As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.Th...As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.This paper studies the service-oriented network virtualization architecture for Io T services.Firstly the semantic description method for Io T services is proposed,then the resource representation model and resource management model in the environment of network virtualization are presented.Based on the above models,the service-oriented virtual network architecture for Io T is established.Finally,a smart campus system is designed and deployed based on the service-oriented virtual network architecture.Moreover,the proposed architecture and models are verified in experiments.展开更多
Occupational structural transformation is a common pattern during the steady growth of GDP per capita in major economies worldwide.In recent years,there has been a decline in the employment share of goods occupation a...Occupational structural transformation is a common pattern during the steady growth of GDP per capita in major economies worldwide.In recent years,there has been a decline in the employment share of goods occupation and an increase in service occupation within the Chinese manufacturing industry,presenting a trend of occupational structural transformation and rapid development of service-oriented manufacturing.It is an important driving force and typical performance of the high-end,intelligent,and green development of the manufacturing industry.As a strategic general technology which leads the new round of technological revolution and industrial transformation,artificial intelligence(AI)has become a new fundamental force to accelerate the occupational structural transformation and service-oriented manufacturing development in China.Thus,this paper establishes a dynamic general equilibrium model with AI technology and occupational heterogeneity,showing the endogenous mechanism of occupational structural transformation.We find that when AI technology is biased towards goods occupation,and the elasticity of substitution between goods occupation and service occupation is less than 1,then AI will drive the transformation of occupational structure from goods to service within the manufacturing sector,increase the proportion of service-oriented manufacturing,improve labor productivity of manufacturing relative to service and stabilize the real output share of manufacturing.Promoting deeper integration of different occupations,intensifying R&D in AI technology and reducing labor mobility barriers between occupations can effectively accelerate the occupational structural transformation and industrial structural upgrading.We use theoretical analysis and numerical simulation method to show the theoretical mechanism by which AI affects occupational structural transformation and industrial structural transformation from a macroeconomic perspective,and put forward policy implications on how to promote the service-oriented manufacturing development and accelerate the construction of modern industrial system through AI innovation.展开更多
To improve efficiency,reduce cost,ensure quality effectively,researchers on CNC machining have focused on virtual machine tool,cloud manufacturing,wireless manufacturing.However,low level of information shared among d...To improve efficiency,reduce cost,ensure quality effectively,researchers on CNC machining have focused on virtual machine tool,cloud manufacturing,wireless manufacturing.However,low level of information shared among different systems is a common disadvantage.In this paper,a machining database with data evaluation module is set up to ensure integrity and update.An online monitoring system based on internet of things and multi-sensors"feel"a variety of signal features to"percept"the state in CNC machining process.A high efficiency and green machining parameters optimization system"execute"service-oriented manufacturing,intelligent manufacturing and green manufacturing.The intelligent CNC machining system is applied in production.CNC machining database effectively shares and manages process data among different systems.The prediction accuracy of online monitoring system is up to 98.8%by acquiring acceleration and noise in real time.High efficiency and green machining parameters optimization system optimizes the original processing parameters,and the calculation indicates that optimized processing parameters not only improve production efficiency,but also reduce carbon emissions.The application proves that the shared and service-oriented CNC machining system is reliable and effective.This research presents a shared and service-oriented CNC machining system for intelligent manufacturing process.展开更多
This paper proposes a theoretical framework of spatial information sharing in a digital city, and analyzes its technical characteristics. According to the service-oriented architecture (SOA) framework, a geospatial in...This paper proposes a theoretical framework of spatial information sharing in a digital city, and analyzes its technical characteristics. According to the service-oriented architecture (SOA) framework, a geospatial information sharing platform is put forward. The spatial information sharing model based on SOA is designed. A prototype platform realizing multiple-source spatial information sharing based on ArcGIS Server is developed.展开更多
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali...Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances.展开更多
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t...In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.展开更多
Weapon system portfolio selection is an important combinatorial problem that arises in various applications,such as weapons development planning and equipment procurement,which are of concern to military decision make...Weapon system portfolio selection is an important combinatorial problem that arises in various applications,such as weapons development planning and equipment procurement,which are of concern to military decision makers.However,the existing weapon system-of-systems(SoS)is tightly coupled.Because of the diversity and connectivity of mission requirements,it is difficult to describe the direct mapping relationship from the mission to the weapon system.In the latest service-oriented research,the introduction of service modules to build a service-oriented,flexible,and combinable structure is an important trend.This paper proposes a service-oriented weapon system portfolio selection method,by introducing service to serve as an intermediary to connect missions and system selection,and transferring the weapon system selection into the service portfolio selection.Specifically,the relation between the service and the task is described through the service-task mapping matrix;and the relation between the service and the weapon system is constructed through the servicesystem mapping matrix.The service collaboration network to calculate the flexibility and connectivity of each service portfolio is then established.Through multi-objective programming,the optimal service portfolios are generated,which are further decoded into weapon system portfolios.展开更多
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee...Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs.展开更多
As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial ne...As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial networks,and terrestrial networks.In 6G SAGINs,a wide variety of network services with the features of diverse requirements,complex mobility,and multi-dimensional resources will pose great challenges to service provisioning,which urges the develop-ment of service-oriented SAGINs.In this paper,we conduct a comprehensive review of 6G SAGINs from a new perspective of service-oriented network.First,we present the requirements of service-oriented networks,and then propose a service-oriented SAGINs management architec-ture.Two categories of critical technologies are presented and discussed,i.e.,heterogeneous resource orchestration technologies and the cloud-edge synergy technologies,which facilitate the interoperability of different network segments and cooperatively orchestrate heterogeneous resources across different domains,according to the service features and requirements.In addition,the potential future research directions are also presented and discussed.展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a ...In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance.展开更多
In this paper we propose a service-oriented architecture for spatial data integration (SOA-SDI) in the context of a large number of available spatial data sources that are physically sitting at different places, and d...In this paper we propose a service-oriented architecture for spatial data integration (SOA-SDI) in the context of a large number of available spatial data sources that are physically sitting at different places, and develop web-based GIS systems based on SOA-SDI, allowing client applications to pull in, analyze and present spatial data from those available spatial data sources. The proposed architecture logically includes 4 layers or components; they are layer of multiple data provider services, layer of data in-tegration, layer of backend services, and front-end graphical user interface (GUI) for spatial data presentation. On the basis of the 4-layered SOA-SDI framework, WebGIS applications can be quickly deployed, which proves that SOA-SDI has the potential to reduce the input of software development and shorten the development period.展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em...This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage展开更多
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(...The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference.展开更多
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who...It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.展开更多
As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seri...As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seriously challenge architecture study. In this paper, a service-oriented architecture of CPS was presented. Further, a two-way time synchronization algorithm for CPS service composition was put forward. And a formal method, for judging if actual CPS service meets space constraints, was suggested, which was based on space-π-calculus proposed. Finally, a case study was performed and CPS business process designed by the model and the proposed methods could run well. The application of research conclusion implies that it has rationality and feasibility.展开更多
In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible f...In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation,and software/systems engineering. Finally, two specific simulation frameworks are studied as examples.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
基金supported by the national 973 project of China under Grants 2013CB329104the Natural Science Foundation of China under Grants 61372124,61427801,61271237,61271236Jiangsu Collaborative Innovation Center for Technology and Application of Internet of Things under Grants SJ213003
文摘As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.This paper studies the service-oriented network virtualization architecture for Io T services.Firstly the semantic description method for Io T services is proposed,then the resource representation model and resource management model in the environment of network virtualization are presented.Based on the above models,the service-oriented virtual network architecture for Io T is established.Finally,a smart campus system is designed and deployed based on the service-oriented virtual network architecture.Moreover,the proposed architecture and models are verified in experiments.
