The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien...The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.展开更多
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
Software-Defined Network (SDN) empowers the evolution of Internet with the OpenFlow, Network Virtualization and Service Slicing strategies. With the fast increasing requirements of Mobile Internet services, the Inte...Software-Defined Network (SDN) empowers the evolution of Internet with the OpenFlow, Network Virtualization and Service Slicing strategies. With the fast increasing requirements of Mobile Internet services, the Internet and Mobile Networks go to the convergence. Mobile Networks can also get benefits from the SDN evolution to fulfill the 5th Generation (5G) capacity booming. The article implements SDN into Frameless Network Architecture (FNA) for 5G Mobile Network evolution with proposed Mobile-oriented OpenFlow Protocol (MOFP). The Control Plane/User Plane (CP/UP) separation and adaptation strategy is proposed to support the User-Centric scenario in FNA. The traditional Base Station is separated with Central Processing Entity (CPE) and Antenna Element (AE) to perform the OpenFlow and Network Virtualization. The AEs are released as new resources for serving users. The mobile-oriented Service Slicing with different Quality of Service (QoS) classification is proposed and Resource Pooling based Virtualized Radio Resource Management (VRRM) is optimized for the Service Slicing strategy with resource-limited feature in Mobile Networks. The capacity gains are provided to show the merits of SDN based FNA. And the MiniNet based Trial Network with Service Slicing is implemented with experimental results.展开更多
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu...With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.展开更多
This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry'...This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry's progress in developing the smart grid are described.In particular,the Low Carbon Networks Fund and Electricity Network Innovation Competition projects,together with the rollout of smart metering,are detailed.A more observable,controllable,automated,and integrated electricity network will be supported by these investments in conjunction with smart meter installation.It is found that the focus has mainly been on distribution networks as well as on real-time flows of information and interaction between suppliers and consumers facilitated by improved information and communications technology,active power flow management,demand management,and energy storage.The learning from the GB smart grid initiatives will provide valuable guidelines for future smart grid development in GB and other countries.展开更多
This paper presents Sphere, a scalable multicast framework in overlay network. Sphere is a highly efficient, serf-organizing and robust multicast protocol overlayed on the Internet. The main contrihutions of this pape...This paper presents Sphere, a scalable multicast framework in overlay network. Sphere is a highly efficient, serf-organizing and robust multicast protocol overlayed on the Internet. The main contrihutions of this paper are twofold. First, Sphere organizes the control topology of overlay network in two directions: horizontal and vertical. The horizontal meshes are used to locate and organize hosts in tracks, and the vertical meshes are. used to manage the data paths between tracks. Second, Sphere balances stress and stretch of the overlay network by assigning hosts into different tracks and clusters. This structure distributes stress on the muhicast trees uniformly, and meantime makes path stretch as small as possible. Simulations results show that Sphere can support multicast with large group size and has good performance on organizing meshes and building data delivery trees.展开更多
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join...In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless).展开更多
It is discussed in this paper the capability requirements of modern communication industry for smart pipe or Network Intelligence Capability Enhancement (NICE), Domestic and international researches on smart pipe ar...It is discussed in this paper the capability requirements of modern communication industry for smart pipe or Network Intelligence Capability Enhancement (NICE), Domestic and international researches on smart pipe are elaborated in the essay as well.展开更多
文摘The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
基金This material is supported by the National Natural Science Foundation of China under Grant No.61001116 and 61121001,Beijing Nova Programme No.Z131101000413030,the National Major Project No.2013ZX03003002 and Program for Changjiang Scholars and Innovative Research Team in University No.IRT1049
文摘Software-Defined Network (SDN) empowers the evolution of Internet with the OpenFlow, Network Virtualization and Service Slicing strategies. With the fast increasing requirements of Mobile Internet services, the Internet and Mobile Networks go to the convergence. Mobile Networks can also get benefits from the SDN evolution to fulfill the 5th Generation (5G) capacity booming. The article implements SDN into Frameless Network Architecture (FNA) for 5G Mobile Network evolution with proposed Mobile-oriented OpenFlow Protocol (MOFP). The Control Plane/User Plane (CP/UP) separation and adaptation strategy is proposed to support the User-Centric scenario in FNA. The traditional Base Station is separated with Central Processing Entity (CPE) and Antenna Element (AE) to perform the OpenFlow and Network Virtualization. The AEs are released as new resources for serving users. The mobile-oriented Service Slicing with different Quality of Service (QoS) classification is proposed and Resource Pooling based Virtualized Radio Resource Management (VRRM) is optimized for the Service Slicing strategy with resource-limited feature in Mobile Networks. The capacity gains are provided to show the merits of SDN based FNA. And the MiniNet based Trial Network with Service Slicing is implemented with experimental results.
基金Sponsored by the National High Technology Development Program of China (Grant No. 2002AA142020).
文摘With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.
基金supported in part by the UK-China NSFC/ EPSRC OPEN project (EP/K006274/1 and 51261130473)the Horizon 2020 project P2P-Smart Test
文摘This paper presents an overview of the current status of the development of the smart grid in Great Britain(GB).The definition,policy and technical drivers,incentive mechanisms,technological focus,and the industry's progress in developing the smart grid are described.In particular,the Low Carbon Networks Fund and Electricity Network Innovation Competition projects,together with the rollout of smart metering,are detailed.A more observable,controllable,automated,and integrated electricity network will be supported by these investments in conjunction with smart meter installation.It is found that the focus has mainly been on distribution networks as well as on real-time flows of information and interaction between suppliers and consumers facilitated by improved information and communications technology,active power flow management,demand management,and energy storage.The learning from the GB smart grid initiatives will provide valuable guidelines for future smart grid development in GB and other countries.
文摘This paper presents Sphere, a scalable multicast framework in overlay network. Sphere is a highly efficient, serf-organizing and robust multicast protocol overlayed on the Internet. The main contrihutions of this paper are twofold. First, Sphere organizes the control topology of overlay network in two directions: horizontal and vertical. The horizontal meshes are used to locate and organize hosts in tracks, and the vertical meshes are. used to manage the data paths between tracks. Second, Sphere balances stress and stretch of the overlay network by assigning hosts into different tracks and clusters. This structure distributes stress on the muhicast trees uniformly, and meantime makes path stretch as small as possible. Simulations results show that Sphere can support multicast with large group size and has good performance on organizing meshes and building data delivery trees.
文摘In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless).
文摘It is discussed in this paper the capability requirements of modern communication industry for smart pipe or Network Intelligence Capability Enhancement (NICE), Domestic and international researches on smart pipe are elaborated in the essay as well.