《中國信科:2023 6G網絡體系架構白皮書-全域覆蓋場景智聯(英文版)(47頁).pdf》由會員分享,可在線閱讀,更多相關《中國信科:2023 6G網絡體系架構白皮書-全域覆蓋場景智聯(英文版)(47頁).pdf(47頁珍藏版)》請在三個皮匠報告上搜索。
1、6G Network Architecture Copyright CICT MOBILE CO.,LTD.All Rights Reserved.No part of this white paper may be reproduced or transmitted in any form or by any means without prior written consent of CICT Mobile Co.,LTD.WHITE PAPERChapter 1:New Requirements of 6G Network DevelopmentChapter 2:New Concept
2、s of 6G Network Architecture DesignChapter 3:New Architecture of Three-Layer and Five-Plane Intelligent Simplicity Empowerment 6G Network Chapter 4:New Three Layers of Intelligent Simplicity Empowerment 6G Network0205081415161719203234363944Chapter 5:New Five Planes of Intelligent Simplicity Empower
3、-ment 6G Network Conclusion CONTENTS目 錄5.1Empowerment Plane 5.2 Data Plane5.3 Control Plane5.4 User Plane5.5 Orchestration and Management Plane 4.1Infrastructure Layer4.2 Network Function Layer4.3 Service and Capability Exposure LayerNew Requirements of 6G Network Development 036G Network Architectu
4、re Diversified Business ScenariosAs communication networks have evolved from basic voice services to three typical 5G scenarios,the diversity of business scenarios has developed towards the direction of integrated communication and sensing and intelligence everywhere.Facing a rich array of business
5、forms and intelligent access device applications,future network architecture needs to be designed,optimized,and reconstructed to provide better service experience.With the development of future businesses such as autonomous driving,smart homes,and virtual As society gradually enters the digital age,
6、the digital world deeply interacts and integrates with the physical world,and 6G network becomes the backbone of the future network.The design of the 6G network architecture should not only consider compatibility and inheritance with existing networks,but also consider diverse business scenarios in
7、6G,complex communication needs of emerging vertical industry users,and the coordinated/adaptive ability of the network and applications.The development of various new technologies drives the development of 6G networks towards global coverage,everything connected,trusted security,and low-carbon green
8、 direction.reality,user demands continue to evolve,and human-machine interactions are becoming increasingly close.Networks require higher bit rates,lower latency jitter,and higher reliability.6G networks aim to achieve seamless coverage of air,land,sea,and space,moving towards a world of ubiquitous
9、intelligent connections.Innovative Technology IntegrationThe integration of DOICT(Data,Operational,Information,Communication Technology)drives the transformation and upgrade of the mobile communication network,creating a Intelligent 046G Network Architecture Simplicity Empowerment 6G,forming a intel
10、li-gence endogenous network.In the future era of big data,the powerful computing capabilities of the 6G network will require higher security and privacy technologies,and the design of the 6G network architecture will consider both intelligent services and trustworthy security mechanisms to promote t
11、he development in relevant fields.High Demand Business ModelTechnology development and social develop-ment are closely related.Immersive experience reality,holographic communication,digital twin,smart transportation and other business needs are emerging constantly,and accelerating digital transforma
12、tion has become a new trend for Chinas economic growth.For individual users,the popularization of new products such as smart wearable devices and smart home appliances provides personalized needs and improves the quality of life and service experience.In vertical industries,more human-machine interc
13、onnection and everything-connected business models are now prevalent,and data application services bring new development opportunities to many indus-tries,making data-driven industries the main form of future enterprises.The high throughput,low latency,ultra-precise positioning,security-in-herent,an
14、d multi-network convergence features of 6G networks provide more possibilities for the development of future business models and vertical industries.Sustainable Social ResponsibilityThe introduction of the carbon peaking and carbon neutrality strategy accelerates the transformation of the communicat
15、ion industry towards energy efficiency and greenness.Currently,the high energy consumption and unsustainable nature of networks cannot meet the requirements of the country and industry for green and energy-efficient networks,intelligent operation,flexible configuration,shared capabilities,and secure
16、-by-design.Major non-preventable events such as extreme weather and pandemics,the needs for low-carbon economic and social development,and the needs for a better life for human society drive the establishment of a more stable and low-carbon smart network and promote the 6G network towards a green,lo
17、w-carbon,and intensive communication direction.2New Concepts of 6G Network Architecture Design066G Network Architecture Due to the diversity of business scenarios,the integration of DOICT technology,high-demand business models,and sustained social responsibility,6G networks face new challenges.There
18、fore,CICT MOBILE CO.,LTD(CICT Mobile)adheres to the design concepts of Intelligent Simplicity,Programmability,Endogenous,Distributed,Service-based,and Digital Twin,when designing the 6G network architecture.Intelligent SimplicityAs the network access scale continues to in-crease and network demands
19、become more diverse,reducing the complexity of the 6G network architecture can achieve the goal of lightweighting the architecture,improving network operational efficiency,and reducing network operation and maintenance costs.Additionally,the 6G Intelligent Simplicity Empowerment network will continu
20、ously improve its level of intelligence based on big data and artificial intelligence technologies,eventually forming an intelligent end-to-end system,mainly consisting of intelligent ter-minals,intelligent edge networks,intelligent core networks,and intelligent business appli-cations.Programmabilit
21、yAs the diversity of 6G network architecture and customization of application scenarios increases,programmable technology,as one of the key technologies for 6G network,has received widespread attention in the industry.6G programmable network can eliminate network differentiation,enabling network on-
22、demand arrangement,flexible resource deployment,dynamic routing planning,and rapid identification and repair of network failures,meeting the diverse needs of business.At the same time,intelligent inherence and programmability can deeply integrate,providing support for the arrangement and implementat
23、ion of 6G network.076G Network Architecture Service-Based5G has achieved the modularization of net-work functions and separation of control and user functions.However,the virtualization of the 5G user and wireless underlying archi-tecture is not high and the networks overall adaptability is limited,
24、restricting the ability to deploy networks flexibly.By increasing access network service and core network user-side service,software and hardware resources can be fully decoupled and flexibly allocated,con-tributing to increased network flexibility and maximizing the networks adaptability.Endogenous
25、Due to the lack of deep integration between existing AI and mobile communication networks,independent management of computational networks and mobile com-munication networks,and the lack of dy-namic and flexible network protection meth-ods,the 6G network system architecture needs to integrate the ab
26、ility of intelligent endogenous,computational endogenous,and security endogenous to achieve the network everywhere,computing power everywhere,and intelligence everywhere.DistributedTo meet the diverse business requirements of various scenarios,6G networks will break the constraints of centralization
27、 and construct decentralized autonomous networks,providing user-centric control and management,meeting the heterogeneous access scenarios and network performance requirements of the sky,land,air and sea,etc.With the continuous growth of network scale,6G networks will be deployed in a combined centra
28、lized and decentralized manner,achieving the goal of complementary network resources and on-demand network composition.Digital TwinWith the continuous development of artificial intelligence and the increasing permeation of sensing and information,6G networks will integrate digital twin technology to
29、 form a virtualized digital twin world based on the physical world,enabling mapping and interaction between the virtual and physical world.The digital twin world can accurately reflect and predict the state of each intelligent entity in the physical world,improving the efficiency of network operatio
30、n and resource utilization.086G Network Architecture New Architecture of Three-Layer and Five-Plane Intelligent Simplicity Empowerment 6G Network 096G Network Architecture Based on the design concepts of Intelligent Simplicity,Programmability,Endogenous,Distributed,Service-based and Digital Twin,thi
31、s white paper proposes a three-layer and five-plane 6G Intelligent Simplicity Empowerment network architecture,which generally presents a three-layer and five-plane architecture with Intelligent Simplicity Empowerment network feature,as shown in Figure 1 below.Firstly,it is divided into three layers
32、 from the bot-tom up,including infrastructure layer,network function layer and service and capability expo-sure layer.Infrastructure layerProvide the corresponding infrastructure and network resources for function generation in the network function layer,covering infra-structure such as ubiquitous a
33、ccess devices,network devices and computing power devices,and multi-dimensional resources such as programmable compute,storage,network,data and AI.Network function layerThe ubiquitous infrastructure provided by the infrastructure layer interconnects the dynamically distributed resources,and provides
34、 network functions such as communication,Figure 1-Three-layer and Five-plane 6G Intelligent Simplicity Empowerment Network ArchitectureNew Architecture of Three-Layer and Five-Plane Intelligent Simplicity Empowerment 6G Network Data serviceConnection serviceAI serviceSensing&Location serviceComputin
35、g power serviceComputing power capabilitySecurity capability AI capabilityNetwork capabilityComputing devicesNetwork devicesAccess devicesUser devices(MTC,V2X,UAV,D2D)Infrastructure LayerService&Capability Exposure LayerAISecurityComputing power.Data Plane Intelligent data analysis Data access&shari
36、ng Privacy protection Data acquisition&processing Distributed trusted storage Virtual and real interaction Multi-resource sensing Network orchestration Service orchestration FCAPSControl PlaneUser PlaneOrchestration&Management PlaneNetwork Function Layer Integrated communication&sensing Intelligent
37、access Mobility management Intelligent policy Session management ProgrammabilityRoute&forward managementPlug&playEmpowerment Plane106G Network Architecture endogenous capabilities,and whose functional modules can be located in other functional planes in the implementation.The 6G network architecture
38、 is designed from the beginning to provide comprehensive support for endogenous capabilities such as intelligence,computing power,and security,so the empowerment plane is used as the basic functional base of the 6G network to build an on-demand,flexible and efficient endogenous capability resource p
39、ool.Based on the empowerment plane,the 6G net-work can optimize network performance and achieve network autonomy by using endoge-nous capabilities internally without external intervention,and give more support to new services for applications in various indus-tries externally to improve user experie
40、nce.Data planeResponsible for data management functions such as collection,processing,analysis and service of all data in the whole network.Driven by the demand of Connect Everything and Digital Twin,it improves the performance of data services,reduces the bandwidth overhead of data transmission,uni
41、fies and collaborates in the management of data across the network,supports 6G to provide secure and shared trusted data services across the network,and creates more value through intelligent processing and analysis of data.At the same time,the data plane can achieve reliable migration of network st
42、ates through functional and data decoupling,improve mobility management performance,and enable frequent switching scenarios such as integrated satellite-terrestrial.sensing,computing power,intelligence,data and security for the services or capabilities required by the service and capability exposure
43、 layer in the upper layer through the unified and collaborative scheduling of multi-dimensional resources,and supports the atomized functions required by users in different network systems for splitting,combining or extending.Service and capability exposure layerExtract,encapsulate and combine the n
44、etwork functions of the lower layer to provide capabilities or services for internal network services or external applications on demand,covering connectivity and various capabilities or services such as data,computing power,intelligence and orchestration management to support the operators network
45、with more value and bring better service experience to users in diverse business scenarios.Secondly,it is divided into five functional planes,including empowerment plane,data plane,control plane,user plane and orchestration and management plane,which are responsible for five major types of network f
46、unctions,such as intelligence/compute/security and other endogenous functions,data management,network control,routing and forwarding,and orchestration and management.Among them,the empowerment plane and data plane are the new functional plane of 6G relative to 5G.Empowerment plane A logical plane th
47、at logically describes the network functions such as intelligence,compute,and security that give the network its 116G Network Architecture The control plane,user plane and orches-tration and management plane are the en-hanced functional planes of 6G compared to 5G.The enhanced 6G control plane,user
48、plane and orchestration and management plane cov-er the control,forwarding and orchestration management functions related to the traditional connectivity capability and the new intelligent/computing/security capabilities on the one hand.On the other hand,the enhanced planes use the empowerment plane
49、 as the basic functional base to enable the network to have endogenous capabilities related to intelligence,computing power and security,etc.The multiple capabilities complement each other to effectively improve the overall performance of the 6G network.Control planeEvolve to full-service,support th
50、e unified and simple access of integrated satellite-terrestrial and the integrated and accurate control of cross-layer and cross-domain re-sources,assist the deep integration of endoge-nous capabilities such as intelligence/security/computing power with the new architecture.Based on the endogenous c
51、apabilities given by the empowerment plane,realize the dynamic division and convergence reconfiguration of the access network and core network,as well as the intelligent,efficient and safe collaborative management and control of multi-dimensional services such as communication,sensing,computing powe
52、r,intelligence,data,security,etc.User planeEvolve to full-service,supports comprehensive high performance forwarding for multi-dimensional services such as communication,sensing,computing power,intelligence,data and security,supports rapid deployment and technological innovation of new protocols or
53、features through programmable technology,and supports a hierarchical experience of deterministic forwarding for users across industries.126G Network Architecture the complexity of operation and maintenance.Considering the ubiquitous connectivity of the whole scenario,the dynamic change of the servic
54、e demand and the flexible expansion of the network,the 6G network needs to have the plug-and-play function under the unified architecture.The intelligent simplicity of 6G network may be reflected in the following aspects.Intelligent SimplicityWith the rapid expansion of network scale and dynamic cha
55、nges in service requirements,the network may become increasingly complex.To avoid network complexity overlap,6G networks need to be designed with intelligence endogenous,efficient and simple lightweight network architecture,minimizing the number of network layers and interfaces and reducing Based on
56、 the three-layer and five-plane architecture,the 6G network will have the network characteristics of intelligent simplicity and empowerment.Orchestration and management planeCovering connection service related resource management and service scheduling,as well as multi-dimensional resource sensing,m
57、anagement and integrated scheduling of sensing,computing power,intelligence,data and security,through the joint optimization of resources and flexible scheduling,to complete the closed-loop intelligent control of sensing,analysis,decision-making and evaluation,to achieve the on-demand selection and
58、balanced application of network capacity,to support the on-demand scheduling and management of integrated satellite-terrestrial,to maximize resource utilization.At the same time,the orchestration and management plane supports the deep integration of digital twin networks to control the real with the
59、 virtual to achieve continuous optimization of the physical network state seeking and simulation verification.136G Network Architecture Architecture intelligent simplicitySupports end-to-end full-service,flexible split-ting and reorganization of network functions for scenario requirements,supports u
60、nified sched-uling of multi-dimensional resources,realizes user-centric scheduling and control,and estab-lishes an elastic and reconfigurable network ar-chitecture.Function intelligent simplicity Supports flexible on-demand orchestration of atomized functions and optimal reconfiguration of network f
61、unctions.Protocol intelligent simplicity The whole domain adopts a unified protocol to support cross-domain interaction in integrat-ed satellite-terrestrial scenario,supports the differentiated needs of each industry through scenario-oriented protocol programming,and unifies radio interface transmis
62、sion protocols and networking protocols to improve end-to-end network performance.Process intelligent simplicitySystematic design,modular synthesis and dis-tributed efficient collaboration of the whole pro-cess such as control process and data interaction process.Terminal intelligent simplicitySuppo
63、rts the convergence of multiple radio interface technologies such as integrated satel-lite-terrestrial to realize the extremely simple and intelligent network access with no differ-ence in terminals.Infrastructure intelligent simplicityUbiquitous resource pools that provide pro-grammable and dynamic
64、 hardware or software resources for the network.Internal empowermentBy atomizing the native network functions and orchestrating intelligence,computing power,security and other functions on demand,the network is endowed with endogenous capabili-ties such as intelligence,computing power and security o
65、n all layers and planes.External empowermentBy designing a native open mechanism,we provide industry users and third parties with trusted on-demand network capabilities and services,empowering users and third parties with thousands of needs such as intelligence,computing power and security.Empowerme
66、ntIn the 6G era,the network is no longer a communication network that simply provides connectivity services,but a converged network that integrates connectivity,intelligence,computing power,security,and data,etc.It needs to support the integrated orchestration and control of multiple capabilities an
67、d services to internally realize multiple capabilities endogenously and provide multiple services externally.146G Network Architecture New Three Layers of Intel-ligent Simplicity Empower-ment 6G Network4156G Network Architecture The infrastructure layer is located at the bottom of the entire network
68、 and is the operational foundation of the entire network,providing wireless,computing power,storage,network and other resources for the upper layer network functions and managed by the corresponding upper layer network functions.The infrastructure layer consists of virtual The 6G-oriented mobile com
69、munication network should be an information and communication network with ubiquitous resources,endogenous capabilities,exposure services,and full connectivity and wide area collaboration.As a complex system,6G network architecture design should consider a clear structured logical view.The logical l
70、evel of 6G network architecture includes infrastructure layer,network function layer,and service and capability exposure layer from the bottom up,based on the logical view level,pulling through the physical resources,network functions and capability services of 6G network.The design of layer highlig
71、hts the enrichment and enhancement of 6G network architecture in terms of layered elements and capabilities.The infrastructure layer covers infrastructure such as computing power,network and cloud,and enriches the computing power resource element on the basis of network resources,which will provide
72、a base for the convergence of network,computing power,storage and other basic resources for 6G network.The network function layer continues the service design concept,supporting the organic integration and flexible construction of different network functions.The service and capability exposure layer
73、 opens powerful information and communication capabilities to industry applications,and provides services for industry applications through unified encapsulation and orchestration of capabilities and services.At the same time,the layer design also reflects the concept of cross-domain pull-through,mu
74、lti-domain collaboration and convergence development.Through the collaboration and interaction between layer and layer,layer and plane,it ensures the self-wisdom and closure of business processes,mutual support and sharing of business capabilities,and promotes the convergence development of 6G netwo
75、rk architecture.4.1 Infrastructure Layer166G Network Architecture resources and hardware resources,includ-ing unified virtualized virtual resources,abstractable physical resources and dedicated high-performance hardware resources.Except for devices or systems that must use dedicated hardware,the inf
76、rastructure layer should adopt a large number of standardized hardware devices that support virtualization deployment,unify the infrastructure resource platform,and realize resource control and unified management for non-virtualized deployed devices in com-bination with abstraction layer technology.
77、6G is a three-dimensional network with global coverage.In addition to the infrastructure resources of the existing terrestrial mobile communication network,the infrastructure layer will further cover the infrastructure resources of air,space and sea,integrating high/medium/low orbit satellite system
78、s,stratospheric platforms,terrestrial networks and maritime ship communications to build an integrated network of integrated satellite-terrestrial,realizing full coverage of space,air,ground,sea and other natural spaces,and truly realizing global ubiquitous connectivity.With the emergence of many ne
79、w applications in 6G such as immersive XR and autonomous driving,the type of computing power resources will introduce diverse heterogeneous computing power such as GPU,ASIC,FPGA,etc.in addition to the traditional general CPU.6G is an integrated communication and sensing network,based on the existing
80、 communication capability,the infrastructure layer will provide sensing data information collection capability for the upper layer network function and provide big data support for AI applications.The network function layer is the core layer to crack the needs of high performance,flexible network,in
81、telligence/computing power/security endogenous,low cost,green and low carbon,etc.This layer is in the key position to carry on,cross the inflection point and win the future,and is an indispensable layer to realize the 6G network architecture and integrate various key technologies.The network functio
82、n layer is embodied by multiple network functions of different planes in a full-service manner,based on the flexible combination and scheduling of various 4.2 Network Function Layerresources provided by the infrastructure layer,providing on-demand intelligent simplicity and reliable functions and se
83、rvices to the service and capability exposure layer,transforming the traditional application-adapted network into an application-defined network,taking the user as the center to meet the fragmented,diversified and complex network needs of different industry applications.The network function layer is
84、 the logical carrier that enables all planes to collaborate with each other and work organically,and it is urgent to comprehensively upgrade and optimize and 176G Network Architecture 4.3 Service and Capability Exposure Layer deeply integrate DOICT technologies to promote the innovative development
85、of traditional control plane,user plane,and management plane with interdisciplinary and cross-disciplinary innovations.To reuse all kinds of data in the network as a special intangible asset and production factor by converging them in the data plane to increase usability,shareability,statistic,expos
86、ure,etc.At the same time,through the empowerment plane,advanced technologies are continuously introduced and absorbed to become the evolutionary gene of the network,and evolve to a higher stage,so that network functional services can support the explosive growth of new industries and applications by
87、 means of an intelligent simplicity platform,promote the digitalization,networking and intelligent transformation and upgrading of the economy and society,and drive productivity development and promote the change of production relations.The development of the network cannot be separated from the dri
88、ving force,and similarly the exposure of the network capability.The exposure of network capability has been tried to be introduced from 4G,for example,after the introduction of SCEF,a network function dedicated to capability exposure.For 5G,the de-mand for capability exposure has been started from t
89、he beginning of architecture design,and the NEF,a capability exposure network func-tion,has been identified,so that the network has the scalability of network capability.Now 5G has a variety of exposure capabilities,such as monitoring capabilities,configuration ca-pabilities,positioning capabilities
90、 and other capabilities,but with the emergence of new services in new scenarios of 6G,the current network exposure capabilities cannot meet the new needs,such as intelligent applications,sensing and positioning needs.In order to meet the business needs of new scenarios and new demands of 6G networks
91、,6G networks need to consider not only the demand for exposure network capabilities,but also the scalability of exposure network capabilities to meet more de-mands in the future when designing the archi-tecture.In other words,the 6G network needs to consider network and application/scenario collabor
92、ation/adaptation capability,and a wider range of capability customization packages to match the application/scenario,in order to provide diverse and new service capabilities and exposure rich network capabilities to users.To sum up,the 6G network needs to introduce the service and capability exposur
93、e layer to provide a variety of exposure network capabil-ities and make the network have the scalability of exposure network capabilities to empower thousands of 6G industries by supporting a higher level,deeper degree and wider range of exposure network capabilities.186G Network Architecture The se
94、rvices provided by the service and ca-pability exposure layer include the computing power services,data services,connectivi-ty services,intelligence services,sensing&location services,and other services.The service and capability exposure layer includes computing power capability,AI capability,secur
95、ity capability,network capability and other capabilities.For computing power capability exposure,it is a key technical means to achieve on-demand computing power call and real-time sharing.The 6G network needs to have the following computing power enabling technologies to realize the exposure and sh
96、aring of computing power capabilities:computing power modeling capability,computing power capability warehouse,computing and network resource orchestration and capability call,etc.For AI capability,it will be used as a basic capability to empower production and society.Al capability exposure include
97、 desensitization and exposure of data,exposure of model joint training capabilities,exposure of model infer-ence capabilities,and other open capabilities.Along with the development of AI,blockchain,federal learning and other technologies,it becomes possible to use security capabilities as an inside-
98、out protection mechanism in 6G network architecture.The changes in 6G network architecture will prompt inside-out changes in the functions of 6G security.Security capabilities is helpful for third-party application providers to better build business security capabilities and achieve application secu
99、rity functions.The exposure capability of security contains active immunity capability,elastic autonomy capability and ubiquitous collaboration capability.Network capability exposure refers to the exposure of management capabilities,manage-ment information,management data,etc.,so that third parties
100、can participate in network op-eration,maintenance and management.The service and capability exposure layer interoperates with the application layer in the north and connects with capabilities and services in the south,supports the exposure of network capabilities securely,and provides callable,frien
101、dly,and rich API interfaces for atomic capabilities.When a request is received from third-party application,the atomic capability API is used as the basis for real-time online encapsulation,orchestration and combination of atomic capabilities to provide users with on-demand network capabilities acco
102、rding to their business requirements,improving the user experience.At the same time,some general service capabilities can be provided to the public according to a unified framework and process,which simplifies network implementation.The service and capability exposure layer interacts with other laye
103、rs/planes to collect and encapsulate the exposure capabilities of other layers or planes to provide network capabilities on demand.In addition,the exposure of network capabili-ties facilitates the rapid integration of third-par-ty services,enhancing the competitiveness of mobile operators to partici
104、pate and expand new services and increase revenue.196G Network Architecture New Five Planes of Intelligent Simplicity Empowerment 6G Network 5206G Network Architecture 5.1 Empowerment PlaneNew diverse application scenarios,intelligent application requirements,and future network decentralization requ
105、ire 6G networks to have more flexible and scalable mechanisms to meet the high-performance communication and flexible rapid response requirements of different application scenarios.In addition to providing connection services,6G networks also need to provide sensing and location services,AI services
106、,data services,computing power services,and other services.At the same time,they must also have AI capabilities,network capabilities,computing power capabilities,and security capabilities.Therefore,the network requires a logic plane(i.e.empowerment plane)that can be extremely flexible and expandable
107、 in terms of capabilities,which can provide the necessary intrinsic capabilities for other layers and planes of the network and have the ability to expand functions and build network services flexibly according to the development of the network and business needs.The features of 6G network system ar
108、chitecture,such as service and capability exposure,on-demand network service provision,ultimate network performance experience,plug and play,distributed collaboration,integrated of computing and networking,and smart home development,have resulted in many core elements and service capabilities in the
109、 network requiring on-demand,elastic deployment and separate consideration,such as computing power,intelligence,security,data,and orchestration management.Based on enhancing the control plane and user plane in traditional network architecture,further adding the empowerment plane,data plane,and orche
110、stration and management plane has realized endogenous computing power,intelligence,security,data,and orchestration and management that is flexible and reconfigurable on demand,constructing a 6G network that is integrated satellite-terrestrial,global coverage and everything connected.The empowerment
111、plane,user plane,control plane,data plane,and orchestration and management plane will be described in detail below.216G Network Architecture As shown in the figure 2,the capabilities cur-rently possessed by the empowerment plane in the 6G network architecture are intelligence,computing power,and sec
112、urity.With the emer-gence of new business scenarios and vertical industries,the capabilities of the empowerment plane will also continue to expand.Intelligence EndogenousThe mobile communication network has always emphasized network intelligence,starting from the Self-Organized Network(SON)project o
113、f the 3G/4G era,and the introduction of the NWDAF element in 5G has continued to deepen the integration of the mobile communication network and AI.However,there are still many gaps in the intelligence of the current mobile communication network.The existing network architecture lacks the effective m
114、anagement of the three elements of AI,the way to discover and solve problems through human intervention,and is limited by human cognition,unable to complete the self-governance of the entire network,and the configuration method cannot adapt to the different needs of the network and Figure 2-Empowerm
115、ent PlaneAISecurityComputing power.services in all scenarios.Relying on existing AI to solve problems in a chimney-style often results in conflicts between different AI use cases,and the configuration-based approach cannot accommodate the different needs of the network and services in all scenarios.
116、For the empowered social industry,the mo-bile communication network as a social infor-mation infrastructure needs to have the ability to provide intelligent services to the entire society and all industries.Facing the unknown new industries and new needs of the future,it is unrealistic for human bei
117、ngs to discover and summarize future needs,and it is necessary to use their own,the entire industry,and the massive data of the network to analyze new trends and changes.Therefore,6G needs to introduce endogenous AI,provide inter-industry federation intel-ligence,and achieve cross-domain wisdom inte
118、gration and sharing,abandoning the AI application mode of patching,plug-in,and overlapping.6G network intelligence in terms of network functions,architecture,protocols,processes,etc.,will deeply integrate the factors 226G Network Architecture of AI calculation power,data,algorithms,etc.into the desi
119、gn,realizing the network-level AI data,algorithms,computing power,etc.can be arranged and transferred as needed,making AI training/inference more real-time and efficient;the intelligent recognition and intelligent application of AI scenarios will be based on network data and knowledge.Computing Powe
120、r Endogenous The appearance of new users,technologies,applications,and scenarios has led to an exponential increase in data volume,and various industries have more pressing needs for computing power and networks.The country has launched the East Data West Calculation project.The current network arch
121、itecture separates the computing power network and the mobile communication network,which increases the cost of network construction and operation maintenance and causes problems such as inter-network signaling interaction and security.At the same time,the expansion of computing power also leads to
122、issues such as low utilization and timeliness of resources.Therefore,6G networks will deeply integrate with the computing power network,and in the architecture design,6G networks will consider not only the exposure of computing power services,but also the transformation from external computing power
123、 to internal computing power.The architecture will embed computing capabilities,making the mobile communication network itself efficient in using computing power resources and building enhanced network architecture,and providing computing power services for external industry applications to meet div
124、erse application needs.The incremental and patch-style capability enhancement cannot meet the diverse business needs under large-scale networking for the multi-domain integrated,connected 6G network.It is necessary to embed computing capabilities in the 6G network architecture and penetrate them thr
125、ough a unified empowered surface to other layers and planes,and provide computing services through the construction of computing capabilities.Security EndogenousThe introduction of new application scenarios and key technologies in 6G has brought about new security issues.In terms of personal pri-vac
126、y security,due to the exposure of 6G net-work capabilities,user privacy information has transferred from closed personal platforms to open public platforms,and its contact status has gone from offline to online,making it possible to obtain user data in real-time,greatly increasing the risk of person
127、al privacy leaks.In the current 5G network and before,the in-dustry has adopted patching and plug-in securi-ty services to address these issues.However,the drawbacks of passive protection measures are that they are not timely in response,protection methods lag behind and cannot avoid security damage
128、 in time,and they lack adaptability and flexibility as the network evolves.The vision of 6G is full coverage and intelligent connection of all things,with its billion-level terminal devices,making network attacks more and more common,and attack methods more 236G Network Architecture diverse and comp
129、lex.The limited security capabilities of terminal devices also exacerbate security risks.At the same time,the vision of 6G global coverage requires a distributed network architecture and interconnection between heterogeneous networks,requiring the establishment of trust relationships between differe
130、nt networks.In addition,the requirement for AI-embedded in 6G greatly strengthens the role of AI,enhancing its importance in 6G,however,the introduction of AI also brings about security issues such as data security,AI model security,AI algorithm security,vulnerabilities in AI software systems and fr
131、ameworks,and malicious use of AI technology.Therefore,the security capabilities of 6G networks should be integrated into the network architecture,with a focus on security-driven security empowerment,based on distributed trust,breaking traditional security boundaries,deploying data security and priva
132、cy protection technologies.This will provide intrinsic security awareness,defense,and prevention functions for the various functions and resources of the 6G network system,allowing security capabilities to be customized and accessed as needed,ensuring network and user security internally,and realizi
133、ng the exposure of security capabilities externally.Ultimately,the 6G network system architecture forms a secure system that is automatically immune,has trust consensus,is cooperatively flexible,and intelligent and efficient.The entire network effectively operates with high reliability and security
134、for parallel multi-application operations.In summary,the empowerment plane is a combination of capabilities such as computing power,intelligence,and security,extracting,encapsulating,and combining computing power,intelligence,and security capabil-ities as needed to provide capabilities and services
135、to other layers and planes.Network technology features can also be encapsulated into service capabilities that are compatible with applications,and the ability to empower externally can be achieved through the design of native exposure mechanisms.By taking the empowerment plane as the basis,and thro
136、ugh the internal atomization of native network functions,computing power,intelligence,security capabilities and services are given to other layers and planes,bringing more value-added services while providing better business experience for users.At the same time,it also cooperates with other layers
137、and planes to flexibly provide capabilities and services as needed,optimizing network operation.5.1.1 Intelligence6G network will rely on the Intelligent Sens-ing-Intelligent Analysis-Intelligent Decision-In-telligent Execution intelligent processing loop,as shown in Figure 3,to achieve autonomous a
138、nd intelligent operation of network services,business,and functions.246G Network Architecture Plane PlaneData CollectionData ProcessingData StorageData InferenceFigure 3-Intelligent ProcessingClosed LoopIntelligent Sensing Sensing of the environ-ment,network resources and status,user needs/intention
139、s,and business quality.It can also be input through an interface.Intelligent Analysis Analysis of the sensing data and validation in the digital twin network.Intelligent Decision Decision-making based on the analysis results,including iterative optimization and execution deployment.Intelligent Execu
140、tion Automatically configures execution according to the decision-making strategy.IntelligentSensingIntelligent DecisionIntelligentAnalysis IntelligentExecution Orchestration&ManagementPlaneFigure 4-Empowerment Plane IntelligenceService&Capability Exposure LayerNetwork Function LayerIntelligence cap
141、abilityGlobal Data Fabric Central SuperbrainAI Case Generation AutoMLAI Task Collaboration MLOpsAI Lifecycle Management AI QoS GuaranteeIntelligent Business IntelligentData IntelligentServices AI Sensing Function AI Inference FunctionAI Training FunctionEmpowerment Plane(Intelligence)Intelligence Ab
142、ility Mode1 Optimization Services Mode1 Optimization Services Data PlaneUser PlaneInfrastructure LayerIntelligent Orchestration&AI Resource ManagementThe 6G networks intelligence endogenous processing logic closed-loop process includes network elements,function layer internal and external,relying on
143、 closed-loop analysis to achieve autonomous network,empowering network applications to be intelligently accessible,as shown in Figure 4.AI Function Orchestration&ManagementAI Resouce Orchestration&ManagementAI Service Orchestration&Management256G Network Architecture Intelligence capability,as a key
144、 capability of 6G empowerment,will be implemented in the intelligent endogenous process at all levels of the network.At the element level,network functions are designed with the closed-loop processing logic shown for the element functions.Within an element,some or all of the closed-loop logic functi
145、ons can be deployed on demand to achieve intelligent endogenous processing at the element level.Within the functional layer,the functional layer processes information within the functional layer based on the closed-loop processing logic shown,achieving intelligent endogenous processing at the functi
146、onal layer level.Between functional layers,the functional layers interact with information and function coordination around the closed-loop processing logic shown,achieving system-level intelligence endogenous processing.6G network realizes intelligent endogenous processing at the element level,func
147、tional layer internal and functional layer interlayer by designing functions and architecture natively based on intelligent processing closed-loop and data intelligence,management intelligence by designing protocols and processes natively based on intelligent processing closed-loop.This results in b
148、usiness intelligence and service intelligence,becoming a high-level autonomous network from end to end,and the link and foundation for empowering a thousand industries with intelligent benefits.266G Network Architecture 5.1.2 Computing Power基礎設施層Figure 5-Empowerment Plane Computing PowerBuilding Com
149、puting Power Service CapabilityBuilding Computing Power Service CapabilityApplication LayerService&Capability Exposure LayerComputing Network Data/Computing Network Service StrategySensing/Collecting/ModifyingComputing PowerDataEmpowerment Plane(Computing Power)Network Function Layer Infrastructure
150、Layer Sensing Computing Power Service RequirementComputing Power ServiceComputing Power Service RequirementBuilding Computing Power Service CapabilityComputing Power ServiceComputing Power ServiceData PlaneOrchestration&Management Plane Computing Power Service OrchestrationComputing&Nework Resource
151、ManagementComputing&Nework DataThe 6G network architecture enhances the computation service capability and aims to build the computation service capability through a unified empowerment plane.It provides computation services to other layers,planes,and twin-body,etc.The computation service ca-pabilit
152、y in the 6G network architecture is mainly based on the efficient coordination of the infrastructure layer,data plane,orchestration and management plane,network function layer,and service and capability exposure layer.The computation service is construct-ed through functions such as computation serv
153、ice orchestration,computation routing policy,computation routing generation,and computation routing forwarding.It empowers the network architecture internally,achieving endogenous computation,and empowers industry applications externally,providing com-putation services.Key technologies involved in c
154、lude as below.Computing power resource sensingFor the diverse computing nodes in 6G,the 6G network architecture controls the global resources through computing resource sensing technology.Computing power nodes initiate reg-istration to sense their basic information such as location,type,size,and ser
155、vice capability.The data plane collects the registered data of the computing power nodes and synchronizes it with the orchestration and management plane,which maintains the global pool of computing power resources and manages the global computing power nodes.For computing power nodes that have compl
156、eted registration,the 6G network needs to monitor their computing resource status in real-time or periodically,ComputingPower ServiceComputing Power Capability Computing PowerRoute GenerationComputing Power Route ForwardComputing PowerRoute Strategy 276G Network Architecture such as the computing lo
157、ad status,deployment status,and resource utilization,by means of network-wide sensing capabilities to support orchestration and management for computing power service arrangement and scheduling.Computing power modelingFor the diverse computing power nodes in 6G,the 6G network architecture controls t
158、he global resources through computing power resource sensing technology.Computing power nodes initiate registration to sense their basic information such as location,type,size,and service capability.The data plane collects the registered data of the computing power nodes and synchronizes it with the
159、 orchestration and management plane,which maintains the global pool of computing power resources and manages the global computing power nodes.For computing power nodes that have completed registration,the 6G network needs to monitor their computing power resource status in real-time or periodically,
160、such as the computing power load status,deployment status,and resource utilization,by means of network-wide sensing capabilities to support orchestration and management for computing power service arrangement and scheduling.Computing power routing controlThe 6G network architecture supports flexible
161、 scheduling of computing power routing control technology.The arrangement management plane generates the computing topology based on the perceived computing and net-work resource information and node-to-node link information,and further generates the computing power routing information table.Combini
162、ng the user business requirements parsed from the application layer,the mapping of user business requirements and resources is performed,the resource allocation policy is formulated,and the network connection needs are obtained according to the resource allocation policy.The routing of computing and
163、 network multi-dimensional resources integration is achieved through the control plane of network functions and services,establishing network connections.Based on the state of computing and network resources,6G network can ensure better user experience by routing the optimal business forwarding path
164、 through arrangement.Computing power service managementThe 6G network architecture has the ability to schedule computational services and manage their entire lifecycle,including the instanti-ation,updating,scaling,and termination of computational services.The heterogeneous computational resources an
165、d network resourc-es on the computational nodes are reserved,allocated,and released,and the network deployment of multiple dimensions of resources such as computation and storage is taken into consideration to generate a business scheduling policy based on the business needs.Intelligent scheduling d
166、ispatches the computational service to the appropriate computational node for processing,achieving dynamic business deployment and scheduling.At the same time,it monitors the networks operation and service quality in real-time under large-scale concurrent 286G Network Architecture multiple business
167、scenarios and adjusts the application deployment policy accordingly,intelligently performs business migration and scheduling to avoid resource constraints leading to business blockage and maximize the guarantee of business service quality and user experience.To support the efficient provision of com
168、-puting power services in 6G networks,the various aspects of the 6G network architecture need to be integrated and work together seam-lessly,embedding the functions supporting computing power services throughout the architecture,and realizing the construction of computing capabilities and the provis
169、ion of computing services through efficient collaboration.5.1.3 SecuritySecurity capability coordination and Distributed trustSecurity capability coordinationSecurity capability should accompany the net-work and provide flexible,on-demand cus-tomizable security coordination capabilities.Security ena
170、bling is to give security capabilities to other layers/planes,which is in line with the 6G networks requirement for on-demand customized business scenarios and the need for rapid on-demand deployment or withdrawal of network resources.To achieve security capability coordination,a security capability
171、 resource pool should be constructed.The security capability resource pool is committed to providing on-demand access to security resources,predicting,identifying and protect-ing security risks before they occur,detecting,responding and recovering after they occur.The security resource pool can achi
172、eve coordinated sharing of security data,security capabilities,and threat analysis,breaking data isolation and divide through collaboration,conducting homogeneity analysis,traceability,and crack-down on security threats.By combining secu-rity knowledge databases,threat intelligence databases and col
173、lected security data,utilizing AI technology,the security situational awareness is realized and the security policy is intelligently decided and deployed adaptively and security devices are deployed adaptively.The security capability resource pool realizes on-demand customization,dynamic deployment,
174、and elastic scaling of security capabilities,which not only provides freely accessible security capabilities to meet diverse needs,but also ensures the security of internal networks or users by invoking the security capability resource pool.The security capability resource pool helps build a barrier
175、 for common defense against security risks,achieves security capability coordination and linkage,and builds a security protection system from the inside out.Distributed trustBuilding a distributed trustworthy relationship between networks is the prerequisite for ability collaboration and cross-domai
176、n resource sched-uling,and the establishment of a distributed trustworthy relationship mainly depends on the establishment of access authentication and access control mechanisms.Blockchain technology,as a distributed ledger technology for peer-to-peer 296G Network Architecture networks,has the chara
177、cteristics of decen-tralization,unalterable,traceable,anonymity,and transparency,and has become a research hotspot for distributed trust.The blockchain network structures built-in distributed ledger technology can ensure data traceability and unalterability while realizing decentralized data managem
178、ent.Meanwhile,adopting distributed consensus algorithms ensures the rapid synchro-nization and timely update of data,achieving information sharing.In 6G distributed networks,each sub-network will serve as a separate man-agement domain with a large number of devices and independent domain communicati
179、on pro-tocols and management methods.However,there is a need for cooperation,interaction,and resource scheduling between devices in different network domains,and the requirement for information sharing and cross-domain collaboration requires the establishment of trust mechanisms between domains.A bl
180、ockchain-based distributed network design can provide trustworthy network services and elastic scaling,as well as cross-domain information sharing.Building a DPKI based on blockchain for cross-domain authentication is currently a hot research topic.Most existing authentication mechanisms are based o
181、n Public Key Infrastruc-ture(PKI),which requires the participation of a trusted third party,such as a Certificate Authority(CA).The CA provides the trust root for all PKI digital certificates,which are used to verify the identity of users,devices,and oth-er entities.In a distributed network environ-
182、ment,a CA is set up in each domain to form a relatively independent trust domain to prevent 306G Network Architecture unauthorized access to internal resources.When users need cross-domain authentication,different domain CAs need to transfer digital certificates,encrypt and decrypt signatures multip
183、le times,and frequent cross-domain access will increase network latency and cost.At the same time,the participation of trusted third parties may be threatened by single point failures,and result in expensive management costs.By using blockchain technology to chain authentication information and usin
184、g block-chain to store updated authentication parame-ters,the consistency of authentication results between domains is ensured based on the tamper-proof nature of blockchain,providing security for cross-domain authentication.Data stored on the chain is maintained by multiple domains,providing redund
185、ancy and fault tolerance,avoiding the problems of centralized authentication causing single point failures and low efficiency.At the same time,authentication servers in multiple domains can download authentication and authorization information from the blockchain,avoiding frequent cross-domain acces
186、s.Distributed trust and security capabilities,as important elements of intrinsic 6G network security,endow 6G network with security capabilities and support business activities.Data security and AI securityData securityThe 6G network will greatly maximize the satisfaction of peoples intelligent need
187、s for daily life.Intelligent services require the collection of a large amount of peoples life and physiological data.In addition,new emerging medical applications require the collection of a large amount of data related to peoples signs,which are themselves very private and sensitive.As a result,th
188、e future 6G data security and privacy protection will rise to new heights.To ensure the security and trustworthiness of data,various data should be isolated and controlled in secure and non-secure domains using different security policies.User data involving personal privacy and sensitive industry d
189、ata should be in the secure domain and the integrity and confidentiality of the data should be guaranteed before data circulation.6G data security can adopt a hierarchical classification approach to finely classify various data in order to finely manage data flow.Data with high security levels shoul
190、d use advanced security policies and security operations to achieve the effect of data availability but not visibility and exposure but not sharing.Data security is the foundation of AI security.AI data includes the original training dataset,a large amount of gradient information generated during th
191、e training and inference process,and model parameters generated after the training and inference process is completed.The preparation,training,transmission,and deployment of AI data are plagued by issues of data privacy breaches and data security attacks.As a result,data security protection technolo
192、gy is a necessary enabling technology for ensuring the reasonable use and efficient empowerment of AI data.Currently,existing AI data security protection technologies include poisoning defense and privacy computation.Privacy computation brings the possibility of securing AI data,but 316G Network Arc
193、hitecture existing mainstream privacy computation technologies face sacrifices in different aspects such as high computational and communication costs and loss of computational accuracy.For the new features and application scenarios of 6G,methods such as blockchain,differential privacy,federated lea
194、rning,and establishing trust models can be further used to improve protection of user privacy and data security.AI security6G network will have a significant improve-ment in support for AI compared to 5G,and AI will take on more critical tasks in areas such as 6G architecture,management,and security
195、.The 6G mobile communication system will both be highly intelligent and autonomous through AI,and use AI technology to achieve active immunization ability,elastic autonomy,and security capabilities for detection and analysis.Active immunization ability refers to an active defense function from insid
196、e to outside for network infrastructure,software,and network architecture based on AI tech-nology.Precise and effective detection of malicious behavior has been a persistent problem in network security,and based on 6G AI security capabilities,AI can be used to designate active security defense plans
197、,and through machine learning classification,more accurately identify malicious activities in network traffic.In addition,by using deep learning to analyze specific user behavior and operations in the network,it can effectively defend against abnormal attacks by legal nodes in the network.AI technol
198、ogy can also improve network defense by providing false information or resources to deceive attackers to further improve network defense.Elastic autonomy is an intelligent,internally resilient,and scalable framework for 6G network security.6G networks break down traditional security boundaries by in
199、tegrating ubiquitous connectivity,AI capabilities,and orchestration and management,and achieve elastic deployment and dynamic orchestration of intrinsic security capabilities through intelligent software-defined security and network function virtualization.Detection and analysis refer to the ability
200、 to enhance network situational awareness and automatically detect network failures through AI big data analysis that mines historical data and obtains information on network performance,channel conditions,and so on.By collecting data such as device,system,and application software log records,networ
201、k protocol traffic,attack threat intelligence,and so on,a unified security big data analysis platform and scenario-based security AI detection and analysis model can be established,enabling intelligent attack threat detection and security event diagnosis analysis to effectively enhance the detection
202、 and analysis capability and efficiency of network attack threats,improving the reliability and security of the network.By analyzing network attack threats from broad time and space dimensions,a widely related AI model can be constructed by combining assets,vulnerabilities,and behaviors based on a k
203、nowledge graph,providing a potential technological approach for detecting and tracing this kind of APT attack.326G Network Architecture 6G network architecture is expected to intro-duce the data plane to handle the massive data generated by various sources such as user ends,sensors,and the network i
204、tself.The data plane aims to improve data flow efficiency,user experience,and data privacy and security.It will provide efficient and secure data services to both internal and external network entities,ensuring the uniform collection,transfer,and Categories of data types Network funciton related dat
205、aNetwork Function Configuration Information:NFprofile configuration information(service slicing,service scope,bandwidth,storage,number of ports,etc.),number of UEs/sessions,network topology,slice configuration information,etc.Data stored by Network Function:Subscrip-tion data,context information(UEs
206、,sessions),policy information,authentication and autho-rization information,slice-related information,etc.provision of data for different business entities,and manage the entire lifecycle of data.The introduction of data plane is essential for 6G networks to efficiently handle and process the increa
207、sing amount of data and resolve the issues of data processing,storage,isolation,trustworthiness,interoperability,and privacy.Figure 6 shows the architecture of data plane.Network Function/Performance/Status data:Throughput,delay,user plane path,port status,available resources,traffic,air interface r
208、esource data(time-frequency domain information,scheduling information),sensing data,etc.Operation dataAlarm,configuration,performance,security,charging,QoE,MDT,events,etc.AI dataAI models,AI data,and related configuration parameters,etc.5.2 Data PlaneFigure 6-Intelligent Simplicity Empowerment Netwo
209、rk Data PlaneEmpowermentPlane Data Plane Service&CapabilityExposure LayerInfrastructure LayerData ServiceData ServiceData Collection Data Collection Data Collection/SensingDistributedStorageBlockchainYangmodelSIDControl PlaneUser PlaneOreches-tration&Manag-ementPlaneData Processing Data StorageData
210、CollectionData Security/PrivacyProtection Data authentication/AccesscontrolData CollectionNetwork Function Layer336G Network Architecture Computing power dataComputing power network-related data and configurations,etc.UE dataConfiguration information,IoT type data,AI type data(metadata,models,parame
211、ters,training sets,etc.),business usage information(such as app usage statistics,traffic statistics),sensing data,etc.Functions of data plane Data collectionData collection refers to obtaining raw data from network entities/devices and then categorizing,converting,and abstracting the raw data accord
212、ing to the corresponding data model to facilitate data storage.Data storageAs data collected from different data sources,raw data needs to be extracted,simple cleaning,preprocessing,removing duplicate raw data,and stored locally for further processing according to a uniform data model.Data processin
213、gBased on a uniform data model,the raw data undergoes processes such as denoising,feature extraction,normalization,standardization,analysis,establishing relationships between data,establishing different response models,etc.to form data assets that can directly respond to needs.The processed data is
214、then placed in appropriate places based on effective policies for quick data retrieval.AI technology can be utilized in the data processing process to speed up processing,data analysis can be performed using techniques such as models,algorithms,knowledge,and computing power,and for data storage,a di
215、stributed storage method can be adopted to avoid single-point failures.Data security/Privacy protectionThe reliability of data is the foundation for realizing data sharing and data value realiza-tion.Data security and privacy protection aim to protect the authenticity,confidentiality,completeness,tr
216、aceability,and non-disclosure of data,thereby providing users and networks with high-quality trustworthy data services on demand.Data authentication/Access controlData authentication verifies the right to access data.For example,it validates the users identity through identity authentication methods
217、 to prevent malicious users from launching various security attacks.Once the identity is verified,the user can access the data based on their access privileges to protect the confidentiality and security of the data,and avoid unauthorized operations on the data,thus realizing data services and data
218、sharing.In summary,the infrastructure layer is the data source,including sensing data,AI data,user subscription data,network operation data,etc.It provides various data for the data plane.The data plane needs to provide data to the corresponding layers and planes,and also needs to collect data from
219、the corresponding layers and planes.All data is processed through the data planes classi-fication,storage,processing,etc.,and fed back to the corresponding layer or plane to achieve the self-production,self-selling,and self-use of data within the entire physical network and digital twin network.Data
220、 is a service product and is 346G Network Architecture 6G networks are evolving and optimizing their control plane,which belongs to the network function layer,to meet higher requirements.This evolution includes moving towards full-service,integrating intelligence,computing Empow-ermentPlaneData Plan
221、eUser PlaneOreches-tration&Manag-ementPlaneFigure 7-Intelligent Simplicity Empowerment Network Control PlaneService&Capability Exposure LayerInfrastructure LayerContainerizationArchitecture Serverless Service MeshNetwork Function LayerControlPlanepower,and security features,distributed core network
222、functions to the edge for improved efficiency,and deeper cloudification for flexible resource allocation and scheduling.Full-serviceThe introduction of SBA(Service-Based Ar-chitecture)in the 5G core network fundamen-tally changes the traditional P2P communi-cation mode and enables rapid construction
223、,deployment,and release of network control functions.However,5G networks only service the control plane of the core network,and the RAN(Radio Access Network)still retains the traditional smokestack protocol stack structure and relatively rigid point-to-point interfaces,lacking flexibility for differ
224、ent scenarios and the ability to support flexible,dynamic deployment and trimming of network functions and network capability exposure.In addition,the current,rigid,closed architecture of the RAN is difficult to deeply integrate with cloud-native.Therefore,the service-based architecture can be furth
225、er extended to the RAN,and even to the UE(User Equipment).The evolution of RAN service cannot be accomplished overnight and requires targeted research based on business features and requirements.In the control plane,the design of the RAN service evolution can be divided into con-trol plane interface
226、 service and control plane net-work function service,as shown in the Figure 8.5.3 Control Planeprovided to the outside world through the service and capability exposure layer.Internally,data sharing and internal data services are achieved through data authentication/access control.IntelligenceStrate
227、gyIntegrity ProtectionSecurity Sitting AwarenessIntegrated communicationand sensingMulti-dimensionalService ManagementMobility ManagementIntelligenceAccess 356G Network Architecture Currently,the RAN and core network control plane are connected through the N2 interface between CU-CP and AMF.As shown
228、 in the fig-ure,in the future 6G system,the N2 interface can be service-oriented,by defining the service-oriented interface between RAN and the core network,allowing multiple NFs within RAN and the 6G core network to have direct interaction interfaces.By service-oriented N2 interface,the UE NAS sign
229、aling does not have to terminate at one reference point each time,reducing the signaling load on the terminal and reducing the signaling delay caused by indirect communication.In order to further realize service-based RAN-core network signaling interaction,it is possible to consider service-oriented
230、 RAN control plane,so that the RAN and core network are fully open,as shown in Figure 8(b).All RAN functions and core network network functions can directly communicate with each other,and the interaction between RAN and core network NFs can change from serial to multi-party parallel interaction.Fun
231、ctionally,RAN and core network services still need to perform the standards and operations required in their independent domains,but core network and RAN functions can provide a wider range of services,which can be directly exposed to other domains through the SBI.Cloud nativeFirstly,microservices a
232、rchitecture,which has the characteristics of independent development,deployment,and updates.Multiple microservices components are deployed and managed in a dis-tributed manner to form a physically independent but logically integrated network functional sys-tem.Second is containerization,which natura
233、l-ly fits with microservices architecture and has good portability,suitable for deploying and mi-grating network functions in cloud environments.Third is service mesh,which provides a secure and reliable communication infrastructure layer for network functions and shields the complexity of service t
234、opology brought by multiple network organization and deployment methods,allow-ing services to focus only on their own business processing logic.Lastly,stateless services,which separates context data and business processing logic,retaining only the business processing logic in network functions to en
235、sure scalability and recoverability and making it convenient to share context data between network function service instances.Figure 8-RAN Service-based Architecture(a)(b)RANRANCNCNNFNFNFNFNFNFNFNFNFNFNFNFNFNFNFNFNFNFNFNF366G Network Architecture The user plane is the only plane in the core network
236、architecture that provides user data flow processing and forwarding functions.It is the core for achieving the ultimate user experience and the window for implementing a user-centric approach.It is also an important tool for opening up imagination space for the development of the industry with simpl
237、e services at various levels of the network.The user plane meets the transmission de-mands of the integration network of 6G com-munication,sensing,computing power,in-telligence,data,and security by extending its support for multi-dimensional new business data forwarding and transmission.Under the tr
238、end of end-to-end full-service,the user plane service will activate the application mode of the network through scene-driven and com-bined with RAN service,may bring about the optimization possibility of access network and core network user plane function splitting and reordering.The user plane,with
239、 its cross-layer and cross-domain programmable capabilities,supports the rapid deployment of new protocols or functions to meet the demand for diverse business rules.For new businesses such as L5 intelligent internet of vehicles,high-precision industrial control operations,and holographic communicat
240、ion,the user plane needs to focus on characteristics such as ultra-large bandwidth,bounded latency,low jitter,high reliability,and high-precision time synchronization.To achieve high-performance forwarding and autonomous interconnections of the network,the user plane needs to enhance or introduce ne
241、w transmis-sion protocols(including protocol IP)or shift from protocol-centered to software-centered,where all functions and protocols will be mi-grated from hardware to software,not restricted by hardware,and a series of new network and application innovations may follow.Infrastructure LayerFigure
242、9-Intelligent Simplicity Empowerment Network-User PlaneService&Capability Exposure LayerNetwork Function LayerUser PlaneControlPlaneData PlaneOreches-tration&Manag-ementPlaneEmpowerment PlaneContainerizationProgrammabilityCollaborative Interconnection Microservice Orchestration Service IntelligentSe
243、nsing5.4 User PlaneFunctionService-basedForwarding Path ManagementSecure ForwardingMulti-dimensionalService ForwardingPlug&Play 376G Network Architecture Based on the traditional user plane,through the integration and innovation of key technolo-gies,the value of the user plane will be greatly enhanc
244、ed in the 6G network,bringing users better and more quality services.Some key technologies are as following.Plug and playWith the demand for user plane in hierarchical and domain-based deployment of polymor-phic applications,it requires a simpler,more automated,and intelligent plug and play ability.
245、Through intelligent connection management sensing(such as network digital twin policy input,AI-based access scene recognition,etc.),various types of access requests and admis-sion recognition,the user plane can quickly and dynamically connect to the network as needed,complete automatic configuration
246、 and perform life cycle management;At the same time,through intelligent business flow self-identification,it can immediately match the business scenario-based strategy,adjust parameters,automatically optimize,and improve services as needed.As an important network node that drives the integration of
247、industries,user plane serves and empowers industries.On the basis of traditional network capability and edge computing,it needs to quickly launch computing and media applications on the edge platform in a more lightweight and green way.The user plane provides simple and intelligent interface service
248、s for applica-tions as a plug and play edge business plat-form(such as Serverless,Function as a Ser-vice(FaaS),Backend as a Service(BaaS),etc.).Service-oriented&MicroservicesWith the deep integration of DOICT technology and the emergence of a large number of new busi-nesses,the cloud-native SBA serv
249、ice-oriented architecture has initially shown the advantages of agility,simplification,and exposure,but the user plane remains a service-oriented island.Decoupling the user plane protocol functions,service-based interfaces,external and internal services,internal introduction of computing power,perce
250、ption,intelligence,security,and other service capabilities,and intelligently implementing the best service calls based on the scenario to constitute a future network that meets customer needs and various heterogeneous integrations is an important part.R18 UPFs support for event exposure services is
251、an important start for user plane service orientation.User plane functions are reorganized into multiple user plane services through service orientation,introducing micro-service governance(ServerMesh),batch pro-cessing(Volcano),heterogeneous microservice technology stacks,providing more dynamic anc
252、hor setting,more dimensions of business processing capabilities,and providing users with a network personalization customized and optimized service running environment.The exposure of user plane service capabilities and the widespread distributed deployment requirements of the user plane,require the
253、 service-oriented framework to have the ability to coordinate between distributed networks and support distributed service addressing and service connection.Through the flexibility of the service-oriented interface,under the centralized 386G Network Architecture dispatch of the control plane functio
254、n,the user plane can realize a dynamic business chain(Service Chain),flexibly control the routing of business data between applications,and provide innovative application network aggregation pat-terns.At the same time,through the exposure of the user plane service capabilities,the migration of appli
255、cation services and the re-selection of business chain paths can be realized during the users movement process,and local service optimization control can be flexibly controlled through obtaining network load,application SLA,and user level parameters,etc.ProgrammabilityThe 6G user plane needs to cont
256、inuously add new protocols and features on top of existing supported features,including tunnels,load balancing,complex filtering,and mandatory QoS constraints.The cost of using traditional custom ASICs is relatively high,and they lack flexibility and dynamism.To make the network adapt to the ever-ch
257、anging needs of the future and improve its scalability and extensibility,the 6G user plane should introduce programmable network technology and provide customized network services based on the situational needs of users,offering a more green,fast,and flexible upgrade option for mobile networks.The p
258、rogrammable elements of the 6G user plane include data programmability,parameter programmability,and behavioral programma-bility.Progressing from data programmability to parameter programmability and then behavioral programmability,the evolution and implementation of programmable technology can be g
259、radually achieved.In terms of imple-mentation,plug-in functions or standard APIs can be used to extend the functional modules,and flexible invocation of plug-in code or extended interfaces can provide a convenient solution for adding and arranging new services.In terms of protocol stack,programmable
260、 technology can be used to reorganize the cur-rent mobile network protocol stack system.The existing user plane protocol stack is rigid and tightly coupled,lacking effective coordi-nation between the access network,the bear-er network,and the core network,leading to difficulties in meeting strict se
261、rvice quality requirements for end-to-end mobile commu-nication networks.6G user plane can consider using new technologies such as SRv6 and APN6 to replace the traditional GTP protocol stack,using the three-layer programmable space of SRv6 to flexibly define the grouping processing logic of the user
262、 plane,to support the different requirements of different services.At the same time,the user plane protocol stack based on SRv6 can achieve a Native IP end-to-end channel from the user to the data center,and realize the integration of the user plane with the data center.DeterministicNew applications
263、 such as XR,remote con-trol,smart healthcare,car networking,and autonomous driving have extremely high requirements for delay,jitter,and reliability,such as end-to-end delay from microseconds to milliseconds,jitter delay in microseconds,and reliability above 99.999%.Thus,6G needs 396G Network Archit
264、ecture to provide a network that offers differentiated,multi-dimensional,and deterministic services to ensure the technology behind intelligent ubiquitous,satellite-ground integration,and holographic communication,and the user plane needs to be able to complete end-to-end cross-layer,cross-domain de
265、terministic data transmission.The user plane detects service KPI and performance through multi-dimensional mea-surement and intelligently senses the resource usage of each base station and terminal.By using techniques such as resource reserva-tion,traffic shaping,and queue scheduling,it implements w
266、ide-area high-precision clock The development of new technologies such as immersive interaction,integrated commu-nication and sensing,and integrated satellite-terrestrial is making the network increasingly heterogeneous,dynamic,and complex.Tradi-tional manual-based operation methods are in-creasingl
267、y unable to match the vision of global coverage context-aware connection,in the 6G network.As a result,in the three-layer and five-plane 6G Intelligent Simplicity Empower-ment network architecture,the Orchestration and management plane has been given new meanings and abilities to match the manage-me
268、nt requirements of 6G full-scenario network on-demand services.Firstly,the orchestration and management plane in the new architecture is an intelligent orchestration and manage-ment plane,supporting intent-driven networks.synchronization,end-to-end deterministic delay,zero congestion loss,and ultra-
269、high reliable data delivery,thereby meeting the diverse needs of new businesses for large bandwidth,low delay,and high reliability.Meanwhile,the user plane has the ability to providedifferentiated plus deterministic services,which can balance deterministic and non-deterministic data transmission whi
270、le ensuring deterministic network transmission and meeting the best effort user requirements,to meet the differentiated network capability requirements of different industries and users.5.5 Orchestration and Management PlaneThrough intelligent sensing of user intent and business requirements,it real
271、izes cross-multiple businesses,multiple domains,and full life-cy-cle intelligent collaboration orchestration and intent strategy dynamic scheduling,realizing closed-loop guarantee of business quality in heterogeneous environments.Secondly,the orchestration and management aspect in the new architectu
272、re is an integrated communi-cation and sensingorchestration and man-agement plane,supporting the integration management of various new resources and new capabilities.Through deep sensing and intelligent management of global heteroge-neous resources,building a full-view knowledge space,and multi-dime
273、nsionally,uniformly orchestrating network resources,network functions,and network service capabilities,it 406G Network Architecture supports automatic generation of end-to-end service flows that meet business requirements,realizing on-demand configuration and full life-cycle management of network re
274、sources.Lastly,the orchestration and management plane in the new architecture is an inherited innovation orchestration and management plane,supporting the evolution of traditional network management modes towards network autonomy.intelligence endogenous has greatly expanded the boundaries of the orc
275、hestration and management plane.By building on the traditional Fault,Configuration,Accounting,Performance,and Security(FCAPS)management,the orchestration and management plane establishes intelligent anomaly detection and self-healing mechanisms in complex network scenarios,deeply integrating with di
276、gital twins,virtualizing control of the network to achieve automatic closed-loop control of the Design-Build-Operate-Optimize network,enhancing network robustness and anti-destruction capabilities.The relationship between orchestration and management plane and other planesIn the 6G Intelligent Simpl
277、icity Empowerment network architecture,the orchestration and management plane is responsible for intelli-gently managing network resources,network functions,services,and capabilities to achieve end-to-end autonomous of the network.The figure 10 is shown below.DataPlaneAirSeaSpaceGroud BusinessClosed
278、 LoopServiceClosed LoopResource Closed LoopOrchestration&Management Closed LoopManage-ment PlaneControl PlaneUser PlaneInfrastructure LayerService&Capability Exposure LayerNetwork Function LayerFigure 10-Intelligent Simplicity Empowerment Network Orchestration and Management PlaneOrchestration&Manag
279、ement PlaneResource orchestration ResourceSensingFCAPSService OrchestrationVirtual and real InteractionDistributed CollaborationComputing Power SchedulingPolicyControlLifecycle ManagementIntent-aware416G Network Architecture The network domain in the 6G Intelligent Simplicity Empowerment network arc
280、hitecture expands from the ground to the air,sea,and space,and the resource types from tradition-al spectrum,storage,and network resources to new types of resources such as data,secu-rity,computing power,and intelligence.The orchestration and management plane needs to have the ability to manage dive
281、rse hetero-geneous resources throughout their lifecycle and provide on-demand resource allocation.In the network functional service layer,the orchestration and management plane needs to have the ability to manage network functions throughout their lifecycle,such as designing on demand,quickly launch
282、ing,version man-agement,etc.to provide users with on-demand network functions through stable operations of various layers and planes.In the service and capability exposure layer,the orchestration and management plane needs to connect all layers and planes of the end-to-end network and arrange capabi
283、lities such as connection,computing power,intelligence,and security into services that can be provided internally and externally.The orchestration and management plane builds a panoramic knowledge space with a real-time and heterogeneous data plane as the center,and with the empowered plane(computin
284、g power,security,intelligence,etc.)as the foundation.Through the autonomous loop process of intelligent sensing-intelligent analysis-intelligent decision-intelligent evaluation,it realizes the management loop between different levels and the operation loop of the three levels of resource loop,servic
285、e loop,and business loop,thus providing the best user experience,maximum resource utilization,and full lifecycle operation automation and intelligence.The relationship between orchestration and management plane and digital twinsThe requirements of 6G networks ultimate performance and cross-domain ca
286、pability bring a massive increase in network scale and complexity,making manual operation and maintenance insufficient.To mitigate the high cost of network failures and expensive trial-and-error costs,a new 6G network digital twin can be created by modeling and mapping to reflect the real-world netw
287、orks operating status and environment.Network deployment and policy pre-validation can be carried out in the digital twin,and closed-loop control can be used to effectively ensure network operation and real-time optimization through a combination of 426G Network Architecture Orchestration and manage
288、ment based on space knowledge6G networks need to be flexible and efficient in order to meet the diverse requirements of integrated satellite-terrestrial,massive connectivity,and ultra-low latency communica-tion.This will be achieved by deploying network functions dynamically,allowing for quick cre-a
289、tion and activation of distributed nodes,and providing on-demand services.To accommo-date this,there will likely be a large number of distributed nodes in the network.To achieve quick deployment and collaboration among these nodes,knowledge-based orchestration and management techniques will be intro
290、duced,using data and knowledge to drive network self-learning mechanisms.In a distributed network deployment envi-ronment,orchestration and management also uses a hierarchical,domain-based deployment method.The orchestration and management plane in distributed network architecture is shown in figure
291、 12.Physical NetworkDigital Twin NetworkFigure 11-Orchestration and Management Plane and Digital TwinsPolicyVerification NetworkTuning Control RealityWith Policy Orchestration&Management PlaneThe orchestration and management layer mainly operates on the physical network,unifying the resources and fu
292、nctions required for orchestration based on user business needs and network operation requirements,and determining the necessary network and computing capabilities.The network digital twin is a digital mirror of the physical network partially or entirely constructed based on four key elements:modeli
293、ng,data,analysis/prediction,and interaction.By using the digital twin,the current network state can be replicated,new services can be deployed in the twin,and performance and impact on other existing services can be simulated and analyzed using analytical models.The orchestration and management laye
294、r can process the analysis/prediction output of the network twin through interaction with the twins interface and dynamically adapt to changes in the environment through closed-loop orchestration,optimizing the final user experience and improving the agility,security,and elasticity of the 6G network
295、 as a whole.virtual and real.As the figure 11 shown in be-low,the new architectures orchestration and management layer will support deep integration of digital twin technology to optimize the phys-ical network continuously through virtual control of the real network.436G Network Architecture Figure
296、12-Orchestration and Management Plane in Distributed Network Distributed nodes are edge network nodes with complete system functions,supporting user ac-cess,data forwarding,security protection,and other functions.They achieve node autonomy through orchestration and management based on the knowledge
297、generated from data.The orchestration and management integrates domain-specific historical knowledge into existing models or deep learning algorithms to form resource scheduling technologies based on knowledge definition.The knowledge base of a node is continually optimized through dynamic data coll
298、ection and monitoring analysis,resulting in self-organization,self-management,and self-optimization of the node.Centralized nodes perceive global network control knowledge through the transfer of knowledge from distributed nodes,unifying modeling and representation of the entire network control obje
299、ct through the whole scenario.By using the knowledge base and data trust sharing mechanism,multiple network control domains such as abnormal detection,network capacity prediction,and network resource management are interconnected,allowing for the sharing of network control data features,sharing of m
300、odels,and interoperation of policies.The network is autonomously governed through the four steps of state alerting,abnormal detection,root cause analysis,and self-healing.Centralized NodeNFNFOrchestration&Management PlaneKnowledge RepositoryDistributed NodeNFNFOrchestration&Management PlaneKnowledge
301、 RepositoryDistributed NodeNFNFOrchestration&Management PlaneKnowledge RepositoryDistributed NodeNFNFOrchestration&Management PlaneKnowledge Repository446G Network Architecture ConclusionThis white paper presents a three-layer and five-plane Intelligent Simplicity Empowerment 6G architecture based o
302、n the vision of global coverage context-aware connection.The 6G network is built on a ubiquitous infrastructure,combining intelligence,computing,security,and other endogenous capabilities to provide data,control,forwarding,and orchestration and management functions to both internal and external netw
303、orks,empowering all industries.Currently,the development of 6G mobile communication network architecture and key technologies is forming a consensus in the industry and such as distributed,autonomous,digital twin,integrated satellite-terrestrial,intelligence endogenous,security endogenous,and integr
304、ated computing and network.Key technologies such as cloud-native,programmability,blockchain,and deterministic will be combined to construct the 6G network architecture.In the future,CICT Mobile will further study the network architecture and key technologies that have reached a consensus in the indu
305、stry based on its three-layer and five-plane Intelligent Simplicity Empowerment architecture,actively promoting the innovation and development of the 6G network architecture,and advancing towards its corporate mission of committed to providing ubiquitous mobile communication capabilities for the benefit of humanity.CICT MobileCICTWebsite:http:/