Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhigang Guo is active.

Publication


Featured researches published by Zhigang Guo.


international conference on communication technology | 2013

Deployment of Intrusion Prevention System based on Software Defined Networking

Lei Zhang; Guochu Shou; Yihong Hu; Zhigang Guo

The development of the mobile Internet brought about by the thriving mobile intelligent terminals has made it possible to access to the Internet anytime and anywhere. While people enjoy the convenience, they also suffer from a series of security threats caused by cyber-attacks. IPS brings reliability and security in a network system and is regarded as one of the most popular security devices. However, the conventional IPS deployment often has some limitations, and the deployment and maintenance costs are expensive, the utilization rate is low. In order to solve these issues, an SDN-based IPS deployment is presented in this paper, which supports a unified scheduling of security applications in the whole network and load balancing among IPSs. In addition, this paper builds a test-bed and shows evaluation results. As the results, It is confirmed that the proposed scheme can achieve a shorter time for ping after the first ping and that with the load balancing, the network latency is significantly reduced.


2013 5th IEEE International Conference on Broadband Network & Multimedia Technology | 2013

Design and implementation of secure multicast based on SDN

Jianfeng Zou; Guochu Shou; Zhigang Guo; Yihong Hu

Multicast communication is an important requirement for many types of applications such as IPTV, video conference. In current IP multicast architecture, any host can join a multicast group without authentication because no host identification information is maintained by routers, which leads to security risks. In addition, the routers need to be involved in both forwarding packets and maintaining route states, which results in massive complexity of the devices and produces a lot of control overheads. This paper proposes a multicast clean-slate scheme based on Software-defined Networking (SDN), aiming to improve security and controllability of multicast networks. A multicast controller logically centralized is designed to be responsible for handling multicast events, calculating multicast tree and authentication the identity of host. A prototype is implemented in our SDN platform. The result proves that our scheme is superior to the traditional IP multicast, which is reflected in two aspects: firstly, the illegal users are prevented from joining multicast group effectively. Secondly, the delay of joining a group is less than the traditional IP multicast.


wireless communications, networking and information security | 2010

High-speed architectures for GHASH based on efficient bit-parallel multipliers

Jimei Wang; Guochu Shou; Yihong Hu; Zhigang Guo

GHASH is the authentication part of Galois Counter Mode (GCM) which can provide encryption and authentication simultaneously, its core is based on the GF(2128) multiplier. A four-parallel architecture for GHASH which is applied to authentication for high-speed access networks is proposed, and its core GF(2128) multiplier is implemented by two kinds of general bit-parallel structures. We implement the four-parallel GHASH on FPGA platform, the synthesis results show that the throughput can reach 123.053 Gbps and 120.086Gbps when use the improved M multiplier and the Karatsuba-Ofman multiplier as its core respectively. So they both meet the demands of high-speed access networks applications.


wireless personal multimedia communications | 2014

SDN based load balancing mechanism for elephant flow in data center networks

Jing Liu; Jie Li; Guochu Shou; Yihong Hu; Zhigang Guo; Wei Dai

With various cloud services emerging in data center networks, network congestion and load imbalance are seriously caused by elephant flows. To resolve this problem, a load balancing mechanism based on software defined networking (SDN) for elephant flows is proposed. The mechanism obtains the topology and status of the entire network via global view of SDN. Then it splits and sends elephant flows through multiple paths based on the ratios which are dynamically computed by taking account of the states of links. Finally, the system prototype is implemented in OpenFlow testbed. The results show the proposed mechanism can significantly enhance the performance of the network by improving the network throughput and link utilization.


international conference on computer science and education | 2016

WiCloud: Innovative uses of network data on smart campus

Hongxing Li; Guochu Shou; Yihong Hu; Zhigang Guo

Mobile Edge Computing (MEC) aims to provide mobile and cloud computing capabilities within the radio access network, and emphasizes the openness of the internet which can transfer the real-time radio network information into context-related services. In this article, we research the state-of-the-art technology of mobile and cloud convergence, then propose WiCloud, a MEC platform, which integrates an edge data center into wireless network to provide edge networking, proximate computing and data acquisition for innovative services. Moreover, we do a series experiment to verify the performance of WiCloud, and according to the campus scenes, we developed four kinds of applications to demonstrate the capability of the ecosystem to promote the process of Smart Campus.


international conference on communication technology | 2013

Software Defined Networking for HTTP video quality optimization

Hui Liu; Yihong Hu; Guochu Shou; Zhigang Guo

In this paper, the scheme to improve HTTP video quality using Software Defined Networking (SDN) is explored. First, by analyzing the characteristics of current HTTP video and the defects of the widely used Content Delivery Network (CDN), a HTTP video content delivery scheme is proposed in SDN network. Then, the authors build SDN experimental platform, and present five experiments to measure video quality in the presence of different round-trip delay according to round-trip delay test results of HTTP video access in both SDN and actual network environment (including CDN). Finally, the user QOE of the video measured in each experiment is calculated and compared. For all experimental results examined, SDN scheme yields a substantial improvement in HTTP video quality and user QOE, and achieves more than Good level of video quality and MOS>4 user QOE even in poor network environment with high pocket loss rate.


broadband communications, networks and systems | 2010

Encryption method of next generation PON system

Xiaoling Xu; Guochu Shou; Zhigang Guo; Yihong Hu

The next generation passive optical network is the major technique choice of broadband access and the FTTx network. This paper describes threat models in the optical access network, focuses on the security issues and needs which the next generation PON system faces, and proposes one kind of high speed encryption algorithm—multi-byte churning algorithm for the future PON. The simulation result shows that this algorithm supports a higher speed and the security has been enhanced obviously. FPGA implementation shows that the algorithm can achieve 10.9Gbps and well support the security requirements in next-generation PON standard. Finally, this paper analysis its features from key space, time domain correlation and resource availability.


international conference on big data | 2016

Trajectory Prediction in Campus Based on Markov Chains

Bonan Wang; Yihong Hu; Guochu Shou; Zhigang Guo

In this paper, we present a model of predicting the next location of a student in campus based on Markov chains. Since the activity of a student in campus is closely related to the time at which the activity occurs, we consider the notion of time in the prediction algorithm that we coined as Trajectory Prediction Algorithm (TPA). In order to evaluate the efficiency of our prediction model, we use our wireless data analysis system to collect real spatio-temporal trajectory data in campus for more than seven months. Experimental results show that our TPA has increased the accuracy of prediction for over 30 % than the original Markov chain.


Journal of Zhejiang University Science C | 2014

Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks

Qing-long Dai; Guochu Shou; Yihong Hu; Zhigang Guo

Fiber-wireless (FiWi) access networks, which are a combination of fiber networks and wireless networks, have the advantages of both networks, such as high bandwidth, high security, low cost, and flexible access. However, with the increasing need for bandwidth and types of service from users, FiWi networks are still relatively incapable and ossified. To alleviate bandwidth tension and facilitate new service deployment, we attempt to apply network virtualization in FiWi networks, in which the network’s control plane and data plane are separated from each other. Based on a previously proposed hierarchical model and service model for FiWi network virtualization, the process of service implementation is described. The performances of the FiWi access networks applying network virtualization are analyzed in detail, including bandwidth for links, throughput for nodes, and multipath flow transmission. Simulation results show that the FiWi network with virtualization is superior to that without.


international conference on communication technology | 2011

Design of low complexity GF(2 m ) multiplier based on Karatsuba algorithm

Zhengzheng Ge; Guochu Shou; Yihong Hu; Zhigang Guo

The multiplication is the basic arithmetic operation of others over the finite field GF(2m) which have widespread applications. In this paper, we analyze the complexity of the classic multiplier mixed Karatsuba multiplier for 2-term polynomials in the finite field GF(2m). By using a method to transform the multiplication operands, we can obtain the complexity of Karatsuba multiplier with any iteration step for any given length m and the constraint when the iteration should be stopped. The results show that this method has a low space complexity and is especially suitable for elliptic curve cryptography (ECC) in which m is suggested to be prime.

Collaboration


Dive into the Zhigang Guo's collaboration.

Top Co-Authors

Avatar

Guochu Shou

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yihong Hu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yaqiong Liu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Jing Liu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Wei Chang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xueguang Jin

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Z. Mao

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Hongxing Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Bonan Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Qingtian Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge