Secondly, an all-fiber mode multiplexer/demultiplexer that could handle non-circularly symmetric degenerate LP modes was proposed, as well as a low insertion loss and low crosstalk fan-in and fan-out devices.Based on the proposed fiber and devices, the low-cost intensity modulation and direct detection were used to implement the short-reach weakly-coupled mode-division-multiplexing and multi-core and few-mode real-time transmission.Finally, the prospective of space-division multiplexing real-time optical transmission technology was discussed.

    Key technologies development and application prospect of ROADM all-optical switching network
    Kai LV, Bin QI, Shengqian ZHONG, Anxu ZHANG, Lipeng FENG
    2022, 38(7):  37-42.  doi:10.11959/j.issn.1000-0801.2022157
    Asbtract ( 283 )   HTML ( 34)   PDF (988KB) ( 402 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development history of reconfigurable optical add/drop multiplexer (ROADM) networks, ROADM technical solutions and the deployment of ROADM networks in China were described.And the development direction of the key technologies of ROADM was described, including optical cross-connect (OXC), high dimensions wavelength selected switch (WSS), colorless/directionless/contentionless ROADM (CDC-ROADM), 400 Gbit/s FlexGrid ROADM, and next-generation wavelength switched optical networks (WSON2.0) intelligent control plane technologies.The existing ROADM network application scenarios and technology development trend were analyzed, and the future prospects of the ROADM all-optical switching network were looked forward to.

    Advanced optical receiver architectures for ultra-high capacity but low-cost short-reach optical interconnects
    Honglin JI, Xueyang LI, Zhixue HE, Weisheng HU, Shieh William
    2022, 38(7):  43-56.  doi:10.11959/j.issn.1000-0801.2022159
    Asbtract ( 352 )   HTML ( 51)   PDF (1148KB) ( 353 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The deployment of emerging network infrastructure such as hyper-scale datacenters urgently requires ultra-high capacity but low-cost short-reach optical interconnects.Conventional intensity modulation and direct detection possesses a simple receiver structure but can only recover the intensity information, which restrains the capability of further scaling up the system capacity.Standard coherent detection can deliver high-order modulation formats and achieve high-capacity transmission.Nevertheless, the coherent transceiver requiring expensive narrow-linewidth laser sources and computation-intensive digital signal processing precludes its wide applications in short-reach systems.The advanced direct-detection optical receivers aim to combine the advantages of both direct detection and coherent detection and bridge the gap between them.Therefore, the advanced optical receivers are mainly based on self-coherent detection.Advanced single-polarization, dual-polarization, and few-mode optical receiver architectures wereintroduced.The proposed advanced optical receivers can retrieve the optical field via direct detection without using the narrow-linewidth lasers, which enables the realization of ultra-high capability but low-cost short-reach optical interconnects.

    Research and practice on fault location technology based on open optical transport network
    Hao LIU, Xiaoli HUO, Qian HU, Yi DING
    2022, 38(7):  57-62.  doi:10.11959/j.issn.1000-0801.2022158
    Asbtract ( 199 )   HTML ( 21)   PDF (807KB) ( 307 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present the network management system of different types of equipment are relatively independent.The problem about how to quickly recover network failure towards inter-domain optical networks is required to be solved in terms of network operation and maintenance.Some fault location schemes within inter-domain optical networks were studied.When any inter-domain fault occurs, firstly, some technologies about automatic link discovery protocol and pilot tone technology of optical modules were applied to get complete optical link information and data.Then, real-time performance monitoring technology and root cause analysis function were used to find the root alarm towards specified network fault.Ultimately the management domain of optical transport networks has been extended by using those methods above on basis of developed prototype system of transmission network operation quality analysis, which may produce an end-to-end open and unified optical transport network management system including the remote client side.

    Research and Development
    PAPR optimization based on SLM and PTS algorithms in NC-OFDM systems
    Jie ZHOU, Bernardo Esono Esono Mikue, Xueying WANG, Huiting ZHOU, Hong LUO
    2022, 38(7):  63-74.  doi:10.11959/j.issn.1000-0801.2022155
    Asbtract ( 136 )   HTML ( 16)   PDF (891KB) ( 277 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the non-continuous orthogonal frequency division multiplexing (NC-OFDM) model, a fusion optimization technology based on selected mapping (SLM) algorithm and partial transmit sequence (PTS) algorithm was proposed, and a system model of fusion technology was designed.Through simulation comparison with other literature methods, it was verified that the SLM-PTS fusion technology had excellent peak to average power ratio (PAPR) reduction ability, but the algorithm implementation complexity was too high.Therefore, a complementary SLM-Clipping fusion solution was proposed, and the deep learning method PAPRnet model was construted.The simulation results verif that prove the effectiveness of the method, the algorithm has an excellent PAPR suppressed effect on the NC-OFDM system, and greatly improves the computational efficiency.

    Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers
    Haiyang HU, Zepin LI, Zhongjin LI
    2022, 38(7):  75-87.  doi:10.11959/j.issn.1000-0801.2022139
    Asbtract ( 153 )   HTML ( 8)   PDF (2614KB) ( 337 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.

    Micro-station sleeping algorithm based on coverage area priority in 5G network
    Ziren WANG, Yi LI
    2022, 38(7):  88-95.  doi:10.11959/j.issn.1000-0801.2022160
    Asbtract ( 235 )   HTML ( 25)   PDF (840KB) ( 249 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.

    Design of concatenated Hash-Polar code based on segmented CRC code
    Zhengjie LI, Shunlan LIU, Xu ZHANG
    2022, 38(7):  96-105.  doi:10.11959/j.issn.1000-0801.2022168
    Asbtract ( 154 )   HTML ( 10)   PDF (977KB) ( 93 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a linear block code, the polarization code has a lower coding complexity and a definite structure, but when it has a short or medium code length, the performance will be reduced.A design method of concatenated HashPolar codes based on segmented cyclic redundancy check (CRC) codes was proposed, which was based on the original Hash-Polar code and used CRC segmented check for double check.The segmented CRC code could assist the path measurement in the decoding process, that was, modify the decoding path, so as to improve the reliability of path selection and the performance.In addition, the segmented check was to add the check code dispersedly to the input information sequence.If the CRC failed during decoding, the decoding path could be terminated in advance to save unnecessary decoding calculations.Finally, at the end of the decoding, Hash check code verified the modified L paths and selected the best decoding path.The simulation results show that the design method proposed has better bit-error-rate performance than CRC-assisted Hash-Polar (Hash-CRC-Polar).In the Gaussian channel, when the code length is 128 bit, the code rate is 1/2, and the bit error rate is 10-3, the Hash-Polar code based on the segmented CRC code proposed achieves a gain of about 0.25 dB over Hash-CRC-Polar.

    Research on key technology and development of industrial Internet network
    Feng WANG, Qingmin YU, Ying HUANG, Shihui Duan
    2022, 38(7):  106-113.  doi:10.11959/j.issn.1000-0801.2022156
    Asbtract ( 335 )   HTML ( 76)   PDF (759KB) ( 423 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years, the rapid development of the industrial Internet has become an important approach to promote the digital transformation of the industries.In order to maximize the role of the comprehensive interconnection of people, machines, things and enterprises in the industrial Internet, it is necessary to build a more open, more resilient and more diverse network which integrates automation systems, communication networks, and new-generation information technologies, and also meets the basic requirements of the reliability, stability, and security.The connotation of the industrial Internet network serving manufacturing was discussed.Relevant key technologies, applicable scenarios and main research results were introduced.The research and development trends in this field were summarized and analyzed.Suggestions for further construction and deployment of the industrial Internet networks were proposed.

    Review on the research of the global emergency communication spectrum
    Xiaoyong LIU, Xixi FAN, Lin ZHU, Yuanxin YAO
    2022, 38(7):  114-125.  doi:10.11959/j.issn.1000-0801.2022167
    Asbtract ( 208 )   HTML ( 19)   PDF (746KB) ( 286 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The construction of an emergency private network is the necessity of unified command and dispatch communications in rescue of disasters, emergency response, and major activity safeguard.It is an important communication means of public safety protection.With the rapid development of radio technology, the traditional narrowband emergency communication system is difficult to meet the needs of multimedia data, interconnection, anti-interference and other needs under the new situation.Digitization, broadband and ubiquity have become the inevitable trend of the development of emergency private networks.First of all, the technical system and development trend of emergency communication were summarized, the global emergency communication research framework were introduced, the frequency planning and current use status of the emergency private network in the United States, Europe, Asia-Pacific and other countries and regions were analyzed.Finally, combine with the current frequency planning, suggestions for the construction of China’s emergency private network from the aspects of technology trends, industrial development, frequency band selection, and construction mode were presented.

    Application of step area algorithm in IDC traffic billing
    Shizong LI, Zhihai CHEN, Yongming YAN
    2022, 38(7):  126-137.  doi:10.11959/j.issn.1000-0801.2022151
    Asbtract ( 183 )   HTML ( 15)   PDF (5228KB) ( 176 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IDC customers reduce costs through traffic scheduling, which leads to waste of resources and increase of operation and maintenance costs of operators.Area billing could effectively improve this problem.It made a comparison between area billing and 95% peak rate billing method, and innovatively tried the step area algorithm.By connecting the difference between 95% peak rate value and average value and 95% peak rate billing and area billing price, the data dimension reduction was carried out, and the two-dimensional scatter diagram was obtained by programming exhaustive calculation, and the relationship between them was analyzed to explore the possibility of area billing.The experimental results show that the area of pricing could guide the customer does not adopt the way of traffic scheduling to reduce costs, in addition ladder area of billing way can meet the current traffic situation in the certain degree differ with 95 billing way smaller, the flow demand rises customers reduce costs, operators can get the corresponding profits at the same time, achieve a win-win situation.

    Engineering and Application
    Architecture of a new infrastructure for data service in DT era
    Gengsheng HUANG, Yuhong HUANG, Manxue GUO, Jianping ZHENG, Xin GE
    2022, 38(7):  138-145.  doi:10.11959/j.issn.1000-0801.2022136
    Asbtract ( 212 )   HTML ( 21)   PDF (1269KB) ( 325 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Data technology (DT) era centered on the data technology and data service was coming.To handle the major challenges in the data exchange and transactions, a new infrastructure - data sharing service network (DSSN) was proposed, which provided the data interconnection, exchange, transactions, supervision and other services for regulators, data providers, data applications and technical support providers.The design principles of DSSN system were outlined as compliance, security, fairness, openness and connection service.And the architecture of DSSN system was designed according to the principles.A layered architecture was applied to the data sharing service node with the service control layer and service capability layer.The data node was composed of the data sharing dedicated server and data source, and was connected to DSSN through data gateway.

    Research on cloud native based distributed IoT operating system architecture
    Nan CHEN, Jianjun ZHAO, Ping ZHONG, Yongjun HUANG, Tian CHEN
    2022, 38(7):  146-156.  doi:10.11959/j.issn.1000-0801.2022144
    Asbtract ( 398 )   HTML ( 49)   PDF (811KB) ( 490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Complex application development, various types of IoT devices, diverse network technology and different types of IoT edge are the major problems of IoT.The novel concept and architecture of the cloud native based distributed IoT operating system were proposed with 8 core features, which extended the scope of operating system from IoT devices to the edge and cloud, followed the trend analysis of IoT industry and technology.The cloud native based distributed IoT operating system has been utilized to decoupling the complexity and differences of massive heterogeneous resources of cloud (platform), edge gateway, devices and the one-stop full life cycle support of intelligent Internet of things applications development, deployment and hosting.The research and development practices of CTWing OS as well as testing and applications were also introduced.

    Gigabit broadband all-optical indoor far-end coverage
    Wenfa YAN, Feng CHEN
    2022, 38(7):  157-165.  doi:10.11959/j.issn.1000-0801.2022170
    Asbtract ( 216 )   HTML ( 13)   PDF (907KB) ( 164 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The indoor wireless local area network has the problem of uneven signal coverage.Moreover, a mismatch between the wireless bandwidth and the incoming broadband rate exists.The research status of wideband indoor wireless coverage was provided with traditional technologies.A new signal coverage technology combining the optical gateway and remote extension covering equipment, using the optical fiber as the transmission medium, was proposed.Experimental results on two examples show that uniform indoor wireless signal coverage and a gigabit level of the rate can be achieved when using the proposed technology.

    Technical solution and application of 5G slicing private network based on cloud-network integration
    Kai CHEN
    2022, 38(7):  166-174.  doi:10.11959/j.issn.1000-0801.2022161
    Asbtract ( 261 )   HTML ( 48)   PDF (1849KB) ( 396 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.

    Key technologies of NR multicast and broadcast services
    Xiayan XU
    2022, 38(7):  175-183.  doi:10.11959/j.issn.1000-0801.2022040
    Asbtract ( 400 )   HTML ( 35)   PDF (710KB) ( 327 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Internet protocol television (IPTV), group communication and other applications are regarded as multicast/broadcast services.5G cellular mobile communication system should support the transmission of such application data efficiently.Firstly, the basic architecture of 5G multicast/broadcast system based on NR was analyzed according to the different transmission modes of multicast/broadcast application data from 5GC to UE via gNB.Then, the key technologies of 5G multicast/broadcast radio transmission were analyzed in detail from the aspects of air interface protocol stack, physical layer and higher layer protocol enhancements, service process and service continuity, etc.Finally, the evolution trends of 5G multicast/broadcast technology were prospected.

    Research and practice of network security threat intelligence management system for power enterprise
    Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG
    2022, 38(7):  184-189.  doi:10.11959/j.issn.1000-0801.2022133
    Asbtract ( 234 )   HTML ( 29)   PDF (3694KB) ( 182 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network security is an important part of the national security, and network security threat intelligence work has become an important part of the network security protection.Aiming at the problems of power enterprise carrying out network security threat intelligence, such as many sources, many types, wide range, many vulnerability risks, many subordinate departments and personnel, the network security threat intelligence work plan of power enterprise was put forward.The scheme includes five aspects: information source, information research and judgment, information disposal, information platform and information performance.The evaluation method of network security vulnerabilities, information emergency disposal process and information performance evaluation method were puts forward.The preliminary application results show that the proposed scheme has important reference value for power enterprise to improve the emergency response ability of network security information and the level of network security protection ability.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: