Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

    • Entropy Reduced Mobile Networks Empowering Industrial Applications
    • ZHANG Ping, XU Xiao-dong, HAN Shu-jun, NIU Kai, XU Wen-jun, LAN Yue-heng
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 1-9. DOI:10.13190/j.jbupt.2020-260
    • Abstract ( 1542 )     HTML( 1481 )       
    • Currently, the mobile networks represented by the fifth generation of mobile communications system (5G) are facing various challenges in empowering industrial applications. The requirements and challenges of 5G empowering industrial applications in communication, control, computation, and security are analyzed. It formulates the sixth generation of mobile communications system(6G) evolution of the mobile networks for empowering industrial application, in a special form named as entropy reduced mobile networks. Based on information theory and directed by systems theory, the entropy reduced mobile networks emphasizes the utilization of endogenous intelligence of semantic information and endogenous simplicity architecture to achieve the global optimization for realizing mobile networks empowering industrial applications, which formulates a potential evolution path to 6G.
    • References | Supplementary Material | Related Articles
    • 6G Vision, Scenarios and Network Requirements
    • CUI Chun-feng, WANG Sen, LI Ke, DONG Jing, ZHENG Zhi-min
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 10-17. DOI:10.13190/j.jbupt.2020-160
    • Abstract ( 1754 )     HTML( 1938 )       
    • Towards the year 2030 and beyond, the overall visions and typical scenarios of the sixth generation of mobile communications system (6G) are discussed preliminarily, and a method for estimating key performance indicators (KPIs) of 6G networks is proposed innovatively. Besides, according to the prediction of the service oriented for 2030, we formulate the traffic models. In addition, the values of KPIs under different typical scenarios are calculated based on the parameters of the traffic models and the user models.
    • References | Supplementary Material | Related Articles

    REVIEW

    • The Architecture Design and Evaluation Method for Eco-Sustainabability Oriented Next Generation Communication Networks
    • Lü Ting-jie, SONG Luo-na, TENG Ying-lei, FENG Ye-yuan
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 18-26,35. DOI:10.13190/j.jbupt.2020-134
    • Abstract ( 797 )     HTML( 1009 )       
    • The rapid development of communication technology and the arrival of the era of internet of everything not only aggravate the deployment of communication infrastructure and energy consumption intensively, but also bring potential impacts to network security and electromagnetic environment. Therefore, the discussion of the 6th generation of mobile communications system (6G) network architecture should transfer its focus from network performance and user experience into all-round sustainability of the networks. Based on the traditional networks, an eco-sustainable network architecture for 6G is explored, construction framework from multi-level is discussed, and the dynamic interaction between 6G networks and the real physical world is analyed. Considering the evaluation demands of networks' sustainability, a new comprehensive evaluation system for new network architectures is designed. Aiming at the challenge of multi-dimensional and cross domain sustainability analysis of networks, an evaluation method of communication networks based on machine learning is proposed, so as to provides a reference for the construction and optimization of the ecological sustainability of the networks.
    • References | Supplementary Material | Related Articles

