CN111292523B - Network intelligent system - Google Patents

Network intelligent system Download PDF

Info

Publication number
CN111292523B
CN111292523B CN201811488431.1A CN201811488431A CN111292523B CN 111292523 B CN111292523 B CN 111292523B CN 201811488431 A CN201811488431 A CN 201811488431A CN 111292523 B CN111292523 B CN 111292523B
Authority
CN
China
Prior art keywords
network
data
intelligence
intelligent
networks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811488431.1A
Other languages
Chinese (zh)
Other versions
CN111292523A (en
Inventor
余少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Information And Communication Technology Group Co ltd
Original Assignee
China Information And Communication Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Information And Communication Technology Group Co ltd filed Critical China Information And Communication Technology Group Co ltd
Priority to CN201811488431.1A priority Critical patent/CN111292523B/en
Publication of CN111292523A publication Critical patent/CN111292523A/en
Application granted granted Critical
Publication of CN111292523B publication Critical patent/CN111292523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Abstract

The invention relates to a network intelligent system which can be used as a future network paradigm. According to an example embodiment, a network intelligence system may include: the network data sensing device is arranged in one or more basic networks and used for sensing network data in the one or more basic networks; and the network intelligent processing device is used for carrying out artificial intelligent processing on the network data obtained from the network data perception device so as to obtain the information of the objects related to the one or more basic networks.

Description

Network intelligent system
Technical Field
The present invention relates generally to network architectures and, more particularly, to a network intelligence system as a future network paradigm.
Background
To cope with major technical challenges of Network scalability, security, user experience assurance, real-time, mobility, manageability, and the like, developing new killer-level applications, american japan korea, and the like have successively started a set of Future Network research plans, including Internet2 (started in 1996), new arch project (started in 2000), clean tile plan (started in 2003), FIND (started in 2006), genin (started in 2006), GENI (Global Environment for Network Innovations, started in 2006), network Science and Engineering (started in 2009), and FIA (started in 2010); FIRE in Europe (Future Internet Research and evaluation, start 2007); the NWGN (New Generation Network,2005 start) study plan in japan, and the AKARI Project (AKARI Architecture Design Project, future light, 2006 start) for NICT deployment; the Korean FIRST (Future Internet Research for sustability test bed, started in 2009) project; ITU-T SG13 GII (Global Information Infrastructure), FG-NGN (Focus Group on Next Generation Network, started in 2009), IMT2020 Fixed/Mobile conversion, OTN (Optical Transport Network) beyond 100Gbit/S, FG-Net2030, etc., and a series of symbolic researches such as Internet of Things (IoT), cloud computing, big data, 4G/5G, software Defined Network (SDN)/Network Function virtualization (Network Function virtualization, NFV) and open source, which have both a revolutionary route and an evolutionary technology route, play a very important role in the future Network research and have significance for the future development of Network technology. Some of these techniques can solve the problem of insufficient addresses, but cannot solve the problem of quality of service; some can solve the bandwidth problem, but cannot solve the security problem; some heavy theories can solve the problems of local and specific services; some overweight experiments are difficult to solve the supervision problem; some are biased to be wired and fixed networks, which is difficult to solve the problem of wireless networks. The network is likely to be overwhelming if all issues and application requirements are taken into account.
From the formal investment of ARPANET in 1969 to the large-scale commercial use of global internet in the near 50 years at present, particularly in the middle and later nineties, all operator networks, all various private networks, all experimental networks, all fixed terminals, all mobile phones (2G/3G/4G/5G) and other mobile terminals are invested in over 100 trillion yuan, wherein only taking the mobile phone as an example, 74 trillion users are invested in the whole world, and each mobile phone is on average 4000 yuan, namely, 30 trillion yuan of assets. Then, backward compatibility and forward compatibility should be considered for all new technologies, new products and new solutions of future networks to protect these original 100 trillion investments. The internet is a global infrastructure of a whole course and a whole network, is a symbol of a group of 74 hundred million people all over the world, covers two hundred of countries and regions all over the world, is deeply integrated with hundreds of different industries such as education, medical treatment, industrial manufacturing and the like, has a submarine network and an aerospace network, has history and cultural deposition of nearly 50 years before and after, and is hidden by invisible hands. Therefore, the technology for using the pipe is a technology for using the pipe which can fully protect the investment of 100 trillion, and simultaneously can incorporate various new technologies which are continuously innovated in various countries, various industries and various organizations in the next decades into the future network new technology.
Disclosure of Invention
To this end, the present application proposes the concept of "Network-Agent" (also called Network AI, NAI), which may constitute a scalable Network architecture, and may be configured as, for example, a super Agent, an enterprise Agent, a school Agent, a hospital Agent, a traffic Agent, a provincial Agent, a military Agent, a fleet Agent, and the like. The intelligent agent is completely different from various future network research plans started in sequence such as American Europe, japan and Korea and the like in the big idea, is not limited to the innovation of a pure network category any more, is not only fascinated by a new method which is only put forward from the specific levels of a network system architecture, a Baseline technology, service quality experience, network security and the like to solve various problems of the network, but jumps out of the pure network innovation range, is stared from the requirement level of billions of network connections to billions and trillion of human-network-physical-everything interconnection and fusion, is stared from the huge requirement level of the internet which is comprehensively pushed from the consumption field to the industrial manufacturing field, is stared from the big data requirement level that the total amount of human knowledge is doubled from hundreds of years to half a day (from the Boeing company Michael Richey), is stared from the idea that the internet is compatible with the traditional network technology, protects 100 trillion investment and can be continuously brought into various new technologies, is not only in the pure network range, but also is the trend of the artificial information which is greatly shifted to the big network range. The application provides an end-to-end network (cloud network), perception, big data, algorithm processing and artificial intelligence all-network-angle network, and the network and the method are used for mutually cooperating and jointly solving the problems in the network.
According to one embodiment, there is provided a network intelligence system comprising: the network data sensing device is arranged in one or more basic networks and used for sensing network data in the one or more basic networks; and the network intelligent processing device is used for carrying out artificial intelligent processing on the network data obtained from the network data perception device so as to obtain the information of the objects related to the one or more basic networks.
In some examples, the network data perceiving device includes a perceiving device for perceiving human society, a perceiving device for perceiving a natural world, and a perceiving device for perceiving a cyber space.
In some examples, the means for perceiving the cyberspace includes at least one deep packet inspection device disposed in the one or more base networks, the deep packet inspection device configured to intercept network data packets from the one or more base networks.
In some examples, the deep packet inspection device includes an inspection function, the inspection function including at least one processor and at least one memory, the memory having instructions stored thereon, the processor executing the instructions to perform the steps of: intercepting network data packets from the one or more underlying networks; parsing the intercepted network data packet to determine a service type and a related object of the network data packet; and repackaging the network data packet into a preset format based on the analysis result and sending the network data packet to the network intelligent processing device.
In some examples, the deep packet inspection device further comprises an inspection management entity configured to manage operation of the inspection function entity according to instructions of the network intelligent processing device.
In some examples, the perception device for perceiving human society and the perception device for perceiving a natural world each include: an automatic sensing unit for automatically sensing the related data; and the perception control unit is used for controlling the operation of the automatic perception unit according to the instruction of the network intelligent processing device.
In some examples, the artificial intelligence process includes determining behavior and/or status of a related object based on the network data.
In some examples, the artificial intelligence process further includes determining attributes of the related objects based on their behavior and/or state.
In some examples, the artificial intelligence process further includes controlling behavior of the related objects based on attributes of the related objects.
In some examples, the artificial intelligence process further includes predicting future behavior and/or state of the relevant object through machine learning based on the network data.
In some examples, the network intelligence processing apparatus is configured to run a neural network model that is trained using the obtained network data to predict future behavior and/or state of the relevant object.
In some examples, the network smart processing device is further configured to determine an association between behaviors and/or states of a plurality of related objects from a plurality of network data related to the plurality of objects.
In some examples, the network intelligent processing device is configured to perform one or more of the following steps: determining travel information for the related objects based on the camera data, vehicle ticketing data, accommodation data; determining traffic load information for the relevant road based on the vehicle position and speed data, and adjusting the traffic control signal and/or planning the navigation path based on the traffic load information; determining bandwidth demand information for the relevant objects based on the traffic data, and configuring bandwidth and/or planning routes based on the bandwidth demand information; determining preferences for related objects based on the web browsing data and determining push content for the related objects based on the preferences for the related objects; and determining air haze data based on the haze sensor, and determining a haze pollution source based on the air haze data.
In some examples, the one or more underlying networks include a telecommunications network, the internet, and/or the internet of things.
In some examples, the one or more infrastructure networks include one or more of an enterprise network, a community network, a traffic control network, an energy control network, an environmental monitoring network, a government affairs network, a logistics network, a banking network, a school network, a hospital network, a port network, a building network, a metropolitan network, and a backbone network.
In some examples, each base network includes a client, a server, and an intermediate connection for connecting the client and the server.
In some examples, the client comprises one or more of a personal computer, a cell phone, a tablet, a personal digital assistant, and a sensor, the server comprises one or more of a cloud server, a base station, a server computer, and a mainframe, and the intermediate connection comprises one or more of a relay, a bridge, a router, a switch, and a gateway.
In some examples, the one or more underlying networks include a Software Defined Network (SDN).
In some examples, the software defined network includes: an infrastructure layer comprising a network infrastructure; a control layer comprising a controller for controlling the network infrastructure, wherein the controller is defined by software; and the cooperative arrangement layer is used for performing cooperative arrangement on the network data and providing the network data to the application layer through the open port.
In some examples, the network intelligence processing apparatus controls operation of an infrastructure layer of the one or more infrastructure networks by configuring a control layer of the one or more infrastructure networks.
In some examples, the network intelligent processing devices include one or more of enterprise intelligent processing devices, community intelligent processing devices, traffic intelligent processing devices, energy intelligent processing devices, environment intelligent processing devices, government intelligent processing devices, logistics intelligent processing devices, bank intelligent processing devices, school intelligent processing devices, hospital intelligent processing devices, port intelligent processing devices, building intelligent processing devices, metropolitan area network intelligent processing devices, and backbone network intelligent processing devices, and super intelligent processing devices.
The above and other features and advantages of the present invention will become apparent from the following description of exemplary embodiments.
Drawings
FIG. 1 illustrates an architectural block diagram of a network intelligence system according to an exemplary embodiment of the present invention.
FIG. 2 shows a block diagram of the architecture of a network intelligence system according to an exemplary embodiment of the present invention.
FIG. 3 illustrates a conceptual diagram of global agents according to an exemplary embodiment of the invention.
Fig. 4 shows a block diagram of a Deep Packet Inspection (DPI) device according to an exemplary embodiment of the present invention.
Figure 5 illustrates an architectural block diagram of a Software Defined Network (SDN) according to an exemplary embodiment of the invention.
Detailed Description
The demand for network applications has overwhelmed the traditional network and network reconfiguration is imperative. From the number of users, the internet has covered more than 220 countries and regions by the end of 2017, the number of global netizens exceeds 35.5 hundred million, 76 hundred million mobile phone users, 41.9 hundred million mobile broadband users, 9.57 hundred million fixed phone users, and 9.7 hundred million fixed broadband users (from ITU data). Wireless mobile networks have evolved over millions of users, over 20 years (1980-1999), over billions of users, over 20 years (2000-2019), over billions of users including IoT, and are expected to be used for 20 years (2020-2039). Similarly, with 5000 million users, newspapers have been used for over 200 years, radios for 38 years, televisions for 15 years, and the internet for only 5 years. Network communication is one of the fields with the largest number of users, the largest industry drive and the widest influence, and the global economic, cultural, security and competitive formats are being changed profoundly. For example, only the kinds of network applications APP are over 400 ten thousand, the bandwidth difference of these services is 1Gbit/s/10kbit/s =10 ten thousand times, and the delay difference is 100ms/10ns =1 000 ten thousand times. The number of users and the types of services are increased dramatically, the difference is huge, the traffic pressure is not enough, the expandability, the safety, the user experience guarantee, the real-time performance, the mobility and the manageability of the network are challenged unprecedentedly, but the network is adapted passively, and the network reconstruction and the introduction of intelligence are really necessary and urgent.
From 5G and 3 large application scenes of sending license plates, a typical value of user experience rate is 0.5-1.0 Gbit/s, the connection number density is millions of users per square kilometer, the peak rate is 10Gbit/s, the flow density is 10Tbit/s per square kilometer, the mobility is more than 500km/h, and the network delay is less than 1ms. The communication from people to people can be expanded to people to things, things to things, the Internet of vehicles and the like, and the connection number can be increased from the current billion level to the billion level. The spectrum of 5G will be much higher than 4G and the density of base stations will be more than 3 times that of 4G. In 2017, the number of 4G base stations reaches 328 ten thousand, so that the number of 5G base stations only enhancing the Mobile Broadband (eMBB) type can finally reach more than 1 000 ten thousand by 3 times of calculation. The dramatic increase of the number of new high-bandwidth services can lead to the exponential increase of the flow of core networks such as metropolitan area networks, provincial trunks and national trunks, the pressure of user experience is increased by several times, the reliability and stability of the core networks are greatly challenged, the introduction of edge computing brings some complexity to the network, the deployment of IoT increases the difficulties such as wide coverage, low power consumption and the like, the network can continuously adapt passively, and the network reconfiguration and the introduction of intelligence are really necessary and urgent.
The network is to take the burden of industrial internet, and all raw materials, finished products, intermediate parts and all manufacturing equipment of all factories around the world are connected together, technical flow, fund flow, logistics (spare parts, intermediate parts and finished products), information flow and people flow are mixed, and the connection number and the type exceed the current person-to-person connection number. The extensibility, user experience assurance, real-time performance, mobility and manageability of the network are challenged unprecedentedly, and the challenges of device security, network security, control security, application security, data security and the like are also faced, the network is being adapted passively, and the network reconfiguration and the introduction of intelligence are really necessary and urgent.
From the global development situation, the network technology is in the important opportunity period of reconstruction innovation and intelligent introduction, the network infrastructure is accelerating to develop towards the direction of large bandwidth, wide coverage, cloud network integration and intellectualization, the network threat and the traditional means are linked together to become an important source influencing the national security, the network space becomes the strategic space gaining the long-term competitive advantage of the country, and the foundation of the urban intelligent agent is supported by equipment intelligence, network intelligence and business intelligence triangles. By 2040 years, the internet was about 30 000 times larger than it is now if it continued to grow without major changes. By then the "network" will not be centered on the network itself, but on the traffic and its intelligence (as with Tencent, ali, etc. driving network traffic far more than the network equipment manufacturers).
From the value of the network, the mertecavir law expresses the network value as: the value of the network is proportional to the square of the number of linked nodes within the system, V = kxn 2 In the formula: k is a value coefficient; n is the number of networking nodes (the number of world man-machine networking devices has grown from 0.08 in 2003 to 1.84 in 2010, 3.47 in 2015, and possibly 6.58 in 2020). The network is the core resource of the country, the architecture is the soul, and the transformation is the strategic measure. And (4) conclusion: the number of users, industrial drive and influence at the current stage of the network are unprecedented; the problems, difficulties and challenges that exist have not been previously addressed; the future development-oriented tasks are heavy, high in pressure and hope, the available technical means are limited, and the time window is also very limited.
In view of the technical problems and challenges of existing networks, the devices in the network have a large number of complex closed systems and a large number of private/internal interfaces. The network lacks flexibility, the function expansibility of the equipment is weak, a large number of service islands are formed, the services are difficult to merge, the development of new services is difficult, the operation and maintenance are complex, and the operation cost is high. The exterior faces OTT challenge, the interior faces business innovation difficulty, growth weakness, business volume and business income scissor difference continuously expanding.
In summary, the network reconfiguration is necessary and is only the first step, and the flexibility, the intelligentization strength and the introduction of the network agent are further increased subsequently, so that the device intelligence, the network intelligence and the service intelligence are realized, and the network agent is supported and formed together.
FIG. 1 illustrates an architectural block diagram of a network intelligence system according to an exemplary embodiment of the present invention. As shown in fig. 1, the network agent system 10 may include a sensing layer 11, a network 12, and a network agent (NAI, or agent for short) 13, where the network agent 13 may include a cloud server agent 13a and an intelligent command hub 13b. Taking a city as an example, after the facilities are deployed, the whole city is like a human body, and through the brain, the hands, the feet, the hearing, the speaking, the smelling, the taste, the skin and the nervous system, the coordination and the consistency are realized, and the self-perception, the self-statistics, the self-reasoning, the self-learning and the self-prediction become an organic whole.
The sensing layer 11 may include various network data sensing devices for sensing various network data and transmitting the sensed data by means of a network. Thus, the awareness layer 11, or network data awareness, may itself be deployed in the network. For example, the sensing layer 11 can sense data related to human society, the natural world and network space, and in short, the sensing layer 11 can sense data generated by human-network-object interconnection and fusion. Due to the development of technologies such as the internet of things, the industrial internet, the internet of vehicles, the ocean network, the air-to-air network and the like, the data amount which can be perceived by the perception layer 11 is larger and larger, and almost most fields can be covered. If necessary, the sensing layer 11 may also perform necessary processing on the sensing data, such as parsing to identify the service type, repackaging into a predetermined format, etc., and then transmitting to the upper layer device.
The human society may include data related to human activities such as traffic data, data generated by human use of personal computers, cell phones, etc. (e.g., web browsing data, weChat click documents, web shopping), etc. For example, traffic data may be generated by a traffic camera, a car networking, and the like. The natural world may include, for example, raw materials purchased by a factory, production equipment, middleware produced, products produced, warehouses, outdoor temperatures, climate, air quality, rainfall, remote videos of scenic spots, etc., which may be generated by various sensors or RFID. The network data includes various data transmitted in the network (such as capital stream data, physical distribution data, management data, voice, video, picture data, etc. of the plant). The sensing layer 11 can sense these data by various means (note: not infringing the privacy of the individual, operating within the allowed scope of the laws and regulations). For example, the means for perceiving cyber-spatial data of the perception layer 11 may include a Deep Packet Inspection (DPI) device deployed in the network to intercept network packets transmitted in the network, as will be described in further detail below. Alternatively, the means of the sensing layer 11 for sensing the human society and the natural world may include an automatic sensing unit 11a and a sensing control unit 11b. The automatic sensing unit 11a may be configured to automatically, e.g., continuously or periodically, sense data generated by activities of the human society. For example, a camera may capture personal movement data, traffic data, etc., a microphone may capture voice data of a person, etc., and data generated by the action of a person tapping a keyboard, clicking a mouse, etc., may also be captured. Also, the auto-perception unit 11a may be configured to send perception data to the network agents 13 via the network 12. As will be described below, the network agent 13 may determine information about the relevant objects based on the received network data and may also control the data-aware process through instructions. For example, the network agent 13 may send an instruction to the sensing control unit 11b, and the sensing control unit 11b may control the operation of the automatic sensing unit 11a according to the instruction, for example, control the type of data traffic sensed by it, the sensing frequency, and the like. It should be understood that the network data aware means may be implemented by software, hardware or a combination thereof.
Although not shown, the network 12 may include various networks, such as one or more underlying networks different from or the same as one another, examples of which include, but are not limited to, telecommunications networks (including 2G, 3G, 4G, 5G networks, as well as future developed telecommunications networks), the internet of things, local area networks, and so forth. Examples of one or more underlying networks include, but are not limited to, enterprise networks, community networks, traffic control networks, energy control networks, environmental monitoring networks, government affairs networks, logistics networks, banking networks, school networks, hospital networks, port networks, building networks, metropolitan networks, and backbone networks, among others, in terms of functional characteristics. As will be understood from the detailed description below, in one or more underlying networks, through various terminals and servers, etc., a multitude of network data may be generated, which is transmitted within the network as well as between the networks.
The network agents 13, which may also be referred to as network intelligence processing means, may perform artificial intelligence processing on the network data obtained from the perception layer 11 to obtain information about objects associated with the underlying network. Here, the object related to the infrastructure network may include the human society (including people) described above, the natural world (e.g., raw materials purchased by a factory, production equipment, middleware for production, products for production, warehouses, outdoor temperature, climate, environment, etc.), or the network itself (e.g., various network devices), and the like.
Network agents 13 may include cloud agents 13a and an intelligent command hub or center 13b. The cloud agent 13a may be deployed on the network 12 in a cloud, and receive network data transmitted through the network 12 from the perception layer 11. The cloud agent 13a may perform necessary processing on the network data, including data fusion, classification, statistics, storage, and the like, or may further include simple inference, association, and the like. For example, the cloud agent 13a may store data related to a certain object, such as a person, in a classified manner to hold information related to the person. The intelligent command hub 13b may perform further artificial intelligence and algorithm processing based on the data of the cloud server agent 13a, including self-perception, self-statistics, self-inference, self-learning, self-prediction, etc., which may be implemented by means of software and hardware related to the field of artificial intelligence, which are currently available or developed in the future. Some functional examples of the network intelligent processing device 13 will be described in further detail below.
FIG. 2 shows a block diagram of the architecture of a network intelligence system according to an exemplary embodiment of the present invention. By way of example, two base networks 10a and 10b are shown in FIG. 2, but it should be understood that a network intelligence system may include more or fewer base networks.
Each base network 10a and 10b may include clients, servers, and intermediate connections for connecting the clients and servers. In the example of fig. 2, the base network 10a may be, for example, the internet (or the internet), wherein the clients may include, for example, a tablet computer 14, a personal computer 15, and may also include, for example, a personal digital assistant, and various sensors (not shown), such as a haze sensor, a water quality sensor, a traffic camera, a security camera, an RFID sensor, a barcode scanner, a magnetic encoding sensor, etc., which are connected to the network, to name but a few examples. The intermediate connections may include, for example, switches 16, and may also include, for example, repeaters, bridges, routers, gateways (not shown), and the like, used to connect various network devices, including clients and servers, for data transfer. The server may include, for example, the server computer 17, and may also include, for example, a mainframe, a super computer, and the like, and of course, the server may also be deployed as a cloud server cluster. The base network 10b may be, for example, a telecommunications network, wherein clients may include, for example, handsets 18, servers may include, for example, base stations 19, network management servers (not shown), etc. It should be understood that the base networks 10a and 10b are only examples and the present invention is not limited thereto.
It will also be appreciated that the network elements given above as examples may serve as one or more of a client, a server, and an intermediary connection. For example, the base station 19 is used to connect different handsets 18 together, so the base station 19 can also be considered an intermediate connection. The personal computer 15 may also be configured as a server to provide certain services, such as HTTP web services, and thus may also act as a server. For another example, a mobile phone, a personal computer, etc. may also be regarded as a sensor for sensing operations and behaviors of a user thereof, and thus, in a broad sense, various terminals in a network may be regarded as a sensor.
As an example of the network data perceiving device 11 for perceiving the network space, a Deep Packet Inspection (DPI) device 21 is shown in fig. 2. One or more Deep Packet Inspection (DPI) devices 21 may be deployed in the infrastructure networks 10a and 10b, for example, near an intermediate connection or network data transmission path (e.g., fiber, cable) to intercept network data packets and send the intercepted network data packets to the network intelligent processing device 30. The Deep Packet Inspection (DPI) device 21 will be described in detail below. Although a Deep Packet Inspection (DPI) device 21 is shown here as an example, it should be understood that the network data awareness device 11 for awareness of network space may be implemented in other ways. For example, the network data aware device 11 may be an intermediate connection in the underlying network or a part thereof for copying and sending network data packets forwarded therethrough to the network intelligent processing device 30. As another example, the network data aware device 11 may be a software defined controller that controls network elements in the underlying network to send a copy of network packets it generates, receives, or forwards to the network intelligent processing device 30.
The network intelligent processing device 30 may include one or more sub-processing devices respectively for performing artificial intelligence processing on network data of different underlying networks. For example, fig. 2 shows a sub-processing device 31 for the infrastructure network 10a and a sub-processing device 32 for the infrastructure network 10 b. In addition, the network intelligent processing device 30 may further include a processing device 33 capable of processing network data of a plurality of infrastructure networks. The processing devices can be classified into an enterprise intelligent processing device, a community intelligent processing device, a traffic intelligent processing device, an energy intelligent processing device, an environment intelligent processing device, a government affair intelligent processing device, a logistics intelligent processing device, a bank intelligent processing device, a school intelligent processing device, a hospital intelligent processing device, a port intelligent processing device, a building intelligent processing device, a metropolitan area network intelligent processing device, a backbone network intelligent processing device, a super intelligent processing device and the like according to functions thereof, wherein the backbone network intelligent processing device can process data of a national network, and the super intelligent processing device can process data of a global network. Each intelligent processing device may be used to implement the cloud server body 13a and the intelligent command hub (or brain) 13b shown in fig. 1.
Here, the network intelligence processing apparatus may also be referred to as a network agent, which determines information of objects related to the network, including behaviors and/or states of the related objects, and the like, based on artificial intelligence processing of network data. The network intelligent agent is an intelligent agent with a brand new form, which is based on various group intelligent behaviors based on network and human-network-object three-element interconnection, has a relatively complete networking and intelligent system, has certain self-perception, self-learning, self-decision, self-execution and self-adaptation capabilities, and has certain intelligence and human-like behavior awareness. The system, the platform or the network which can be materialized can be used for realizing (or embodying) the entity which is continuously upgraded and evolved, has timeliness and weak central control and high connectivity manually, and the entity needs to cooperate and interact with 'network (cloud network) + perception + big data + algorithm processing' to solve various problems in the future network together. The conversion is from sensing to data, from data to information, from information to knowledge, from knowledge to intelligence, from intelligence to service, the network is still neutral, and the privacy of the user needs to be protected to ensure the information security.
The implementation of network agents can take full advantage of the hardware and software levels that have developed now, including the hardware and software associated with artificial intelligence that has developed rapidly in recent years, as well as quantum computers that are developed in the future, and the like. In particular, the rapid development of artificial intelligence has given machines the ability to perceive and learn, which has the potential to break through "singularities" in machines, i.e., beyond the capabilities of humans. With artificial intelligence, human-like perception, learning, and prediction processes have been enabled by machines. For example, with artificial intelligence processing, in addition to determining the behavior and/or state of a related object based on network data, attributes of the related object may be determined based on its behavior and/or state, and its behavior may be controlled based on the attributes of the related object. For example, it may be determined that a network user performs network attack many times based on network data, and thus it may be determined that the network user is a hacker. When the user is determined to be a hacker, the network agent may configure the network to restrict the user's network operation, and in particular to restrict its network attack behavior, such as may cause its attack instructions to be incorrectly routed to a target network element or address. Conventional networks can only resist network attacks by improving the security of the network itself, but it is theoretically almost impossible to build a network completely free of security holes. The network of the invention can limit the attack behavior of a user by actively determining the user as a hacker, thereby being capable of solving the problem of network attack more effectively. As another example, based on the energy consumption data and the environmental haze monitoring data obtained from the internet of things, it may be determined that a certain object (e.g., a factory or a site) is a haze pollution source, and then the energy consumption (e.g., power distribution) of the object may be limited to reduce the haze pollution. As another example, the network traffic data of a certain user may determine the network bandwidth required by the user, so that the user may be configured with the required bandwidth. The service can be applied to a large number of users, thereby achieving reasonable and efficient configuration of network bandwidth.
In some embodiments, the artificial intelligence process of the network agents may also utilize recently developed machine learning techniques to predict future behavior and/or states of related objects through machine learning of existing data. For example, the network intelligent processing device may run a neural network model established for a specific application scenario, train the neural network model using the obtained network data, and then predict the future behavior and/or state of the relevant object using the trained model. The model may also be continually modified using truth data during the prediction process. For example, future data may be predicted from historical data of traffic, weather, and the like.
In some embodiments, the network smart processing device may also determine an association between behaviors and/or states of a plurality of related objects through a plurality of network data related to the plurality of objects. For example, the main emission source may be determined by determining the relationship between the nationwide haze distribution and the density distribution of emission sources of factories, vehicles, and the like. The network agents may utilize the big data obtained from the network to stand at a higher perspective to view the network related objects, thereby making it easier to discover associations between the objects.
Some examples of specific applications of the network intelligent processing device are described below.
Example 1: and determining the travel information of the person based on the camera data, the vehicle ticketing data and the accommodation data, and realizing the tracking of the person. The network camera can shoot pedestrians in various scenes to obtain face images of the pedestrians. In some embodiments, facial features can be extracted by software or dedicated hardware such as a chip at the camera head end by using edge computing technology, and then transmitted to the network intelligent agent for identification and matching, which can greatly reduce the computing power requirement of the intelligent agent end and reduce the network bandwidth consumption. Further, traffic ticket data such as railway, airplane, ship ticket purchasable information, accommodation information, and the like can provide travel information of a person as a specific object. The network intelligent agent can track the journey of a person by extracting and integrating the information.
Example 2: traffic load information for the relevant road is determined based on the vehicle position and speed data, and traffic control signals are adjusted and/or a navigation path is planned based on the traffic load information. The construction of the 5G network promotes the development of the vehicle networking, the networked vehicles can send information such as the positions and the speeds of the networked vehicles to the traffic management intelligent agent, and the traffic management intelligent agent can determine the conforming information of the traffic network through the data, so that traffic control signals can be adjusted and/or navigation paths can be planned. For example, if the east-west load of a certain intersection is much higher than the north-south load, the green light time in the east-west direction can be prolonged, and the street lamp time in the north-south direction can be shortened, so that the traffic flow is accelerated, and the traffic pressure is relieved.
Example 3: bandwidth demand information for the relevant objects is determined based on the traffic data, and bandwidth is configured and/or routes are planned based on the bandwidth demand information. For example, if the network traffic of a terminal is large, a large network bandwidth may be configured for the terminal. For another example, if the load of a certain routing path is large, a new routing path can be planned, and faster access is realized. One advantage of the network agent is that the whole network can be observed globally, so that the optimal configuration of resources is realized, and the utilization efficiency of the network is improved.
Example 4: preferences of related objects are determined based on the web browsing data, and push content for the related objects is determined based on the preferences of the related objects. For example, if the browsing content of a certain user is related to the clothing and accessories, popular element information such as the clothing and the accessories can be pushed for the user; if the browsing content of a certain user is related to finance, finance news or products and the like can be pushed for the user.
Example 5: the air haze data is determined based on the haze sensor, and the haze pollution source and the like are determined based on the air haze data. This example has been described previously and will not be repeated here.
The above are only a few examples, and it should be understood that a network agent may have various functions depending on the network it serves, which may be implemented using existing levels of hardware and software.
From the perspective of the global agent, it is inexpensive,the system consists of optical fibers, wireless electromagnetic waves, copper wires, silicon atoms, bits, software, algorithms and the like, consumes electric energy equivalent to dozens of large nuclear power stations on the earth, is an unthinkable huge network, is ubiquitous and non-porous, and covers 5.1 multiplied by 10 of the world 14 The range of square meters, which relates to land, sea, air and space and hundreds of large and small industries including education and medical treatment, is the largest system established by human beings at present, and the influence and the penetrating power on daily life are ten to one hundred times larger than the industrialization.
