Unlock instant, AI-driven research and patent intelligence for your innovation.

Performance evaluation method of quantum secret communication network

A quantum secure communication and evaluation method technology, applied in the field of quantum secure communication network performance evaluation, can solve the problems that the performance limit of the network cannot be given, the specific influencing factors of the performance cannot be accurately given, and the network performance limit cannot be calculated.

Active Publication Date: 2019-10-18
HARBIN INST OF TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently used QSCN performance evaluation index can only calculate the performance of the running network, but cannot give the specific factors affecting the performance and the performance limit of the current network, and cannot give an evaluation of the rationality of the current network scheme
The main shortcomings of the existing research are: (1) The performance evaluation method based on test verification is too expensive, and it is difficult to change the network topology and parameters; (2) The current QSCN simulation model based on the simulation method can only simulate and analyze the operation (3) In terms of QSCN performance evaluation, it is impossible to calculate the performance limit of the network for a given QSCN, and it is impossible to evaluate the rationality of the current network scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Performance evaluation method of quantum secret communication network
  • Performance evaluation method of quantum secret communication network
  • Performance evaluation method of quantum secret communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0102] In order to verify the rationality of the present invention, the present embodiment selects the topological structure of two QSCNs that have been put into operation, the SECOQC network and the Tokyo network, such as figure 1 and figure 2 shown. The QKD device parameters of these two networks are shown in Table 3:

[0103] Table 3 QKD equipment parameters

[0104]

[0105] Considering that the existing optical fiber communication technology has reached a very high level, this embodiment sets the classic channel capacity of all sides to be 100Mbps, that is, the channel capacity is:

[0106]

[0107] In the present embodiment, the packet size P is set to 500 bytes, that is:

[0108] P=500byte

[0109] In the communication scenario of this embodiment, the connection requirements between all different nodes are set to the same scale, taking:

[0110] K={(s i ,t j )|s i ∈V,t j ∈V,si≠t j}

[0111] and

[0112] Quantitative evaluation of topological quality...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a performance evaluation method for a quantum secret communication network, can measure the communication demand satisfaction degree of a network topology level, and belongs tothe field of performance evaluation of the quantum secret communication network. The method comprises the steps that S1, based on the graph theory, simulating a quantum secret communication network through a graph G = (V, E, F), wherein V, E and F represent sets of nodes, edges and network flows in the quantum secret communication network based on the graph theory respectively; representing the attribute of the node si by using the connection requirement of a connection node pair (si, tj) in the quantum secret communication network; representing the attribute of the edge (u sigma, v phi) by using the channel capacity and the key capacity in the quantum secret communication network; forming a non-negative function f (si, tj, u [sigma], v [phi]) by using the connection node pair with the attribute and the edge, and representing a network flow of the connection node pair (si, tj) on the edge (u [sigma], v [phi]); and S2, calculating an evaluation index B according to the graph G = (V, E,F): when the value of B is greater than 1, indicating that the current quantitative sub-secret communication network can meet the communication requirements of all connection node pairs in K.

Description

technical field [0001] The invention relates to an evaluation method of a quantum security communication network, belonging to the field of quantum security communication network performance evaluation. Background technique [0002] With the rapid development of QKD technology and its increasing applicability, its point-to-point communication mechanism has become the main bottleneck limiting its application scale. In order to overcome the limitations of node scale and communication distance, it is an inevitable development trend to use QKD equipment to build QSCN by designing a reasonable network planning scheme. When designing a network solution, using appropriate evaluation indicators to accurately evaluate the performance of the network plays a vital role in network quality assurance, cost control, optimal design, and performance verification. [0003] The three typical methods used for performance evaluation are: test verification, simulation model, and mathematical ana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L9/08
CPCH04L41/145H04L41/142H04L43/50H04L9/0852Y02D30/50
Inventor 李琼姚佳萌王亚星毛昊坤韩琦刘兆庆
Owner HARBIN INST OF TECH