Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Design concept and key technology of Network 5.0
    • JIANG Lintao
    • Information and Communications Technology and Policy. 2023, 49(12): 2-11. DOI:10.12267/j.issn.2096-5931.2023.12.001
    • Abstract ( 280 ) HTML( 242 )   
    • According to the technology adopted by the data network to divide the generations, from the simulated data network to the technical data network (IP network is the representative one), the data network has developed for 4 generations. Network 5.0 is a network technology with the fifth generation of data network as the main technology. It is the inheritance, development and innovation of the traditional Internet. Network 5.0 adopts generation research and target determination. Based on four application scenarios, it is forward compatible with and capability tolerant of IP network. This paper puts forward new concepts in the dimensions of classification and grading, credibility and security, certainty, as well as interface and protocol among virtual network, business network and bearer network.

    • Figures/Tables | References | Related Articles | Metrics
    • Service classification technology in Network 5.0
    • XIONG Quan, LUO Jian, LIU Aihua, YAN Jinjie
    • Information and Communications Technology and Policy. 2023, 49(12): 21-29. DOI:10.12267/j.issn.2096-5931.2023.12.003
    • Abstract ( 218 ) HTML( 101 )   
    • Based on the future application scenarios of Network 5.0, this paper analyzes the different requirements of services for network performance in different scenarios, and proposes the concept of network service classification. On this basis, the service classification mechanism is proposed from the perspective of deterministic service requirements. Further, the service sub-classification method is proposed according to the key metrics of the service level agreement of each deterministic service requirement. The key deterministic technology of network classification is also clarified. Finally, this paper provides encapsulation suggestions for classified packets.

    • Figures/Tables | References | Related Articles | Metrics
    • Architecture of Network 5.0
    • YAO Huijuan, LU Lu, ZHANG Jie, ZHENG Xiuli, HUANG Guangping
    • Information and Communications Technology and Policy. 2023, 49(12): 30-39. DOI:10.12267/j.issn.2096-5931.2023.12.004
    • Abstract ( 203 ) HTML( 199 )   
    • This paper mainly explores the network 5.0 architecture framework, architecture design principles, and architecture design for the future evolution of IP networks, targeting national major strategic needs such as the national computing network to synergize east and west and scenarios in the fields of industrial internet, air space integration, cloud intelligence, and computing-aware networks. From multiple perspectives such as functional architecture system and network architecture view, this paper demonstrates the design of the system architecture. It is expected to explore a new paradigm for network system design, and promote the transformation of the network from an information infrastructure centered on information forwarding to intelligent information infrastructure that integrates perception, forwarding, computing, and processing.

    • Figures/Tables | References | Related Articles | Metrics
    • Endogenous security and trust architecture of Network 5.0
    • MA Zheng, YAN Xincheng, ZHOU Jihua, JIANG Lintao
    • Information and Communications Technology and Policy. 2023, 49(12): 40-47. DOI:10.12267/j.issn.2096-5931.2023.12.005
    • Abstract ( 134 ) HTML( 90 )   
    • Network 5.0 is a future-oriented data network communication architecture. One of the most basic features of this network architecture is the ability of ensuring endogenous security and trust. Based on this technical feature, this paper first discusses the current situation of network security threats and the shortcomings of traditional network security protection models. Then, it analyzes and sorts out the security requirements of major application scenarios of Network 5.0. It also proposes the security and trust architecture and implementation mechanism for Network 5.0, and discusses the typical key technologies for security of Network 5.0. Finally, it introduces the relevant practices carried out in the field of Network 5.0, and proposes suggestions for future research directions.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on Network 5.0 identifiers
    • LI Xueying, MO Yijun, NIE Xiuying, ZHENG Xiuli
    • Information and Communications Technology and Policy. 2023, 49(12): 48-55. DOI:10.12267/j.issn.2096-5931.2023.12.006
    • Abstract ( 106 ) HTML( 75 )   
    • The network identifier also named as network number and network address, is mainly used to provide numbering, naming, addressing, routing and identifying, and it is a kind of very important network resource. Based on the different technologies, architecture and functions used by the networks, the formats and functions of network identifiers for different networks are different. As Network 5.0 is continuation, development and innovations of the traditional Internet, Network 5.0 identifiers are also continuation, development and innovations of traditional Internet identifiers based on the function targets of Network 5.0.

    • Figures/Tables | References | Related Articles | Metrics
    • Practice and reflection on new network architecture test based on Network 5.0
    • TANG Jing, LEI Bo, LI Yunhe, XIE Yunpeng
    • Information and Communications Technology and Policy. 2023, 49(12): 56-61. DOI:10.12267/j.issn.2096-5931.2023.12.007
    • Abstract ( 108 ) HTML( 91 )   
    • With the continuous development of technologies such as 5G/6G, artificial intelligence (AI), Internet of Things (IoT), digital twins, and machine learning, as well as the continuous popularity of various SaaS applications such as metaverse and video conferencing, new network traffic models and business requirements have brought unprecedented challenges to the current network. Domestic research organizations represented by the Network 5.0 Industry and Technology Innovation Alliance are conducting research on a new network architecture for future networks, but they are still in the early stage of exploring practical application. The various quality parameters, business testing systems, and testing standards for emerging networks have not yet reached a mature stage, so the further exploration is needed. By analyzing and summarizing the current research and situation of IP network testing technology, this paper reflects on and prospects the development of testing and evaluation technologies for the new network architecture of Network 5.0.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on Network 5.0 innovation experimental platform
    • ZHANG Jie, JIANG Lintao, XU Du, TIAN Ye, JIANG Xuelian, SUN Yalou
    • Information and Communications Technology and Policy. 2023, 49(12): 62-71. DOI:10.12267/j.issn.2096-5931.2023.12.008
    • Abstract ( 90 ) HTML( 80 )   
    • A large-scale test environment with heterogeneous adaptability, agility, and deterministic resource supply can support continuous network evolution and innovation. This paper introduces the objectives and architecture of Network 5.0 innovation experimental platform. It also describes the key technologies and system implementations, including deterministic network resource supply and the integrated scheduling of heterogeneous resources. Finally, this paper presents some related research and development, as well as verification practice work based on the platform.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on the service network architecture of Network 5.0
    • LIANG Jie, ZENG Qimiao, CHEN Ge
    • Information and Communications Technology and Policy. 2023, 49(12): 72-80. DOI:10.12267/j.issn.2096-5931.2023.12.009
    • Abstract ( 95 ) HTML( 86 )   
    • With the rapid emergence of new businesses like the Internet of Things and the Industrial Internet, networks face significant challenges in determinism, security, and resource allocation. Existing networks operate under a “best-effort” model, managing network resources without controlling service or application connections. Network 5.0 addresses these problems by proposing solutions such as innovative protocols, deterministic networks, intrinsic security and trust, self-organizing networks, and computational networks. Besides, Network 5.0 needs to resolve the Over-The-Top (OTT) problem, namely, the insufficiency in controlling and matching applications and network layers for current business support. Thus, this paper analyzes four motivations for Network 5.0 service networks. Subsequently, it presents the service network architecture by overlaying a service core layer onto the existing network transport layer, enabling dynamic service perception, connections, resource matching, and connection control capabilities. This inherently resolves the deterministic support Underlay+Overlay coordination of application. Finally, it highlights two typical scenarios, namely, supercomputing and uninterrupted live broadcasting. These serve as robust indicators for future directions in network research.

    • Figures/Tables | References | Related Articles | Metrics
    • Computing network in overlay network state based on Network 5.0
    • NIE Xiuying, JIN Wei, ZHANG Jie
    • Information and Communications Technology and Policy. 2023, 49(12): 81-88. DOI:10.12267/j.issn.2096-5931.2023.12.010
    • Abstract ( 119 ) HTML( 84 )   
    • Data are the most important strategic resources in computing age. All the collection, transmission, processing and application of data depend on the support of computing power resources. With the rapidly development of digital technologies, digital economy and digital society, both the requirements and supply of computing power resources increate tremendously. The rapid development and application of cloud computing technique change the supplying method of computing power resource. Nowadays, the research on computing network becomes a hot topic. First, this article introduces the concepts related to computing power resources and supply method evolution. After analyzing the network requirements of computing network, it discusses the research on computing network in overlay network state based on Network 5.0 including participants, service periods and related challenges faced by the study on computing network in the future.

    • Figures/Tables | References | Related Articles | Metrics
    • Network video conferencing system based on Network 5.0 technology
    • YANG Kun, LU Chunlin
    • Information and Communications Technology and Policy. 2023, 49(12): 89-96. DOI:10.12267/j.issn.2096-5931.2023.12.011
    • Abstract ( 114 ) HTML( 85 )   
    • Network video conferencing system is currently the main tool for online office and information communication, which has diversified functions. It can be divided into public cloud deployment, private cloud deployment, and non-cloud deployment in business organization. In response to the need for large-scale deployment, the network video conferencing has built a hierarchical deployment architecture, which achieves the management of business participants, the management of business logic, and the processing of media streams through the management layer, control layer, and media layer, respectively. And rely on this architecture, it completes the business process and cross vendor interconnection of typical scenarios in online video conferencing. Network 5.0 technology will have a significant influence on the development of the network video conferencing.

    • References | Related Articles | Metrics