基金This study was supported by:The Late-Stage Support Program of the National Social Science Fund of China“Supply-Side Structural Reform and the Dual Structural Transformation of China's Economy”(Grant No.22FJLB009)The National Natural Science Fund of China for Young Scholars“The Dual Structural Transformation of China’s Economy:A Theoretical Analysis and Empirical Test Based on the Supply-Side Structural Reform”(Grant No.71703056).
文摘Occupational structural transformation is a common pattern during the steady growth of GDP per capita in major economies worldwide.In recent years,there has been a decline in the employment share of goods occupation and an increase in service occupation within the Chinese manufacturing industry,presenting a trend of occupational structural transformation and rapid development of service-oriented manufacturing.It is an important driving force and typical performance of the high-end,intelligent,and green development of the manufacturing industry.As a strategic general technology which leads the new round of technological revolution and industrial transformation,artificial intelligence(AI)has become a new fundamental force to accelerate the occupational structural transformation and service-oriented manufacturing development in China.Thus,this paper establishes a dynamic general equilibrium model with AI technology and occupational heterogeneity,showing the endogenous mechanism of occupational structural transformation.We find that when AI technology is biased towards goods occupation,and the elasticity of substitution between goods occupation and service occupation is less than 1,then AI will drive the transformation of occupational structure from goods to service within the manufacturing sector,increase the proportion of service-oriented manufacturing,improve labor productivity of manufacturing relative to service and stabilize the real output share of manufacturing.Promoting deeper integration of different occupations,intensifying R&D in AI technology and reducing labor mobility barriers between occupations can effectively accelerate the occupational structural transformation and industrial structural upgrading.We use theoretical analysis and numerical simulation method to show the theoretical mechanism by which AI affects occupational structural transformation and industrial structural transformation from a macroeconomic perspective,and put forward policy implications on how to promote the service-oriented manufacturing development and accelerate the construction of modern industrial system through AI innovation.
基金Supported by National Defense Basic Scientific Research of China(Grant No.A2120110002)National Science Foundation of China(Grant No.11290144)Major National Science and Technology Special Project of China(Grant Nos.2010ZX04014-052,2010ZX0414-017)
文摘To improve efficiency,reduce cost,ensure quality effectively,researchers on CNC machining have focused on virtual machine tool,cloud manufacturing,wireless manufacturing.However,low level of information shared among different systems is a common disadvantage.In this paper,a machining database with data evaluation module is set up to ensure integrity and update.An online monitoring system based on internet of things and multi-sensors"feel"a variety of signal features to"percept"the state in CNC machining process.A high efficiency and green machining parameters optimization system"execute"service-oriented manufacturing,intelligent manufacturing and green manufacturing.The intelligent CNC machining system is applied in production.CNC machining database effectively shares and manages process data among different systems.The prediction accuracy of online monitoring system is up to 98.8%by acquiring acceleration and noise in real time.High efficiency and green machining parameters optimization system optimizes the original processing parameters,and the calculation indicates that optimized processing parameters not only improve production efficiency,but also reduce carbon emissions.The application proves that the shared and service-oriented CNC machining system is reliable and effective.This research presents a shared and service-oriented CNC machining system for intelligent manufacturing process.
基金Supported by the National Key Basic Research and Development Program of China (No2004CB318206) the Basic Research of Survey and MappingBureau Project (No1469990711111)
文摘This paper proposes a theoretical framework of spatial information sharing in a digital city, and analyzes its technical characteristics. According to the service-oriented architecture (SOA) framework, a geospatial information sharing platform is put forward. The spatial information sharing model based on SOA is designed. A prototype platform realizing multiple-source spatial information sharing based on ArcGIS Server is developed.
基金supported by Program for National Basic Research Program of China (973 Program) "Reconfigurable Network Emulation Testbed for Basic Network Communication"
文摘Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances.
基金Supported by the National Basic Research Program of China(973 Program)(2014CB340600)the National Natural Science Foundation of China(61173138,61103628,61103220)the Intel Collaborative Research Project
文摘In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.
基金the National Key R&D Program of China(2017YFC1405005)the National Natural Science Foundation of China(71901214,71690233).
文摘Weapon system portfolio selection is an important combinatorial problem that arises in various applications,such as weapons development planning and equipment procurement,which are of concern to military decision makers.However,the existing weapon system-of-systems(SoS)is tightly coupled.Because of the diversity and connectivity of mission requirements,it is difficult to describe the direct mapping relationship from the mission to the weapon system.In the latest service-oriented research,the introduction of service modules to build a service-oriented,flexible,and combinable structure is an important trend.This paper proposes a service-oriented weapon system portfolio selection method,by introducing service to serve as an intermediary to connect missions and system selection,and transferring the weapon system selection into the service portfolio selection.Specifically,the relation between the service and the task is described through the service-task mapping matrix;and the relation between the service and the weapon system is constructed through the servicesystem mapping matrix.The service collaboration network to calculate the flexibility and connectivity of each service portfolio is then established.Through multi-objective programming,the optimal service portfolios are generated,which are further decoded into weapon system portfolios.
文摘Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs.
基金supported by the National Key Research and Development Program of China(No.2020YFB1807700).
文摘As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial networks,and terrestrial networks.In 6G SAGINs,a wide variety of network services with the features of diverse requirements,complex mobility,and multi-dimensional resources will pose great challenges to service provisioning,which urges the develop-ment of service-oriented SAGINs.In this paper,we conduct a comprehensive review of 6G SAGINs from a new perspective of service-oriented network.First,we present the requirements of service-oriented networks,and then propose a service-oriented SAGINs management architec-ture.Two categories of critical technologies are presented and discussed,i.e.,heterogeneous resource orchestration technologies and the cloud-edge synergy technologies,which facilitate the interoperability of different network segments and cooperatively orchestrate heterogeneous resources across different domains,according to the service features and requirements.In addition,the potential future research directions are also presented and discussed.
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
基金supported by National Natural Science Foundation of China under Grant No.61240040
文摘In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance.
基金Supported by the Research Fund of Key GIS Lab of the Education Ministry (No. 200610)
文摘In this paper we propose a service-oriented architecture for spatial data integration (SOA-SDI) in the context of a large number of available spatial data sources that are physically sitting at different places, and develop web-based GIS systems based on SOA-SDI, allowing client applications to pull in, analyze and present spatial data from those available spatial data sources. The proposed architecture logically includes 4 layers or components; they are layer of multiple data provider services, layer of data in-tegration, layer of backend services, and front-end graphical user interface (GUI) for spatial data presentation. On the basis of the 4-layered SOA-SDI framework, WebGIS applications can be quickly deployed, which proves that SOA-SDI has the potential to reduce the input of software development and shorten the development period.
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.
基金the Hi-tech Research and Development Program of China,the National Natural Science Foundation of China,the Beijing Natural Science Foundation,the Fundamental Research Funds for the Central Universities,the Fund of the State Key Laboratory of Software Development Environment
文摘This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage
基金supported by the National Natural Science Foundation of China(61701521)the Shaanxi Provincial Natural Science Foundation(2018JQ6074)。
文摘The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference.
基金the National High Technology Research and Development Program of China (2007AA01Z412)
文摘It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.
基金National High-Tech Research and Development Programs of China( 863 Program) ( No. 2011AA010101,No. 2012AA062203) National Natural Science Foundation of China ( No. 61103069 ) Key Research Project of Shanghai Science and Technology Committee,China( No. 10dz1122600)
文摘As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seriously challenge architecture study. In this paper, a service-oriented architecture of CPS was presented. Further, a two-way time synchronization algorithm for CPS service composition was put forward. And a formal method, for judging if actual CPS service meets space constraints, was suggested, which was based on space-π-calculus proposed. Finally, a case study was performed and CPS business process designed by the model and the proposed methods could run well. The application of research conclusion implies that it has rationality and feasibility.
基金Project (Nos.60574056 and 60674069) supported by the National Natural Science Foundation of China
文摘In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation,and software/systems engineering. Finally, two specific simulation frameworks are studied as examples.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.