From the class of Network Agents (NAIs), they can be very large, such as the global agents mentioned above; can be large-scale, such as national agent (can be divided into a plurality of agents according to functions, such as education, science and technology, national defense, import and export and the like), for example, the modern political information agent appears, if can be utilized, the treatment capacity, level and efficiency of the state can be many times higher than the current; may be moderate, such as city agents, provincial agents, operator agents, national traffic agents, educational agents, cross-country company agents, tencent/Ali agents, and the like; the system can also be small-medium-sized, such as an enterprise agent (a super enterprise, compared with the current 'enterprise + informatization', the competitiveness is increased by a large level, and the efficiency can be improved by several times to dozens of times). The 2000 data shows that of the 100 largest economies worldwide, 51 are corporations and only 49 are nations. Several years later, if they became intelligent, the impact of their decisions is far and widespread worldwide, and it is of great importance.
People click thousands of billions of times through mobile phones and other terminals every day to tell the NAI what the human is doing, what the human can do next, and the NAI can complete intelligent learning and other functions. Continuously learning every day, continuously carrying out intelligent statistics and classification on big data, carrying out deep mining, continuously finding internal correlation (for example, finding a haze source through a batch of isolated and dispersed haze data, carrying out case detection through a batch of seemingly irrelevant police video information, quickly finding a suspect and the like), and upgrading to new intelligence. The study characteristics are defined as follows:
(1) The theory, the method and the application of 'cloud network + perception + big data + algorithm + artificial intelligence' are researched and developed on the basis of the Internet, network reconstruction and SDN/NFV and network big data thereof, so that the proper use of the artificial intelligence is realized.
(2) A new intelligent entity (composed of software and hardware, such as software upgrading of an SDN/NFV controller) capable of reacting in a manner similar to human intelligence can be developed and produced, and research in the field comprises network self-perception, self-search, machine self-learning, logic self-reasoning, certain self-thinking capability and expert system capability generated through training and the like, so that the principle of intelligence is realized, an algorithm similar to human brain intelligence is designed, and a computer can realize higher-level intelligent application.
(3) The system can complete a large amount of repetitive primary mental labor like human beings, has certain thinking capability in the aspects of data correlation, timeliness and individuation exceeding the human beings in the big data processing, and can greatly exceed the intelligence of the human beings in the later period. Some of the more complex tasks that normally require human intelligence can be accomplished through training. The understanding of this "complex work" by different industries, different locations, and different groups of people is different.
The connection quantity of NAI can be rapidly developed from billions to billions and trillions, from human-network binary interconnection to human-network-object ternary interconnection and even multiple interconnection and fusion, from ground plane interconnection to space three-dimensional interconnection and outer space and interstellar interconnection (NAI is equivalent to adding a nerve layer or control layer on the traditional physical world and human society, and is deep informationized in nature), and the total quantity of network data can be rapidly developed from TB and PB levels to EB, ZB, YB and even BB levels. The method greatly breaks through the limitations of the self ability and the mental power of human beings, greatly breaks through the limitations of space and time, and greatly breaks through the limitations of a large amount of human facilities and resources such as a worldwide library, a large encyclopedia, a worldwide university, a worldwide hospital, a worldwide movie theater, a worldwide factory, a worldwide shop, a worldwide post office and the like.
From NAI worldwide, a huge intelligent agent which is spread all over the world, land, sea and air, has no time and place, can be used at the grassroots level at any time and any place, has no holes and can not be input, has concentrated on the intelligence of 74 hundred million people, is dynamically connected with 74 hundred million people, changes ' loose ' connection of 74 hundred million people into ' tight and dynamic ' connection, changes ' billion isolated ' dead ' matters on the earth into ' live and dynamic connected ' matters, is a dynamic artifact which is the biggest history of human beings, is the most complicated and hard to imagine event which is not transferred by human will appear by the earth, and is composed of silicon materials (hardware), equipment, 0/1 codes (software), networks, algorithms, data and the like (the networks are still neutral, the user privacy must be protected, and the information security problem always plagues us). The human brain is composed of approximately 800 million neurons, NAI can be at least billion-fold more than human neurons, and its capacity, amount of knowledge, and intelligence are accelerating to increase. The NAI has better adaptability and can perform self-adjustment on external changes in a very wide range; the method has an evolutionary capability, and can transfer the adaptability obtained by local construction from one area to another area and from one application category to another category; the NAI is established on a plurality of parallel relations, redundancy exists, and even if a large fault occurs, the NAI is equivalent to a small fault in a higher level; the expandability is realized, a more complex new structure can be constructed, and more useful information can be bred; with novelty, the combination of small individuals associated with each other in a large system grows exponentially. Individual differences are allowed in the clusters, and the individual differences can lead to constant newness through evolution.
The amount of economy driven by it will approach and exceed the physical economy, which is a necessary trend. There is a mechanism to predict that the data usage by the world's world human-web-object interaction and fusion will reach about 44ZB (1zb = 10) by 2020 12 Megabyte) to cover various fields of economic and social development, can reconstruct the traditional links of production, distribution, exchange, consumption and the like, can change the employment structure of people, impact law and social ethics, invade personal privacy, have profound influence on government management, economic safety, social stability, global governance and the like, are more complex in national safety and international competition, and can generate new uncertainAnd (5) performing qualitative determination. The revolutionary influence generated by the method can remold the productivity development mode again, reconstruct the production relation, improve the industrial efficiency and the management level, deeply change the production life style and thinking mode of human beings and continuously improve the accuracy, the high efficiency, the predictability and the service level of government governance. These big data will create next generation internet ecology, next generation innovation systems, next generation manufacturing modalities and next generation social governance structures.
A typical example of a network agent is a city agent serving a metropolitan network, the concept of which is broad and well understood. It contains political, economic, cultural and technical contents. The concept of IoT was formally proposed by international union in 2005 on the internet basis.
The city intelligent agent has a complete digitalization, networking and intelligent system, has certain self-perception, self-learning, self-decision, self-execution and self-adaptation capabilities, has a brand new form city with city intelligence and human-like behavior awareness, and is an upgraded version of the smart city at a higher stage at the present stage. The method needs to cooperate and interact with 'network (cloud network) + perception + big data + algorithm processing', and various problems proposed in future network and city development are solved together.
Taking an urban traffic intelligent agent as an example, the urban traffic intelligent agent refers to the whole-course whole-network dispatching and commanding intelligentization of the whole urban traffic, and each intersection has certain dynamic self-sensing, self-learning, self-decision, self-regulation and control capabilities of traffic flow and routing detouring capabilities. The driver can know the traffic jam condition at any time through the terminal device in the vehicle, and can also obtain the traffic jam forecast, and the traffic accident information can be automatically sent to each vehicle. The parking lot conditions near the shortest path and the destination are automatically obtained, the parking space is reserved, and the vehicles are automatically sensed and are subjected to networking accounting through a direct bank. The robber can alarm at any time when encountering the vehicle robber. Once the vehicle is stolen, the position of the vehicle can be known at any time, and if the terminal in the vehicle has important potential safety hazard, the terminal can prompt in time. Emergencies and important weather changes are also automatically prompted. The traffic information and flow, annual inspection of vehicles and violation information are automatically counted and classified at regular time, and the switching time of traffic lights at the crossing is automatically and dynamically adjusted.
The construction and development of city intelligent bodies can bring about a new intelligent industry, and the new intelligent industry is taken as a link to promote the self-benign operation of the whole city. The intelligent industry brought by the urban intelligent agent can be understood as follows: based on the physical world and the physical society of a real city, information, knowledge and mental resources are used as supports, and information processing technology is utilized to carry out deep intelligent analysis and refinement on various things so as to realize a novel industrial system (such as online tour, facebook, virtual community and the like) with relatively perfect self-perception, self-learning, self-decision, self-regulation and control capability and behavior awareness. It is different from the information industry as well as the knowledge industry. The intelligent industry can not only form huge virtual Space different from network Space (Cyber Space) and enlarge intangible scale of cities, but also comprehensively develop and utilize the intelligent virtual network Space.
The difference between the city intelligent agent and the city informatization lies in that:
(1) The urban intelligent agent takes the 'more scientific development, more efficient management, more harmonious society and better life' as a high-quality development target, and the whole city has more perfect behavior awareness and self-regulation capability and has air-space-ground multi-platform cooperative processing capability;
(2) The whole city has a complete digitization, networking and intelligent system, and has certain intelligent perception, situation perception and cognition ability;
(3) The whole city has a mature information-knowledge-intelligent self-conversion mechanism, and a certain city intelligence and human-like behavior awareness;
(4) The whole city has certain self-learning, self-growing and self-innovation abilities and the like.
The city intelligent agent integrates the informationized system, the IoT system and the community network which are dispersed and are respectively administrative in the city, and is promoted to be an organic whole with better coordination capability and self-regulation capability, which is not existed before, is sublimation and leap of the smart city in the traditional sense, and is endowed with new connotation.
And a simple comparison with the digital government. The positioning of the digital government is to make a scientific decision, fine management and high-efficiency service digital government, which means that government organizations apply modern information and communication technology, the management and service functions are fused through network technology, the optimization and recombination of government targets, organizational structures and work flows are realized on the Internet, the boundaries among time, space and departments are broken through, and high-quality, all-round, standard and transparent management and service which accord with the international standard are provided for citizens. The digital government has the same characteristic points with the intelligent government in the aspects of 'applying modern information and communication technology', 'realizing the optimization and recombination of government targets, organizational structures and workflow, breaking the division boundary' and 'providing high-quality and all-round management and service to the society', different characteristics or different characteristics of urban intelligent agents and urban informatization, and the 4 items, for example, 'permeating the functions of the intelligent agents to each corner of a city through self-perception, self-detection, self-learning, self-decision and the like' are not related to the digital government.
The urban intelligent agent is a product combining virtual economy and entity economy, can promote production, life, management modes and economic social development in an urban area to have unprecedented deep changes, can reduce and save the investment of various substances and energy sources in cities to a great extent, reduce the consumption of resources and energy sources, reduce urban environmental pollution, further improve the effect of market allocation resources, further improve labor productivity, and provide a high-quality-development urban road with high technological content, good economic benefit, low resource consumption, less environmental pollution and fully exerted human resource advantages.
