Professional Documents
Culture Documents
6G Network Architecture White Paper
6G Network Architecture White Paper
WHITE PAPER
Empowerment 6G Network
4.1Infrastructure Layer 15
4.2 Network Function Layer 16
4.3 Service and Capability Exposure Layer 17
ment 6G Network
5.1Empowerment Plane 20
Conclusion 44
New Requirements of 6G
Network Development
03
6G Network Architecture
As society gradually enters the digital age, the digital world deeply interacts and integrates with the
physical world, and 6G network becomes the backbone of the future network. The design of the 6G
network architecture should not only consider compatibility and inheritance with existing networks,
but also consider diverse business scenarios in 6G, complex communication needs of emerging
vertical industry users, and the coordinated/adaptive ability of the network and applications. The
development of various new technologies drives the development of 6G networks towards global
coverage,everything connected , trusted security, and low-carbon green direction.
Simplicity Empowerment 6G, forming a intelli- form of future enterprises. The high throughput,
gence endogenous network. In the future era of low latency, ultra-precise positioning, security-in-
big data, the powerful computing capabilities herent, and multi-network convergence features
of the 6G network will require higher security of 6G networks provide more possibilities for
and privacy technologies, and the design of the development of future business models and
the 6G network architecture will consider both vertical industries.
intelligent services and trustworthy security
mechanisms to promote the development in Sustainable Social Responsibility
relevant fields. The introduction of the "carbon peaking and
carbon neutrality" strategy accelerates the
High Demand Business Model transformation of the communication industry
Technology development and social develop- towards energy efficiency and greenness.
ment are closely related. Immersive experience Currently, the high energy consumption and
reality, holographic communication, digital twin, unsustainable nature of networks cannot meet
smart transportation and other business needs the requirements of the country and industry
are emerging constantly, and accelerating digital for green and energy-efficient networks,
transformation has become a new trend for intelligent operation, flexible configuration,
China's economic growth. For individual users, shared capabilities, and secure-by-design.
the popularization of new products such as smart Major non-preventable events such as extreme
wearable devices and smart home appliances weather and pandemics, the needs for low-
provides personalized needs and improves the carbon economic and social development, and
quality of life and service experience. In vertical the needs for a better life for human society
industries, more human-machine interconnection drive the establishment of a more stable and
and everything-connected business models are low-carbon smart network and promote the
now prevalent, and data application services bring 6G network towards a green, low-carbon, and
new development opportunities to many indus- intensive communication direction.
tries, making data-driven industries the main
2
New Concepts of 6G Network
Architecture Design
06
6G Network Architecture
Due to the diversity of business scenarios, the integration of DOICT technology, high-demand
business models, and sustained social responsibility, 6G networks face new challenges. Therefore,
CICT MOBILE CO., LTD(CICT Mobile)adheres to the design concepts of Intelligent Simplicity,
Programmability, Endogenous, Distributed, Service-based, and Digital Twin, when designing the
6G network architecture.
As the network access scale continues to in- As the diversity of 6G network architecture
crease and network demands become more and customization of application scenarios
diverse, reducing the complexity of the 6G increases, programmable technology, as one
network architecture can achieve the goal of of the key technologies for 6G network, has
lightweighting the architecture, improving received widespread attention in the industry.
network operational efficiency, and reducing 6G programmable network can eliminate
network operation and maintenance costs. network differentiation, enabling network
Additionally, the 6G Intelligent Simplicity on-demand arrangement, flexible resource
Empowerment network will continuously deployment, dynamic routing planning, and
improve its level of intelligence based on big rapid identification and repair of network
data and artificial intelligence technologies, failures, meeting the diverse needs of business.
eventually forming an intelligent end-to-end At the same time, intelligent inherence
system, mainly consisting of intelligent ter- and programmability can deeply integrate,
minals, intelligent edge networks, intelligent providing support for the arrangement and
core networks, and intelligent business appli- implementation of 6G network.
cations.
07
6G Network Architecture
Endogenous Distributed
Due to the lack of deep integration between To meet the diverse business requirements
existing AI and mobile communication of various scenarios, 6G networks will
networks, independent management of break the constraints of centralization
computational networks and mobile com- and construct decentralized autonomous
munication networks, and the lack of dy- networks, providing user-centric control and
namic and flexible network protection meth- management, meeting the heterogeneous
ods, the 6G network system architecture access scenarios and network performance
needs to integrate the ability of intelligent requirements of the sky, land, air and sea,
endogenous, computational endogenous, and etc. With the continuous growth of network
security endogenous to achieve the network scale, 6G networks will be deployed in a
everywhere, computing power everywhere, combined centralized and decentralized
and intelligence everywhere. manner, achieving the goal of complementary
network resources and on-demand network
composition.
5G has achieved the modularization of net- With the continuous development of artificial
work functions and separation of control and intelligence and the increasing permeation
user functions. However, the virtualization of sensing and information, 6G networks
of the 5G user and wireless underlying archi- will integrate digital twin technology to form
tecture is not high and the network's overall a virtualized digital twin world based on
adaptability is limited, restricting the ability to the physical world, enabling mapping and
deploy networks flexibly. By increasing access interaction between the virtual and physical
network service and core network user-side world. The digital twin world can accurately
service, software and hardware resources can reflect and predict the state of each intelligent
be fully decoupled and flexibly allocated, con- entity in the physical world, improving the
tributing to increased network flexibility and efficiency of network operation and resource
maximizing the network's adaptability. utilization.
08
6G Network Architecture
Data service Computing power service AI service Computing power capability Security capability
Data Plane
Orchestration &
·Intelligent data analysis ·Data access & sharing
Management Plane
·Privacy protection ·Data acquisition & processing
· Virtual and real interaction · Multi-resource sensing ·Distributed trusted storage
· Network orchestration · Service orchestration
AI Security
· FCAPS
Infrastructure
Layer
User devices(MTC, V2X, UAV, D2D) Access devices Network devices Computing devices
Firstly, it is divided into three layers from the bot- network devices and computing power devices,
tom up, including infrastructure layer, network and multi-dimensional resources such as
function layer and service and capability expo- programmable compute, storage, network, data
sure layer. and AI.
sensing, computing power, intelligence, data endogenous capabilities, and whose functional
and security for the services or capabilities modules can be located in other functional
required by the service and capability exposure planes in the implementation. The 6G network
layer in the upper layer through the unified and architecture is designed from the beginning to
collaborative scheduling of multi-dimensional provide comprehensive support for endogenous
resources, and supports the atomized functions capabilities such as intelligence, computing
required by users in different network systems power, and security, so the empowerment plane
for splitting, combining or extending. is used as the basic functional base of the 6G
network to build an on-demand, flexible and
Service and capability exposure layer efficient endogenous capability resource pool.
Extract, encapsulate and combine the network Based on the empowerment plane, the 6G net-
functions of the lower layer to provide work can optimize network performance and
capabilities or services for internal network achieve network autonomy by using endoge-
services or external applications on demand, nous capabilities internally without external
covering connectivity and various capabilities intervention, and give more support to new
or services such as data, computing power, services for applications in various indus-
intelligence and orchestration management to tries externally to improve user experience.
support the operator's network with more value
and bring better service experience to users in Data plane
diverse business scenarios. Responsible for data management functions
Secondly, it is divided into five functional such as collection, processing, analysis and
planes, including empowerment plane, data service of all data in the whole network. Driven
plane, control plane, user plane and orchestration by the demand of Connect Everything and
and management plane, which are responsible Digital Twin, it improves the performance of
for five major types of network functions, such data services, reduces the bandwidth overhead
as intelligence/compute/security and other of data transmission, unifies and collaborates
endogenous functions, data management, in the management of data across the network,
network control, routing and forwarding, and supports 6G to provide secure and shared trusted
orchestration and management. Among them, data services across the network, and creates
the empowerment plane and data plane are more value through intelligent processing and
the new functional plane of 6G relative to 5G. analysis of data. At the same time, the data
plane can achieve reliable migration of network
Empowerment plane states through functional and data decoupling,
A logical plane that logically describes the improve mobility management performance,
network functions such as intelligence, and enable frequent switching scenarios such as
compute, and security that give the network its integrated satellite-terrestrial.
11
6G Network Architecture
The control plane, user plane and orches- sources, assist the deep integration of endoge-
tration and management plane are the en- nous capabilities such as intelligence/security/
hanced functional planes of 6G compared to computing power with the new architecture.
5G. The enhanced 6G control plane, user plane Based on the endogenous capabilities given by
and orchestration and management plane cov- the empowerment plane, realize the dynamic
er the control, forwarding and orchestration division and convergence reconfiguration of
management functions related to the traditional the access network and core network, as well as
connectivity capability and the new intelligent/ the intelligent, efficient and safe collaborative
computing/security capabilities on the one management and control of multi-dimensional
hand. On the other hand, the enhanced planes services such as communication, sensing,
use the empowerment plane as the basic computing power, intelligence, data, security, etc.
functional base to enable the network to have
endogenous capabilities related to intelligence, User plane
computing power and security, etc. The Evolve to full-service, supports comprehensive
multiple capabilities complement each other to high performance forwarding for multi-
effectively improve the overall performance of dimensional services such as communication,
the 6G network. sensing, computing power, intelligence, data
and security, supports rapid deployment and
Control plane technological innovation of new protocols or
Evolve to full-service, support the unified features through programmable technology,
and simple access of integrated satellite- and supports a hierarchical experience of
terrestrial and the integrated and accurate deterministic forwarding for users across
control of cross-layer and cross-domain re- industries.
12
6G Network Architecture
Orchestration and management plane achieve the on-demand selection and balanced
Covering connection service related resource application of network capacity, to support
management and service scheduling, as the on-demand scheduling and management
well as multi-dimensional resource sensing, of integrated satellite-terrestrial, to maximize
management and integrated scheduling of resource utilization. At the same time, the
sensing, computing power, intelligence, data orchestration and management plane supports
and security, through the joint optimization of the deep integration of digital twin networks
resources and flexible scheduling, to complete to control the real with the virtual to achieve
the closed-loop intelligent control of sensing, continuous optimization of the physical network
analysis, decision-making and evaluation, to state seeking and simulation verification.
Based on the three-layer and five-plane architecture, the 6G network will have the
network characteristics of intelligent simplicity and empowerment.
· Internal empowerment
Empowerment By atomizing the native network functions and
In the 6G era, the network is no orchestrating intelligence, computing power,
longer a communication network that security and other functions on demand, the
simply provides connectivity services, network is endowed with endogenous capabili-
but a converged network that integrates ties such as intelligence, computing power and
connectivity, intelligence, computing security on all layers and planes.
power, security, and data, etc. It needs · External empowerment
to support the integrated orchestration By designing a native open mechanism, we
and control of multiple capabilities and provide industry users and third parties with
services to internally realize multiple trusted on-demand network capabilities and
capabilities endogenously and provide services, empowering users and third parties
multiple services externally. with thousands of needs such as intelligence,
computing power and security.
14
6G Network Architecture
4
New Three Layers of Intel-
ligent Simplicity Empower-
ment 6G Network
15
6G Network Architecture
The design of layer highlights the enrichment and enhancement of 6G network architecture in terms
of layered elements and capabilities. The infrastructure layer covers infrastructure such as computing
power, network and cloud, and enriches the computing power resource element on the basis of
network resources, which will provide a base for the convergence of network, computing power,
storage and other basic resources for 6G network. The network function layer continues the service
design concept, supporting the organic integration and flexible construction of different network
functions. The service and capability exposure layer opens powerful information and communication
capabilities to industry applications, and provides services for industry applications through unified
encapsulation and orchestration of capabilities and services. At the same time, the layer design also
reflects the concept of cross-domain pull-through, multi-domain collaboration and convergence
development. Through the collaboration and interaction between layer and layer, layer and plane, it
ensures the self-wisdom and closure of business processes, mutual support and sharing of business
capabilities, and promotes the convergence development of 6G network architecture.
The infrastructure layer is located at the bottom and other resources for the upper layer network
of the entire network and is the operational functions and managed by the corresponding
foundation of the entire network, providing upper layer network functions.
wireless, computing power, storage, network The infrastructure layer consists of virtual
16
6G Network Architecture
The network function layer is the core layer to resources provided by the infrastructure layer,
crack the needs of high performance, flexible providing on-demand intelligent simplicity and
network, intelligence/computing power/security reliable functions and services to the service
endogenous, low cost, green and low carbon, and capability exposure layer, transforming the
etc. This layer is in the key position to carry on, traditional application-adapted network into an
cross the inflection point and win the future, application-defined network, taking the user as
and is an indispensable layer to realize the 6G the center to meet the fragmented, diversified
network architecture and integrate various key and complex network needs of different
technologies. industry applications.
The network function layer is embodied The network function layer is the logical
by multiple network functions of different carrier that enables all planes to collaborate with
planes in a full-service manner, based on the each other and work organically, and it is urgent
flexible combination and scheduling of various to comprehensively upgrade and optimize and
17
6G Network Architecture
deeply integrate DOICT technologies to promote and absorbed to become the evolutionary
the innovative development of traditional gene of the network, and evolve to a higher
control plane, user plane, and management stage, so that network functional services can
plane with interdisciplinar y and cross- support the explosive growth of new industries
disciplinary innovations. To reuse all kinds of and applications by means of an intelligent
data in the network as a special intangible asset simplicity platform, promote the digitalization,
and production factor by converging them in networking and intelligent transformation and
the data plane to increase usability, shareability, upgrading of the economy and society, and drive
statistic, exposure, etc. At the same time, productivity development and promote the
through the empowerment plane, advanced change of production relations.
technologies are continuously introduced
The services provided by the service and ca- security contains active immunity capability,
pability exposure layer include the computing elastic autonomy capability and ubiquitous
power services, data services, connectivi- collaboration capability.
ty services, intelligence services, sensing & Network capability exposure refers to the
location services, and other services. The exposure of management capabilities, manage-
service and capability exposure layer includes ment information, management data, etc., so
computing power capability, AI capability, that third parties can participate in network op-
security capability, network capability and other eration, maintenance and management.
capabilities. The service and capability exposure layer
For computing power capability exposure, it interoperates with the application layer in
is a key technical means to achieve on-demand the north and connects with capabilities and
computing power call and real-time sharing. services in the south, supports the exposure
The 6G network needs to have the following of network capabilities securely, and provides
computing power enabling technologies to callable, friendly, and rich API interfaces for
realize the exposure and sharing of computing atomic capabilities. When a request is received
power capabilities: computing power modeling from third-party application, the atomic
capability, computing power capability capability API is used as the basis for real-
warehouse, computing and network resource time online encapsulation, orchestration and
orchestration and capability call, etc. combination of atomic capabilities to provide
For AI capability, it will be used as a basic users with on-demand network capabilities
capability to empower production and society. according to their business requirements,
Al capability exposure include desensitization improving the user experience. At the same
and exposure of data, exposure of model joint time, some general service capabilities can be
training capabilities, exposure of model infer- provided to the public according to a unified
ence capabilities, and other open capabilities. framework and process, which simplifies
Along with the development of AI, blockchain, network implementation. The service and
federal learning and other technologies, it capability exposure layer interacts with other
becomes possible to use security capabilities layers/planes to collect and encapsulate the
as an inside-out protection mechanism in exposure capabilities of other layers or planes to
6G network architecture. The changes in 6G provide network capabilities on demand.
network architecture will prompt inside- In addition, the exposure of network capabili-
out changes in the functions of 6G security. ties facilitates the rapid integration of third-par-
Security capabilities is helpful for third-party ty services, enhancing the competitiveness of
application providers to better build business mobile operators to participate and expand new
security capabilities and achieve application services and increase revenue.
security functions. The exposure capability of
19
6G Network Architecture
5
New Five Planes of Intelligent
Simplicity Empowerment 6G
Network
20
6G Network Architecture
The features of 6G network system architecture, such as service and capability exposure, on-demand
network service provision, ultimate network performance experience, plug and play, distributed
collaboration, integrated of computing and networking, and smart home development, have
resulted in many core elements and service capabilities in the network requiring on-demand, elastic
deployment and separate consideration, such as computing power, intelligence, security, data, and
orchestration management.
Based on enhancing the control plane and user plane in traditional network architecture, further
adding the empowerment plane, data plane, and orchestration and management plane has realized
endogenous computing power, intelligence, security, data, and orchestration and management that
is flexible and reconfigurable on demand, constructing a 6G network that is integrated satellite-
terrestrial , global coverage and everything connected. The empowerment plane, user plane, control
plane,data plane, and orchestration and management plane will be described in detail below.
New diverse application scenarios, intelligent also have AI capabilities, network capabilities,
application requirements, and future network computing power capabilities, and security
decentralization require 6G networks to have capabilities. Therefore, the network requires a
more flexible and scalable mechanisms to meet logic plane (i.e. empowerment plane) that can
the high-performance communication and be extremely flexible and expandable in terms
flexible rapid response requirements of different of capabilities, which can provide the necessary
application scenarios. In addition to providing intrinsic capabilities for other layers and planes
connection services, 6G networks also need to of the network and have the ability to expand
provide sensing and location services, AI services, functions and build network services flexibly
data services, computing power services, and according to the development of the network and
other services. At the same time, they must business needs.
21
6G Network Architecture
AI Security
As shown in the figure 2,the capabilities cur- services in all scenarios. Relying on existing
rently possessed by the empowerment plane AI to solve problems in a chimney-style often
in the 6G network architecture are intelligence, results in conflicts between different AI use
computing power, and security. With the emer- cases, and the configuration-based approach
gence of new business scenarios and vertical cannot accommodate the different needs of the
industries, the capabilities of the empowerment network and services in all scenarios.
plane will also continue to expand. For the empowered social industry, the mo-
bile communication network as a social infor-
Intelligence Endogenous mation infrastructure needs to have the ability
The mobile communication network has always to provide intelligent services to the entire
emphasized network intelligence, starting society and all industries. Facing the unknown
from the Self-Organized Network (SON) project new industries and new needs of the future, it
of the 3G/4G era, and the introduction of the is unrealistic for human beings to discover and
NWDAF element in 5G has continued to deepen summarize future needs, and it is necessary
the integration of the mobile communication to use their own, the entire industry, and the
network and AI. However, there are still many massive data of the network to analyze new
gaps in the intelligence of the current mobile trends and changes.
communication network. The existing network Therefore, 6G needs to introduce endogenous
architecture lacks the effective management of AI, provide inter-industry federation intel-
the three elements of AI, the way to discover and ligence, and achieve cross-domain wisdom
solve problems through human intervention, integration and sharing, abandoning the AI
and is limited by human cognition, unable application mode of "patching", "plug-in", and
to complete the self-governance of the entire "overlapping". 6G network intelligence in terms
network, and the configuration method cannot of network functions, architecture, protocols,
adapt to the different needs of the network and processes, etc., will deeply integrate the factors
22
6G Network Architecture
of AI calculation power, data, algorithms, etc. computing power services for external industry
into the design, realizing the network-level AI applications to meet diverse application needs.
data, algorithms, computing power, etc. can be The incremental and patch-style capability
arranged and transferred as needed, making AI enhancement cannot meet the diverse business
training/inference more real-time and efficient; needs under large-scale networking for the
the intelligent recognition and intelligent multi-domain integrated, connected 6G
application of AI scenarios will be based on network. It is necessary to embed computing
network data and knowledge. capabilities in the 6G network architecture and
penetrate them through a unified empowered
Computing Power Endogenous surface to other layers and planes, and provide
The appearance of new users, technologies, computing services through the construction of
applications, and scenarios has led to an computing capabilities.
exponential increase in data volume, and
various industries have more pressing needs for Security Endogenous
computing power and networks. The country The introduction of new application scenarios
has launched the "East Data West Calculation" and key technologies in 6G has brought about
project. The current network architecture new security issues. In terms of personal pri-
separates the computing power network and vacy security, due to the exposure of 6G net-
the mobile communication network, which work capabilities, user privacy information has
increases the cost of network construction and transferred from closed personal platforms to
operation maintenance and causes problems open public platforms, and its contact status has
such as inter-network signaling interaction and gone from offline to online, making it possible to
security. At the same time, the expansion of obtain user data in real-time, greatly increasing
computing power also leads to issues such as the risk of personal privacy leaks.
low utilization and timeliness of resources. In the current 5G network and before, the in-
Therefore, 6G networks will deeply integrate dustry has adopted patching and plug-in securi-
with the computing power network, and in ty services to address these issues. However, the
the architecture design, 6G networks will drawbacks of passive protection measures are
consider not only the exposure of computing that they are not timely in response, protection
power services, but also the transformation methods lag behind and cannot avoid security
from external computing power to internal damage in time, and they lack adaptability and
computing power. The architecture will embed flexibility as the network evolves.
computing capabilities, making the mobile The vision of 6G is full coverage and intelligent
communication network itself efficient in connection of all things, with its billion-level
using computing power resources and building terminal devices, making network attacks more
enhanced network architecture, and providing and more common, and attack methods more
23
6G Network Architecture
The 6G network's intelligence endogenous processing logic closed-loop process includes network
elements, function layer internal and external, relying on closed-loop analysis to achieve autonomous
network, empowering network applications to be intelligently accessible, as shown in Figure 4.
Intelligent Business
Infrastructure Layer
Intelligence capability, as a key capability of around the closed-loop processing logic shown,
6G empowerment, will be implemented in the achieving system-level intelligence endogenous
intelligent endogenous process at all levels of the processing.
network. At the element level, network functions 6G network realizes intelligent endogenous
are designed with the closed-loop processing processing at the element level, functional
logic shown for the element functions. Within layer internal and functional layer interlayer by
an element, some or all of the closed-loop logic designing functions and architecture natively
functions can be deployed on demand to achieve based on intelligent processing closed-loop and
intelligent endogenous processing at the element data intelligence, management intelligence
level. Within the functional layer, the functional by designing protocols and processes natively
layer processes information within the functional based on intelligent processing closed-loop.
layer based on the closed-loop processing This results in business intelligence and
logic shown, achieving intelligent endogenous service intelligence, becoming a high-level
processing at the functional layer level. Between autonomous network from end to end, and the
functional layers, the functional layers interact link and foundation for empowering a thousand
with information and function coordination industries with intelligent benefits.
26
6G Network Architecture
Application Layer
The 6G network architecture enhances the putation services. Key technologies involved in
computation service capability and aims to build clude as below.
the computation service capability through
a unified empowerment plane. It provides Computing power resource sensing
computation services to other layers, planes, For the diverse computing nodes in 6G, the
and twin-body, etc. The computation service ca- 6G network architecture controls the global
pability in the 6G network architecture is mainly resources through computing resource sensing
based on the efficient coordination of the technology. Computing power nodes initiate reg-
infrastructure layer, data plane, orchestration istration to sense their basic information such
and management plane, network function as location, type, size, and service capability.
layer, and service and capability exposure The data plane collects the registered data of
layer. The computation service is construct- the computing power nodes and synchronizes it
ed through functions such as computation with the orchestration and management plane,
service orchestration, computation routing which maintains the global pool of computing
policy, computation routing generation, and power resources and manages the global
computation routing forwarding. It empowers computing power nodes. For computing power
the network architecture internally, achieving nodes that have completed registration, the
endogenous computation, and empowers 6G network needs to monitor their computing
industry applications externally, providing com- resource status in real-time or periodically,
27
6G Network Architecture
such as the computing load status, deployment link information, and further generates the
status, and resource utilization, by means of computing power routing information table.
network-wide sensing capabilities to support Combining the user business requirements
orchestration and management for computing parsed from the application layer, the mapping
power service arrangement and scheduling. of user business requirements and resources
is performed, the resource allocation policy is
Computing power modeling formulated, and the network connection needs
For the diverse computing power nodes in are obtained according to the resource allocation
6G, the 6G network architecture controls the policy. The routing of computing and network
global resources through computing power multi-dimensional resources integration is
resource sensing technology. Computing power achieved through the control plane of network
nodes initiate registration to sense their basic functions and services, establishing network
information such as location, type, size, and connections. Based on the state of computing
service capability. The data plane collects the and network resources, 6G network can ensure
registered data of the computing power nodes better user experience by routing the optimal
and synchronizes it with the orchestration business forwarding path through arrangement.
and management plane, which maintains the
global pool of computing power resources and Computing power service management
manages the global computing power nodes. For The 6G network architecture has the ability to
computing power nodes that have completed schedule computational services and manage
registration, the 6G network needs to monitor their entire lifecycle, including the instanti-
their computing power resource status in real- ation, updating, scaling, and termination of
time or periodically, such as the computing computational services. The heterogeneous
power load status, deployment status, and computational resources and network resourc-
resource utilization, by means of network-wide es on the computational nodes are reserved,
sensing capabilities to support orchestration allocated, and released, and the network
and management for computing power service deployment of multiple dimensions of resources
arrangement and scheduling. such as computation and storage is taken into
consideration to generate a business scheduling
Computing power routing control policy based on the business needs. Intelligent
The 6G network architecture supports flexible scheduling dispatches the computational
scheduling of computing power routing control service to the appropriate computational node
technology. The arrangement management for processing, achieving dynamic business
plane generates the computing topology deployment and scheduling. At the same time,
based on the perceived computing and net- it monitors the network's operation and service
work resource information and node-to-node quality in real-time under large-scale concurrent
28
6G Network Architecture
multiple business scenarios and adjusts the ing security risks before they occur, detecting,
application deployment policy accordingly, responding and recovering after they occur. The
intelligently performs business migration security resource pool can achieve coordinated
and scheduling to avoid resource constraints sharing of security data, security capabilities,
leading to business blockage and maximize the and threat analysis, breaking data isolation
guarantee of business service quality and user and divide through collaboration, conducting
experience. homogeneity analysis, traceability, and crack-
To support the efficient provision of com- down on security threats. By combining secu-
puting power services in 6G networks, the rity knowledge databases, threat intelligence
various aspects of the 6G network architecture databases and collected security data, utilizing
need to be integrated and work together seam- AI technology, the security situational awareness
lessly, embedding the functions supporting is realized and the security policy is intelligently
computing power services throughout the decided and deployed adaptively and security
architecture, and realizing the construction devices are deployed adaptively. The security
of computing capabilities and the provision capability resource pool realizes on-demand
of computing services through eff icient customization, dynamic deployment, and elastic
collaboration. scaling of security capabilities, which not only
provides freely accessible security capabilities
5.1.3 Security to meet diverse needs, but also ensures the
Security capability coordination and security of internal networks or users by
Distributed trust invoking the security capability resource pool.
Security capability coordination The security capability resource pool helps build
Security capability should accompany the net- a barrier for common defense against security
work and provide flexible, on-demand cus- risks, achieves security capability coordination
tomizable security coordination capabilities. and linkage, and builds a security protection
Security enabling is to give security capabilities system from the inside out.
rapid on-demand deployment or withdrawal between networks is the prerequisite for ability
networks, has the characteristics of decen- for information sharing and cross-domain
tralization, unalterable, traceable, anonymity, collaboration requires the establishment of trust
and transparency, and has become a research mechanisms between domains. A blockchain-
hotspot for distributed trust. The blockchain based distributed network design can provide
network structure's built-in distributed ledger trustworthy network services and elastic scaling,
technology can ensure data traceability and as well as cross-domain information sharing.
unalterability while realizing decentralized data Building a DPKI based on blockchain for
management. Meanwhile, adopting distributed cross-domain authentication is currently a hot
consensus algorithms ensures the rapid synchro- research topic. Most existing authentication
nization and timely update of data, achieving mechanisms are based on Public Key Infrastruc-
information sharing. In 6G distributed networks, ture (PKI), which requires the participation
each sub-network will serve as a separate man- of a trusted third party, such as a Certificate
agement domain with a large number of devices Authority (CA). The CA provides the trust root
and independent domain communication pro- for all PKI digital certificates, which are used
tocols and management methods. However, to verify the identity of users, devices, and oth-
there is a need for cooperation, interaction, er entities. In a distributed network environ-
and resource scheduling between devices in ment, a CA is set up in each domain to form a
different network domains, and the requirement relatively independent trust domain to prevent
30
6G Network Architecture
The 6G network will greatly maximize the of AI data. Currently, existing AI data security
satisfaction of people's intelligent needs for daily protection technologies include poisoning defense
life. Intelligent services require the collection of and privacy computation. Privacy computation
a large amount of people's life and physiological brings the possibility of securing AI data, but
31
6G Network Architecture
6G network architecture is expected to intro- provision of data for different business entities,
duce the "data plane" to handle the massive and manage the entire lifecycle of data. The
data generated by various sources such as user introduction of data plane is essential for 6G
ends, sensors, and the network itself. The data networks to efficiently handle and process
plane aims to improve data flow efficiency, the increasing amount of data and resolve the
user experience, and data privacy and security. issues of data processing, storage, isolation,
It will provide efficient and secure data services trustworthiness, interoperability, and privacy.
to both internal and external network entities, Figure 6 shows the architecture of data plane.
ensuring the uniform collection, transfer, and
Infrastructure Layer
Data Collection
/Sensing
· Network funciton related data data: Throughput, delay, user plane path,
Network Function Configuration Information: port status, available resources, traffic, air
NFprofile configuration information (service interface resource data (time-frequency domain
slicing, service scope, bandwidth, storage, number information, scheduling information), sensing
of ports, etc.), number of UEs/sessions, network data, etc.
topology, slice configuration information, etc. · Operation data
Data stored by Network Function: Subscrip- Alarm, configuration, performance, security,
tion data, context information (UEs, sessions), charging, QoE, MDT, events, etc.
policy information, authentication and autho- · AI data
rization information, slice-related information, AI models, AI data, and related configuration
etc. parameters, etc.
33
6G Network Architecture
· Computing power data knowledge, and computing power, and for data
Computing power network-related data and storage, a distributed storage method can be
configurations, etc. adopted to avoid single-point failures.
provided to the outside world through the service sharing and internal data services are achieved
and capability exposure layer. Internally, data through data authentication/access control.
6G networks are evolving and optimizing their power, and security features, distributed core
control plane, which belongs to the network network functions to the edge for improved
function layer, to meet higher requirements. efficiency, and deeper cloudification for flexible
This evolution includes moving towards full- resource allocation and scheduling.
service, integrating intelligence, computing
Infrastructure Layer
NF NF NF NF NF NF NF NF NF NF
NF NF NF NF NF NF NF NF NF NF
RAN CN RAN CN
(a) (b)
Currently, the RAN and core network control services, which can be directly exposed to other
plane are connected through the N2 interface domains through the SBI.
between CU-CP and AMF. As shown in the fig-
ure, in the future 6G system, the N2 interface Cloud native
can be service-oriented, by defining the service- Firstly, microservices architecture, which has
oriented interface between RAN and the the characteristics of independent development,
core network, allowing multiple NFs within deployment, and updates. Multiple microservices
RAN and the 6G core network to have direct components are deployed and managed in a dis-
interaction interfaces. By service-oriented N2 tributed manner to form a physically independent
interface, the UE NAS signaling does not have but logically integrated network functional sys-
to terminate at one reference point each time, tem. Second is containerization, which natural-
reducing the signaling load on the terminal and ly fits with microservices architecture and has
reducing the signaling delay caused by indirect good portability, suitable for deploying and mi-
communication. grating network functions in cloud environments.
In order to further realize service-based RAN- Third is service mesh, which provides a secure
core network signaling interaction, it is possible and reliable communication infrastructure layer
to consider service-oriented RAN control for network functions and shields the complexity
plane, so that the RAN and core network are of service topology brought by multiple network
fully open, as shown in Figure 8(b). All RAN organization and deployment methods, allow-
functions and core network network functions ing services to focus only on their own business
can directly communicate with each other, processing logic. Lastly, stateless services, which
and the interaction between RAN and core separates context data and business processing
network NFs can change from serial to multi- logic, retaining only the business processing logic
party parallel interaction. Functionally, RAN in network functions to ensure scalability and
and core network services still need to perform recoverability and making it convenient to share
the standards and operations required in their context data between network function service
independent domains, but core network and instances.
RAN functions can provide a wider range of
36
6G Network Architecture
Empowerment Plane
Infrastructure Layer
The user plane is the only plane in the core reordering. The user plane, with its cross-layer
network architecture that provides user data and cross-domain programmable capabilities,
flow processing and forwarding functions. supports the rapid deployment of new protocols
It is the core for achieving the ultimate user or functions to meet the demand for diverse
experience and the window for implementing a business rules. For new businesses such as L5
"user-centric" approach. It is also an important intelligent internet of vehicles, high-precision
tool for opening up imagination space for industrial control operations, and holographic
the development of the industry with simple communication, the user plane needs to focus
services at various levels of the network. on characteristics such as ultra-large bandwidth,
The user plane meets the transmission de- bounded latency, low jitter, high reliability, and
mands of the integration network of 6G com- high-precision time synchronization. To achieve
munication, sensing, computing power, in- high-performance forwarding and autonomous
telligence, data, and security by extending its interconnections of the network, the user plane
support for multi-dimensional new business needs to enhance or introduce new transmis-
data forwarding and transmission. Under the sion protocols (including protocol IP) or shift
trend of end-to-end full-service, the user plane from protocol-centered to software-centered,
service will activate the application mode of where all functions and "protocols" will be mi-
the network through scene-driven and com- grated from hardware to software, not restricted
bined with RAN service, may bring about the by hardware, and a series of new network and
optimization possibility of access network and application innovations may follow.
core network user plane function splitting and
37
6G Network Architecture
dispatch of the control plane function, the user can be gradually achieved. In terms of imple-
plane can realize a dynamic business chain mentation, plug-in functions or standard APIs
(Service Chain), flexibly control the routing of can be used to extend the functional modules,
business data between applications, and provide and flexible invocation of plug-in code or
innovative application network aggregation pat- extended interfaces can provide a convenient
terns. At the same time, through the exposure of solution for adding and arranging new services.
the user plane service capabilities, the migration In terms of protocol stack, programmable
of application services and the re-selection of technology can be used to reorganize the cur-
business chain paths can be realized during rent mobile network protocol stack system.
the user's movement process, and local service The existing user plane protocol stack is rigid
optimization control can be flexibly controlled and tightly coupled, lacking effective coordi-
through obtaining network load, application nation between the access network, the bear-
SLA, and user level parameters, etc. er network, and the core network, leading to
difficulties in meeting strict service quality
Programmability requirements for end-to-end mobile commu-
The 6G user plane needs to continuously add nication networks. 6G user plane can consider
new protocols and features on top of existing using new technologies such as SRv6 and APN6
supported features, including tunnels, load to replace the traditional GTP protocol stack,
balancing, complex filtering, and mandatory using the three-layer programmable space of
QoS constraints. The cost of using traditional SRv6 to flexibly define the grouping processing
custom ASICs is relatively high, and they lack logic of the user plane, to support the different
flexibility and dynamism. To make the network requirements of different services. At the same
adapt to the ever-changing needs of the future time, the user plane protocol stack based on
and improve its scalability and extensibility, the SRv6 can achieve a Native IP end-to-end channel
6G user plane should introduce programmable from the user to the data center, and realize
network technology and provide customized the integration of the user plane with the data
network services based on the situational needs center.
of users, offering a more green, fast, and flexible
upgrade option for mobile networks. Deterministic
The programmable elements of the 6G user New applications such as XR, remote con-
plane include data programmability, parameter trol, smart healthcare, car networking, and
programmability, and behavioral programma- autonomous driving have extremely high
bility. Progressing from data programmability requirements for delay, jitter, and reliability,
to parameter programmability and then such as end-to-end delay from microseconds
behavioral programmability, the evolution and to milliseconds, jitter delay in microseconds,
implementation of programmable technology and reliability above 99.999%. Thus, 6G needs
39
6G Network Architecture
The development of new technologies such Through intelligent sensing of user intent and
as immersive interaction, integrated commu- business requirements, it realizes cross-multiple
nication and sensing, and integrated satellite- businesses, multiple domains, and full life-cy-
terrestrial is making the network increasingly cle intelligent collaboration orchestration and
heterogeneous, dynamic, and complex. Tradi- intent strategy dynamic scheduling, realizing
tional manual-based operation methods are in- closed-loop guarantee of business quality in
creasingly unable to match the vision of global heterogeneous environments. Secondly, the
coverage context-aware connection,in the 6G orchestration and management aspect in the
network. As a result, in the "three-layer and new architecture is an "integrated communi-
five-plane" 6G Intelligent Simplicity Empower- cation and sensing"orchestration and man-
ment network architecture, the Orchestration agement plane, supporting the integration
and management plane has been given new management of various new resources and
meanings and abilities to match the manage- new capabilities. Through deep sensing and
ment requirements of 6G full-scenario network intelligent management of global heteroge-
on-demand services. Firstly, the orchestration neous resources, building a full-view knowledge
and management plane in the new architecture space, and multi-dimensionally, uniformly
is an "intelligent" orchestration and manage- orchestrating network resources, network
ment plane, supporting intent-driven networks. functions, and network service capabilities, it
40
6G Network Architecture
supports automatic generation of end-to-end scenarios, deeply integrating with digital twins,
service flows that meet business requirements, virtualizing control of the network to achieve
realizing on-demand configuration and full automatic closed-loop control of the "Design-
life-cycle management of network resources. Build-Operate-Optimize" network, enhancing
Lastly, the orchestration and management network robustness and anti-destruction
plane in the new architecture is an "inherited capabilities.
innovation" orchestration and management
plane, supporting the evolution of traditional The relationship between orchestration
network management modes towards network and management plane and other planes
autonomy. "intelligence endogenous" has greatly In the 6G Intelligent Simplicity Empowerment
expanded the boundaries of the orchestration network architecture, the orchestration and
and management plane. By building on the management plane is responsible for intelli-
traditional Fault, Configuration, Accounting, gently managing network resources, network
Performance, and Security (FCAPS) management, functions, services, and capabilities to achieve
the orchestration and management plane end-to-end autonomous of the network. The
establishes intelligent anomaly detection and figure 10 is shown below.
self-healing mechanisms in complex network
Business
Closed Loop
Data Manage Control User
Plane -ment Plane Plane Service & Capability
Plane
Exposure Layer
Service Orchestration
& Management
Closed Loop
Closed Loop
Network Function
Layer
Resource
Closed Loop
Infrastructure
Layer
Air Space Groud Sea
virtual and real. As the figure 11 shown in be- of digital twin technology to optimize the phys-
low, the new architecture's orchestration and ical network continuously through virtual
management layer will support deep integration control of the real network.
Network Policy
Tuning Control Reality
Verification
With Policy
Orchestration &
Management Plane
Knowledge
Repository
NF NF
Centralized Node
NF NF NF NF
Orchestration &
Management Plane
Knowledge
Repository
NF NF
Distributed Node
Distributed nodes are edge network nodes with Centralized nodes perceive global network
complete system functions, supporting user ac- control knowledge through the transfer of
cess, data forwarding, security protection, and knowledge from distributed nodes, unifying
other functions. They achieve node autonomy modeling and representation of the entire
through orchestration and management based network control object through the whole
on the knowledge generated from data. The scenario. By using the knowledge base and data
orchestration and management integrates trust sharing mechanism, multiple network
domain-specific historical knowledge into control domains such as abnormal detection,
existing models or deep learning algorithms to network capacity prediction, and network
form resource scheduling technologies based on resource management are interconnected,
knowledge definition. The knowledge base of a allowing for the sharing of network control data
node is continually optimized through dynamic features, sharing of models, and interoperation of
data collection and monitoring analysis, policies. The network is autonomously governed
resulting in self-organization, self-management, through the four steps of state alerting, abnormal
and self-optimization of the node. detection, root cause analysis, and self-healing.
44
6G Network Architecture
Conclusion
This white paper presents a three-layer and endogenous, and integrated computing and
five-plane Intelligent Simplicity Empowerment network. Key technologies such as cloud-native,
6G architecture based on the vision of "global programmability, blockchain, and deterministic
coverage context-aware connection". The 6G will be combined to construct the 6G network
network is built on a ubiquitous infrastructure, architecture.
combining intelligence, computing, security, In the future, CICT Mobile will further study
and other endogenous capabilities to provide the network architecture and key technologies
data, control, forwarding, and orchestration that have reached a consensus in the industry
and management functions to both internal and based on its three-layer and five-plane Intelligent
external networks, empowering all industries. Simplicity Empowerment architecture, actively
Currently, the development of 6G mobile promoting the innovation and development of
communication network architecture and the 6G network architecture, and advancing
key technologies is forming a consensus towards its corporate mission of "committed to
in the industry and such as distributed, providing ubiquitous mobile communication
autonomous, digital twin, integrated satellite- capabilities for the benefit of humanity".
terrestrial, intelligence endogenous, security
CICT CICT Mobile
Website:http://www.cictmobile.com/