    PAPERS

    • The Research on Channel Capacity of OAM-MIMO System
    • TANG Jie, LI Kai, LIN Chu-ting, SONG Yan, ZHOU En-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 27-35. DOI:10.13190/j.jbupt.2020-198
    • Abstract ( 1183 )     HTML( 1260 )       
    • The proposal of orbital angular momentum(OAM)provides a feasible solution for the carrier required by the next-generation mobile communication technology. Its unique modular division multiplexing(MDM) method greatly increases the transmission capacity. However, with the diversification of the next-generation communication technology services, people have put forward higher requirements for bandwidth and spectrum utilization. In order to effectively improve the channel capacity and spectrum utilization of the system, an orbital angular momentum-multiple input multiple output (OAM-MIMO) multiplexing communication system combining OAM and multiple input multiple output(MIMO)technology is proposed. The OAM-MIMO system can improve channel capacity and spectrum utilization without increasing bandwidth and antenna transmit power. The system uses the Butler matrix as a phase shifter to feed the signal to a uniform circular array antenna(UCA), so that each UCA can simultaneously and independently generate a carrier wave carrying a variety of different OAM modal signal, thereby significantly improving the channel capacity of the system. The experimental results show that the channel capacity and spectrum utilization rate of the OAM-MIMO communication system are greatly improved in the macro cell and micro cell environment.
    • References | Supplementary Material | Related Articles
    • A 28 GHz Transformer Matched Differential Cascode Power Amplifier Based on SiGe Technology
    • ZHANG Yao-zhen, LIU Yu
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 36-41. DOI:10.13190/j.jbupt.2020-182
    • Abstract ( 884 )     HTML( 1308 )       
    • A 28 GHz high power, high efficiency, millimeter wave power amplifier based on SiGe technology is proposed for the sixth generation of mobile communications system (6G) communication system. The high-performance heterojunction bipolar transistor is used to form a differential Cascode amplifier structure. The low impedance of the base of the common base transistor significantly improves the breakdown voltage, which can greatly increase the output voltage swing, so that the output power. Compared with the traditional LC matching network, transformer has less insertion loss and wider bandwidth. The simulation results show that the output 1 dB compression point is 18.6 dBm, the power added efficiency is 28.9%, and the power gain is 17.3 dB. By applying the proposed amplifier in a 6G communication downlink system simulation, the system can provide a high data rate of 1.34 Tbit/s with 89 antenna driven branch.
    • References | Supplementary Material | Related Articles

    • Data-Importance-Aware Resource Allocation in IRS-Aided Edge Intelligent System
    • TIAN Hui, NI Wan-li, WANG Wen, ZHENG Jing-heng, HE Shuo
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 51-58. DOI:10.13190/j.jbupt.2020-162
    • Abstract ( 1090 )     HTML( 1080 )       
    • In order to solve the problem of model aggregation in intelligent reflecting surface (IRS) aided edge intelligent system, a data-importance-aware resource allocation algorithm is proposed by using convex optimization and branch-and-bound methods to alternately design the user's uplink power, transmission time, and the phase shifts of IRS. Simulation results show that the proposed algorithm can effectively aggregate the model parameters of the distributed agents based on the importance difference of local data, and can maximize the uplink weighted sum rate.
    • References | Supplementary Material | Related Articles

    PAPERS

    • Analysis of Short-Distance Terahertz Channel Characteristics Based on Channel Measurements
    • TIAN Hao-yu, TANG Pan, TIAN Lei, ZHANG Jian-hua, HE Jing-suo
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 59-65. DOI:10.13190/j.jbupt.2020-170
    • Abstract ( 906 )     HTML( 1157 )       
    • The wireless channel is the medium in which electromagnetic waves propagate in the air, and the channel characteristics determine the performance of the wireless communication system. To understand the terahertz channel characteristics in short-distance scenarios, based on the channel measurement in the 310 GHz frequency band, the large-scale fading characteristics and the small-scale fading characteristics of the terahertz channel are studied. The analysis of the results shows that the path loss of the terahertz channel in the short-distance scenario is consistent with the results of the free-space path loss model at 0.2 m. After 0.2 m, the measured path loss results are smaller, and the propagation conditions are better than the free space. The results of the Rice K factor and root-mean-square(RMS) delay spread shows that compared with low-frequency channels, the terahertz channel has a lower degree of delay dispersion, and the direct path occupies the main received signal energy. The Rice K factor and RMS delay spread shows a strong correlation. These results provide a theoretical model basis for the design and optimization of short-distance terahertz communications.
    • References | Supplementary Material | Related Articles

