Development Roadmap of Polymorphic Intelligence Network Technology Toward 2035

Junfei Li, Yuxiang Hu, Peng Yi, Jiangxing Wu

Strategic Study of CAE ›› 2020, Vol. 22 ›› Issue (3) : 141-147.

PDF(522 KB)
PDF(522 KB)
Strategic Study of CAE ›› 2020, Vol. 22 ›› Issue (3) : 141-147. DOI: 10.15302/J-SSCAE-2019.11.010
Frontier of Engineering
Orginal Article

Development Roadmap of Polymorphic Intelligence Network Technology Toward 2035

Author information +
History +

Abstract

The current infrastructure and technology system of the Internet are facing major challenges in terms of intelligence, diversification, personalization, robustness, and efficiency. It is urgent to change the network infrastructure and build a polymorphic definable and intelligent network. This paper studies and judges the development trend of network technologies in China and abroad, proposes the development goal of polymorphic definable and intelligent network, and extracts a list of key cutting-edge technologies for foresight. Based on these, the development roadmap of polymorphic definable and intelligent network in China for 2035 is constructed. China should prospect the research and development of key technologies including network architecture, addressing and routing, full-dimensional definability, network intelligence, and network robust control, and guide the development of relevant industries through the key contents including core chips, products, and systems. Demonstration projects can be deployed to promote the implementation of intelligent network business, including projects concerning information infrastructure, vertical industry network, space–earth integrated network, ubiquitous interconnection of human and things. In addition, this paper proposes some suggestions on the guarantee measures of polymorphic definable and intelligent network in China from the aspects of policy guarantee, scientific research platform support and joint research, international communication expansion, and human resource cultivation and employment.

Keywords

intelligence network / polymorphic / network architecture / full-dimension definable / robust control / development roadmap

Cite this article

Download citation ▾
Junfei Li, Yuxiang Hu, Peng Yi, Jiangxing Wu. Development Roadmap of Polymorphic Intelligence Network Technology Toward 2035. Strategic Study of CAE, 2020, 22(3): 141‒147 https://doi.org/10.15302/J-SSCAE-2019.11.010

References

[1]
Liang K, Zhao L, Chu X, et al. An integrated architecture for software defined and virtualized radio access networks with fog computing [J]. IEEE Network, 2017, 31(1): 80–87.
[2]
Kaiwartya O, Abdullah A H, Cao Y, et al. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects [J]. IEEE Access, 2016, 4: 5356–5373.
[3]
Naranjo P G V, Pooranian Z, Shojafar M, et al. FOCAN: A fogsupported smart city network architecture for management of applications in the Internet of everything environments [J]. Journal of Parallel and Distributed Computing, 2019, 132: 274–283.
[4]
Akshatha N, Rai K H J, Haritha M K, et al. Tactile Internet: Next Generation IoT [C]. Coimbatore: 2019 Third International Conference on Inventive Systems and Control (ICISC), 2019.
[5]
Rossini G, Rossi D. Evaluating CCN multi-path interest forwarding strategies [J]. Computer Communications, 2013, 36(7): 771–778.
[6]
Perry J, Ousterhout A, Balakrishnan H, et al. Fastpass: A centralized “zero-queue” datacenter network [J]. ACM SIGCOMM Computer Communication Review, 2014, 44(4): 307–318.
[7]
Zorzi M, Zanella A, Testolin A, et al. Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence [J]. IEEE Access, 2015, 3: 1512–1530.
[8]
Xiao S H, He D D, Gong Z B. Deep-Q: Traffic-driven QoS inference using deep generative network [C]. New York: Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018.
[9]
Wang L Y, Jajodia S, Singhal A, et al. k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities [J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(1): 30–44.
[10]
Suthaharan S. Big data classification: Problems and challenges in network intrusion prediction with machine learning [J]. ACM SIGMETRICS Performance Evaluation Review, 2014, 41(4): 70–73.
[11]
Shahriar N, Ahmed R, Chowdhury S R, et al. Generalized recovery from node failure in virtual network embedding [J]. IEEE Transactions on Network and Service Management, 2017, 14(2): 261–274.
[12]
新华网. 我国将加快构建高速、移动、安全、泛在的新一代信息 基础设施 [EB/OL]. (2019-05-17) [2020-08-10]. http://www.xinhuanet.com/2019-05/17/c_1124510041.htm. Xinhua Net. China will speed up the construction of a new generation of high-speed, mobile, secure and ubiquitous information infrastructure [EB/OL]. (2019-05-17) [2020-08-10]. http://www.xinhuanet.com/2019-05/17/c_1124510041.htm.
[13]
邬江兴. 新型网络技术发展思考 [J]. 中国科学: 信息科学, 2018, 48(8): 1102–1111. Wu J X. Thoughts on the development of novel network technology [J]. Scientia Sinica (Informationis), 2018, 48(8): 1102–1111.
AI Summary AI Mindmap
PDF(522 KB)

Accesses

Citations

Detail

Sections
Recommended

/