- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Network Security and Intrusion Detection
- Advanced MIMO Systems Optimization
- Software System Performance and Reliability
- Network Traffic and Congestion Control
- Cloud Data Security Solutions
- IoT and Edge/Fog Computing
- DNA and Biological Computing
- Global Trade and Competitiveness
- Error Correcting Code Techniques
- Bayesian Methods and Mixture Models
- Advanced Memory and Neural Computing
- Adaptive Control of Nonlinear Systems
- Consumer Market Behavior and Pricing
- Distributed Control Multi-Agent Systems
- Caching and Content Delivery
- Advanced biosensing and bioanalysis techniques
- Neural Networks Stability and Synchronization
- Advanced Queuing Theory Analysis
- Network Packet Processing and Optimization
- Blockchain Technology Applications and Security
- Consumer Retail Behavior Studies
- International Business and FDI
- Mobile Agent-Based Network Management
China Academy of Engineering Physics
2023
Beijing University of Posts and Telecommunications
2017-2023
Jiangsu University
2023
National University of Defense Technology
2022
Civil Aviation University of China
2015
This paper investigates the slice-based service function chain embedding (SBSFCE) problem, which is to embed chains (SFCs) of flows from different slices on a physical network for end-to-end slice deployment. Compared with regarding deployment as complete virtual (VNE), deploying perspective SBSFCE beneficial achieving more delicate resource allocation and jointly optimizing (VNF) mapping link without need particular topology designs. However, performing effective also faces several key...
Network function virtualization (NFV) has become an emerging issue in both academia and industry. By outsourcing network functions from dedicated hardware to platform, NFV promises significantly improve the scalability flexibility of management orchestration. One main challenges for deployment is realize coordinated service chaining on NFV-based infrastructures. This challenge referred as resource allocation (coordinated NFV-RA) problem which proved be NP-hard. In order response timely...
Multicast is an effective transmission mode to support ever-growing multimedia applications. The introduction of software defined networking (SDN) and network function virtualization (NFV) makes the multicast service operation more flexible efficient. Nevertheless, one main challenge SDN/NFV-enabled optimally orchestrating chain (SFC) match resources. Compared with unicast, SFC orchestration (MSO) challenging due features like routing user fluidity (i.e., frequent arrival departure). There...
The proposition of network function virtualization (NFV) aims to solve the difficulty and ossification in current network's management service provision caused by ever-growing NFs with dedicated hardware. By decoupling from hardware virtualized platform, NFV promises flexible deployment chains (SFCs). However, an optimal resource allocation for requested SFC NFV-based infrastructures should coordinately consider following three stages: virtual functions (VNFs) chain composing, VNF forwarding...
Digital transformation is reshaping the decision making management of rental service mode in manufacturing industry, and improving digital detection technology big data marketing have become effective ways to create value. Based on three-level platform supply chain network structure composed manufacturers, operators demand market, a equilibrium model considering input constructed by using variational inequality Nash theory, optimal conditions manufacturers are derived. Combined with Euler...
This paper investigates the Joint Optimization of Base station sleeping, Functional split, and Routing selection (JOBFR) in virtualized radio access network (vRAN) architectures to minimize operator's total cost, including operating cost migration while satisfying user requirements. Specifically, we first use mathematical methods describe relationships between base (BS) functional split (FS) routing selection, then model goal as a joint optimization problem. Next, propose heuristic algorithm...
In order to support the exchange of VPN routing information between operators, it is necessary extend existing protocols and modify MPLS architecture provide an interconnection model that different from provided by basic architecture, is, BGP-based cross-domain so prefix label can be traversed across interoperator link.This paper introduces conceptual based on BGP, analyzes working principle BGP in depth, compares current mainstream three types (VPN-OptionA, VPNOptionB, VPN-OptionC) aspects...
Virtual network Embedding (VNE) is recognized as the fundamental issue in virtualization. Previous work VNE mainly focused on researching efficient static algorithms without considering dynamic topology remapping which may have an impact mapping efficiency. In this paper, we address problem and give a classification to clarify approaches under any circumstances. We find that choosing different strategies between timing, object algorithm will affect further schemes.
The evolving 5G virtualization technology is a key enabler for the radio access network (RAN) slicing, which aims to support services with differentiated requirements. One of major challenges in RAN slicing inter-slice interference caused by sharing spectrum resources between different base stations (BSs). To tackle this obstacle and guarantee user experience, paper first models multi-base station scenario. Then resource allocation algorithm based on non-interference idle resources, Priority...
Network slicing is a promising technology to provide various services on common physical network infrastructure. A slice logical virtual composed of group service function chains (SFCs) and the operator performs SFC embedding (SFCE) create orchestrate slices. Compared conventional SFCE, implementing slice-based SFCE (SBSFCE) faces some new challenges like diversified requirements SFCs, inter-slice intra-slice VNF sharing, priority-based admission control due introduction dimension. In this...
Typically, traffic within a cluster of IIoT (Industrial Internet Things) services is secure by default. However, accidental access privileged users inside the cluster, compromised services, and malicious requests carefully constructed attackers can cause sensitive data leakage threaten security even other applications themselves. In order to defend against possible threats from service we propose an approach implement verification based on API function control. The service, when handling...
Retracted.
Polar codes have attracted a lot of attention during past few years and been adopted as coding scheme for 5G standard. Successive-cancellation list (SCL) decoder provides high level error-correction performance polar codes, but the implementation complexity grows rapidly with increase size. Since computation cost sorting, many works focus on reducing sorting SCL decoder. In this paper, we propose method which directly reduce number input elements network without loss. Compared decoder,...