    • A Cloud-Edge Collaborative Computing Task Scheduling Algorithm for 6G Edge Networks
    • MA Lu, LIU Ming, LI Chao, LU Zhao-ming, MA Huan
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 66-73. DOI:10.13190/j.jbupt.2020-161
    • Abstract ( 1921 )     HTML( 2207 )       
    • A distributed cloud-edge collaborative computing architecture for the sixth generation of mobile communications system (6G) is proposed. Furthermore, a cloud-edge collaborative computing task scheduling algorithm based on the Proximal Jacobian alternating direction multiplier method (ADMM) is designed. This algorithm models the computing task scheduling in cloud-edge collaboration architecture as a system costs minimization problem considering the system delay, energy consumption, bandwidth costs, and quality of service (QoS) loss etc. Then the algorithm is solved through an efficient distributed parallel computing method. The simulation results show that the proposed algorithm can reduce network operating costs while ensuring QoS, and achieve high execution efficiency and fast convergence.
    • References | Supplementary Material | Related Articles

    PAPERS

    • Research on Coverage and Handover Performance of Unmanned Aerial Vehicle Network
    • JIAO Ming-han, PENG Mu-gen, LIU Chen-xi
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 74-81. DOI:10.13190/j.jbupt.2020-142
    • Abstract ( 974 )     HTML( 988 )       
    • Unmanned aerial vehicle (UAV) networks can be deployed on demand and operate flexibly. However, the analytical approach for traditional terrestrial cellular networks cannot be directly applied to the UAV networks. Against this background, this paper investigates the coverage and handover performance of the UAV communication systems. With the consideration of user mobility in a 2-tier UAV communication system, the analytical expressions of the coverage probability, the transmission rate, the boundary length intensity, and the maximum velocity constraint of users are derived. The impacts of the UAV density, height, and the velocity of user on the coverage and handover performance of system are examined as well. Analytical and numerical results demonstrate that the coverage and handover performance of the UAV networks can be effectively boosted by adaptively adjusting the density and the height of the UAVs.
    • References | Supplementary Material | Related Articles
    • User Matching with Maximum Flow Algorithm for Full-Duplex Small Cells
    • ZHAO Fei-fei, ZHOU Mo-miao, HU Shu-kai, YANG Tao
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 82-87. DOI:10.13190/j.jbupt.2020-173
    • Abstract ( 535 )     HTML( 361 )       
    • Considering the impact of the inter-user interference on the quality of service (QoS) in full-duplex-enabled small cells, an uplink-downlink user matching strategy was proposed with the goal of maximizing the number of satisfied user pairs. The strategy is applicable to some newborn QoS-sensitive services. Firstly, based on the desired rate and the achievable rate of each user, a feasible graph was established to show all the possible satisfied user pairs. Then, the feasible graph was transformed into a unit-capacity network. The max-flow number of the unit-capacity network was proved to be the maximum number of satisfied user pairs, and the optimal matching strategy can be derived from the max-flow route. Finally, simulations demonstrated that the proposed strategy trebled the number of satisfied user pairs as the max-sum-rate strategy while maintaining polynomial complexity.
    • References | Supplementary Material | Related Articles
    • Access Control Scheme Supporting Userand Attribute Revocation in Fog Computing
    • WANG Zheng, LI Ling, LI Na
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 88-95. DOI:10.13190/j.jbupt.2020-092
    • Abstract ( 538 )     HTML( 428 )       
    • In fog computing, attribute-based encryption technology not only solves the problem of fine-grained access control of data, but also brings the problem of user and attribute revocation. To solve this problem, an access control scheme that supports user and attribute revocation in fog computing is proposed. The proposed scheme improves the existing access control scheme based on attribute group revocation attributes, making it used in fog computing and improving the efficiency of key update. In addition, users can be revoked by fog nodes. In order to reduce the burden on the user side, part of the calculation overhead is transferred from the user side to the adjacent fog node. The security analysis based on the decisional bilinear diffie-hellman (DBDH) assumption shows that the proposed scheme can resist chosen plaintext attack. Finally, the scheme is analyzed in both theory and experiment. The analysis results show that the proposed scheme has high revocation efficiency and practical value.
    • References | Supplementary Material | Related Articles
    • Distributed Wireless Node Task Allocation Method Based on KM Algorithm
    • TIAN Xing-peng, ZHU Xiao-rong, ZHU Hong-bo
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 96-102. DOI:10.13190/j.jbupt.2020-089
    • Abstract ( 656 )     HTML( 658 )     PDF (0KB) ( 1 )   
    • Aiming at the fact that a single node cannot meet the delay or energy consumption requirements of various novel applications,a distributed wireless node task collaborative allocation method is proposed to reduce the total delay or total energy consumption of all node processing tasks by utilizing the idle resources of surrounding nodes. Firstly, according to the analytic hierarchy process (AHP),the priority of task execution is determined according to the multi-dimensional attributes of tasks, such as calculation load and latest completion time. Then, the optimization model of time delay and energy consumption is established, which is transformed into the problem of maximum weight matching of bipartite graph. The optimal solution of task allocation is obtained by using Kuhn Munkras(KM)algorithm, which realizes the efficient cooperation of terminal nodes at the edge of network. The simulation results show that the algorithm can effectively reduce the time delay and energy consumption of task processing.
    • References | Supplementary Material | Related Articles
    • Secure Beamforming Scheme for Multi-Antenna UAV Communication Systems
    • WANG Xiao-xiao, DAN Zhen-lei, GU Chen-wei, ZHU Wei-ping, LIN Min
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 103-109. DOI:10.13190/j.jbupt.2020-108
    • Abstract ( 812 )     HTML( 1265 )       
    • Aming at multiple legitimate users and a single eavesdropper in the downlink transmission system of multi antenna unmanned aerial vehicle(UAV) communication in the sixth generation of mobile communications system network, two secure beamforming schemes are proposed on the basic of the eavesdropper statistics channel state information is known. One is based on the criterion of secure rate maximization of the system under the condition of limited total transmit power. A zero forcing beamforming scheme is proposed, and the closed solutions of the weight vector and power allocation factor of beamforming are obtained. The other is based on the criterion of maximizing the enhanced signal to noise ratio of the system under the condition of limited total transmit power. A fractional programming combined with alternative direction method of multipliers (ADMM) is proposed to realize the design of beamforming weight vector and power allocation factor. The simulation results show that, compared with the zero forcing algorithm, the ADMM algorithm can effectively improve the security performance of the system.
    • References | Supplementary Material | Related Articles

    REPORTS

    • Research on Frequency Compatibility of Collaboration-Based Large-Scale NGSO Constellations
    • LI Wei, PAN Ji, YAN Kang, WEI Wen-kang, ZHANG Lei
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 110-117. DOI:10.13190/j.jbupt.2020-189
    • Abstract ( 832 )     HTML( 858 )       
    • Aiming at the problem of co-frequency interference between large-scale non-geostationary orbit(NGSO)constellation systems, we established the interference analysis model of link angle to convert communication interference constraints into geometric configuration constraints based on the comprehensive analysis of the mutual conversion relationship of the traditional interference evaluation indicators. Furthermore, the system availability index is defined by satellite selection and link combination selection. On basis of this, we carry out some researches on frequency compatibility of collaboration-based large-scale NGSO constellations, in which the working mode of NGSO constellation in cooperation mode is given. In this simulation, the actual working parameters of OneWeb and Telesat systems are selected to evaluate the system availability on a global scale. The result illustrates that the average system availability in non-cooperative mode is 72.82% since the severe interference will occur between systems in 27.18% of the time, while the average system availability in cooperative mode is 96.00%, which means cooperation mode will greatly improve the compatibility of NGSO communication constellation systems.
    • References | Supplementary Material | Related Articles
    • Data Collection Method of Space-Based Internet of Things Based on Improved Double Level Distributed LT Code
    • HE Jian-hua, ZHAO Hui, XU Xiao-bin, YAN Lei, WANG Shang-guang
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 118-125. DOI:10.13190/j.jbupt.2020-148
    • Abstract ( 618 )     HTML( 712 )       
    • Satellite networks and unmanned aerial vehicles (UAVs) are introduced into Internet of things, which provides a typical application for the sixth generation of mobile communication system(6G). Data transmission methods for each layer in the space-based Internet of things are analyzed, and one new data collection strategy is proposed. Combining the advantages of current network coding and multi-layer distributed LT codes, a data collection strategy based on improved double-layer LT codes is proposed. This strategy adopts adaptive block coding mechanism to avoid data loss caused by multi-path crossover. Simulation results show that this strategy can effectively improve the success rate and throughput of data transmission when the network connection is unstable.
    • References | Supplementary Material | Related Articles
    • Energy Efficient Resource Allocation for Secure MEC System Based on mMIMO
    • ZHAO Wei, WANG Bin, BAO Hui, ZHAO Pin-fang, LI Bao-gang
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 126-131. DOI:10.13190/j.jbupt.2020-066
    • Abstract ( 860 )     HTML( 369 )       
    • Under the double threat of malicious user jamming and eavesdropping, the mobile edge computing(MEC)system will cause problems such as blocked uplink offloading, user information leakage, and low system energy utilization. To address this problem, this letter proposed to use physical layer security technology to prevent eavesdropping, and use massive multiple input multiple output(mMIMO)technology to reduce interference and user energy consumption. In addition, under the conditions of limited delay, the user's total energy consumption is minimized by jointly optimizing the user's offloading method, transmission power, and offloading rate. For this non-convex multi-objective optimization problem, it can be decomposed into multiple sub-optimal sub-problems. Firstly, the Lagrange multiplier method is used to obtain a closed expression of the user's offloading data bits, and then the iterative algorithm is used to obtain the user's optimal transmit power and maximum offloading rate. Simulation results show that the proposed new mMIMO-MEC secure offloading scheme can effectively reduce the total energy consumption of the system while solving interference and eavesdropping security issues.
    • References | Supplementary Material | Related Articles

    • Intelligent Resource Allocation Algorithm for 6G Multi-Tenant Network Slicing Based on Deep Reinforcement Learning
    • GUAN Wan-qing, ZHANG Hai-jun, LU Zhao-ming
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 132-139. DOI:10.13190/j.jbupt.2020-211
    • Abstract ( 1229 )     HTML( 1495 )       
    • In the future, the sixth generation of mobile communications system (6G) network services merge reality and virtual reality, and support real-time interaction. It is urgent to quickly match the personalized service requirements of multiple tenants, therefore a two-layer hierarchical intelligent management scheme for network slicing is proposed, including the global resource manager at the upper level and the local resource managers for different tenants at the lower level. Firstly, based on the real-time status description of end-to-end slice, a service quality evaluation model is established considering the difference of multi-type slice requests from different tenants. With the service quality feedback, deep reinforcement learning (DRL) algorithm is adopted to optimize the global resource allocation and local resource adjustment. Hence, utilization efficiency of multi-dimensional resources in different domains are improved and tenants are able to customize resource usage. The simulation results show that the proposed scheme can optimize the long-term revenue of resource providers while guaranteeing the service quality.
    • References | Supplementary Material | Related Articles

    REPORTS

    • Overhead Analysis of Blockchain Consensus Algorithm in Wireless Networks
    • CAO Bin, NIE Kai-jun, PENG Mu-gen, ZHOU Zhi-zhong, ZHANG Lei
    • Journal of Beijing University of Posts and Telecommunications. 2020, 43(6): 140-146. DOI:10.13190/j.jbupt.2020-206
    • Abstract ( 872 )     HTML( 1779 )       
    • In order to provide a reasonable evaluation for the choice of blockchain type, proof of work (PoW) and practical Byzantine fault tolerance (PBFT) are treated as the benchmark of typical public and private chains for blockchain selection evaluation, and the overhead of blockchain in wireless networks is studied. Firstly, a fair network system and standard blockchain procedure have been provided, and then, considering the impact of block loss generated by transmission failure, the forking probability in PoW and view change probability in PBFT have been analyzed. Moreover, how network scale affects the communication and computation overhead in PoW and PBFT has been also investigated. Finally, the experimental results show that the computational overhead of PBFT is much smaller than that of PoW, the communication overhead of PBFT is greatly affected by the scale of the node, and thus the scalability of PBFT is poor. In contrast, the overhead of PoW communication is affected by the network scale linearly, and the scalability is much better compared with PBFT.
    • References | Supplementary Material | Related Articles