The NAI and the urban intelligent agent are all intelligent agents, and are all end-to-end and whole-course full-network entities with human behavior awareness and self-regulation capability, namely 'network (cloud network) + perception + big data + algorithm processing + artificial intelligence'. The differences are as follows: NAI emphasizes more on solving the network problem of end-to-end and whole-course whole network, emphasizes various group intelligent behaviors based on network and human-network-object three-element mutual interconnection, emphasizes establishing a relatively complete networking and intelligent system, emphasizes establishing an intelligent agent with certain self-perception, self-learning, self-decision, self-execution and self-adaptation capability and certain intelligence and human-like behavior awareness in city range. The city intelligent agent emphasizes more in the city range, solves the network problems of end-to-end city range and whole-course whole network, emphasizes more cities, takes 'development is more scientific, governance is more efficient, life is better, society is more harmonious' as a high-quality development overall target, builds a complete digital, networked and intelligent system, builds a city with certain self-perception, self-learning, self-decision, self-execution and self-adaptation capabilities and a brand new form of city intelligence and humanoid behavior consciousness, and is an upgraded version of the smart city at the higher stage at the present stage.
Another typical example of a network agent is a global agent serving a global network, or may also be referred to as a super agent, of which fig. 3 shows a conceptual diagram. The global agent can collect information of the global network, extract information behind the data through big data and artificial intelligence processing and the like (note: the privacy of the individual must not be invaded, the operation is allowed by the corresponding laws and regulations), observe and understand the world beyond the global view of the whole human, so that the world can be more comprehensively and deeply understood, and the global development is promoted and optimized. Global agents can cover the world-wide network area, including marine, land and space networks, and relate to various industries, including education, medical services, etc., which will be the largest system established historically by humans, with 10-100 times greater impact on human daily life than the industrialized revolution. Global agents can be used anywhere at any time, benefit the world from 74 billion population, transform loose connections between people into tightly dynamic connections, transform hundreds of billions of isolated transactions on earth into interrelated transactions, and profoundly change the political economic culture life of mankind.
Fig. 4 shows a block diagram of the Deep Packet Inspection (DPI) device 21 shown in fig. 2. As shown in fig. 4, the deep packet inspection device 21 may include an inspection function entity 41 and an inspection management entity 42, which will be described separately below.
The detection function entity 41 is the body that performs the DPI detection function and may include a memory 43 and a processor 45, and the processor 45 may execute the DPI detection process by executing instructions stored in the memory 43, so the processor 45 may also be referred to as a DIP engine, which may be implemented by a CPU, such as an ARM CPU. In addition to executable instruction codes, the memory 43 may also store related configuration information of the detection function entity 41, such as the detected service type (i.e. application type), the packet parsing rule, and the like. The processor 45 may perform the following steps by executing instructions in the memory 43 and based on configuration information in the memory 43:
intercepting network data packets from one or more underlying networks 10;
parsing the intercepted network data packet to determine a service type and a related object of the network data packet; and
and repackaging the network data packet into a preset format based on the parsing result, and sending the network data packet to the network intelligent processing device.
The format of the network packets may vary from network to network and from application to application. Therefore, in addition to intercepting data, the detection functional entity 41 may parse the data packet according to the configured parsing rule, identify useful information therein, repackage and encapsulate the network data packet according to a predetermined format, and send the network data packet to the network intelligent processing device. By uniformly packaging and encapsulating the network data packets by the detection functional entity 41, a format convenient for the network intelligent processing device to use can be formed, thereby reducing the data processing load at the network intelligent processing device.
The detection management entity 42 may manage the operation of the detection function entity 41. For example, the detection management entity 42 may configure the service types that the detection function entity 41 can detect, the parsing rule for the detection function entity 41 to parse the network data packet, and the like, and the parsing rule may be represented by a regular expression. Although the detection function 41 and the detection management entity 42 are shown as two separate modules in fig. 4, in some embodiments the detection management entity 42 may also be implemented in the detection function 41 as one management module.
The reconfiguration of the network is not only embodied in the overall architecture described above, but may also be embodied in the base network 12. Software functions are separated and decoupled from a hardware platform, and a basic network is driven to an SDN; the software functions are clouded and open source, and the embedded software deployment operation automation is not needed any more; moving from office-centric networking to cloud Data Center (DC) -centric networking; the architecture is unified, the network capability is opened, the application is flexibly called, and the centralized management and control are realized; -defining services by the operator towards defining services by the user; the traditional supplier trading relation is shifted to the construction of an industrial chain ecosystem. After the network SDN/NFV is formed, hardware management and service operation are separated, the network and service operation is changed into cloud, networking of physical equipment is changed into virtual software operation, and an integrated cloud platform becomes a basic platform of a future network architecture and is gradually upgraded to an intelligent architecture. Two logic architectures are required to be built on a network entity, an intelligent architecture and a traditional architecture are built, and the final aim is to build a network intelligence brain and a nervous system. The newly-built intelligent architecture is superposed with a nerve layer, and a nerve system is a component of a super agent or a city agent. The SDN/NFV is the first step to reconstruct the traditional architecture, i.e. to reconstruct the network body, but to ensure the interworking and consistency with the existing network. The two logical architectures have different respective orientations, but with deep intersections and merges between them.
Taking an operator optical network as an example, the software definition architecture is realized as follows: the NFV is used for realizing virtualization and modularization of service and network functions, defining equipment function software, separating software and hardware, separating control and forwarding, and realizing flexible architecture, centralized service control and network slicing, so that the problems of single architecture, inflexibility and rigid architecture in the past are solved.
And realizing SDN: soft definition and dynamic connection of a network are realized by using an SDN; the system has the advantages that the system is centered on a user, functions are modularized, resources are fully shared, the capacity is fully opened, strategies are easy to arrange, services are tightly coupled, services are easy to experience, the network can be self-healed, and management can be unified; the intelligent, flexible, open, expandable, efficient, large-capacity and on-demand customization of the network is realized, and the problems of the prior network structure rigidity, complex mode and low operation efficiency are solved.
And (3) realizing software defined operation: services are separated from a network, users are separated from the network, and the SDN and the NFV are used for realizing the on-demand management of the users, performance, flow, configuration, charging, safety and the like; the method has the advantages that the network function and the service are open, the whole process is centralized and managed by software, the service is quickly on-line and unified in operation and maintenance, the service and the strategy are customized according to needs, the network is served according to needs, big data is intelligent, an industrial chain is open, and the traditional single pipeline and solidified operation mode is changed.
Figure 5 illustrates an architectural block diagram of a Software Defined Network (SDN) that may be used to implement the underlying network 12 in an embodiment of the invention, according to an exemplary embodiment of the invention. As shown in fig. 5, the SDN may include an infrastructure layer 52, a control layer 54, and a collaborative orchestration layer 56, each described below.
Infrastructure layer 52 may include various network hardware devices, such as those described above with reference to FIG. 2, as an underlying portion of the separation of network resource hardware and software. Infrastructure layer 52 may utilize the OpenFlow protocol to program data flows based on Flow tables (Flow tables) and achieve consistency of Flow Table updates.
The control layer 54 includes a plurality of controllers for controlling the infrastructure layer 52, such as issuing flow tables and the like. It should be understood that each controller is a software-defined controller, such that the underlying network 10 implements network function virtualization. The control layer 54 centrally controls network resources, so that flexible scheduling and cooperative control of network resources can be achieved.
Collaborative orchestration layer 56 is responsible for collaborative orchestrating network data and is provided to the application layer (not shown) through an open port (API). According to the business requirements, the cooperative arrangement layer 56 can dynamically provide an arrangement template and a control strategy, so as to realize end-to-end arrangement of the data stream.
It can be understood that the SDN network is a cross-layer optimization-oriented OpenFlow-based uniform resource model, and can implement optimization control on a multilayer multi-domain multi-constraint base network. In the embodiment of the invention, through the synergistic effect of the SDN basic network and the upper network agent, more functions of the network can be mined and exerted globally and efficiently, the value of the network is improved, and the rapid development of the productivity is promoted.
In the face of major technical challenges such as network expandability, safety, user experience guarantee, real-time performance, mobility and manageability, and major technical challenges such as pulling economic challenges, manufacturing transformation challenges, big data challenges and other major strategic challenges faced by networks, the application jumps out of a pure network innovation thinking, comprehensively solves the problems existing in the network through an end-to-end and whole-process whole-network-angle 'network (cloud network) + perception + big data + algorithm processing + artificial intelligence' human-like behavior consciousness and a self-regulation method, mutually coordinates and jointly solves the problems existing in the network (because the comprehensive problem is difficult to solve by the pure network alone), and considers compatibility with the traditional network technology and protects the generated network investment. Many of the problems that were originally not well solved in the pure network context may become relatively simple due to the introduction of artificial intelligence and big data analytics. For example, end-to-end user experience guarantees can be coordinated and solved through an end-to-end intelligent bandwidth management policy. For another example, the scalability problem can be cooperatively solved by a wider end-to-end network, and the problem location is only more accurate and at least can be alleviated. Because the source and root of problems in future networks are also people, solving the problems of such people is a strong item of intelligence.
The value of the network is proportional to the square of the number N of nodes in the network, with the value of the network being higher for larger N. The network is the core resource of the country and the city, the network architecture is the soul of the network, the network revolution is the strategic measure, and the significance is great. Network reconfiguration and introduction of intelligence are inevitable and cannot be avoided, and SDN/NFV is the first step and is still in the early development stage at present. Network reconfiguration requires two logical architectures to be built on one entity: an intelligent architecture (such as a city intelligent agent, a nerve layer is superposed on a traditional network architecture) is newly established, and a traditional architecture (a network body is reconstructed, and the intercommunication and consistency with the current network are ensured). The ultimate goal is to build NAIs and network brains.
Only some embodiments of the invention have been described above. It will be understood that various changes in form and details may be made therein without departing from the spirit and scope of the invention, and that such changes are encompassed within the invention as defined by the appended claims and their equivalents.

Claims (17)

1. A network intelligence system, comprising:
the network data perception device is arranged in a plurality of basic networks and used for perceiving network data in the basic networks and encapsulating the perceiving data into a preset format, and the basic networks comprise a telecommunication network and the Internet;
the cloud main body is used for processing the sensing data obtained from the network data sensing device, and the processing comprises data fusion, classification, statistics, storage, simple reasoning and association; and
an intelligent command hub for performing artificial intelligence processing based on data of the cloud agent, the artificial intelligence processing including self-perception, self-statistics, self-reasoning, self-learning, and self-prediction to obtain information of objects related to the plurality of infrastructure networks,
wherein the cloud agent and the intelligent command center are realized by a network intelligent processing device, the network intelligent processing device comprises a plurality of first sub-processing devices and a second sub-processing device, the first sub-processing devices are respectively used for carrying out artificial intelligent processing on network data of different basic networks, the second sub-processing device is used for processing the network data of the basic networks, the network intelligent processing device determines the relevance among behaviors and/or states of a plurality of related objects through a plurality of network data related to the objects,
wherein the artificial intelligence process comprises determining behavior and/or state of a related object based on the network data, determining attributes of the related object based on the behavior and/or state of the related object, and controlling the behavior of the related object based on the attributes of the related object.
2. The network intelligence system of claim 1, wherein the network data awareness means comprises awareness means for awareness of human society, awareness means for awareness of the natural world, and awareness means for awareness of cyberspace.
3. The network intelligence system of claim 2, wherein the means for perceiving network spaces comprises at least one deep packet inspection device disposed in the plurality of base networks, the deep packet inspection device configured to intercept network data packets from the plurality of base networks.
4. A network intelligent system according to claim 3, wherein said deep packet inspection device comprises an inspection function, said inspection function having at least one processor and at least one memory, said memory having instructions stored thereon, said processor executing said instructions to perform the steps of:
intercepting network data packets from the plurality of base networks;
parsing the intercepted network data packet to determine a service type and a related object of the network data packet; and
repackaging the network data packet into a preset format based on the analysis result and sending the network data packet to the network intelligent processing device.
5. The network intelligence system of claim 4, wherein the deep packet inspection device further comprises an inspection management entity configured to manage operation of the inspection function entity according to instructions of the network intelligence processing device.
6. The network intelligence system of claim 2, wherein the perceiving means for perceiving human society and the perceiving means for perceiving the natural world each comprise:
an automatic sensing unit for automatically sensing the related data; and
and the perception control unit is used for controlling the operation of the automatic perception unit according to the instruction of the network intelligent processing device.
7. The network intelligence system of claim 1, wherein the artificial intelligence process further comprises predicting future behavior and/or state of a related object through machine learning based on the network data.
8. The network intelligence system of claim 7 wherein the network intelligence processing arrangement is configured to run a neural network model that is trained using the obtained network data to predict future behavior and/or state of the relevant object.
9. The network intelligence system of claim 1, wherein the network intelligence processing arrangement is further configured to determine associations between behaviors and/or states of a plurality of related objects through a plurality of network data related to the plurality of objects.
10. The network intelligence system of claim 1, wherein the network intelligence processing device is configured to perform one or more of the following:
determining travel information for the related objects based on the camera data, vehicle ticketing data, accommodation data;
determining traffic load information for the relevant road based on the vehicle position and speed data, and adjusting the traffic control signal and/or planning the navigation path based on the traffic load information;
determining bandwidth demand information for the relevant objects based on the traffic data, and configuring bandwidth and/or planning routes based on the bandwidth demand information;
determining preferences for related objects based on the web browsing data and determining push content for the related objects based on the preferences for the related objects; and
the method further includes determining air haze data based on the haze sensor, and determining a source of haze pollution based on the air haze data.
11. The network intelligence system of claim 1, wherein the plurality of base networks further comprises one or more of an enterprise network, a community network, a traffic control network, an energy control network, an environmental monitoring network, a government affairs network, a logistics network, a banking network, a school network, a hospital network, a port network, a building network, a metropolitan network, and a backbone network.
12. A network intelligence system in accordance with claim 1 wherein each base network comprises a client, a server, and an intermediate connection for connecting the client and the server.
13. The network intelligence system of claim 12, wherein the client comprises one or more of a personal computer, a cell phone, a tablet computer, a personal digital assistant, and a sensor,
the server comprises one or more of a cloud server, a base station, a server computer and a mainframe, and
the intermediate connections include one or more of repeaters, bridges, routers, switches, and gateways.
14. The network intelligence system of claim 1, wherein the plurality of base networks comprises a Software Defined Network (SDN).
15. The network intelligence system of claim 14, wherein the software defined network comprises:
an infrastructure layer comprising a network infrastructure;
a control layer comprising a controller for controlling the network infrastructure, wherein the controller is defined by software; and
and the cooperative arrangement layer is used for performing cooperative arrangement on the network data and providing the network data to the application layer through the open port.
16. The network intelligence system of claim 15, wherein the network intelligence processing arrangement controls operation of an infrastructure layer of the plurality of infrastructure networks by configuring a control layer of the plurality of infrastructure networks.
17. The network intelligence system of claim 1, wherein the network intelligence processing devices include one or more of enterprise intelligence processing devices, community intelligence processing devices, traffic intelligence processing devices, energy intelligence processing devices, environmental intelligence processing devices, government intelligence processing devices, logistics intelligence processing devices, bank intelligence processing devices, school intelligence processing devices, hospital intelligence processing devices, port intelligence processing devices, building intelligence processing devices, metropolitan area network intelligence processing devices, and backbone network intelligence processing devices, and super intelligence processing devices.
CN201811488431.1A 2018-12-06 2018-12-06 Network intelligent system Active CN111292523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811488431.1A CN111292523B (en) 2018-12-06 2018-12-06 Network intelligent system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811488431.1A CN111292523B (en) 2018-12-06 2018-12-06 Network intelligent system

Publications (2)

Publication Number Publication Date
CN111292523A CN111292523A (en) 2020-06-16
CN111292523B true CN111292523B (en) 2023-04-07

Family

ID=71026335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811488431.1A Active CN111292523B (en) 2018-12-06 2018-12-06 Network intelligent system

Country Status (1)

Country Link
CN (1) CN111292523B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111836409B (en) * 2020-06-30 2023-06-09 镇江宇诚智能装备科技有限责任公司 Multi-agent system structure and control method thereof
CN115242630B (en) * 2021-04-23 2023-10-27 中国移动通信集团四川有限公司 5G network slice arrangement method and device and electronic equipment
WO2022237987A1 (en) * 2021-05-14 2022-11-17 NEC Laboratories Europe GmbH A method for decision-making regarding a decision in an environment by means of a data processing system and a corresponding data processing system
CN113411819B (en) * 2021-05-30 2022-07-12 西安电子科技大学 5G NFV slice reconfiguration method, system and wireless communication system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102035855A (en) * 2010-12-30 2011-04-27 江苏省电力公司 Network security incident association analysis system
US8713138B1 (en) * 2006-08-15 2014-04-29 Sprint Communications Company L.P. Extensible framework for client-based active network measurement
CN104780099A (en) * 2014-01-10 2015-07-15 瞻博网络公司 Dynamic end-to-end network path setup across multiple network layers with network service chaining
CN107005587A (en) * 2014-11-18 2017-08-01 思科技术公司 The system and method for Distributed Application in linked network environment

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101071424B (en) * 2006-06-23 2010-08-25 腾讯科技(深圳)有限公司 Personalized information push system and method
US8274377B2 (en) * 2007-01-10 2012-09-25 Decision Sciences International Corporation Information collecting and decision making via tiered information network systems
US7873052B2 (en) * 2007-04-16 2011-01-18 Pivotal Systems Corporation System and method for controlling process end-point utilizing legacy end-point system
CN101345713B (en) * 2008-09-01 2011-02-09 华为技术有限公司 Network resource distribution method, apparatus and system
CN102185927A (en) * 2011-05-31 2011-09-14 北京亿赞普网络技术有限公司 Knowledge-as-service cloud computing platform
CN102663887B (en) * 2012-04-13 2014-06-11 浙江工业大学 Implementation system and method for cloud calculation and cloud service of road traffic information based on technology of internet of things
US20150063349A1 (en) * 2012-08-30 2015-03-05 Shahab Ardalan Programmable switching engine with storage, analytic and processing capabilities
JP2016508353A (en) * 2013-01-10 2016-03-17 ネットフロー ロジック コーポレーション Improved streaming method and system for processing network metadata
US20160050104A1 (en) * 2013-03-15 2016-02-18 Hewlett-Packard Development Company, L.P. Network device architecture adjustments
CN103235823A (en) * 2013-05-06 2013-08-07 上海河广信息科技有限公司 Method and system for determining current interest of users according to related web pages and current behaviors
CN105302012B (en) * 2014-06-30 2017-11-17 湖北省科技信息研究院 Information collecting method and system in agriculture field
CN105323114A (en) * 2014-07-31 2016-02-10 宇龙计算机通信科技(深圳)有限公司 Routing equipment and state adjustment method
CN104834669A (en) * 2015-03-18 2015-08-12 广西师范学院 Multi-order position prediction method of suspect on the basis of spatiotemporal semantics transfer matrix
CN105049353B (en) * 2015-07-28 2018-11-16 华为技术有限公司 A kind of method and controller for business configuration routed path
CN106713380A (en) * 2015-08-14 2017-05-24 江贻芳 Position sensing based information sharing, pushing and exchanging system
CN106355166B (en) * 2016-10-13 2021-09-24 北京师范大学 Dust-haze diffusion path drawing and source determining method based on monitoring video and remote sensing image
CN107425997B (en) * 2017-03-27 2019-08-06 烽火通信科技股份有限公司 The network architecture and implementation method of class people net
CN107248959B (en) * 2017-06-30 2020-07-24 联想(北京)有限公司 Flow optimization method and device
CN107909206B (en) * 2017-11-15 2021-06-04 电子科技大学 PM2.5 prediction method based on deep structure recurrent neural network
CN108897926B (en) * 2018-06-11 2024-02-23 青岛慧拓智能机器有限公司 Artificial Internet of vehicles system and establishment method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8713138B1 (en) * 2006-08-15 2014-04-29 Sprint Communications Company L.P. Extensible framework for client-based active network measurement
CN102035855A (en) * 2010-12-30 2011-04-27 江苏省电力公司 Network security incident association analysis system
CN104780099A (en) * 2014-01-10 2015-07-15 瞻博网络公司 Dynamic end-to-end network path setup across multiple network layers with network service chaining
CN107005587A (en) * 2014-11-18 2017-08-01 思科技术公司 The system and method for Distributed Application in linked network environment

Also Published As

Publication number Publication date
CN111292523A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN111292523B (en) Network intelligent system
Yang et al. Edge intelligence for autonomous driving in 6G wireless system: Design challenges and solutions
Manias et al. Making a case for federated learning in the internet of vehicles and intelligent transportation systems
Baldin et al. Fabric: A national-scale programmable experimental network infrastructure
Ning Unit and ubiquitous internet of things
Elfatih et al. Internet of vehicle's resource management in 5G networks using AI technologies: Current status and trends
While et al. Urban robotic experimentation: San Francisco, Tokyo and Dubai
Tzafestas Synergy of IoT and AI in modern society: The robotics and automation case
Rathore et al. Efficient graph-oriented smart transportation using internet of things generated big data
CN116368355A (en) Internet of things system
Ashraf A proactive role of IoT devices in building smart cities
Rathore et al. Exploiting real-time big data to empower smart transportation using big graphs
Hahanov et al. Cloud-driven traffic monitoring and control based on smart virtual infrastructure
Ghaemi A cyber-physical system approach to smart city development
Pushpa et al. Using fog computing/edge computing to leverage Digital Twin
Ahammed et al. 6G and AI: The emergence of future forefront technology
Li et al. Tourism information data processing method based on multi-source data fusion
Embarak Smart Cities New Paradigm Applications and Challenges
Bai et al. A study of taxi service mode choice based on evolutionary game theory
Bariah et al. Digital twin-empowered smart cities: A new frontier of wireless networks
Mishra et al. Sustainable Smart Cities: Enabling Technologies, Energy Trends and Potential Applications
Klymash et al. Emerging Networking in the Digital Transformation Age: Approaches, Protocols, Platforms, Best Practices, and Energy Efficiency
Goundar et al. Architecture and Security Issues in Fog Computing Applications
Davey et al. Visual analytics: Towards intelligent interactive internet and security solutions
Wang Edge‐driven ubiquitous wireless communication for robust cluster intelligent piano presentation platform considering system security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant