Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guochu Shou is active.

Publication


Featured researches published by Guochu Shou.


international symposium on information engineering and electronic commerce | 2009

High Throughput, Pipelined Implementation of AES on FPGA

Shanxin Qu; Guochu Shou; Yihong Hu; Zhigang Guo; Zongjue Qian

The FPGA-based high throughput 128 bits AES cipher processor is proposed in this paper. We present an equivalent pipelined AES architecture working on CTR mode to provide the highest throughput up to date through inserting some registers in appropriate points making the delay shortest, when implementing the byte transformation in one clock period. The equivalent pipelined architecture does not change the data stream direction but change the inner process order in round transformation. Xilinx Foundation ISETM 10.1 FPGA design tool is used in the synthesis of the design. And the throughput of 73.737Gbps, clock frequency of 576.07MHz and resource efficiency of 3.21Mbps/LUT are provided by the proposed equivalent pipelined AES architecture. The proposed design reach higher throughput than the other designs up to date, and its resource efficiency is also very high.


mobile cloud computing & services | 2016

Mobile Edge Computing: Progress and Challenges

Hongxing Li; Guochu Shou; Yihong Hu; Zhigang Guo

Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. This paper presents an investigation on the progress of MEC, and proposes a platform, named WiCloud, to provide edge networking, proximate computing and data acquisition for innovative services. Furthermore, the open challenges that must be addressed before the commercial deployment of MEC are discussed.


international conference on communications | 2013

A general model for hybrid fiber-wireless (FiWi) access network virtualization

Qinglong Dai; Guochu Shou; Yihong Hu; Zhigang Guo

The fiber-wireless (FiWi) access network combines plenty of available bandwidth of the fiber network and the ubiquity and mobility of the wireless network, with the purpose to reduce their cost and complexity. The FiWi network is thought by many as a very promising architecture for the future network. From the standpoint of the Internet service provider (ISP), though the FiWi network has the advantages of high capacity and high flexibility, there is still a great discordant part between the fiber subnetwork and the wireless subnetwork, which is the necessary transformation of their protocols. Technically, it is still difficult to achieve the FiWi networks seamless networking. In this paper, we apply network virtualization to hide the differences between the fiber network and the wireless network, in which the ISP is separated into two independent entities: the infrastructure provider (InP) and the service provider (SP). We also propose a general model for the FiWi access network virtualization. The proposed model decouples applications from infrastructure networks and allows SPs provide users with services carried by granular virtual networks (VNs), which is composed by the virtual resources allocated by InPs. The results of a simulation are demonstrated, which prove that our model is superior to the FiWi network without virtualization.


computer science and software engineering | 2008

Study on Preliminary Performance of Algorithms for Network Traffic Identification

Yongli Ma; Zongjue Qian; Guochu Shou; Yihong Hu

At present, more and more scholars paid attention to accuracy rate of Internet traffic identification, but not on construction model time, test time, CPU utilization, memory consumption, and concision of models description between different algorithms. However, these indicators played a decisive role in performance of practical internet traffic identification system. So, we collected traffic from existing operatorspsila networks, and tested 15 kinds of supervised learning algorithms and so on. The multivariate evaluation method was proposed to assess the test results. The results show that the 15 kinds of algorithms have similar accuracy rate, but their construction model time, test time, and concision of models description are very different. The C4.5 algorithm is the most suitable classification algorithms for network traffic identification.


military communications conference | 2013

Performance of Multipath in Fiber-Wireless (FiWi) Access Network with Network Virtualization

Shan He; Guochu Shou; Yihong Hu; Zhigang Guo

Nowadays, multipath routing algorithms and resource distribution strategies of the homogeneous network are the research focus of the Fiber-Wireless (FiWi) network which is the combination of optical subnetwork and wireless subnetwork. However few studies concerned on the efficient way to set up multipath in FiWi network as the affiliation of heterogeneous networks and packet reordering are tangled problems. Separating the Internet service provider (ISP) into two independent sections, nfrastructure provider (InP) and service provider (SP), the proposal of network virtualization provides a potential method to solve this problem. As a starting point, in this paper we apply network virtualization to remove the differences between heterogeneous networks to take FiWi network as a whole. Moreover, we propose a viable way to establish multipath access in the FiWi network through the flexible use of virtual networks (VNs) which can be deployed in the virtual resource manager (VRM). Besides, we present the superior performance of multipath in the FiWi network with network virtualization based on the simulation results by using the multipath scheduling policy Weighted Round Robin (WRR).


international conference on e business | 2009

The Research and Efficient FPGA Implementation of Ghash Core for GMAC

Yang Lu; Guochu Shou; Yihong Hu; Zhigang Guo

GMAC (Galois Message Authentication Code) is a special case of authenticated encryption mode GCM (Galois/Counter Mode) when it acts as a stand-alone MAC. As the hash function of GMAC, Ghash is based on the GF (2 128 ) multiplier. It is the algebraic properties of Ghash that support incremental authentication of GMAC. In this paper, an efficient hardware implementation on Xilinx Virtex 5 FPGA platform, in terms of performance, of Ghash core is presented. The proposed hardware implementation has been thoroughly tested using commercial simulation tools ModelSim and its functionality has been verified. The synthesis results show that this efficient implementation of Ghash core does not introduce extra design complexity and has high throughput, which is up to 15.382 Gbps, and it can meet the requirement of GMAC for high-speed and highly efficient authentication.


symposium on photonics and optoelectronics | 2009

OFDMA System with Dynamic Bandwidth Allocation in Passive Optical Networks

Zhihua Zheng; Zongjue Qian; Guochu Shou; Yihong Hu

A scheme on orthogonal frequency division multiple access (OFDMA) system with dynamic bandwidth allocation is investigated in passive optical networks (PONs). The system supports various applications and enables dynamic bandwidth allocation among these applications. Digital signal processing (DSP) unit as an important component is utilized for flexibility in PON. The simulation results show that the bit error rate (BER) performance of OFDM signal with quadrature amplitude modulation (QAM) is good after fiber transmission.


international conference on networks | 2009

The Design and FPGA Implementation of GF(2^128) Multiplier for Ghash

Jia Huo; Guochu Shou; Yihong Hu; Zhigang Guo

In this paper, we propose a high-speed parallel 128 bit multiplier for Ghash Function in conjunction with its FPGA implementation. Through the use of Verilog the designs are evaluated by using Xilinx Vertax5 with 65nm technic and 30,000 logic cells. The highest throughput of 30.764Gpbs can be achieved on virtex5 with the consumption of 8864 slices LUT. The proposed design of the multiplier can be utilized as a design IP core for the implementation of the Ghash Function. The architecture of the multiplier can also apply in more general polynomial basis. Moreover it can be used as arithmetic module in other encryption field.


China Communications | 2014

Network virtualization based seamless networking scheme for fiber-wireless (FiWi) networks

Qinglong Dai; Jianfeng Zou; Guochu Shou; Yihong Hu; Zhigang Guo

In order to reduce cost and complexity, fiber-wireless (FiWi) networks emerge, combining the huge amount of available bandwidth of fiber networks and the flexibility, mobility of wireless networks. However, there is still a long way to go before taking fiber and wireless systems as fully integrated networks. In this paper, we propose a network virtualization based seamless networking scheme for FiWi networks, including hierarchical model, service model, service implementation and dynamic bandwidth assignment (DBA). Then, we evaluate the performance changes after network virtualization is introduced. Throughput for nodes, bandwidth for links and overheads leaded by network virtualization are analyzed. The performance of our proposed networking scheme is evaluated by simulation and real implementations, respectively. The results show that, compared to traditional networking scheme, our scheme has a better performance.


international conference on e business | 2010

Encryption and Authentication Mechanism of 10G EPON Systems Based on GCM

Xianghua Chen; Guochu Shou; Zhigang Guo; Yihong Hu

10G EPON can provide us with wide band access technology and high data transmission rate. However, it is faced with a series of security threats due to its point-to-multipoint network topology and high-speed data rate. In this paper, we propose a security mechanism based on GCM (Galois/Counter Mode) for 10G EPON systems, which can support encryption and authentication functions simultaneously. First we describe the encryption system and propose a new mechanism of key update and synchronization, in which we use the GCM encryption and authentication module both in the OLT and ONU side to ensure the security of the key exchanging process. Then, we design the authentication mechanism based on GMAC (Galois Message Authentication Code), using the GMAC authentication tag to ensure the information reliability. We present an authentication model for 10G EPON systems, and describe the ONU and user authentication process in detail. According to this mechanism, we can provide a secure and reliable environment for 10G EPON data transmission.

Collaboration


Dive into the Guochu Shou's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge