用户名: 密码: 验证码:
近端云计算:后云计算时代的机遇与挑战
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Near-End Cloud Computing: Opportunities and Challenges in the Post-Cloud Computing Era
  • 作者:周悦芝 ; 张迪
  • 英文作者:ZHOU Yue-Zhi;ZHANG Di;Department of Computer Science and Technology,Tsinghua University;Key Laboratory of Pervasive Computing,Ministry of Education;
  • 关键词:云计算 ; 雾计算 ; 边缘计算 ; 移动边缘计算 ; 多通路边缘计算
  • 英文关键词:cloud computing;;fog computing;;edge computing;;mobile edge computing;;multi-access edge computing
  • 中文刊名:JSJX
  • 英文刊名:Chinese Journal of Computers
  • 机构:清华大学计算机科学与技术系;普适计算教育部重点实验室;
  • 出版日期:2018-03-05 14:55
  • 出版单位:计算机学报
  • 年:2019
  • 期:v.42;No.436
  • 基金:清华大学自主科研计划(20161080066)资助~~
  • 语种:中文;
  • 页:JSJX201904001
  • 页数:24
  • CN:04
  • ISSN:11-1826/TP
  • 分类号:3-26
摘要
随着普适化智能终端以及泛在化网络技术的快速发展,新型网络应用和服务不断涌现,诸如物联网、智慧城市、智能电网、虚拟/增强现实、无人驾驶等.以集中式计算和存储为主要特征的云计算已经难以满足这些技术和应用的发展需求.近年来,为了克服云计算的局限性,雾计算、移动边缘计算以及边缘计算等近端云计算模式相继被提出并日益受到关注.这些计算模式虽然名称不一,但是其基本思想都是对云计算进行扩展,即将云计算基础设施从距离用户较远的数据中心移至距离用户终端较近的边缘路由器、移动基站或者服务器上,以克服云计算的技术和应用瓶颈.该文对近年来出现的近端云计算模式进行了系统综述,总结了当前几种近端云计算模式的基本特征.首先,分析了云计算在发展中所遇到的主要技术和应用瓶颈.其次,介绍了近端云计算模式的概念和架构,并总结了几种近端云计算模式.接着,讨论了近端云计算所面临的主要发展机遇和技术挑战.最后,对近端云计算的未来发展进行了展望.
        Cloud computing is a form of network computing paradigm that can provide on-demand access to shared pools of configurable computing resources,such as computation,storage,and services.Since its introduction in 2007,it has attracted a lot of attention and has developed rapidly over the last decade.In recent years,with the rapid development of pervasive smart devices and ubiquitous network technologies,various kinds of new network applications and services are continuously emerging,such as the Internet of things,smart city,smart grid,virtual/augmented reality,unmanned vehicles.However,it is very difficult for cloud computing to meet the diverse requirements of these new network applications and services due to the characteristic of centralized computation and storage.The capabilities of heterogeneous devices and edge equipment are not fully leveraged in cloud computing.Cloud computing also encounters the bottleneck of heterogeneous and long-distance networks.Moreover,the demands of new complex network application scenarios,such as the Internet of Things and 5G,cannot be satisfied by cloud computing.To overcome the limitations of cloud computing,a variety of new network computing paradigms,such as fog computing,multi-access edge computing,and edge computing are proposed by industry and academia.Although they employ different terms,the basic idea of them is to extend cloud computing and move the computing infrastructure from remote data centers to edge routers,base stations and servers that are close to end-devices,thus overcoming the technology and application bottlenecks of cloud computing.In this paper,we collectively refer to these new network computing paradigms as near-end cloud computing paradigm.To make it easier to understand the underlying causes of the near-end cloud computing paradigm and to grasp the application scenarios and challenges of it,we systematically summarize the emerged near-end cloud computing paradigms in recent years and sum up the basic characteristics of them.First,the main technology and application bottlenecks encountered in the development of cloud computing are summarized and analyzed in detail.Second,the concept and architecture of the near-end cloud computing paradigm are introduced,and several near-end cloud computing paradigms,including fog computing,multiaccess edge computing,and edge computing are summarized.This shows that these near-end cloud computing paradigms are not completely different from cloud computing,but rather a natural extension of cloud computing from large-scale centralization to small-scale centralization and distribution,which can be regarded as a historical regression to the distributed computing paradigm.Third,the development opportunities associated with near-end cloud computing are discussed with application scenarios,including the Internet of Things,5G,smart grid,virtual/augmented reality,and unmanned aerial vehicle.Fourth,the technological challenges including architecture and model,network access and management,resource management and scheduling,pricing and incentive mechanism,security and privacy protection are discussed in details.Finally,the future development of near-end cloud computing is prospected.It is believed that as problems faced by cloud computing become increasingly prominent,near-end cloud computing will undoubtedly become a hot research topic in both the industrial and academic communities in the near future.
引文
[1]Bonomi F.Connected vehicles,the Internet of Things,and fog computing//Keynotes of the 8th ACM International Workshop on Vehicular Inter-Networking.Las Vegas,USA,2011
    [2]Bonomi F,Milito R,Zhu J,Addepalli S.Fog computing and its role in the internet of things//Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing.Helsinki,Finland,2012:13-16
    [3]Patel M,Hu Y,Chan C,et al.Mobile-edge computing.France:European Telecommunications Standards Institute,Introductory Technical White Paper,2014
    [4]Satyanarayanan M.The emergence of edge computing.IEEEComputer,2017,50(1):30-39
    [5]Berman F,Fox G,Hey A J G.Grid Computing:Making the Global Infrastructure a Reality.West Sussex,England:John Wiley,2003
    [6]Papazoglou M P.Service-oriented computing:Concepts,characteristics and directions//Proceedings of the 4th International Conference on Web Information Systems Engineering.Roma,Italy,2003:3-12
    [7]Murch R.Autonomic Computing.USA:IBM Press,2004
    [8]Kephart J O,Chess D M.The vision of autonomic computing.Computer,2003,36(1):41-50
    [9]Zhang Y,Zhou Y.Transparent computing:A new paradigm for pervasive computing//Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing.Wuhan,China,2006:1-11
    [10]Grigorik I.High Performance Browser Networking.Sebastopol,California,USA:O’Reilly,2013
    [11]Tolia N,Andersen D G,Satyanarayanan M.Quantifying interactive user experience on thin clients.Computer,2006,39(3):46-52
    [12]Stojmenovic I,Wen S.The fog computing paradigm:Scenarios and security issues//Proceedings of the 2014 Federated Conference on Computer Science and Information Systems.Warsaw,Poland,2014:1-8
    [13]Luan T H,Gao L,Li Z,et al.Fog computing:Focusing on mobile users at the edge.Australia:Deakin University,Preprint:arXiv:1502.01815,2016
    [14]Vaquero L M,Rodero-Merino L.Finding your way in the fog:towards a comprehensive definition of fog computing.ACM SIGCOMM Computer Communication Review,2014,44(5):27-32
    [15]Yi S,Hao Z,Qin Z,Li Q.Fog computing:Platform and applications//Proceedings of the 3rd IEEE Workshop on Hot Topics in Web Systems and Technologies.Washington,USA,2015:73-78
    [16]Yi S,Li C,Li Q.A survey of fog computing:concepts,applications and issues//Proceedings of the 2015 Workshop on Mobile Big Data.Hangzhou,China,2015:37-42
    [17]Ahmed A,Ahmed E.A survey on mobile edge computing//Proceedings of the 10th International Conference on Intelligent Systems and Control.Coimbatore,Tamil Nadu,India,2016:1-8
    [18]Wang Y.Cloud-dew architecture.International Journal of Cloud Computing,2015,4(3):199-210
    [19]Ha K.System Infrastructure for MobileCloud Convergence[Ph.D.dissertation].Carnegie Mellon University,Pittsburgh,PA,USA,2016
    [20]Satyanarayanan M,Bahl P,Caceres R,Davies N.The case for VM-based Cloudlets in mobile computing.IEEE Pervasive Computing,2009,8(4):14-23
    [21]Wang Y.Definition and categorization of dew computing.Open Journal of Cloud Computing,2016,3(1):1-7
    [22]Skala K,Davidovic D,Afgan E,et al.Scalable distributed computing hierarchy:Cloud,fog and dew computing.Open Journal of Cloud Computing,2015,2(1):16-24
    [23]Zhou Y,Tang W,Zhang D,Zhang Y.Software-defined streaming-based code scheduling for transparent computing//Proceedings of the 4th International Conference on Advanced Cloud and Big Data.Chengdu,China,2016:296-303
    [24]Zhang Y,Guo K,Ren J,et al.Transparent computing:Apromising network computing paradigm,Computing in Science&Engineering,2017,19(1):7-20
    [25]Sun Qi-Bo,Liu Jie,Li Shan,et al.Internet of Things:Summarize on concepts,architecture and key technology problem.Journal of Beijing University of Posts and Telecommunications,2010,33(3):1-9(in Chinese)(孙其博,刘杰,黎羴等.物联网:概念、架构与关键技术研究综述.北京邮电大学学报,2010,33(3):1-9)
    [26]ITU.The Internet of Things.Geneva:International Telecommunication Union,ITU Internet Reports,2005
    [27]Cisco.Fog Computing and the Internet of Things:Extend the Cloud to Where the Things Are.San Jose,California,USA:Cisco,White Paper,2015
    [28]Perera C,Qin Y,Estrella J C,et al.Fog computing for sustainable smart cities:A survey.ACM Computing Surveys,2017,50(3):1-43
    [29]Datta K S,Bonnet C,Haerri J.Fog computing architecture to enable consumer centric Internet of Things services//Proceedings of the 2015 International Symposium on Consumer Electronics.Madrid,Spain,2015:1-2
    [30]Tao M,Ota K,Dong M.Foud:Integrating fog and cloud for5G-enabled V2Gnetworks.IEEE Network,2017,31(2):8-13
    [31]Ren J,Guo H,Xu C,Zhang Y.Serving at the edge:Ascalable IoT architecture based on transparent computing.IEEE Network,2017,31(5):96-105
    [32]Jalali F,Smith O J,Lynar T,Suits F.Cognitive IoTgateways:Automatic task sharing and switching between cloud and edge/fog computing//Proceedings of the SIGCOMMPosters and Demos.New York,USA,2017:121-123
    [33]3GPP.Technical specification group services and system aspects;System architecture for the 5G systems;Stage 2(release 15).3GPP TS 23.501V0.4.0,2017
    [34]Anjum A,Abdullah T,Tariq M,et al.Video stream analysis in clouds:An object detection and classification framework for high performance video analytics.IEEE Transactions on Cloud Computing,2016,PP(99):1-17
    [35]Hu W,Gao Y,Ha K,et al.Quantifying the impact of edge computing on mobile applications//Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems.Hong Kong,China,2016:1-8
    [36]Habak K,Ammar M,Harras K A,Zegura E.FemtoClouds:Leveraging mobile devices to provide cloud service at the edge//Proceedings of the 8th International Conference on Cloud Computing.New York,USA,2015:9-16
    [37]Chen Shu-Yong,Song Shu-Fang,Li Lan-Xin,Shen Jie.Survey on smart grid technology.Power System Technology,2009,33(8):1-7(in Chinese)(陈树勇,宋书芳,李兰欣,沈杰.智能电网技术综述.电网技术,2009,33(8):1-7)
    [38]Stojmenovic I.Fog computing:A cloud to the ground support for smart things and machine-to-machine networks//Proceedings of the Australasian Telecommunication Networks and Applications Conference.Melbourne,Australia,2014:117-122
    [39]Bastug E,Bennis M,Médard M,Debbah M.Toward interconnected virtual reality:Opportunities,challenges,and enablers.IEEE Communications Magazine,2017,55(6):110-117
    [40]Wu C,Zhang Y,Zhang L,et al.ButterFly:Mobile collaborative rendering over GPU workload migration//Proceedings of the International Conference on Computer Communications.Atlanta,USA,2017:1-9
    [41]Valavanis K P,Vachtsevanos G J.Handbook of Unmanned Aerial Vehicles.Dordrecht,Netherlands:Springer Publishing Company,2015
    [42]Lin Y,Saripalli S.Sampling-based path planning for UAVcollision avoidance.IEEE Transactions on Intelligent Transportation Systems,2017,18(11):3179-3192
    [43]St9cker C,Bennett R,Nex F,et al.Review of the current state of UAV regulations.Remote Sensing,2017,9(5):1-26
    [44]Motlagh N H,Bagaa M,Taleb T.UAV-based IoT platform:A crowd surveillance use case.IEEE Communications Magazine,2017,55(2):128-134
    [45]Zeng Y,Zhang R,Lim T J.Throughput maximization for UAV-enabled mobile relaying systems.IEEE Transactions on Communications,2016,64(12):4983-4996
    [46]Jeong S,Simeone O,Kang J.Mobile edge computing via a UAV-mounted cloudlet:Optimization of bit allocation and path planning.IEEE Transactions on Vehicular Technology,2018,67(3):2049-2063
    [47]Mach P,Becvar Z.Mobile edge computing:A survey on architecture and computation offloading.IEEE Communications Surveys and Tutorials,2017,19(3):1628-1656
    [48]ETSI.Mobile Edge Computing(MEC);Framework and Reference Architecture.ETSI GS MEC 003V1.1.1,2016
    [49]Dinh H T,Lee C,Niyato D,Wang P.A survey of mobile cloud computing:architecture,applications,and approaches.Wireless Communications and Mobile Computing,2013,13(18):1587-1611
    [50]Dean J,Ghemawat S.MapReduce:Simplified data processing on large clusters.Communications of the ACM,2008,51(1):107-113
    [51]Hong K,Lillethun D,Ramachandran U,et al.Mobile fog:A programming model for large-scale applications on the Internet of Things//Proceedings of the 2nd ACM Sigcomm Workshop on Mobile Cloud Computing.Hong Kong,China,2013:15-20
    [52]Orsini G,Bade D,Lamersdorf W.Computing at the mobile edge:designing elastic android applications for computation offloading//Proceedings of the IFIP Wireless and Mobile Networking Conference.Munich,Germany,2015:112-119
    [53]Saurez E,Hong K,Lillethun D,et al.Incremental deployment and migration of geo-distributed situation awareness applications in the fog//Proceedings of the 10th ACM International Conference on Distributed and Event-Based Systems.Irvine,USA,2016:258-269
    [54]Ottenwlder B,Koldehofe B,Rothermel K,et al.MCEP:Amobility-aware complex event processing system.ACMTransactions on Internet Technology,2014,14(1):1-24
    [55]Cheng B,Solmaz G,Cirillo F,et al.FogFlow:Easy programming of IoT services over cloud and edges for smart cities.IEEE Internet of Things Journal,2018,5(2):696-707
    [56]Willis D,Dasgupta A,Banerjee S.ParaDrop:A multitenant platform to dynamically install third party services on wireless gateways//Proceedings of the 9th ACM Workshop on Mobility in the Evolving Internet Architecture.Maui,Hawaii,2014:43-48
    [57]Hu Y C,Patel M,Sabella D,et al.Mobile edge computingA key technology towards 5G.ETSI White Paper,2015
    [58]Ku I,Lu Y,Gerla M.Software-defined mobile cloud:Architecture,services and use cases//Proceedings of the Wireless Communications and Mobile Computing Conference.Nicosia,Cyprus,2014:1-6
    [59]Heller B,Sherwood R,McKeown N.The controller placement problem//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks.Helsinki,Finland,2012:7-12
    [60]Mijumbi R,Serrat J,Gorricho J L,et al.Network function virtualization:State-of-the-art and research challenges.IEEE Communications Surveys&Tutorials,2016,18(1):236-262
    [61]Katsalis K,Nikaein N,Schiller E,et al.Network slices toward 5Gcommunications:Slicing the LTE network.IEEECommunications Magazine,2017,55(8):146-154
    [62]Han B,Geopalakrishnan V,Ji L S,Lee S.Network function virtualization:challenges and opportunities for innovations.IEEE Communications Magazine,2015,53(2):90-97
    [63]Satyanarayanan M,Chen Z,Ha K,et al.Cloudlets:At the leading edge of mobile-cloud convergence//Proceedings of the 6th International Conference on Mobile Computing,Applications and Services.Austin,USA,2014:1-9
    [64]Chen W,Xu L,Li G,Xiang Y.A lightweight virtualization solution for Android devices.IEEE Transactions on Computers,2015,64(10):2741-2751
    [65]Fernandes E,Paupore J,Rahmati A,et al.FlowFence:Practical data protection for emerging IoT application frameworks//Proceedings of the USENIX Security Symposium.Austin,USA,2016:531-548
    [66]Liu W,Nishio T,Shinkuma R,Takahashi T.Adaptive resource discovery in mobile cloud computing.Computer Communications,2014,50:119-129
    [67]Nishio T,Shinkuma R,Takahashi T,Mandayam B N.Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud//Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking.Bangalore,India,2013:19-26
    [68]Aazam M,Huh E N.Dynamic resource provisioning through Fog micro datacenter//Proceedings of the International Conference on Pervasive Computing and Communication Workshops.Saint Louis,USA,2015:105-110
    [69]Skarlat O,Schulte S,Borkowski M,Leitner P.Resource provisioning for iot services in the fog//Proceedings of the9th International Conference on Service-Oriented Computing and Applications.Macau,China,2016:32-39
    [70]Zhan Z H,Liu X F,Gong Y J,et al.Cloud computing resource scheduling and a survey of its evolutionary approaches.ACM Computing Surveys,2015,47(4):1-33
    [71]Kavvadia E,Sagiadinos S,Oikonomou K,et al.Elastic virtual machine placement in cloud computing network environments.Computer Networks,2015,93:435-447
    [72]Liu J,Zhang Y,Zhou Y,et al.Aggressive resource provisioning for ensuring QoS in virtualized environments.IEEE Transactions on Cloud Computing,2015,3(2):119-131
    [73]Chun B G,Ihm S,Maniatis P,et al.CloneCloud:Elastic execution between mobile device and cloud//Proceedings of the 6th Conference on Computer Systems.Salzburg,Austria,2011:201-314
    [74]Barbera M V,Kosta S,Mei A,Stefa J.To offload or not to offload?the bandwidth and energy costs of mobile cloud computing//Proceedings of the International Conference on Computer Communications.Turin,Italy,2013:1285-1293
    [75]Kosta S,Aucinas A,Hui P,et al.ThinkAir:Dynamic resource allocation and parallel execution in the cloud for mobile code offloading//Proceedings of the International Conference on Computer Communications.Orlando,USA,2012:945-953
    [76]Macías M,Guitart J.A genetic model for pricing in cloud computing markets//Proceedings of the 2011ACM Symposium on Applied Computing.Taiwan,China,2011:113-118
    [77]Xu H,Li B.Dynamic cloud pricing for revenue maximization.IEEE Transactions on Cloud Computing,2013,1(2):158-171
    [78]Liu Y,Wang R,Han Z.Interference-constrained pricing for D2Dnetworks.IEEE Transactions on Wireless Communications,2017,16(1):475-486
    [79]Chen X,Proulx B,Gong X,Zhang J.Exploiting social ties for cooperative D2D communications:A mobile social networking case.IEEE/ACM Transactions on Networking,2015,23(5):1471-1484
    [80]Jin Y,Liu F,Yi X,Chen M.Reducing cellular signaling traffic for heartbeat messages via energy-efficient D2Dforwarding//Proceedings of the 37th International Conference on Distributed Computing Systems.Atlanta,USA,2017:1301-1311
    [81]Toosi A N,Calheiros R N,Buyya R.Interconnected cloud computing environments:Challenges,taxonomy,and survey.ACM Computing Surveys,2014,47(1):1-47
    [82]Ibrahim M H.Octopus:An edge-fog mutual authentication scheme.International Journal of Network Security,2016,18(6):1089-1101
    [83]Bouzefrane S,Mostefa A F B,Houacine F,Cagnon H.Cloudlets authentication in NFC-based mobile computing//Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing,Service,and Engineering.Oxford,UK,2014:267-272
    [84]Yang X,Huang X,Liu J K.Efficient handover authentication with user anonymity and untraceability for mobile cloud computing.Future Generation Computer Systems,2016,62:190-195
    [85]Yu S,Wang C,Ren K,Lou W.Achieving secure scalable and fine-grained data access control in cloud computing//Proceedings of the International Conference on Computer Communications.San Diego,USA,2010:1-9
    [86]Almutairi A,Sarfraz M,Basalamah S,et al.A distributed access control architecture for cloud computing.IEEE Software,2012,29(2):36-44
    [87]Dsouza C,Ahn G J,Taguinod M.Policy-driven security management for fog computing//Proceedings of the 15th International Conference on Information Reuse and Integration.San Francisco,USA,2014:16-23
    [88]Lu R,Liang X,Li X,et al.EPPA:An efficient and privacypreserving aggregation scheme for secure smart grid communications.IEEE Transactions on Parallel and Distributed Systems,2012,23(9):1621-1631
    [89]Dwork C.Differential privacy:A survey of results//Proceedings of the International Conference on Theory and Applications of Models of Computation.Xi’an,China,2008:1-19
    [90]Yang R,Xu Q,Au M H,et al.Position based cryptography with location privacy:A step for fog computing.Future Generation Computer Systems,2018,78(2):799-806
    [91]Wang Y,Xu D,He X,et al.L2P2:Location-aware location privacy protection for location-based services//Proceedings of the International Conference on Computer Communications.Orlando,USA,2012:1996-2004
    [92]Yi S,Qin Z,Li Q.Security and privacy issues of fog computing:A survey//Proceedings of the International Conference on Wireless Algorithms,Systems,and Applications.Guilin,China,2015:685-695
    [93]NowSecure.Mobile Security Report.Oak Park,Illinois,USA:NowSecure,2016
    [94]Alrawais A,Alhothaily A,Hu C,Cheng X.Fog computing for the Internet of Things:Security and privacy issues.IEEEInternet Computing,2017,21(2):34-42
    (1)IBM Introduces Ready-to-Use Cloud Computing.https://www-03.ibm.com/press/us/en/pressrelease/22613.wss2007,11,15
    (2)Amazon’s massive cloud business hit over 12billion in revenue and 3billion in profit in 2016.http://www.businessinsider.com/amazons-cloud-business-hits-over-12-billion-in-revenue-2017-2 2017,2,2
    (3)Microsoft vows to have 20 billion in cloud revenue by 2018.http://www.businessinsider.sg/microsoft-20-billion-cloudrevenue-and-1-billion-windows-10-pcs-by-2018-2015-4/?r=US&IR=T#iz25lv5lyAbEVkd3.97 2015,4,29
    (4)ICT Facts and Figures 2016.http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2016.pdf 2016,6,1
    (5)Economic operation of Telecom industry November 2016.http://www.miit.gov.cn/n1146285/n1146352/n3054355/n3057511/n3057518/c5426194/content.html 2016,6,1
    (1)其实除了将云计算设施部署在离终端更近的地点外,近年来还出现了其他扩展的方式,如移动云、混和云、联邦云以及自组织云等.
    (1)OpenFog.http://www.openfogconsortium.org,2017,7,10
    (1)ETSI Drops‘Mobile’From MEC.http://www.lightreading.com/mobile/mec-(mobile-edge-computing)/etsi-dropsmobile-from-mec/d/d-id/726273 2016,9,21
    (1)Mobile Edge Computing.https://portal.etsi.org/tb.aspx?tbid=826&SubTB=826,835 2017,7,10
    (2)Edge Computing.http://openedgecomputing.org 2017,7,10
    (3)The Relationships among Cloud Computing,Fog Computing,and Dew Computing.http://www.dewcomputing.org/index.php/2015/11/12/the-relationships-among-cloud-computingfog-computing-and-dew-computing 2015,11,12
    (1)Gartner Says 8.4 Billion Connected“Things”Will Be in Use in 2017,Up 31Percent From 2016.http://www.gartner.com/newsroom/id/3598917 2017,2,7
    (1)IOx-App Developer’s guide.https://developer.cisco.com/media/iox-dev-guide-3-10-16/2017,7,10
    (1)Wifi Network Security Statistics/Graph.http://graphs.net/wifi-stats.html 2017,7,10

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700