首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
To address the needs of intelligent sharing of network resources,blockchain and artificial intelligence were integrated with the network,and an endogenous trusted resource intelligent sharing network architecture was proposed to make network asset sharing have endogenous trust.Based on distributed alliance blockchain,an integration mechanism of on-chain identification and off-chain resource was proposed to achieve credible management of network resources.Security and trusted sharing protocols for network data was designed to synchronize data consensus within the network.Based on smart contract,network resource scheduling and service composition methods were presented to achieve trusted service sharing.Finally,the proposed architecture was applied to decentralized scenarios such as domain name resolution,cross domain authentication,and virtual network operation.The proposed architecture realizes the integration of blockchain and network and supports the endogenous trusted sharing of network assets.  相似文献   

2.
在数字化时代,作为生产要素之一的数据,对各行各业都产生了深远影响。在区块链、5G、人工智能、云计算等技术的加持下,企业掌握全面数据,更有利于洞察商机、防控风险、提升品牌竞争力与影响力。对于跨国经营、混业经营的大型集团企业来说,实现集团范围内的数据集成和共享势在必行,但在这个过程中必须严格遵守国家安全、网络安全、监管要求以及个人信息保护等各类国内外法规政策的要求,知易而行难。基于此,通过对集团数据集成管理进行研究,探索出国际化、综合化大型集团企业合法合规开展数据集成与共享的可行模式。  相似文献   

3.
As the Internet evolves into a global all-service communication infrastructure, a key consideration is providing quality of service guarantees over IP with efficient resource utilization in a scalable, flexible, and automatic way. In this article we present a virtual network (VN) based architecture for scalable IP service deployment and efficient network resource management. Particularly considering a DiffServ/MPLS III transport network supporting multiple VNs, we propose a dynamic approach for efficient bandwidth sharing among VNs. The bandwidth sharing is service-level-agreement-based; the spare capacity in underloaded VNs is adaptively and efficiently utilized, and SLA compliance for all the VNs involved is always guaranteed.  相似文献   

4.
左益平  金石  张胜利 《电信科学》2019,35(9):114-123
区块链本质上是分布式数据库,无需第三方中介机构即可安全更新状态。将区块链技术引入6G蜂窝移动通信系统中以保障用户的隐私安全,减少资源分配和通信服务成本,支持不同分布式应用,从而实现移动通信和区块链技术的有机结合,被预测为6G蜂窝移动通信的关键技术之一。从区块链结合物联网(IoT)、边缘计算、频谱分配、干扰管理方面展开了详细的介绍,阐述了近年来国际学术界在该方向的最新研究进展,并在此基础上对6G蜂窝移动通信中区块链技术的发展趋势进行了进一步的展望。  相似文献   

5.
5G投资巨大,运营商之间的5G基础设施共建共享有利于在实现预定网络质量和网络覆盖的情况下,节约5G投资成本.区块链具有分布式链式存储、链上数据不容易被篡改等特点,适用于为存在竞合关系的运营商提供可信任记账功能从而赋能5G共建共享、促进行业良性发展.首先对5G技术和区块链技术进行了简单描述;然后对区块链赋能跨运营商5G合...  相似文献   

6.
With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile cellular networks (5G). The future sixth generation of mobile cellular networks (6G) is expected to have the capability to support new and unknown services with changing requirements. Hence, in addition to enhancing its capability by 10–100 times compared with 5G, 6G should also be intelligent and open to adapt to the ever-changing services in the IoT, which requires a convergence of Communication, Computing and Caching (3C). Based on the analysis of the requirements of new services for 6G, this paper identifies key enabling technologies for an intelligent and open 6G network, all featured with 3C convergence. These technologies cover fundamental and emerging topics, including 3C-based spectrum management, radio channel construction, delay-aware transmission, wireless distributed computing, and network self-evolution. From the detailed analysis of these 3C-based technologies presented in this paper, we can see that although they are promising to enable an intelligent and open 6G, more efforts are needed to realize the expected 6G network.  相似文献   

7.
6G网络将带来全场景按需服务泛在智能新范式,其中可信可靠网络服务是泛在智能的关键技术指标。该文面向6G零信任网络的通信需求,以区块链为“信任桥梁”,研究6G车联网边缘计算中的可信可靠接入管理方法。首先,采用基于2次剩余的零知识身份验证算法,在不暴露车辆隐私的前提下完成基站和车辆之间的相互验证与授权。然后,为提高验证效率并节省基站能耗,建立了基于契约理论的路侧冗余算力激励模型,将基站的一部分验证任务分配给边缘服务器或停泊车辆,再给予相应的报酬。最后,建立了基于双层区块链的6G零信任车联网架构,利用基站群维护的主链与边缘算力维护的辅链记录车联网身份验证的重要参数,实现零信任网络环境的可信接入。通过与现有方法比较,该文所述方法在不泄露车辆隐私的前提下显著提升了车辆验证效率,降低了基站能耗,具有更高的安全性。  相似文献   

8.
随着区块链技术的不断发展,其应用变得越来越普及。文章主要针对区块链的数据结构及整体架构进行分析,并审视了区块链为物联网带来的挑战;最后从物联网数据交易系统方面、电网管理方面、车联网方面以及防伪安全管理方面,细化阐述了基于区块链的物联网技术应用,以期为基于区块链的物联网技术发展提供可靠支持。  相似文献   

9.
Wireless Local Area Network (WLAN) with high data bit rates can be used with cellular network to achieve higher level of Quality of Service (QoS) by sharing their total resources efficiently. The integration between cellular and WLAN networks should be ensured considering different channel allocation strategies of both networks and efficient resource management techniques should be developed. In this paper, we propose a new call admission scheme to use the coupled resource effectively. The proposed scheme, by taking the different resource sharing strategies for two access networks, limits the new, horizontal and vertical handoff voice and data call arrivals with respect to their call level QoS requirements. Numerical results show that the proposed integrated cellular/WLAN network model uses the resources more effectively and achieves all upper bound QoS requirements for voice and data users as compared with the non integrated network model.  相似文献   

10.
The require of omnipresent wireless access and high data rate services are expected to increase extensively in the near future. In this context, heterogeneous networks, which are a mixture of different wireless technologies (LTE-advanced, LTE-advanced Pro, C-IoT (Cellular Internet of Thing), 5G WiFi, etc) are invited to enable important capabilities, such as high data rates, low latencies and efficient resource utilization in order to provide dedicated capacity to offices, homes, and urban hotspots. Mixing these technologies in the same system, with their complementary characteristics, to afford a complete coverage to users can cause various challenges such as seamless handover, resource management and call admission control. This article proposes a general radio resource management framework which can be supported by future network architectures. A combined call admission control, resource reservation algorithm and bandwidth adaptation based IEEE 802.21 MIH standard approach for heterogeneous wireless network is detailed in this framework. Our aims are to guarantee quality of service (QoS) requirements of all accepted calls, reduce new call blocking probability and handover call dropping probability, and maintain efficient resource utilization. Performance analysis shows that our proposed approach best guarantees QoS requirements.  相似文献   

11.
Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost.  相似文献   

12.
Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean‐slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP‐based Internet. Hence, the transition from contemporary IP‐based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in‐network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC‐based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured.  相似文献   

13.
The Internet is rapidly evolving from a network that provides basic best-effort communication service to an infrastructure capable of supporting complex value-added services. These services typically have multiple fluffs with interdependent resource requirements. These dependencies provide opportunities to share the same set of resources among related flows over time leading to significant resource gains. We call this type of sharing temporal resource sharing. Exploiting temporal sharing requires support in the signaling protocol that performs resource allocation for the related flows. We examine the problem of supporting temporal sharing in a signaling protocol. This paper makes the case that temporal sharing support must be designed to be extensible, so that service providers can define and implement new sharing behaviors without having to modify the signaling protocol. We motivate the need for an extensible design by showing that the range of possible temporal sharing behaviors is large and supporting the most general forms of temporal sharing is computationally expensive. We then present a design for extensible signaling support for temporal sharing. We have implemented the temporal sharing design presented in this paper in the Beagle signaling protocol. We present an evaluation of the Beagle design and contrast it with other signaling protocols like RSVP and Tenet-2  相似文献   

14.
The Internet is rapidly changing from a set of wires and switches that carry packets into a sophisticated infrastructure that delivers a set of complex value-added services to end users. Services can range from bit transport all the way up to distributed value-added services like video teleconferencing, virtual private networking, data mining, and distributed interactive simulations. Before such services can be supported in a general and dynamic manner, we have to develop appropriate resource management mechanisms. These resource management mechanisms must make it possible to identify and allocate resources that meet service or application requirements, support both isolation and controlled dynamic sharing of resources across services and applications sharing physical resources, and be customizable so services and applications can tailor resource usage to optimize their performance. The Darwin project has developed a set of customizable resource management mechanisms that support value-added services. We present and motivate these mechanisms, describe their implementation in a prototype system, and describe the results of a series of proof-of-concept experiments  相似文献   

15.
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT-based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain-related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain.  相似文献   

16.
Fifth generation (5G) slicing is an emerging technology for software‐defined networking/network function virtualization–enabled mobile networks. Improving the utilization and throughput to meet the quality of service (QoS) requirements of 5G slicing is very important for the operators of mobile networks. With growing data traffic from different applications of numerous smart mobile devices having several QoS requirements, we expect networks to face problems of congestion and overload that prevent the effective functioning of a radio access network (RAN). This paper proposes a more effective packet‐based scheduling scheme for data traffic by 5G slicing with two operation modes for improving the resource utilization of 5G cloud RAN and providing an efficient isolation of the 5G slices. These two operation modes are referred to as static sharing resource (SSR) scheme and dynamic sharing resources (DSR) scheme. The SSR scheme is a modified version of an existing method. The goal of this approach is to reallocate the shared available resources of 5G network fairly and maximize the utilization of bandwidth while protecting a 5G slice from overwhelming other 5G slices. Throughput and delays of the system model are also discussed to show its performance limits. On the basis of the simulation outcomes, we observed that the proposed DSR scheme outperforms the SSR scheme in terms of provided delay and throughput. In addition, the token bucket parameters together with the assigned capacity weight for each slice can be selected and configured based on the required QoS. Finally, a good estimate for the maximum delay bounds of the slices is provided by the derived theoretical delay bound.  相似文献   

17.
In the 6 th generation mobile communication system(6 G) era, a large number of delay-sensitive and computation-intensive applications impose great pressure on resource-constrained Internet of things(IoT) devices. Aerial edge computing is envisioned as a promising and cost-effective solution, especially in hostile environments without terrestrial infrastructures. Therefore, this paper focuses on integrating aerial edge computing into 6 G for providing ubiquitous computing services for IoT devices...  相似文献   

18.
Internet of Vehicles (IoVs), the emerging trend of Internet of Things (IoTs), has undoubtedly become a promising trend to improve communication among vehicles on the roads. Vehicle-to-everything (V2X) communication that is based on 5G technology enables vehicle users to communicate and collaborate with each other to enhance road traffic efficiency and safety. Owing to the increased traffic load and restricted resources of existing network substructure, a channel that responds to the latency and reliability needs of V2X communication must be designed. Thereby, several intelligent spectrum allocation techniques have been proposed to improve the system's overall effectiveness. In this paper, we discuss the spectrum sharing issue of V2X communication in Device-to-Device (D2D)-based cellular networks. We propose a new multi-layer neural network (MLNN)-based Resource Allocation and sharing approach (MNNRA) for D2D-based V2X communications. According to the main advantages of MLNN, the proposed algorithm takes several profits by improving system performance while reducing computational complexity. Numerical analysis is presented to approve the effectiveness of our proposed solution in terms of network sum rate, packet reception ratio, resource utilization ratio, and time complexity.  相似文献   

19.
陈梦  孟放 《电视技术》2016,40(7):60-64
随着网络技术的飞速发展,互联网资源的有效管理与共享成为亟待解决的问题.针对资源元数据进行的收割操作可实现对音视频等网络资源的共享,提高资源利用率.首先介绍基于OAI-PMH协议的元数据收割流程及其应用现状,之后设计并实现了一个用于网络资源元数据收割的简单示例系统.该系统在MySQL5.6和VC环境下开发,简单实用,在一般配置计算机之间即可实现元数据收割功能,对该系统的测试,可验证各项基本功能实现有效.并且通过此示例系统的运行可看出,基于OAI-PMH协议的元数据收割系统可作为互联网资源共享与管理的有效途径之一.  相似文献   

20.
The huge commercial success of mobile telephony, the phenomenal growth of Internet users, the popularity of IP-based multimedia applications are the major driving forces behind third-generation (3G), ongoing Byond 3G (B3G), and forth-genertion (4G) evolution. 3G brought wired applications, both data and multimedia, into wireless environments. It operates on IP-based infrastructures to provide wider service access capability. To support and satisfy QoS (Quality of Service) of diverse IP-based multimedia applications, traffic management, such as Connection Admission Control (CAC) and resource allocation, becomes essential. CAC and resource allocation are computationally complex when combined with QoS guarantee for traffic with different characteristics. However, CAC and resource allocation are real-time traffic control procedures. Hence, processing load should be minimized to reduce delay. At the same time, network resources should be utilized efficiently to accommodate more users. However, reducing processing load and obtaining high resource utilization efficiency has been considered to be contradictory matter. In addition, CAC and resource allocation schemes which consider multiple QoS criteria – loss and delay – simultaneously have not been adequately studied. Simultaneous QoS consideration is important to satisfy stringent and diverse QoS requirements of multimedia traffic. In this paper, we propose a nobel effective bandwidth/buffer calculation method based on a virtual channel/buffer analysis scheme. We show that our method can achieve high resource utilization efficiency with reduced processing load. Moreover, we show that our scheme allows for simultaneous consideration of multiple QoS criteria, loss and delay.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号