The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in...The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.展开更多
The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as...The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as a cornerstone of future communication systems.The demand for ubiquitous connectivity,resilient infrastructures,and intelligent network services has never been greater,driven by applications ranging from global broadband access to emergency response and space-air-ground integration.展开更多
Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid ...Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid of curvularin and purine.The structures and absolute configurations of compounds 1-9 were elucidated via nuclear magnetic resonance(NMR)spectroscopy,X-ray diffraction,electronic circular dichroism(ECD)calculations,^(13)C NMR calculation,modified Mosher's method,and chemical derivatization.Investigation of anti-inflammatory activities revealed that compounds 7-9,11,12,14,15,and 18 exhibited significant suppressive effects against lipopolysaccharide(LPS)-induced nitric oxide(NO)production in murine macrophage RAW264.7 cells,with IC_(50)values ranging from 0.44 to 4.40μmol·L^(-1).Furthermore,these bioactive compounds were found to suppress the expression of inflammation-related proteins,including inducible NO synthase(i NOS),cyclooxygenase-2(COX-2),NLR family pyrin domain-containing protein 3(NLRP3),and nuclear factor kappa-B(NF-κB).Additional studies demonstrated that the novel compound 7 possessed potent antiinflammatory activity by inhibiting the transcription of inflammation-related genes,downregulating the expression of inflammation-related proteins,and inhibiting the release of inflammatory cytokines,indicating its potential application in the treatment of inflammatory diseases.展开更多
The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic c...The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic complementarity of multiple bands are crucial for enhancing the spectrum efficiency,reducing network energy consumption,and ensuring a consistent user experience.This paper investigates the present researches and challenges associated with deployment of multi-band integrated networks in existing infrastructures.Then,an evolutionary path for integrated networking is proposed with the consideration of maturity of emerging technologies and practical network deployment.The proposed design principles for 6G multi-band integrated networking aim to achieve on-demand networking objectives,while the architecture supports full spectrum access and collaboration between high and low frequencies.In addition,the potential key air interface technologies and intelligent technologies for integrated networking are comprehensively discussed.It will be a crucial basis for the subsequent standards promotion of 6G multi-band integrated networking technology.展开更多
From fifth-generation(5G)communication technology onward,non-terrestrial networks(NTNs)have emerged as a key component of future network architectures.Especially through the rise of low-Earth-orbit satellite constella...From fifth-generation(5G)communication technology onward,non-terrestrial networks(NTNs)have emerged as a key component of future network architectures.Especially through the rise of low-Earth-orbit satellite constellations,NTNs enable a space Internet and present a paradigm shift in delivering reliable services to even the most remote regions on Earth.However,the extensive coverage and rapid movement of satellites pose unique challenges in user equipment access and inter-satellite transmission,impacting the quality of service and service continuity.This paper offers an in-depth review of NTN networking technologies in the context of six-generation(6G)mobile networks evolution,focusing on access management,satellite mobility,and hetero-network slicing.Building on this foundation and considering the latest trends in NTN development,we then present innovative perspectives on emerging challenges,including satellite beamforming,handover mechanisms,and service delivery.Lastly,we identify key open research areas and propose future directions to improve NTN performance and accelerate satellite Internet deployment.展开更多
Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using c...Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using complex network theory,this study proposes a hierarchy for TSN and introduces the concept of bounded time error.A coupling model between traffic scheduling and time synchronization is established,deriving functional relationships among end-to-end delay,delay jitter,gate window,and time error.These relationships illustrate that time errors can trigger jumps in delay and delay jitter.To evaluate different time errors impact on traffic scheduling performance,an end-to-end transmission experiment scheme is designed,along with the construction of a TSN test platform implementing two representative cases.Case A is a closed TSN domain scenario with pure TSN switches emulating closed factory floor network.Case B depicts remote factory interconnection where TSN domains link via non-TSN domains composed of OpenFlow switches.Results from Case A show that delay and delay jitter on a single node are most significantly affected by time errors,up to one gating cycle.End-to-end delay jitter tends to increase with the number of hops.When the ratio of time error bound to window exceeds 10%,the number of schedulable traffic flows decreases rapidly.Case B reveals that when time error is below 1μs,the number of schedulable traffic flows begins to increase significantly,approaching full schedulability at errors below 0.6μs.展开更多
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a...The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes.展开更多
(±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified co...(±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified compounds(5–7),were isolated from the crude extract of the mangrove-derived fungus Penicillium sp.,guided by heteronuclear single quantum correlation(HSQC)-based small molecule accurate recognition technology(SMART 2.0)and liquid chromatography-tandem mass spectrometry(LC-MS/MS)-based molecular networking.The structural elucidation of new compounds was accomplished through comprehensive spectroscopic analysis,and their absolute configurations were determined using DP4+^(13)C nuclear magnetic resonance(NMR)calculations and electronic circular dichroism(ECD)calculations.Compounds 1a/1b–4a/4b demonstrated moderate cytotoxicity against three human cancer cell lines HeLa,HCT116 and MCF-7 with half maximal inhibitory concentration(IC50)values ranging from 15.95±1.64 to 28.56±2.59μmol·L–1.展开更多
Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently r...Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently realize load balancing.However,such a ubiquitous caching approach may cause problems including duplicate caching and low data diversity,thus reducing the caching efficiency of NDN routers.To mitigate these caching problems and improve the NDN caching efficiency,in this paper,a hierarchical-based sequential caching(HSC)scheme is proposed.In this scheme,the NDN routers in the data transmission path are divided into various levels and data with different request frequencies are cached in distinct router levels.The aim is to cache data with high request frequencies in the router that is closest to the content requester to increase the response probability of the nearby data,improve the data caching efficiency of named data networks,shorten the response time,and reduce cache redundancy.Simulation results show that this scheme can effectively improve the cache hit rate(CHR)and reduce the average request delay(ARD)and average route hop(ARH).展开更多
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late...Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.展开更多
The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data....The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.展开更多
With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of hig...With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of high, medium, and low Earth orbit satellite networks with terrestrial networks has become a critical direction for future communication technologies. The objective is to develop a space-terrestrial integrated 6G network that ensures ubiquitous connectivity and seamless services, facilitating intelligent interconnection and collaborative symbiosis among humans, machines, and objects. This integration has become a central focus of global technological innovation.展开更多
With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.Howev...With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.However,battlefield uncertainties,such as equipment failures and enemy attacks,can impact these collaborative operations'stability and communication efficiency.To this end,we design a highly destruction-resistant air-ground cooperative resilient networking platform that aims to enhance the robustness of network communications by integrating ground vehicle information for UAV network deployment.It then incorporates the concept of virtual guiding force,enabling the UAV swarm to adaptively configure its network layout based on ground vehicle information,thereby improving network destruction resistance.Simulation results demonstrate that the UAV swarm involved in the proposed platform exhibits balanced flight energy consumption and excellent performance in network destruction resistance.展开更多
1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring na...1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring nations and regions,including the United States,Europe,China,and Russia.Specifically,Space X’s Starlink project has deployed over 6750 satellites,2while One Web has completed its initial phase of satellite constellation deployment with more than 600 satellites.展开更多
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl...As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.展开更多
In-network caching and Interest packets aggregation are two important features of Content-Centric Networking(CCN).CCN routers can directly respond to the Interest request by Content Store(CS)and aggregate the same Int...In-network caching and Interest packets aggregation are two important features of Content-Centric Networking(CCN).CCN routers can directly respond to the Interest request by Content Store(CS)and aggregate the same Interest packets by Pending Interest Table(PIT).In this way,most popular content requests will not reach the origin content server.Thus,content providers will be unaware of the actual usages of their contents in network.This new network paradigm presents content providers with unprecedented challenge.It will bring a great impact on existing mature business model of content providers,such as advertising revenue model based on hits amount.To leverage the advantages of CCN and the realistic business needs of content providers,we explore the hits-based content provisioning mechanism in CCN.The proposed approaches can avoid the unprecedented impact on content providers' existing business model and promote content providers to embrace the real deployment of CCN network.展开更多
The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evo...The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evolution)technology, especially TD-LTE (time division-LTE) technology adopting the spectral asymmetric. This paper analyzed details of TD-LTE system networking, and studied the feasibility of TD-LTE and TD-SCDMA(TD-synchronous code division multiple access) system with the same spectrum. At last, the paper provided suggestions on networking of TD-LTE system.展开更多
Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmab...Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed.展开更多
基金supported in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the National Natural Science Foundation of China(Grant No.92067102)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility.
文摘The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as a cornerstone of future communication systems.The demand for ubiquitous connectivity,resilient infrastructures,and intelligent network services has never been greater,driven by applications ranging from global broadband access to emergency response and space-air-ground integration.
基金funded by the National Key Research and Development Program of China(No.2022YFC2804101)the Guangdong Provincial Key R&D Program(No.2023B1111050011)+2 种基金the Guangdong Basic and Applied Basic Research Foundation(No.2023A1515010432)the Guangzhou Basic and Applied Basic Research Foundation(No.202201010305)the High-Level Talents Special Program of Zhejiang(No.2022R52036)。
文摘Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid of curvularin and purine.The structures and absolute configurations of compounds 1-9 were elucidated via nuclear magnetic resonance(NMR)spectroscopy,X-ray diffraction,electronic circular dichroism(ECD)calculations,^(13)C NMR calculation,modified Mosher's method,and chemical derivatization.Investigation of anti-inflammatory activities revealed that compounds 7-9,11,12,14,15,and 18 exhibited significant suppressive effects against lipopolysaccharide(LPS)-induced nitric oxide(NO)production in murine macrophage RAW264.7 cells,with IC_(50)values ranging from 0.44 to 4.40μmol·L^(-1).Furthermore,these bioactive compounds were found to suppress the expression of inflammation-related proteins,including inducible NO synthase(i NOS),cyclooxygenase-2(COX-2),NLR family pyrin domain-containing protein 3(NLRP3),and nuclear factor kappa-B(NF-κB).Additional studies demonstrated that the novel compound 7 possessed potent antiinflammatory activity by inhibiting the transcription of inflammation-related genes,downregulating the expression of inflammation-related proteins,and inhibiting the release of inflammatory cytokines,indicating its potential application in the treatment of inflammatory diseases.
基金supported by China’s National Key R&D Program(Project Number:2022YFB2902100)。
文摘The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic complementarity of multiple bands are crucial for enhancing the spectrum efficiency,reducing network energy consumption,and ensuring a consistent user experience.This paper investigates the present researches and challenges associated with deployment of multi-band integrated networks in existing infrastructures.Then,an evolutionary path for integrated networking is proposed with the consideration of maturity of emerging technologies and practical network deployment.The proposed design principles for 6G multi-band integrated networking aim to achieve on-demand networking objectives,while the architecture supports full spectrum access and collaboration between high and low frequencies.In addition,the potential key air interface technologies and intelligent technologies for integrated networking are comprehensively discussed.It will be a crucial basis for the subsequent standards promotion of 6G multi-band integrated networking technology.
基金supported by the National Research Foundation,Singapore and Infocomm Media Development Authority under its Future Communications Research&Development Programme.
文摘From fifth-generation(5G)communication technology onward,non-terrestrial networks(NTNs)have emerged as a key component of future network architectures.Especially through the rise of low-Earth-orbit satellite constellations,NTNs enable a space Internet and present a paradigm shift in delivering reliable services to even the most remote regions on Earth.However,the extensive coverage and rapid movement of satellites pose unique challenges in user equipment access and inter-satellite transmission,impacting the quality of service and service continuity.This paper offers an in-depth review of NTN networking technologies in the context of six-generation(6G)mobile networks evolution,focusing on access management,satellite mobility,and hetero-network slicing.Building on this foundation and considering the latest trends in NTN development,we then present innovative perspectives on emerging challenges,including satellite beamforming,handover mechanisms,and service delivery.Lastly,we identify key open research areas and propose future directions to improve NTN performance and accelerate satellite Internet deployment.
基金supported in part by the Science and Technology Research and Development Foundation of China Academy of Railway Sciences Corporation Limited(Grant No.2023YJ364)in part by National Key R&D Program of China(Grant No.2022YFC3803700)in part by the project of Beijing Laboratory of Advanced Information Networks.
文摘Time synchronization is a prerequisite for ensuring determinism in time-sensitive networking(TSN).While time synchronization errors cannot be overlooked,pursuing minimal time errors may incur unnecessary costs.Using complex network theory,this study proposes a hierarchy for TSN and introduces the concept of bounded time error.A coupling model between traffic scheduling and time synchronization is established,deriving functional relationships among end-to-end delay,delay jitter,gate window,and time error.These relationships illustrate that time errors can trigger jumps in delay and delay jitter.To evaluate different time errors impact on traffic scheduling performance,an end-to-end transmission experiment scheme is designed,along with the construction of a TSN test platform implementing two representative cases.Case A is a closed TSN domain scenario with pure TSN switches emulating closed factory floor network.Case B depicts remote factory interconnection where TSN domains link via non-TSN domains composed of OpenFlow switches.Results from Case A show that delay and delay jitter on a single node are most significantly affected by time errors,up to one gating cycle.End-to-end delay jitter tends to increase with the number of hops.When the ratio of time error bound to window exceeds 10%,the number of schedulable traffic flows decreases rapidly.Case B reveals that when time error is below 1μs,the number of schedulable traffic flows begins to increase significantly,approaching full schedulability at errors below 0.6μs.
基金supported by the IITP(Institute of Information&Communications Technology Planning&Evaluation)-ITRC(Information Technology Research Center)grant funded by the Korean government(Ministry of Science and ICT)(IITP-2025-RS-2024-00438056).
文摘The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes.
基金supported by the National Key Research and Development Program of China(No.2022YFC2303100)the National Natural Science Foundation of China(Nos.32022002 and 21977113).
文摘(±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified compounds(5–7),were isolated from the crude extract of the mangrove-derived fungus Penicillium sp.,guided by heteronuclear single quantum correlation(HSQC)-based small molecule accurate recognition technology(SMART 2.0)and liquid chromatography-tandem mass spectrometry(LC-MS/MS)-based molecular networking.The structural elucidation of new compounds was accomplished through comprehensive spectroscopic analysis,and their absolute configurations were determined using DP4+^(13)C nuclear magnetic resonance(NMR)calculations and electronic circular dichroism(ECD)calculations.Compounds 1a/1b–4a/4b demonstrated moderate cytotoxicity against three human cancer cell lines HeLa,HCT116 and MCF-7 with half maximal inhibitory concentration(IC50)values ranging from 15.95±1.64 to 28.56±2.59μmol·L–1.
基金supported in part by the National Natural Science Foundation of China under Grant 61972424 and 62372479in part by the High Value Intellectual Property Cultivation Project of Hubei Province,China,under grant D2021002094+1 种基金in part by JSPS KAKENHI under Grants JP16K00117 and JP19K20250in part by the Leading Initiative for Excellent Young Researchers(LEADER),MEXT,Japan,and KDDI Foundation.
文摘Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently realize load balancing.However,such a ubiquitous caching approach may cause problems including duplicate caching and low data diversity,thus reducing the caching efficiency of NDN routers.To mitigate these caching problems and improve the NDN caching efficiency,in this paper,a hierarchical-based sequential caching(HSC)scheme is proposed.In this scheme,the NDN routers in the data transmission path are divided into various levels and data with different request frequencies are cached in distinct router levels.The aim is to cache data with high request frequencies in the router that is closest to the content requester to increase the response probability of the nearby data,improve the data caching efficiency of named data networks,shorten the response time,and reduce cache redundancy.Simulation results show that this scheme can effectively improve the cache hit rate(CHR)and reduce the average request delay(ARD)and average route hop(ARH).
基金supported by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
基金supported by the National High-tech R&D Program("863"Program)of China(No.2013AA013505)the National Science Foundation of China(No.61472213)State Scholarship Fund from China Scholarship Council(No.201406210270)
文摘The basic function of the Internet is to delivery data(what) to serve the needs of all applications. IP names the attachment points(where) to facilitate ubiquitous interconnectivity as the current way to deliver data. The fundamental mismatch between data delivery and naming attachment points leads to a lot of challenges, e.g., mapping from data name to IP address, handling dynamics of underlying topology, scaling up the data distribution, and securing communication, etc. Informationcentric networking(ICN) is proposed to shift the focus of communication paradigm from where to what, by making the named data the first-class citizen in the network, The basic consensus of ICN is to name the data independent from its container(space dimension) and session(time dimension), which breaks the limitation of point-to-point IP semantic. It scales up data distribution by utilizing available resources, and facilitates communication to fit diverse connectivity and heterogeneous networks. However, there are only a few consensuses on the detailed design of ICN, and quite a few different ICN architectures are proposed. This paper reveals the rationales of ICN from the perspective of the Internet evolution, surveys different design choices, and discusses on two debatable topics in ICN, i.e.,self-certifying versus hierarchical names, and edge versus pervasive caching. We hope this survey helps clarify some mis-understandings on ICN and achieve more consensuses.
文摘With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of high, medium, and low Earth orbit satellite networks with terrestrial networks has become a critical direction for future communication technologies. The objective is to develop a space-terrestrial integrated 6G network that ensures ubiquitous connectivity and seamless services, facilitating intelligent interconnection and collaborative symbiosis among humans, machines, and objects. This integration has become a central focus of global technological innovation.
基金supported by the Researchers Supporting Project of King Saud University,Riyadh,Saudi Arabia,under Project RSPD2025R681。
文摘With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.However,battlefield uncertainties,such as equipment failures and enemy attacks,can impact these collaborative operations'stability and communication efficiency.To this end,we design a highly destruction-resistant air-ground cooperative resilient networking platform that aims to enhance the robustness of network communications by integrating ground vehicle information for UAV network deployment.It then incorporates the concept of virtual guiding force,enabling the UAV swarm to adaptively configure its network layout based on ground vehicle information,thereby improving network destruction resistance.Simulation results demonstrate that the UAV swarm involved in the proposed platform exhibits balanced flight energy consumption and excellent performance in network destruction resistance.
基金co-supported by the National Natural Science Foundation of China(Nos.62225103,U2441227,U24A20211)the Fundamental Research Funds for the Central Universities of China(No.FRF-TP-22-002C2)。
文摘1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring nations and regions,including the United States,Europe,China,and Russia.Specifically,Space X’s Starlink project has deployed over 6750 satellites,2while One Web has completed its initial phase of satellite constellation deployment with more than 600 satellites.
基金supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61671081in part by the Funds for International Cooperation and Exchange of NSFC under Grant 61720106007+2 种基金in part by the 111 Project under Grant B18008in part by the Beijing Natural Science Foundation under Grant 4172042in part by the Fundamental Research Funds for the Central Universities under Grant 2018XKJC01
文摘As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.
基金This work was supported by National Key Basic Research Program of China (973 Program) under Grant No. 2012CB315802 National Natural Science Foundation of China under Grant No. 61171102 and No. 61132001 Prospective Research on Future Networks of Jiangsu Future Networks Innovation institute under Grant No. BY2013095-4-01. Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478.
文摘In-network caching and Interest packets aggregation are two important features of Content-Centric Networking(CCN).CCN routers can directly respond to the Interest request by Content Store(CS)and aggregate the same Interest packets by Pending Interest Table(PIT).In this way,most popular content requests will not reach the origin content server.Thus,content providers will be unaware of the actual usages of their contents in network.This new network paradigm presents content providers with unprecedented challenge.It will bring a great impact on existing mature business model of content providers,such as advertising revenue model based on hits amount.To leverage the advantages of CCN and the realistic business needs of content providers,we explore the hits-based content provisioning mechanism in CCN.The proposed approaches can avoid the unprecedented impact on content providers' existing business model and promote content providers to embrace the real deployment of CCN network.
基金Important National Science & Technology Specific Projects"New Generation Broadband Wireless Mobile Communication"2010 project"TD-LTE Large-Scale Technical Trial "( No. 2010ZX03002-009)
文摘The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE(long term evolution)technology, especially TD-LTE (time division-LTE) technology adopting the spectral asymmetric. This paper analyzed details of TD-LTE system networking, and studied the feasibility of TD-LTE and TD-SCDMA(TD-synchronous code division multiple access) system with the same spectrum. At last, the paper provided suggestions on networking of TD-LTE system.
基金supported by the Wuhan Frontier Program of Application Foundation (No.2018010401011295)National High Technology Research and Development Program of China (“863” Program) (Grant No. 2015AA016002)
文摘Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed.