" Innovation and Application of PKS System"related to papers

Abstract:At present, domestic terminals are gradually becoming the mainstream of China's terminal market, and terminal products based on the PKS (Phytium+Kylin+Security) system, as the main force in China, undertake a more important mission and urgently need to speed up the optimization to meet the needs of various domestic industries. To meet the growing needs of the user group, this paper predicts user function usage scenarios from the user's point of view on the basis of the single-point verification method of functions, and innovatively proposes a terminal function scenario verification method based on the PKS system. By comparing and analyzing the two methods, the verification data of three domestic terminals proves that the efficiency and value of the functional scenario verification method are better than the traditional single-point verification method, which can promote the continuous optimization of domestic terminals and provide new ideas for the domestic terminal verification system.

Abstract:PKS system is a representative of the autonomous computing systems of China. To promote the development of PKS system, it is important to construct PKS ecosystem. This paper analyzes the significance of PKS ecosystem construction, and then proposes a novel 5S model based on the experience of CEC Joint Innovation Research Institute, aiming to construct PKS ecosystem through five areas, including development strategy, organizational system, engineering service, resource sharing, and brand spreading. This model has been promoted and adopted in the institute with positive results, which is valuable and instructive for the future relevant work.

Abstract:As a key component for offloading and accelerating key services in cloud data centers, smart NIC is significant for improving the processing efficiency of network and storage services in data centers. The service needs of data centers are complicated, lacking the support of mature commercial chips, and the design of smart NIC is difficult to meet the multiple requirements of service offloading flexibility, high performance, cost economy and so on in a limited space. Designing a separate architecture scheme to physically decouple the smart NIC interface function from the service offload processing function, break through the physical space limit of the network card, reuse the service offload processing hardware resources, and improve the cost economy is an effective way to achieve the engineering and large-scale deployment of smart NIC.

Abstract:With the development of communication technology and the increasing demand for smart campuses, traditional campus networks are also faced with major challenges such as insufficient bandwidth, inflexible networking, and difficulty in accessing the Internet of Things. In recent years, the industry has introduced network technologies such as PON and WDM in the campus network, or improved and optimized the existing Ethernet technology to deal with the problems and challenges. This paper summarizes the representative networking solutions in the industry, analyzes the technical principles, characteristics, and networking technology advantages and disadvantages, and uses the campus network scene as standard to judge and summarize the adaptability respectively, so as to achieve the comparison and judgment of technological advancement. Through the comparison, the shortcomings of the existing technology and the advantages and disadvantages of the new technology can be more deeply understood, in order to be used as a reference for solution selection in the future network construction.

Abstract:In recent years, the localization of computer hardware and software systems has developed rapidly, and the general technical architecture and ecosystem Phytium Kylin Security (PKS) led by China Electronics has become more and more mature. At present, most of the research on the terminal performance scenario verification method is based on non-domestic system equipment, lack of pertinence, and it is difficult to fully explore the problems of domestic computer hardware and software system. This paper proposes a research on the terminal performance scenario verification method based on the PKS system, and conducts a comparative test of the terminal performance scenario verification method for common domestic equipment in China. The experimental results show that the terminal performance scenario verification based on the PKS system proposed in this paper can conduct more targeted and in-depth tests for domestic equipment, and at the same time meet the needs of domestic terminal performance scenario verification, and realize the systematic independent inspection of domestic equipment.

Abstract: Under the background of building cyberpower, an inherently secure autonomous computing system, i.e., PKS system, comes into being. To promote the continuous upgrades of PKS system, it is necessary to build up the innovation research team. This paper studies the construction of innovation research team in CEC Joint Innovation Research Institute. To tackle with the current challenges of talent work, this paper proposes the guiding ideology and basic principles, four innovative solutions and the corresponding safeguards based on the institute′s 14th Five-Year Plan, which are instructive for its talent work in the 14th Five-Year Plan period.

Abstract:The self-control cloud collaborative office platform based on network, cloud and end architecture adopts the "network, cloud and end" architecture mode, and comprehensively uses new technologies such as cloud computing, microservice, SDN and cloud security to create a networked and intelligent collaborative office cloud service system with advanced technology, comprehensive functions, convenient use, flexible deployment, intelligent operation and maintenance, compatibility and adaptation, security and reliability. Through the construction of comprehensive network system, it can achieve security, credibility, Flexible and reliable networked collaborative office, enhance office information security, improve office efficiency and informatization level, provide information support for scientific decision-making, and promote the leapfrog development of informatization construction.

Abstract:The paper proposes a question and answer robot for government knowledge based on domestic PKS environment, which uses deep learning model to work in pipeline mode for multi-source heterogeneous data. The system consists of five parts: schema design, knowledge extraction, knowledge fusion, knowledge storage and knowledge update, automatically completes the establishment of knowledge base, automatically classifies user questions, and recognizes intention. Knowledge map retrieval, analysis and computing technology are used to form answers for users. The robot system can greatly improve the work efficiency of government staff.

Abstract:As the core basic equipment of the industrial control system, PLC is widely used in important national infrastructure and various industrial control fields. It is the top priority to realize the transformation from made in China to intelligent manufacturing in China to control the industrial site independently, safely, stably and reliably. In this context, domestic PLC has a strong and rapid development momentum, especially in high-end application fields such as aerospace, national defense and military industry. There is an urgent demand for domestic high-performance PLC products. Due to the late development and less application of domestic large-scale PLC, how to evaluate the performance of domestic PLC and whether it can meet the industrial field application is lack of unified standards and evaluation methods. In view of this problem, a set of comprehensive test platform for domestic high-performance PLC is designed. Two mainstream domestic PLCs are selected for quantitative comparison of horizontal parameters with a foreign mainstream product. The key performance indicators and evaluation methods of high-end PLC are proposed. By building a hardware in the loop virtual industrial scene, the ability of PLC to meet the application is tested and compared. The effectiveness of the test platform is verified through a test example, which provides a basis for the evaluation of domestic high-performance PLC Choose to provide reference, promote the normalization, standardization and scale of domestic PLC, and help the high-quality development of Industry 4.0.

Abstract:Applied on machine learning, malicious web page detection technology is studied in this paper. At present, popular methods of “feature code” or “whitelist” can only detect known malicious web pages. The method of machine learning can detect unknown malicious web pages, but it has to face the problem of that the data is large, complex and tedious when processing web page features. In this paper, a Hash compression method is proposed. The method can map 1.5 million features into 20,000 feature space, and train multiple traditional machine learning models and integrated learning models using k-fold cross-validation method for extracted feature data. The best classification detection model will be selected by evaluating the detection effect of the model.

Abstract:With the rapid growth of demand for computing power in various fields of society, more and more attention has been paid to improving computing power of computing systems through computing architecture innovation. The development of computing system is a complex system engineering. Innovations in computing architectures have resulted in ever-increasing complexity of computing systems. Traditional systems engineering methods are difficult to meet the needs of system development. The modeling method of a kind of computing system is studied by the method of model-based systems engineering(MBSE), the modeling framework is proposed, and the system model is established. Using this modeling method, a model of a localized computing system was established, which proved the effectiveness of the modeling method, and laid the foundation for the next step to use computer simulation technology to develop a type of computing system.

Abstract:To promote independent innovation ability in the information technology field, it is necessary to develop high-quality computer products by conducting the joint research on computer software and hardware via systematic method. This paper proposes a novel model to deal with the current challenges in the joint research on computer software and hardware based on PKS system, which includes the innovations on the aspects of management, service and communication. This model has been applied in some real projects and has achievd positive results, which is valuable and instructive for the future work.

Abstract:In recent years, China′s independent software and hardware joint ecology has developed rapidly. The establishment of the hardware and software ecosystem includes the infrastructure composed of the underlying hardware and operating system, abundant general tool software, a large number of middleware, applications, and a large number of developers. In order to solve the healthy development of independent hardware and software ecology, it is necessary to understand the development of ecology and study its construction mode. This paper innovatively summarizes the current construction of independent software and hardware ecology in China into three modes, namely product mode, group mode and service mode. By combining the adaptive product data and developer behavior data, the characteristics and differences of the three construction modes are expounded, providing experience reference and decision support for the successful construction of the independent software and hardware ecosystem in China′s IT industry.

Abstract:Based on the development of China′s Internet and the policy orientation of the country′s new infrastructure, data centers are booming, and data center networks are also transitioning from 10G and 40G networks to 25G and 100G networks. Even some leading companies are already experimenting with 100G and 400G networks. At the same time, with the escalating trade friction between China and the United States, the phenomenon of neck stuck is becoming more and more serious. Whether it is possible to build a cloud data center network based on fully autonomous chips and technology is an important issue. Cloud data center networks usually include SDN controllers, switches, security devices, network offloading devices, virtual switches vSwitch, smart network cards and other related components. The hardware and software of these components need to be domestically independent to get rid of the dependence on foreign technology. This article focuses on the technical characteristics of the autonomous data center, the feasibility of the autonomous layout of related components, and the choice of autonomous methods and solutions.

Abstract:In order to solve the problem that traditional network security hosts commonly use foreign CPUs and OS as solutions, which have important hidden dangers such as backdoor, loopholes and interrupted supply, a solution of network security hosts based on PKS system is presented, and the network security hosts of different architectures are compared and tested. The result shows that the PKS system network security host can meet the function and performance requirements of network security products, and realize trusted computing of network security host.

Abstract:With the rapid development of the network and the transformation of network digitization, the number of terminals in the access network is explosively growing, how to carry out intelligent, safe management terminal is particularly important. Combined with the current situation of enterprise terminal management,from the perspective of security risks and terminal access risk control, the paper designs a method of intelligent identification of terminal types through automatic learning terminal characteristics, and realizes terminal intelligent identification and secure access network terminal management system through perfect terminal access function, so as to ensure enterprise network security.