You are on page 1of 47

6G Network Architecture

WHITE PAPER

Copyright © CICT MOBILE CO., LTD. All Rights Reserved. No

part of this white paper may be reproduced or transmitted in

any form or by any means without prior written consent of

CICT Mobile Co., LTD.


CONTENTS
目 录

Chapter 1:New Requirements of 6G Network Development 02

Chapter 2:New Concepts of 6G Network Architecture Design 05

Chapter 3:New Architecture of 'Three-Layer and Five-Plane' 08

Intelligent Simplicity Empowerment 6G Network

Chapter 4:New Three Layers of Intelligent Simplicity 14

Empowerment 6G Network

4.1Infrastructure Layer 15
4.2 Network Function Layer 16
4.3 Service and Capability Exposure Layer 17

Chapter 5:New Five Planes of Intelligent Simplicity Empower- 19

ment 6G Network

5.1Empowerment Plane 20

5.2 Data Plane 32

5.3 Control Plane 34

5.4 User Plane 36

5.5 Orchestration and Management Plane 39

Conclusion 44
New Requirements of 6G
Network Development
03
6G Network Architecture

As society gradually enters the digital age, the digital world deeply interacts and integrates with the
physical world, and 6G network becomes the backbone of the future network. The design of the 6G
network architecture should not only consider compatibility and inheritance with existing networks,
but also consider diverse business scenarios in 6G, complex communication needs of emerging
vertical industry users, and the coordinated/adaptive ability of the network and applications. The
development of various new technologies drives the development of 6G networks towards global
coverage,everything connected , trusted security, and low-carbon green direction.

Diversified Business Scenarios reality, user demands continue to evolve, and


As communication networks have evolved human-machine interactions are becoming
from basic voice services to three typical 5G increasingly close. Networks require higher bit
scenarios, the diversity of business scenarios has rates, lower latency jitter, and higher reliability.
developed towards the direction of integrated 6G networks aim to achieve seamless coverage
communication and sensing and intelligence of air, land, sea, and space, moving towards a
everywhere. Facing a rich array of business world of ubiquitous intelligent connections.
forms and intelligent access device applications,
future network architecture needs to be Innovative Technology Integration
designed, optimized, and reconstructed to The integration of DOICT (Data, Operational,
provide better service experience. With the Information, Communication Technology) drives
development of future businesses such as the transformation and upgrade of the mobile
autonomous driving, smart homes, and virtual communication network, creating a Intelligent
04
6G Network Architecture

Simplicity Empowerment 6G, forming a intelli- form of future enterprises. The high throughput,
gence endogenous network. In the future era of low latency, ultra-precise positioning, security-in-
big data, the powerful computing capabilities herent, and multi-network convergence features
of the 6G network will require higher security of 6G networks provide more possibilities for
and privacy technologies, and the design of the development of future business models and
the 6G network architecture will consider both vertical industries.
intelligent services and trustworthy security
mechanisms to promote the development in Sustainable Social Responsibility
relevant fields. The introduction of the "carbon peaking and
carbon neutrality" strategy accelerates the
High Demand Business Model transformation of the communication industry
Technology development and social develop- towards energy efficiency and greenness.
ment are closely related. Immersive experience Currently, the high energy consumption and
reality, holographic communication, digital twin, unsustainable nature of networks cannot meet
smart transportation and other business needs the requirements of the country and industry
are emerging constantly, and accelerating digital for green and energy-efficient networks,
transformation has become a new trend for intelligent operation, flexible configuration,
China's economic growth. For individual users, shared capabilities, and secure-by-design.
the popularization of new products such as smart Major non-preventable events such as extreme
wearable devices and smart home appliances weather and pandemics, the needs for low-
provides personalized needs and improves the carbon economic and social development, and
quality of life and service experience. In vertical the needs for a better life for human society
industries, more human-machine interconnection drive the establishment of a more stable and
and everything-connected business models are low-carbon smart network and promote the
now prevalent, and data application services bring 6G network towards a green, low-carbon, and
new development opportunities to many indus- intensive communication direction.
tries, making data-driven industries the main
2
New Concepts of 6G Network
Architecture Design
06
6G Network Architecture

Due to the diversity of business scenarios, the integration of DOICT technology, high-demand
business models, and sustained social responsibility, 6G networks face new challenges. Therefore,
CICT MOBILE CO., LTD(CICT Mobile)adheres to the design concepts of Intelligent Simplicity,
Programmability, Endogenous, Distributed, Service-based, and Digital Twin, when designing the
6G network architecture.

Intelligent Simplicity Programmability

As the network access scale continues to in- As the diversity of 6G network architecture
crease and network demands become more and customization of application scenarios
diverse, reducing the complexity of the 6G increases, programmable technology, as one
network architecture can achieve the goal of of the key technologies for 6G network, has
lightweighting the architecture, improving received widespread attention in the industry.
network operational efficiency, and reducing 6G programmable network can eliminate
network operation and maintenance costs. network differentiation, enabling network
Additionally, the 6G Intelligent Simplicity on-demand arrangement, flexible resource
Empowerment network will continuously deployment, dynamic routing planning, and
improve its level of intelligence based on big rapid identification and repair of network
data and artificial intelligence technologies, failures, meeting the diverse needs of business.
eventually forming an intelligent end-to-end At the same time, intelligent inherence
system, mainly consisting of intelligent ter- and programmability can deeply integrate,
minals, intelligent edge networks, intelligent providing support for the arrangement and
core networks, and intelligent business appli- implementation of 6G network.
cations.
07
6G Network Architecture

Endogenous Distributed

Due to the lack of deep integration between To meet the diverse business requirements
existing AI and mobile communication of various scenarios, 6G networks will
networks, independent management of break the constraints of centralization
computational networks and mobile com- and construct decentralized autonomous
munication networks, and the lack of dy- networks, providing user-centric control and
namic and flexible network protection meth- management, meeting the heterogeneous
ods, the 6G network system architecture access scenarios and network performance
needs to integrate the ability of intelligent requirements of the sky, land, air and sea,
endogenous, computational endogenous, and etc. With the continuous growth of network
security endogenous to achieve the network scale, 6G networks will be deployed in a
everywhere, computing power everywhere, combined centralized and decentralized
and intelligence everywhere. manner, achieving the goal of complementary
network resources and on-demand network
composition.

Service-Based Digital Twin

5G has achieved the modularization of net- With the continuous development of artificial
work functions and separation of control and intelligence and the increasing permeation
user functions. However, the virtualization of sensing and information, 6G networks
of the 5G user and wireless underlying archi- will integrate digital twin technology to form
tecture is not high and the network's overall a virtualized digital twin world based on
adaptability is limited, restricting the ability to the physical world, enabling mapping and
deploy networks flexibly. By increasing access interaction between the virtual and physical
network service and core network user-side world. The digital twin world can accurately
service, software and hardware resources can reflect and predict the state of each intelligent
be fully decoupled and flexibly allocated, con- entity in the physical world, improving the
tributing to increased network flexibility and efficiency of network operation and resource
maximizing the network's adaptability. utilization.
08
6G Network Architecture

New Architecture of 'Three-Layer


and Five-Plane' Intelligent Simplicity
Empowerment 6G Network
09
6G Network Architecture

Based on the design concepts of Intelligent Simplicity, Programmability, Endogenous, Distributed,


Service-based and Digital Twin, this white paper proposes a three-layer and five-plane 6G Intelligent
Simplicity Empowerment network architecture, which generally presents a three-layer and five-plane
architecture with Intelligent Simplicity Empowerment network feature, as shown in Figure 1 below.

Service & Capability


Exposure Layer
Connection service Sensing & Location service AI capability Network capability

Data service Computing power service AI service Computing power capability Security capability

Data Plane
Orchestration &
·Intelligent data analysis ·Data access & sharing
Management Plane
·Privacy protection ·Data acquisition & processing
· Virtual and real interaction · Multi-resource sensing ·Distributed trusted storage
· Network orchestration · Service orchestration
AI Security
· FCAPS

Network Function Empowerment


Plane
Layer
Computing ...
power Control Plane
User Plane · Integrated communication & sensing
· Intelligent access · Mobility management
·Programmability
· Intelligent policy · Session management
·Route & forward management
·Plug & play

Infrastructure
Layer
User devices(MTC, V2X, UAV, D2D) Access devices Network devices Computing devices

Figure 1- Three-layer and Five-plane 6G Intelligent Simplicity


Empowerment Network Architecture

Firstly, it is divided into three layers from the bot- network devices and computing power devices,
tom up, including infrastructure layer, network and multi-dimensional resources such as
function layer and service and capability expo- programmable compute, storage, network, data
sure layer. and AI.

Infrastructure layer Network function layer


Provide the corresponding infrastructure and The ubiquitous infrastructure provided by
network resources for function generation the infrastructure layer interconnects the
in the network function layer, covering infra- dynamically distributed resources, and provides
structure such as ubiquitous access devices, network functions such as communication,
10
6G Network Architecture

sensing, computing power, intelligence, data endogenous capabilities, and whose functional
and security for the services or capabilities modules can be located in other functional
required by the service and capability exposure planes in the implementation. The 6G network
layer in the upper layer through the unified and architecture is designed from the beginning to
collaborative scheduling of multi-dimensional provide comprehensive support for endogenous
resources, and supports the atomized functions capabilities such as intelligence, computing
required by users in different network systems power, and security, so the empowerment plane
for splitting, combining or extending. is used as the basic functional base of the 6G
network to build an on-demand, flexible and
Service and capability exposure layer efficient endogenous capability resource pool.
Extract, encapsulate and combine the network Based on the empowerment plane, the 6G net-
functions of the lower layer to provide work can optimize network performance and
capabilities or services for internal network achieve network autonomy by using endoge-
services or external applications on demand, nous capabilities internally without external
covering connectivity and various capabilities intervention, and give more support to new
or services such as data, computing power, services for applications in various indus-
intelligence and orchestration management to tries externally to improve user experience.
support the operator's network with more value
and bring better service experience to users in Data plane
diverse business scenarios. Responsible for data management functions
Secondly, it is divided into five functional such as collection, processing, analysis and
planes, including empowerment plane, data service of all data in the whole network. Driven
plane, control plane, user plane and orchestration by the demand of Connect Everything and
and management plane, which are responsible Digital Twin, it improves the performance of
for five major types of network functions, such data services, reduces the bandwidth overhead
as intelligence/compute/security and other of data transmission, unifies and collaborates
endogenous functions, data management, in the management of data across the network,
network control, routing and forwarding, and supports 6G to provide secure and shared trusted
orchestration and management. Among them, data services across the network, and creates
the empowerment plane and data plane are more value through intelligent processing and
the new functional plane of 6G relative to 5G. analysis of data. At the same time, the data
plane can achieve reliable migration of network
Empowerment plane states through functional and data decoupling,
A logical plane that logically describes the improve mobility management performance,
network functions such as intelligence, and enable frequent switching scenarios such as
compute, and security that give the network its integrated satellite-terrestrial.
11
6G Network Architecture

The control plane, user plane and orches- sources, assist the deep integration of endoge-
tration and management plane are the en- nous capabilities such as intelligence/security/
hanced functional planes of 6G compared to computing power with the new architecture.
5G. The enhanced 6G control plane, user plane Based on the endogenous capabilities given by
and orchestration and management plane cov- the empowerment plane, realize the dynamic
er the control, forwarding and orchestration division and convergence reconfiguration of
management functions related to the traditional the access network and core network, as well as
connectivity capability and the new intelligent/ the intelligent, efficient and safe collaborative
computing/security capabilities on the one management and control of multi-dimensional
hand. On the other hand, the enhanced planes services such as communication, sensing,
use the empowerment plane as the basic computing power, intelligence, data, security, etc.
functional base to enable the network to have
endogenous capabilities related to intelligence, User plane
computing power and security, etc. The Evolve to full-service, supports comprehensive
multiple capabilities complement each other to high performance forwarding for multi-
effectively improve the overall performance of dimensional services such as communication,
the 6G network. sensing, computing power, intelligence, data
and security, supports rapid deployment and
Control plane technological innovation of new protocols or
Evolve to full-service, support the unified features through programmable technology,
and simple access of integrated satellite- and supports a hierarchical experience of
terrestrial and the integrated and accurate deterministic forwarding for users across
control of cross-layer and cross-domain re- industries.
12
6G Network Architecture

Orchestration and management plane achieve the on-demand selection and balanced
Covering connection service related resource application of network capacity, to support
management and service scheduling, as the on-demand scheduling and management
well as multi-dimensional resource sensing, of integrated satellite-terrestrial, to maximize
management and integrated scheduling of resource utilization. At the same time, the
sensing, computing power, intelligence, data orchestration and management plane supports
and security, through the joint optimization of the deep integration of digital twin networks
resources and flexible scheduling, to complete to control the real with the virtual to achieve
the closed-loop intelligent control of sensing, continuous optimization of the physical network
analysis, decision-making and evaluation, to state seeking and simulation verification.

Based on the three-layer and five-plane architecture, the 6G network will have the
network characteristics of intelligent simplicity and empowerment.

Intelligent Simplicity the complexity of operation and maintenance.


With the rapid expansion of network scale and Considering the ubiquitous connectivity of the
dynamic changes in service requirements, the whole scenario, the dynamic change of the
network may become increasingly complex. service demand and the flexible expansion
To avoid network complexity overlap, 6G of the network, the 6G network needs to have
networks need to be designed with intelligence the plug-and-play function under the unified
endogenous, efficient and simple lightweight architecture. The intelligent simplicity of 6G
network architecture, minimizing the number network may be reflected in the following
of network layers and interfaces and reducing aspects.
13
6G Network Architecture

· Architecture intelligent simplicity unifies radio interface transmission protocols


Supports end-to-end full-service, flexible split- and networking protocols to improve end-to-
ting and reorganization of network functions for end network performance.
scenario requirements, supports unified sched- · Process intelligent simplicity
uling of multi-dimensional resources, realizes Systematic design, modular synthesis and dis-
user-centric scheduling and control, and estab- tributed efficient collaboration of the whole pro-
lishes an elastic and reconfigurable network ar- cess such as control process and data interaction
chitecture. process.

· Function intelligent simplicity · Terminal intelligent simplicity


Supports flexible on-demand orchestration of Supports the convergence of multiple radio
atomized functions and optimal reconfiguration interface technologies such as integrated satel-
of network functions. lite-terrestrial to realize the extremely simple

· Protocol intelligent simplicity and intelligent network access with no differ-


The whole domain adopts a unified protocol to ence in terminals.
support cross-domain interaction in integrat- · Infrastructure intelligent simplicity
ed satellite-terrestrial scenario, supports the Ubiquitous resource pools that provide pro-
differentiated needs of each industry through grammable and dynamic hardware or software
scenario-oriented protocol programming, and resources for the network.

· Internal empowerment
Empowerment By atomizing the native network functions and
In the 6G era, the network is no orchestrating intelligence, computing power,
longer a communication network that security and other functions on demand, the
simply provides connectivity services, network is endowed with endogenous capabili-
but a converged network that integrates ties such as intelligence, computing power and
connectivity, intelligence, computing security on all layers and planes.
power, security, and data, etc. It needs · External empowerment
to support the integrated orchestration By designing a native open mechanism, we
and control of multiple capabilities and provide industry users and third parties with
services to internally realize multiple trusted on-demand network capabilities and
capabilities endogenously and provide services, empowering users and third parties
multiple services externally. with thousands of needs such as intelligence,
computing power and security.
14
6G Network Architecture

4
New Three Layers of Intel-
ligent Simplicity Empower-
ment 6G Network
15
6G Network Architecture

The 6G-oriented mobile communication


network should be an information and
communication network with ubiquitous
resources, endogenous capabilities, exposure
services, and full connectivity and wide
area collaboration. As a complex system, 6G
network architecture design should consider
a clear structured logical view. The logical
level of 6G network architecture includes
infrastructure layer, network function layer,
and service and capability exposure layer
from the bottom up, based on the logical view
level, pulling through the physical resources,
network functions and capability services of
6G network.

The design of layer highlights the enrichment and enhancement of 6G network architecture in terms
of layered elements and capabilities. The infrastructure layer covers infrastructure such as computing
power, network and cloud, and enriches the computing power resource element on the basis of
network resources, which will provide a base for the convergence of network, computing power,
storage and other basic resources for 6G network. The network function layer continues the service
design concept, supporting the organic integration and flexible construction of different network
functions. The service and capability exposure layer opens powerful information and communication
capabilities to industry applications, and provides services for industry applications through unified
encapsulation and orchestration of capabilities and services. At the same time, the layer design also
reflects the concept of cross-domain pull-through, multi-domain collaboration and convergence
development. Through the collaboration and interaction between layer and layer, layer and plane, it
ensures the self-wisdom and closure of business processes, mutual support and sharing of business
capabilities, and promotes the convergence development of 6G network architecture.

4.1 Infrastructure Layer

The infrastructure layer is located at the bottom and other resources for the upper layer network
of the entire network and is the operational functions and managed by the corresponding
foundation of the entire network, providing upper layer network functions.
wireless, computing power, storage, network The infrastructure layer consists of virtual
16
6G Network Architecture

resources and hardware resources, includ- stratospheric platforms, terrestrial networks


ing unified virtualized virtual resources, and maritime ship communications to build
abstractable physical resources and dedicated an integrated network of integrated satellite-
high-performance hardware resources. Except terrestrial, realizing full coverage of space, air,
for devices or systems that must use dedicated ground, sea and other natural spaces, and truly
hardware, the infrastructure layer should adopt a realizing global ubiquitous connectivity.
large number of standardized hardware devices With the emergence of many new applications
that support virtualization deployment, unify in 6G such as immersive XR and autonomous
the infrastructure resource platform, and realize driving, the type of computing power resources
resource control and unified management will introduce diverse heterogeneous computing
for non-virtualized deployed devices in com- power such as GPU, ASIC, FPGA, etc. in addition
bination with abstraction layer technology. to the traditional general CPU.
6G is a three-dimensional network with global 6G is an integrated communication and sensing
coverage. In addition to the infrastructure network, based on the existing communication
resources of the existing terrestrial mobile capability, the infrastructure layer will provide
communication network, the infrastructure sensing data information collection capability
layer will further cover the infrastructure for the upper layer network function and
resources of air, space and sea, integrating provide big data support for AI applications.
high/medium/low orbit satellite systems,

4.2 Network Function Layer

The network function layer is the core layer to resources provided by the infrastructure layer,
crack the needs of high performance, flexible providing on-demand intelligent simplicity and
network, intelligence/computing power/security reliable functions and services to the service
endogenous, low cost, green and low carbon, and capability exposure layer, transforming the
etc. This layer is in the key position to carry on, traditional application-adapted network into an
cross the inflection point and win the future, application-defined network, taking the user as
and is an indispensable layer to realize the 6G the center to meet the fragmented, diversified
network architecture and integrate various key and complex network needs of different
technologies. industry applications.
The network function layer is embodied The network function layer is the logical
by multiple network functions of different carrier that enables all planes to collaborate with
planes in a full-service manner, based on the each other and work organically, and it is urgent
flexible combination and scheduling of various to comprehensively upgrade and optimize and
17
6G Network Architecture

deeply integrate DOICT technologies to promote and absorbed to become the evolutionary
the innovative development of traditional gene of the network, and evolve to a higher
control plane, user plane, and management stage, so that network functional services can
plane with interdisciplinar y and cross- support the explosive growth of new industries
disciplinary innovations. To reuse all kinds of and applications by means of an intelligent
data in the network as a special intangible asset simplicity platform, promote the digitalization,
and production factor by converging them in networking and intelligent transformation and
the data plane to increase usability, shareability, upgrading of the economy and society, and drive
statistic, exposure, etc. At the same time, productivity development and promote the
through the empowerment plane, advanced change of production relations.
technologies are continuously introduced

4.3 Service and Capability Exposure Layer

The development of the network cannot be demands of 6G networks, 6G networks need


separated from the driving force, and similarly to consider not only the demand for exposure
the exposure of the network capability. The network capabilities, but also the scalability of
exposure of network capability has been tried exposure network capabilities to meet more de-
to be introduced from 4G, for example, after mands in the future when designing the archi-
the introduction of SCEF, a network function tecture. In other words, the 6G network needs
dedicated to capability exposure. For 5G, the de- to consider network and application/scenario
mand for capability exposure has been started collaboration/adaptation capability, and a wider
from the beginning of architecture design, and range of capability customization packages
the NEF, a capability exposure network func- to match the application/scenario, in order to
tion, has been identified, so that the network provide diverse and new service capabilities
has the scalability of network capability. Now and exposure rich network capabilities to users.
5G has a variety of exposure capabilities, such To sum up, the 6G network needs to introduce
as monitoring capabilities, configuration ca- the service and capability exposure layer to
pabilities, positioning capabilities and other provide a variety of exposure network capabil-
capabilities, but with the emergence of new ities and make the network have the scalability
services in new scenarios of 6G, the current of exposure network capabilities to empower
network exposure capabilities cannot meet the thousands of 6G industries by supporting a
new needs, such as intelligent applications, higher level, deeper degree and wider range of
sensing and positioning needs. In order to meet exposure network capabilities.
the business needs of new scenarios and new
18
6G Network Architecture

The services provided by the service and ca- security contains active immunity capability,
pability exposure layer include the computing elastic autonomy capability and ubiquitous
power services, data services, connectivi- collaboration capability.
ty services, intelligence services, sensing & Network capability exposure refers to the
location services, and other services. The exposure of management capabilities, manage-
service and capability exposure layer includes ment information, management data, etc., so
computing power capability, AI capability, that third parties can participate in network op-
security capability, network capability and other eration, maintenance and management.
capabilities. The service and capability exposure layer
For computing power capability exposure, it interoperates with the application layer in
is a key technical means to achieve on-demand the north and connects with capabilities and
computing power call and real-time sharing. services in the south, supports the exposure
The 6G network needs to have the following of network capabilities securely, and provides
computing power enabling technologies to callable, friendly, and rich API interfaces for
realize the exposure and sharing of computing atomic capabilities. When a request is received
power capabilities: computing power modeling from third-party application, the atomic
capability, computing power capability capability API is used as the basis for real-
warehouse, computing and network resource time online encapsulation, orchestration and
orchestration and capability call, etc. combination of atomic capabilities to provide
For AI capability, it will be used as a basic users with on-demand network capabilities
capability to empower production and society. according to their business requirements,
Al capability exposure include desensitization improving the user experience. At the same
and exposure of data, exposure of model joint time, some general service capabilities can be
training capabilities, exposure of model infer- provided to the public according to a unified
ence capabilities, and other open capabilities. framework and process, which simplifies
Along with the development of AI, blockchain, network implementation. The service and
federal learning and other technologies, it capability exposure layer interacts with other
becomes possible to use security capabilities layers/planes to collect and encapsulate the
as an inside-out protection mechanism in exposure capabilities of other layers or planes to
6G network architecture. The changes in 6G provide network capabilities on demand.
network architecture will prompt inside- In addition, the exposure of network capabili-
out changes in the functions of 6G security. ties facilitates the rapid integration of third-par-
Security capabilities is helpful for third-party ty services, enhancing the competitiveness of
application providers to better build business mobile operators to participate and expand new
security capabilities and achieve application services and increase revenue.
security functions. The exposure capability of
19
6G Network Architecture

5
New Five Planes of Intelligent
Simplicity Empowerment 6G
Network
20
6G Network Architecture

The features of 6G network system architecture, such as service and capability exposure, on-demand
network service provision, ultimate network performance experience, plug and play, distributed
collaboration, integrated of computing and networking, and smart home development, have
resulted in many core elements and service capabilities in the network requiring on-demand, elastic
deployment and separate consideration, such as computing power, intelligence, security, data, and
orchestration management.

Based on enhancing the control plane and user plane in traditional network architecture, further
adding the empowerment plane, data plane, and orchestration and management plane has realized
endogenous computing power, intelligence, security, data, and orchestration and management that
is flexible and reconfigurable on demand, constructing a 6G network that is integrated satellite-
terrestrial , global coverage and everything connected. The empowerment plane, user plane, control
plane,data plane, and orchestration and management plane will be described in detail below.

5.1 Empowerment Plane

New diverse application scenarios, intelligent also have AI capabilities, network capabilities,
application requirements, and future network computing power capabilities, and security
decentralization require 6G networks to have capabilities. Therefore, the network requires a
more flexible and scalable mechanisms to meet logic plane (i.e. empowerment plane) that can
the high-performance communication and be extremely flexible and expandable in terms
flexible rapid response requirements of different of capabilities, which can provide the necessary
application scenarios. In addition to providing intrinsic capabilities for other layers and planes
connection services, 6G networks also need to of the network and have the ability to expand
provide sensing and location services, AI services, functions and build network services flexibly
data services, computing power services, and according to the development of the network and
other services. At the same time, they must business needs.
21
6G Network Architecture

AI Security

Computing power ...

Figure 2-Empowerment Plane

As shown in the figure 2,the capabilities cur- services in all scenarios. Relying on existing
rently possessed by the empowerment plane AI to solve problems in a chimney-style often
in the 6G network architecture are intelligence, results in conflicts between different AI use
computing power, and security. With the emer- cases, and the configuration-based approach
gence of new business scenarios and vertical cannot accommodate the different needs of the
industries, the capabilities of the empowerment network and services in all scenarios.
plane will also continue to expand. For the empowered social industry, the mo-
bile communication network as a social infor-
Intelligence Endogenous mation infrastructure needs to have the ability
The mobile communication network has always to provide intelligent services to the entire
emphasized network intelligence, starting society and all industries. Facing the unknown
from the Self-Organized Network (SON) project new industries and new needs of the future, it
of the 3G/4G era, and the introduction of the is unrealistic for human beings to discover and
NWDAF element in 5G has continued to deepen summarize future needs, and it is necessary
the integration of the mobile communication to use their own, the entire industry, and the
network and AI. However, there are still many massive data of the network to analyze new
gaps in the intelligence of the current mobile trends and changes.
communication network. The existing network Therefore, 6G needs to introduce endogenous
architecture lacks the effective management of AI, provide inter-industry federation intel-
the three elements of AI, the way to discover and ligence, and achieve cross-domain wisdom
solve problems through human intervention, integration and sharing, abandoning the AI
and is limited by human cognition, unable application mode of "patching", "plug-in", and
to complete the self-governance of the entire "overlapping". 6G network intelligence in terms
network, and the configuration method cannot of network functions, architecture, protocols,
adapt to the different needs of the network and processes, etc., will deeply integrate the factors
22
6G Network Architecture

of AI calculation power, data, algorithms, etc. computing power services for external industry
into the design, realizing the network-level AI applications to meet diverse application needs.
data, algorithms, computing power, etc. can be The incremental and patch-style capability
arranged and transferred as needed, making AI enhancement cannot meet the diverse business
training/inference more real-time and efficient; needs under large-scale networking for the
the intelligent recognition and intelligent multi-domain integrated, connected 6G
application of AI scenarios will be based on network. It is necessary to embed computing
network data and knowledge. capabilities in the 6G network architecture and
penetrate them through a unified empowered
Computing Power Endogenous surface to other layers and planes, and provide
The appearance of new users, technologies, computing services through the construction of
applications, and scenarios has led to an computing capabilities.
exponential increase in data volume, and
various industries have more pressing needs for Security Endogenous
computing power and networks. The country The introduction of new application scenarios
has launched the "East Data West Calculation" and key technologies in 6G has brought about
project. The current network architecture new security issues. In terms of personal pri-
separates the computing power network and vacy security, due to the exposure of 6G net-
the mobile communication network, which work capabilities, user privacy information has
increases the cost of network construction and transferred from closed personal platforms to
operation maintenance and causes problems open public platforms, and its contact status has
such as inter-network signaling interaction and gone from offline to online, making it possible to
security. At the same time, the expansion of obtain user data in real-time, greatly increasing
computing power also leads to issues such as the risk of personal privacy leaks.
low utilization and timeliness of resources. In the current 5G network and before, the in-
Therefore, 6G networks will deeply integrate dustry has adopted patching and plug-in securi-
with the computing power network, and in ty services to address these issues. However, the
the architecture design, 6G networks will drawbacks of passive protection measures are
consider not only the exposure of computing that they are not timely in response, protection
power services, but also the transformation methods lag behind and cannot avoid security
from external computing power to internal damage in time, and they lack adaptability and
computing power. The architecture will embed flexibility as the network evolves.
computing capabilities, making the mobile The vision of 6G is full coverage and intelligent
communication network itself efficient in connection of all things, with its billion-level
using computing power resources and building terminal devices, making network attacks more
enhanced network architecture, and providing and more common, and attack methods more
23
6G Network Architecture

diverse and complex. The limited security


capabilities of terminal devices also exacerbate
security risks. At the same time, the vision of
6G "global coverage" requires a distributed
network architecture and interconnection
between heterogeneous networks, requiring the
establishment of trust relationships between
different networks. In addition, the requirement combination of capabilities such as computing
for AI-embedded in 6G greatly strengthens power, intelligence, and security, extracting,
the role of AI, enhancing its importance in 6G, encapsulating, and combining computing
however, the introduction of AI also brings about power, intelligence, and security capabil-
security issues such as data security, AI model ities as needed to provide capabilities and
security, AI algorithm security, vulnerabilities services to other layers and planes. Network
in AI software systems and frameworks, and technology features can also be encapsulated
malicious use of AI technology. into service capabilities that are compatible
Therefore, the security capabilities of 6G with applications, and the ability to empower
networks should be integrated into the network externally can be achieved through the design
architecture, with a focus on security-driven of native exposure mechanisms. By taking the
security empowerment, based on distributed empowerment plane as the basis, and through
trust, breaking traditional security boundaries, the internal atomization of native network
deploying data security and privacy protection functions, computing power, intelligence,
technologies. This will provide intrinsic security security capabilities and services are given to
awareness, defense, and prevention functions other layers and planes, bringing more value-
for the various functions and resources of the 6G added services while providing better business
network system, allowing security capabilities to experience for users. At the same time, it also
be customized and accessed as needed, ensuring cooperates with other layers and planes to
network and user security internally, and flexibly provide capabilities and services as
realizing the exposure of security capabilities needed, optimizing network operation.
externally. Ultimately, the 6G network system
architecture forms a secure system that is 5.1.1 Intelligence
automatically immune, has trust consensus, 6G network will rely on the "Intelligent Sens-
is cooperatively flexible, and intelligent and ing-Intelligent Analysis - Intelligent Decision-In-
efficient. The entire network effectively operates telligent Execution" intelligent processing loop,
with high reliability and security for parallel as shown in Figure 3, to achieve autonomous
multi-application operations. and intelligent operation of network services,
In summary, the empowerment plane is a business, and functions.
24
6G Network Architecture

Intelligent Sensing Sensing of the environ-


Intelligent
Sensing ment, network resources and status, user needs/
intentions, and business quality. It can also be
input through an interface.
Intelligent Intelligent Intelligent Analysis Analysis of the sensing data
Execution Analysis
and validation in the digital twin network.
Intelligent Decision Decision-making based
on the analysis results, including iterative
Intelligent
Decision optimization and execution deployment.
Intelligent Execution Automatically configures

Figure 3-Intelligent Processing execution according to the decision-making


Closed Loop strategy.

The 6G network's intelligence endogenous processing logic closed-loop process includes network
elements, function layer internal and external, relying on closed-loop analysis to achieve autonomous
network, empowering network applications to be intelligently accessible, as shown in Figure 4.

Plane Plane Service &Capability Exposure Layer Orchestration &


Mode1 Optimization Management
Data Collection Services Plane
Intelligence
Mode1 Optimization capability AI Service
Data Storage Intelligence Ability
Services Orchestration &
Management
Data Processing Data User
Global Data Fabric
Plane Plane AI Function
Data Inference Orchestration &
Intelligent Management
Intelligent Intelligent
Data
Network Function Layer Services
Orchestration
&
AI Resouce
AI Sensing AI Inference AI Training AI Resource
Management Orchestration &
Function Function Function
Management

Intelligent Business

AI Case AI Task AI Lifecycle


Central Generation Collaboration Management
Superbrain
AutoML MLOps AI QoS
Guarantee

Empowerment Plane (Intelligence)

Infrastructure Layer

Figure 4-Empowerment Plane –Intelligence


25
6G Network Architecture

Intelligence capability, as a key capability of around the closed-loop processing logic shown,
6G empowerment, will be implemented in the achieving system-level intelligence endogenous
intelligent endogenous process at all levels of the processing.
network. At the element level, network functions 6G network realizes intelligent endogenous
are designed with the closed-loop processing processing at the element level, functional
logic shown for the element functions. Within layer internal and functional layer interlayer by
an element, some or all of the closed-loop logic designing functions and architecture natively
functions can be deployed on demand to achieve based on intelligent processing closed-loop and
intelligent endogenous processing at the element data intelligence, management intelligence
level. Within the functional layer, the functional by designing protocols and processes natively
layer processes information within the functional based on intelligent processing closed-loop.
layer based on the closed-loop processing This results in business intelligence and
logic shown, achieving intelligent endogenous service intelligence, becoming a high-level
processing at the functional layer level. Between autonomous network from end to end, and the
functional layers, the functional layers interact link and foundation for empowering a thousand
with information and function coordination industries with intelligent benefits.
26
6G Network Architecture

5.1.2 Computing Power

Application Layer

Computing Computing Power


Power Service Service Requirement

Computing Sensing Computing


Power Service & Capability Exposure Layer Power Service Orchestration &
Service Requirement Management Plane
Computing Computing Power
Power Service Capability Computing
Power Service
Building Computing Power Orchestration
Empowerment Service Capability
Computing Computing Network
Plane Computing &
Power Data/Computing
(Computing
Service Network Function Layer Network Service
Nework Resource
Power) Management
Strategy
Computing Power Computing Power Computing Power
Route Generation Route Forward Route Strategy
Building
Computing Sensing/Collecting
Building Computing Power Computing
Power Service /Modifying
Service Capability & Nework Data
Capability Computing Power
基础设施层
Infrastructure Layer
Data
Data Plane

Figure 5-Empowerment Plane – Computing Power

The 6G network architecture enhances the putation services. Key technologies involved in
computation service capability and aims to build clude as below.
the computation service capability through
a unified empowerment plane. It provides Computing power resource sensing
computation services to other layers, planes, For the diverse computing nodes in 6G, the
and twin-body, etc. The computation service ca- 6G network architecture controls the global
pability in the 6G network architecture is mainly resources through computing resource sensing
based on the efficient coordination of the technology. Computing power nodes initiate reg-
infrastructure layer, data plane, orchestration istration to sense their basic information such
and management plane, network function as location, type, size, and service capability.
layer, and service and capability exposure The data plane collects the registered data of
layer. The computation service is construct- the computing power nodes and synchronizes it
ed through functions such as computation with the orchestration and management plane,
service orchestration, computation routing which maintains the global pool of computing
policy, computation routing generation, and power resources and manages the global
computation routing forwarding. It empowers computing power nodes. For computing power
the network architecture internally, achieving nodes that have completed registration, the
endogenous computation, and empowers 6G network needs to monitor their computing
industry applications externally, providing com- resource status in real-time or periodically,
27
6G Network Architecture

such as the computing load status, deployment link information, and further generates the
status, and resource utilization, by means of computing power routing information table.
network-wide sensing capabilities to support Combining the user business requirements
orchestration and management for computing parsed from the application layer, the mapping
power service arrangement and scheduling. of user business requirements and resources
is performed, the resource allocation policy is
Computing power modeling formulated, and the network connection needs
For the diverse computing power nodes in are obtained according to the resource allocation
6G, the 6G network architecture controls the policy. The routing of computing and network
global resources through computing power multi-dimensional resources integration is
resource sensing technology. Computing power achieved through the control plane of network
nodes initiate registration to sense their basic functions and services, establishing network
information such as location, type, size, and connections. Based on the state of computing
service capability. The data plane collects the and network resources, 6G network can ensure
registered data of the computing power nodes better user experience by routing the optimal
and synchronizes it with the orchestration business forwarding path through arrangement.
and management plane, which maintains the
global pool of computing power resources and Computing power service management
manages the global computing power nodes. For The 6G network architecture has the ability to
computing power nodes that have completed schedule computational services and manage
registration, the 6G network needs to monitor their entire lifecycle, including the instanti-
their computing power resource status in real- ation, updating, scaling, and termination of
time or periodically, such as the computing computational services. The heterogeneous
power load status, deployment status, and computational resources and network resourc-
resource utilization, by means of network-wide es on the computational nodes are reserved,
sensing capabilities to support orchestration allocated, and released, and the network
and management for computing power service deployment of multiple dimensions of resources
arrangement and scheduling. such as computation and storage is taken into
consideration to generate a business scheduling
Computing power routing control policy based on the business needs. Intelligent
The 6G network architecture supports flexible scheduling dispatches the computational
scheduling of computing power routing control service to the appropriate computational node
technology. The arrangement management for processing, achieving dynamic business
plane generates the computing topology deployment and scheduling. At the same time,
based on the perceived computing and net- it monitors the network's operation and service
work resource information and node-to-node quality in real-time under large-scale concurrent
28
6G Network Architecture

multiple business scenarios and adjusts the ing security risks before they occur, detecting,
application deployment policy accordingly, responding and recovering after they occur. The
intelligently performs business migration security resource pool can achieve coordinated
and scheduling to avoid resource constraints sharing of security data, security capabilities,
leading to business blockage and maximize the and threat analysis, breaking data isolation
guarantee of business service quality and user and divide through collaboration, conducting
experience. homogeneity analysis, traceability, and crack-
To support the efficient provision of com- down on security threats. By combining secu-
puting power services in 6G networks, the rity knowledge databases, threat intelligence
various aspects of the 6G network architecture databases and collected security data, utilizing
need to be integrated and work together seam- AI technology, the security situational awareness
lessly, embedding the functions supporting is realized and the security policy is intelligently
computing power services throughout the decided and deployed adaptively and security
architecture, and realizing the construction devices are deployed adaptively. The security
of computing capabilities and the provision capability resource pool realizes on-demand
of computing services through eff icient customization, dynamic deployment, and elastic
collaboration. scaling of security capabilities, which not only
provides freely accessible security capabilities
5.1.3 Security to meet diverse needs, but also ensures the
Security capability coordination and security of internal networks or users by
Distributed trust invoking the security capability resource pool.

Security capability coordination The security capability resource pool helps build

Security capability should accompany the net- a barrier for common defense against security

work and provide flexible, on-demand cus- risks, achieves security capability coordination

tomizable security coordination capabilities. and linkage, and builds a security protection

Security enabling is to give security capabilities system from the inside out.

to other layers/planes, which is in line with


the 6G network's requirement for on-demand Distributed trust
customized business scenarios and the need for Building a distributed trustworthy relationship

rapid on-demand deployment or withdrawal between networks is the prerequisite for ability

of network resources. To achieve security collaboration and cross-domain resource sched-

capability coordination, a security capability uling, and the establishment of a distributed


resource pool should be constructed. The trustworthy relationship mainly depends on the
security capability resource pool is committed establishment of access authentication and access
to providing on-demand access to security control mechanisms. Blockchain technology, as
resources, predicting, identifying and protect- a distributed ledger technology for peer-to-peer
29
6G Network Architecture

networks, has the characteristics of decen- for information sharing and cross-domain
tralization, unalterable, traceable, anonymity, collaboration requires the establishment of trust
and transparency, and has become a research mechanisms between domains. A blockchain-
hotspot for distributed trust. The blockchain based distributed network design can provide
network structure's built-in distributed ledger trustworthy network services and elastic scaling,
technology can ensure data traceability and as well as cross-domain information sharing.
unalterability while realizing decentralized data Building a DPKI based on blockchain for
management. Meanwhile, adopting distributed cross-domain authentication is currently a hot
consensus algorithms ensures the rapid synchro- research topic. Most existing authentication
nization and timely update of data, achieving mechanisms are based on Public Key Infrastruc-
information sharing. In 6G distributed networks, ture (PKI), which requires the participation
each sub-network will serve as a separate man- of a trusted third party, such as a Certificate
agement domain with a large number of devices Authority (CA). The CA provides the trust root
and independent domain communication pro- for all PKI digital certificates, which are used
tocols and management methods. However, to verify the identity of users, devices, and oth-
there is a need for cooperation, interaction, er entities. In a distributed network environ-
and resource scheduling between devices in ment, a CA is set up in each domain to form a
different network domains, and the requirement relatively independent trust domain to prevent
30
6G Network Architecture

unauthorized access to internal resources. data. In addition, new emerging medical


When users need cross-domain authentication, applications require the collection of a large
different domain CAs need to transfer digital amount of data related to people's signs, which are
certificates, encrypt and decrypt signatures themselves very private and sensitive. As a result,
multiple times, and frequent cross-domain the future 6G data security and privacy protection
access will increase network latency and cost. will rise to new heights. To ensure the security
At the same time, the participation of trusted and trustworthiness of data, various data should
third parties may be threatened by single point be isolated and controlled in secure and non-
failures, and result in expensive management secure domains using different security policies.
costs. By using blockchain technology to chain User data involving personal privacy and sensitive
authentication information and using block- industry data should be in the secure domain and
chain to store updated authentication parame- the integrity and confidentiality of the data should
ters, the consistency of authentication results be guaranteed before data circulation. 6G data
between domains is ensured based on the security can adopt a hierarchical classification
tamper-proof nature of blockchain, providing approach to finely classify various data in order to
security for cross-domain authentication. Data finely manage data flow. Data with high security
stored on the chain is maintained by multiple levels should use advanced security policies and
domains, providing redundancy and fault security operations to achieve the effect of data
tolerance, avoiding the problems of centralized availability but not visibility and exposure but not
authentication causing single point failures and sharing.
low efficiency. At the same time, authentication Data security is the foundation of AI security.
servers in multiple domains can download AI data includes the original training dataset, a
authentication and authorization information large amount of gradient information generated
from the blockchain, avoiding frequent cross- during the training and inference process,
domain access. and model parameters generated after the
Distributed trust and security capabilities, training and inference process is completed.
as important elements of intrinsic 6G network The preparation, training, transmission, and
security, endow 6G network with security deployment of AI data are plagued by issues of
capabilities and support business activities. data privacy breaches and data security attacks.
As a result, data security protection technology
Data security and AI security is a necessary enabling technology for ensuring

Data security the reasonable use and efficient empowerment

The 6G network will greatly maximize the of AI data. Currently, existing AI data security

satisfaction of people's intelligent needs for daily protection technologies include poisoning defense

life. Intelligent services require the collection of and privacy computation. Privacy computation

a large amount of people's life and physiological brings the possibility of securing AI data, but
31
6G Network Architecture

existing mainstream privacy computation also improve network defense by providing


technologies face sacrifices in different aspects false information or resources to deceive
such as high computational and communication attackers to further improve network defense.
costs and loss of computational accuracy. For the Elastic autonomy is an intelligent, internally
new features and application scenarios of 6G, resilient, and scalable framework for 6G
methods such as blockchain, differential privacy, network security. 6G networks break down
federated learning, and establishing trust models traditional security boundaries by integrating
can be further used to improve protection of user ubiquitous connectivity, AI capabilities, and
privacy and data security. orchestration and management, and achieve
elastic deployment and dynamic orchestration
AI security of intrinsic security capabilities through
6G network will have a significant improve- intelligent software-defined security and
ment in support for AI compared to 5G, and AI network function virtualization.
will take on more critical tasks in areas such Detection and analysis refer to the ability to
as 6G architecture, management, and security. enhance network situational awareness and
The 6G mobile communication system will automatically detect network failures through AI
both be highly intelligent and autonomous big data analysis that mines historical data and
through AI, and use AI technology to achieve obtains information on network performance,
active immunization ability, elastic autonomy, channel conditions, and so on. By collecting data
and security capabilities for detection and such as device, system, and application software
analysis. Active immunization ability refers log records, network protocol traffic, attack
to an active defense function from inside to threat intelligence, and so on, a unified security
outside for network infrastructure, software, big data analysis platform and scenario-based
and network architecture based on AI tech- security AI detection and analysis model can be
nology. Precise and effective detection of established, enabling intelligent attack threat
malicious behavior has been a persistent detection and security event diagnosis analysis
problem in network security, and based on to effectively enhance the detection and analysis
6G AI security capabilities, AI can be used capability and efficiency of network attack
to designate active security defense plans, threats, improving the reliability and security
and through machine learning classification, of the network. By analyzing network attack
more accurately identify malicious activities threats from broad time and space dimensions,
in network traffic. In addition, by using deep a widely related AI model can be constructed by
learning to analyze specific user behavior and combining assets, vulnerabilities, and behaviors
operations in the network, it can effectively based on a knowledge graph, providing a
defend against abnormal attacks by legal potential technological approach for detecting
nodes in the network. AI technology can and tracing this kind of APT attack.
32
6G Network Architecture

5.2 Data Plane

6G network architecture is expected to intro- provision of data for different business entities,
duce the "data plane" to handle the massive and manage the entire lifecycle of data. The
data generated by various sources such as user introduction of data plane is essential for 6G
ends, sensors, and the network itself. The data networks to efficiently handle and process
plane aims to improve data flow efficiency, the increasing amount of data and resolve the
user experience, and data privacy and security. issues of data processing, storage, isolation,
It will provide efficient and secure data services trustworthiness, interoperability, and privacy.
to both internal and external network entities, Figure 6 shows the architecture of data plane.
ensuring the uniform collection, transfer, and

Service & Capability Data Service


Data Plane
Exposure Layer
Data Collection
Data Processing
Control User Oreches Data Data
-tration authenticati Security/
Plane Plane Data Storage Privacy
& on/Access
control Protection
Manag
Network Data Service Data Collection
-ement
Function Layer Plane Data Collection
Data Collection
Empowerment
Plane
Distributed Yang
Blockchain SID
Storage model

Infrastructure Layer
Data Collection
/Sensing

Figure 6-Intelligent Simplicity Empowerment Network – Data Plane

Categories of data types Network Function/Performance/Status

· Network funciton related data data: Throughput, delay, user plane path,
Network Function Configuration Information: port status, available resources, traffic, air
NFprofile configuration information (service interface resource data (time-frequency domain
slicing, service scope, bandwidth, storage, number information, scheduling information), sensing
of ports, etc.), number of UEs/sessions, network data, etc.
topology, slice configuration information, etc. · Operation data
Data stored by Network Function: Subscrip- Alarm, configuration, performance, security,
tion data, context information (UEs, sessions), charging, QoE, MDT, events, etc.
policy information, authentication and autho- · AI data
rization information, slice-related information, AI models, AI data, and related configuration
etc. parameters, etc.
33
6G Network Architecture

· Computing power data knowledge, and computing power, and for data
Computing power network-related data and storage, a distributed storage method can be
configurations, etc. adopted to avoid single-point failures.

· UE data · Data security/Privacy protection


Configuration information, IoT type data, AI The reliability of data is the foundation for
type data (metadata, models, parameters, realizing data sharing and data value realiza-
training sets, etc.), business usage information tion. Data security and privacy protection aim
(such as app usage statistics, traffic statistics), to protect the authenticity, confidentiality,
sensing data, etc. completeness, traceability, and non-disclosure
of data, thereby providing users and networks
Functions of data plane with high-quality trustworthy data services on

· Data collection demand.


Data collection refers to obtaining raw data from · Data authentication/Access control
network entities/devices and then categorizing, Data authentication verifies the right to access
converting, and abstracting the raw data data. For example, it validates the user's identity
according to the corresponding data model to through identity authentication methods to
facilitate data storage. prevent malicious users from launching various

· Data storage security attacks. Once the identity is verified,


As data collected from different data sources, the user can access the data based on their
raw data needs to be extracted, simple cleaning, access privileges to protect the confidentiality
preprocessing, removing duplicate raw data, and security of the data, and avoid unauthorized
and stored locally for further processing operations on the data, thus realizing data
according to a uniform data model. services and data sharing.

· Data processing In summary, the infrastructure layer is the


Based on a uniform data model, the raw data data source, including sensing data, AI data, user
undergoes processes such as denoising, feature subscription data, network operation data, etc. It
extraction, normalization, standardization, provides various data for the data plane. The data
analysis, establishing relationships between plane needs to provide data to the corresponding
data, establishing different response models, layers and planes, and also needs to collect data
etc. to form data assets that can directly respond from the corresponding layers and planes. All
to needs. The processed data is then placed in data is processed through the data plane's classi-
appropriate places based on effective policies fication, storage, processing, etc., and fed back to
for quick data retrieval. AI technology can be the corresponding layer or plane to achieve the
utilized in the data processing process to speed self-production, self-selling, and self-use of data
up processing, data analysis can be performed within the entire physical network and digital
using techniques such as models, algorithms, twin network. Data is a service product and is
34
6G Network Architecture

provided to the outside world through the service sharing and internal data services are achieved
and capability exposure layer. Internally, data through data authentication/access control.

5.3 Control Plane

6G networks are evolving and optimizing their power, and security features, distributed core
control plane, which belongs to the network network functions to the edge for improved
function layer, to meet higher requirements. efficiency, and deeper cloudification for flexible
This evolution includes moving towards full- resource allocation and scheduling.
service, integrating intelligence, computing

Service &Capability Exposure Layer

Oreches Empow User Data


Network Function Layer
-tration -erment Plane Plane Intelligence Mobility Multi-dimensional Integrated communication
& Plane Access Management Service Management and sensing
Manag
Security Sitting Integrity Intelligence
-ement Awareness Protection Strategy
Plane
Control
Plane Service Architecture
Containerization
Mesh Serverless

Infrastructure Layer

Figure 7-Intelligent Simplicity Empowerment Network –Control Plane

Full-service and trimming of network functions and network


The introduction of SBA (Service-Based Ar- capability exposure. In addition, the current,
chitecture) in the 5G core network fundamen- rigid, closed architecture of the RAN is difficult
tally changes the traditional P2P communi- to deeply integrate with cloud-native. Therefore,
cation mode and enables rapid construction, the service-based architecture can be further
deployment, and release of network control extended to the RAN, and even to the UE (User
functions. However, 5G networks only service Equipment). The evolution of RAN service
the control plane of the core network, and the cannot be accomplished overnight and requires
RAN (Radio Access Network) still retains the targeted research based on business features and
traditional "smokestack" protocol stack structure requirements. In the control plane, the design of
and relatively rigid point-to-point interfaces, the RAN service evolution can be divided into con-
lacking flexibility for different scenarios and the trol plane interface service and control plane net-
ability to support flexible, dynamic deployment work function service, as shown in the Figure 8.
35
6G Network Architecture

NF NF NF NF NF NF NF NF NF NF

NF NF NF NF NF NF NF NF NF NF

RAN CN RAN CN

(a) (b)

Figure 8-RAN Service-based Architecture

Currently, the RAN and core network control services, which can be directly exposed to other
plane are connected through the N2 interface domains through the SBI.
between CU-CP and AMF. As shown in the fig-
ure, in the future 6G system, the N2 interface Cloud native
can be service-oriented, by defining the service- Firstly, microservices architecture, which has
oriented interface between RAN and the the characteristics of independent development,
core network, allowing multiple NFs within deployment, and updates. Multiple microservices
RAN and the 6G core network to have direct components are deployed and managed in a dis-
interaction interfaces. By service-oriented N2 tributed manner to form a physically independent
interface, the UE NAS signaling does not have but logically integrated network functional sys-
to terminate at one reference point each time, tem. Second is containerization, which natural-
reducing the signaling load on the terminal and ly fits with microservices architecture and has
reducing the signaling delay caused by indirect good portability, suitable for deploying and mi-
communication. grating network functions in cloud environments.
In order to further realize service-based RAN- Third is service mesh, which provides a secure
core network signaling interaction, it is possible and reliable communication infrastructure layer
to consider service-oriented RAN control for network functions and shields the complexity
plane, so that the RAN and core network are of service topology brought by multiple network
fully open, as shown in Figure 8(b). All RAN organization and deployment methods, allow-
functions and core network network functions ing services to focus only on their own business
can directly communicate with each other, processing logic. Lastly, stateless services, which
and the interaction between RAN and core separates context data and business processing
network NFs can change from serial to multi- logic, retaining only the business processing logic
party parallel interaction. Functionally, RAN in network functions to ensure scalability and
and core network services still need to perform recoverability and making it convenient to share
the standards and operations required in their context data between network function service
independent domains, but core network and instances.
RAN functions can provide a wider range of
36
6G Network Architecture

5.4 User Plane

Service & Capability Exposure Layer

Network Function Layer


Oreches Data Control
-tration Plane Plane Function Secure
Forwarding Plug & Play
Service-based
&
Manag Forwarding Path Multi-dimensional
-ement User Plane Management Service Forwarding
Plane
Collaborative
Containerization Programmability
Interconnection

Microservice Service Intelligent


Orchestration Sensing

Empowerment Plane

Infrastructure Layer

Figure 9-Intelligent Simplicity Empowerment Network-User Plane

The user plane is the only plane in the core reordering. The user plane, with its cross-layer
network architecture that provides user data and cross-domain programmable capabilities,
flow processing and forwarding functions. supports the rapid deployment of new protocols
It is the core for achieving the ultimate user or functions to meet the demand for diverse
experience and the window for implementing a business rules. For new businesses such as L5
"user-centric" approach. It is also an important intelligent internet of vehicles, high-precision
tool for opening up imagination space for industrial control operations, and holographic
the development of the industry with simple communication, the user plane needs to focus
services at various levels of the network. on characteristics such as ultra-large bandwidth,
The user plane meets the transmission de- bounded latency, low jitter, high reliability, and
mands of the integration network of 6G com- high-precision time synchronization. To achieve
munication, sensing, computing power, in- high-performance forwarding and autonomous
telligence, data, and security by extending its interconnections of the network, the user plane
support for multi-dimensional new business needs to enhance or introduce new transmis-
data forwarding and transmission. Under the sion protocols (including protocol IP) or shift
trend of end-to-end full-service, the user plane from protocol-centered to software-centered,
service will activate the application mode of where all functions and "protocols" will be mi-
the network through scene-driven and com- grated from hardware to software, not restricted
bined with RAN service, may bring about the by hardware, and a series of new network and
optimization possibility of access network and application innovations may follow.
core network user plane function splitting and
37
6G Network Architecture

Based on the traditional user plane, through Service-oriented & Microservices


the integration and innovation of key technolo- With the deep integration of DOICT technology
gies, the value of the user plane will be greatly and the emergence of a large number of new busi-
enhanced in the 6G network, bringing users nesses, the cloud-native SBA service-oriented
better and more quality services. Some key architecture has initially shown the advantages
technologies are as following. of agility, simplification, and exposure, but the
user plane remains a service-oriented island.
Plug and play Decoupling the user plane protocol functions,
With the demand for user plane in hierarchical service-based interfaces, external and internal
and domain-based deployment of polymor- services, internal introduction of computing
phic applications, it requires a simpler, more power, perception, intelligence, security, and
automated, and intelligent plug and play ability. other service capabilities, and intelligently
Through intelligent connection management implementing the best service calls based on
sensing (such as network digital twin policy the scenario to constitute a future network
input, AI-based access scene recognition, etc.), that meets customer needs and various
various types of access requests and admis- heterogeneous integrations is an important
sion recognition, the user plane can quickly part. R18 UPF's support for event exposure
and dynamically connect to the network as services is an important start for user plane
needed, complete automatic configuration service orientation. User plane functions are
and perform life cycle management; At the reorganized into multiple user plane services
same time, through intelligent business flow through service orientation, introducing micro-
self-identification, it can immediately match service governance (ServerMesh), batch pro-
the business scenario-based strategy, adjust cessing (Volcano), heterogeneous microservice
parameters, automatically optimize, and technology stacks, providing more dynamic
improve services as needed. As an important anchor setting, more dimensions of business
network node that drives the integration of processing capabilities, and providing users
industries, user plane serves and empowers with a network personalization customized
industries. On the basis of traditional network and optimized service running environment.
capability and edge computing, it needs to quickly The exposure of user plane service capabilities
launch computing and media applications on and the widespread distributed deployment
the edge platform in a more lightweight and requirements of the user plane, require the
green way. The user plane provides simple service-oriented framework to have the ability
and intelligent interface services for applica- to coordinate between distributed networks
tions as a plug and play edge business plat- and support distributed service addressing and
form (such as Serverless, Function as a Ser- service connection. Through the flexibility of the
vice (FaaS), Backend as a Service (BaaS), etc.). service-oriented interface, under the centralized
38
6G Network Architecture

dispatch of the control plane function, the user can be gradually achieved. In terms of imple-
plane can realize a dynamic business chain mentation, plug-in functions or standard APIs
(Service Chain), flexibly control the routing of can be used to extend the functional modules,
business data between applications, and provide and flexible invocation of plug-in code or
innovative application network aggregation pat- extended interfaces can provide a convenient
terns. At the same time, through the exposure of solution for adding and arranging new services.
the user plane service capabilities, the migration In terms of protocol stack, programmable
of application services and the re-selection of technology can be used to reorganize the cur-
business chain paths can be realized during rent mobile network protocol stack system.
the user's movement process, and local service The existing user plane protocol stack is rigid
optimization control can be flexibly controlled and tightly coupled, lacking effective coordi-
through obtaining network load, application nation between the access network, the bear-
SLA, and user level parameters, etc. er network, and the core network, leading to
difficulties in meeting strict service quality
Programmability requirements for end-to-end mobile commu-
The 6G user plane needs to continuously add nication networks. 6G user plane can consider
new protocols and features on top of existing using new technologies such as SRv6 and APN6
supported features, including tunnels, load to replace the traditional GTP protocol stack,
balancing, complex filtering, and mandatory using the three-layer programmable space of
QoS constraints. The cost of using traditional SRv6 to flexibly define the grouping processing
custom ASICs is relatively high, and they lack logic of the user plane, to support the different
flexibility and dynamism. To make the network requirements of different services. At the same
adapt to the ever-changing needs of the future time, the user plane protocol stack based on
and improve its scalability and extensibility, the SRv6 can achieve a Native IP end-to-end channel
6G user plane should introduce programmable from the user to the data center, and realize
network technology and provide customized the integration of the user plane with the data
network services based on the situational needs center.
of users, offering a more green, fast, and flexible
upgrade option for mobile networks. Deterministic
The programmable elements of the 6G user New applications such as XR, remote con-
plane include data programmability, parameter trol, smart healthcare, car networking, and
programmability, and behavioral programma- autonomous driving have extremely high
bility. Progressing from data programmability requirements for delay, jitter, and reliability,
to parameter programmability and then such as end-to-end delay from microseconds
behavioral programmability, the evolution and to milliseconds, jitter delay in microseconds,
implementation of programmable technology and reliability above 99.999%. Thus, 6G needs
39
6G Network Architecture

to provide a network that offers differentiated, synchronization, end-to-end deterministic


multi-dimensional, and deterministic services delay, zero congestion loss, and ultra-high
to ensure the technology behind intelligent reliable data delivery, thereby meeting the
ubiquitous, satellite-ground integration, and diverse needs of new businesses for large
holographic communication, and the user bandwidth, low delay, and high reliability.
plane needs to be able to complete end-to-end Meanwhile, the user plane has the ability to
cross-layer, cross-domain deterministic data provide"differentiated" plus "deterministic"
transmission. services, which can balance deterministic
The user plane detects service KPI and and non-deterministic data transmission
performance through multi-dimensional mea- while ensuring deterministic net work
surement and intelligently senses the resource transmission and meeting the "best effort"
usage of each base station and terminal. By user requirements, to meet the differentiated
using techniques such as resource reserva- network capability requirements of different
tion, traffic shaping, and queue scheduling, industries and users.
it implements wide-area high-precision clock

5.5 Orchestration and Management Plane

The development of new technologies such Through intelligent sensing of user intent and
as immersive interaction, integrated commu- business requirements, it realizes cross-multiple
nication and sensing, and integrated satellite- businesses, multiple domains, and full life-cy-
terrestrial is making the network increasingly cle intelligent collaboration orchestration and
heterogeneous, dynamic, and complex. Tradi- intent strategy dynamic scheduling, realizing
tional manual-based operation methods are in- closed-loop guarantee of business quality in
creasingly unable to match the vision of global heterogeneous environments. Secondly, the
coverage context-aware connection,in the 6G orchestration and management aspect in the
network. As a result, in the "three-layer and new architecture is an "integrated communi-
five-plane" 6G Intelligent Simplicity Empower- cation and sensing"orchestration and man-
ment network architecture, the Orchestration agement plane, supporting the integration
and management plane has been given new management of various new resources and
meanings and abilities to match the manage- new capabilities. Through deep sensing and
ment requirements of 6G full-scenario network intelligent management of global heteroge-
on-demand services. Firstly, the orchestration neous resources, building a full-view knowledge
and management plane in the new architecture space, and multi-dimensionally, uniformly
is an "intelligent" orchestration and manage- orchestrating network resources, network
ment plane, supporting intent-driven networks. functions, and network service capabilities, it
40
6G Network Architecture

supports automatic generation of end-to-end scenarios, deeply integrating with digital twins,
service flows that meet business requirements, virtualizing control of the network to achieve
realizing on-demand configuration and full automatic closed-loop control of the "Design-
life-cycle management of network resources. Build-Operate-Optimize" network, enhancing
Lastly, the orchestration and management network robustness and anti-destruction
plane in the new architecture is an "inherited capabilities.
innovation" orchestration and management
plane, supporting the evolution of traditional The relationship between orchestration
network management modes towards network and management plane and other planes
autonomy. "intelligence endogenous" has greatly In the 6G Intelligent Simplicity Empowerment
expanded the boundaries of the orchestration network architecture, the orchestration and
and management plane. By building on the management plane is responsible for intelli-
traditional Fault, Configuration, Accounting, gently managing network resources, network
Performance, and Security (FCAPS) management, functions, services, and capabilities to achieve
the orchestration and management plane end-to-end autonomous of the network. The
establishes intelligent anomaly detection and figure 10 is shown below.
self-healing mechanisms in complex network

Intent Service Resource Distributed Policy


-aware Orchestration Sensing Collaboration Control Orchestration
&
Resource Virtual and real Computing Power Lifecycle Management Plane
FCAPS
orchestration Interaction Scheduling Management

Business
Closed Loop
Data Manage Control User
Plane -ment Plane Plane Service & Capability
Plane
Exposure Layer
Service Orchestration
& Management
Closed Loop
Closed Loop
Network Function
Layer
Resource
Closed Loop

Infrastructure
Layer
Air Space Groud Sea

Figure 10 -Intelligent Simplicity Empowerment Network


– Orchestration and Management Plane
41
6G Network Architecture

The network domain in the 6G Intelligent connection, computing power, intelligence,


Simplicity Empowerment network architecture and security into services that can be provided
expands from the ground to the air, sea, and internally and externally.
space, and the resource types from tradition- The orchestration and management plane
al spectrum, storage, and network resources builds a panoramic knowledge space with a
to new types of resources such as data, secu- real-time and heterogeneous data plane as
rity, computing power, and intelligence. The the center, and with the empowered plane
orchestration and management plane needs (computing power, security, intelligence, etc.)
to have the ability to manage diverse hetero- as the foundation. Through the autonomous
geneous resources throughout their lifecycle loop process of "intelligent sensing-intelligent
and provide on-demand resource allocation. analysis-intelligent decision-intelligent
In the network functional service layer, the evaluation", it realizes the management loop
orchestration and management plane needs to between different levels and the operation
have the ability to manage network functions loop of the three levels of "resource loop",
throughout their lifecycle, such as designing "service loop", and "business loop", thus
on demand, quickly launching, version man- providing the best user experience, maximum
agement, etc. to provide users with on-demand resource utilization, and full lifecycle operation
network functions through stable operations of automation and intelligence.
various layers and planes.
In the service and capability exposure layer, The relationship between orchestration
the orchestration and management plane needs and management plane and digital twins
to connect all layers and planes of the end-to- The requirements of 6G network's ultimate
end network and arrange capabilities such as performance and cross-domain capability
bring a massive increase in network scale and
complexity, making manual operation and
maintenance insufficient. To mitigate the high
cost of network failures and expensive trial-and-
error costs, a new 6G network digital twin can
be created by modeling and mapping to reflect
the real-world network's operating status and
environment. Network deployment and policy
pre-validation can be carried out in the digital
twin, and closed-loop control can be used to
effectively ensure network operation and real-
time optimization through a combination of
42
6G Network Architecture

virtual and real. As the figure 11 shown in be- of digital twin technology to optimize the phys-
low, the new architecture's orchestration and ical network continuously through virtual
management layer will support deep integration control of the real network.

Orchestration & Management Plane

Network Policy
Tuning Control Reality
Verification
With Policy

Physical Digital Twin


Network Network

Figure 11-Orchestration and Management Plane and Digital Twins

The orchestration and management layer Orchestration and management based


mainly operates on the physical network, on space knowledge
unifying the resources and functions required 6G networks need to be flexible and efficient
for orchestration based on user business in order to meet the diverse requirements
needs and network operation requirements, of integrated satellite-terrestrial, massive
and determining the necessary network and connectivity, and ultra-low latency communica-
computing capabilities. The network digital tion. This will be achieved by deploying network
twin is a digital mirror of the physical network functions dynamically, allowing for quick cre-
partially or entirely constructed based on ation and activation of distributed nodes, and
four key elements: modeling, data, analysis/ providing on-demand services. To accommo-
prediction, and interaction. By using the date this, there will likely be a large number of
digital twin, the current network state can be distributed nodes in the network. To achieve
replicated, new services can be deployed in the quick deployment and collaboration among
twin, and performance and impact on other these nodes, knowledge-based orchestration
existing services can be simulated and analyzed and management techniques will be introduced,
using analytical models. The orchestration using data and knowledge to drive network self-
and management layer can process the learning mechanisms.
analysis/prediction output of the network twin In a distributed network deployment envi-
through interaction with the twin's interface ronment, orchestration and management also
and dynamically adapt to changes in the uses a hierarchical, domain-based deployment
environment through closed-loop orchestration, method. The orchestration and management
optimizing the final user experience and plane in distributed network architecture is
improving the agility, security, and elasticity of shown in figure 12.
the 6G network as a whole.
43
6G Network Architecture

Orchestration &
Management Plane
Knowledge
Repository

NF NF

Centralized Node

Orchestration & Orchestration &


Management Plane Management Plane
Knowledge Knowledge
Repository Repository

NF NF NF NF

Distributed Node Distributed Node

Orchestration &
Management Plane
Knowledge
Repository

NF NF

Distributed Node

Figure 12-Orchestration and Management Plane in Distributed Network

Distributed nodes are edge network nodes with Centralized nodes perceive global network
complete system functions, supporting user ac- control knowledge through the transfer of
cess, data forwarding, security protection, and knowledge from distributed nodes, unifying
other functions. They achieve node autonomy modeling and representation of the entire
through orchestration and management based network control object through the whole
on the knowledge generated from data. The scenario. By using the knowledge base and data
orchestration and management integrates trust sharing mechanism, multiple network
domain-specific historical knowledge into control domains such as abnormal detection,
existing models or deep learning algorithms to network capacity prediction, and network
form resource scheduling technologies based on resource management are interconnected,
knowledge definition. The knowledge base of a allowing for the sharing of network control data
node is continually optimized through dynamic features, sharing of models, and interoperation of
data collection and monitoring analysis, policies. The network is autonomously governed
resulting in self-organization, self-management, through the four steps of state alerting, abnormal
and self-optimization of the node. detection, root cause analysis, and self-healing.
44
6G Network Architecture

Conclusion

This white paper presents a three-layer and endogenous, and integrated computing and
five-plane Intelligent Simplicity Empowerment network. Key technologies such as cloud-native,
6G architecture based on the vision of "global programmability, blockchain, and deterministic
coverage context-aware connection". The 6G will be combined to construct the 6G network
network is built on a ubiquitous infrastructure, architecture.
combining intelligence, computing, security, In the future, CICT Mobile will further study
and other endogenous capabilities to provide the network architecture and key technologies
data, control, forwarding, and orchestration that have reached a consensus in the industry
and management functions to both internal and based on its three-layer and five-plane Intelligent
external networks, empowering all industries. Simplicity Empowerment architecture, actively
Currently, the development of 6G mobile promoting the innovation and development of
communication network architecture and the 6G network architecture, and advancing
key technologies is forming a consensus towards its corporate mission of "committed to
in the industry and such as distributed, providing ubiquitous mobile communication
autonomous, digital twin, integrated satellite- capabilities for the benefit of humanity".
terrestrial, intelligence endogenous, security
CICT CICT Mobile

Website:http://www.cictmobile.com/

You might also like