上海品茶

全球6G技术大会:2024年面向6G的联盟网络体系架构白皮书(英文版)(48页).pdf

编号:160868 PDF  PPTX  48页 5.14MB 下载积分:VIP专享
下载报告请您先登录!

全球6G技术大会:2024年面向6G的联盟网络体系架构白皮书(英文版)(48页).pdf

1、1/47CatalogueAbstract.2Explanation of Key Words in the Paper.41.New Network Ecosystem Concept Towards 6G.51.1.6G Ecological Value Factors.51.2.6G Ecosystem Integration Trends.71.3.Concept of Consortium Network Ecology.82.Typical Scenarios andApplications of Consortium Networks.102.1.Typical Scenario

2、s.102.2.Typical Applications and Services.122.3.Concept of New Business Model.143.Consortium Network Design Concept.163.1.Network Autonomy.163.2.Flexibility of Service Relationship.173.3.Distributed Collaboration and Sharing.183.4.Multi-party Trustworthiness and Security Privacy.193.5.Intelligently

3、Automatic Operation.204.Consortium Network System andArchitecture.214.1.Overview of System andArchitecture.214.2.Owner Network Layer.224.3.Interconnection Layer.234.4.Network Application Layer.254.5.Consortium Right Management.264.6.Consortium Trustworthiness Guarantee.265.Related Key Technologies.2

4、85.1.Autonomous Digital Identity.285.2.Distributed Service Management.315.3.Right Management.335.4.Multi-Party Consensus Based Trustworthiness.355.5.AI Empowered Network Intelligence.375.6.Other Technologies.386.Conclusion and Outlook.44Abbreviation in the Paper.462/47AbstractWith the construction a

5、nd application of 5G networks,mobile communicationnetworks have achieved significant results in many areas such as peoples livelihoodsand vertical industries,meanwhile demonstrating tremendous commercial and socialvalue.6G will further expand and integrate with much more fields such asinformation co

6、nsumption,real economy,and so on.The new 6G network will becomea comprehensive platform for the integration of ODICT,covering air-space-groundintegration and services such as communication,sensing,computing,intelligence,andtrustworthiness.Driven by the pluralistic new-value in the future,the origina

7、l business operationmodels of various industries will continue to undergo evolution and experimentalinnovation to adapt to changing ecological demands.This will promote thereorganization and iterative updating of the ecological system,ultimately forming anintegrated and innovative ecological system.

8、Traditional centralized and universalnetwork design and operation paradigms will be difficult to meet the various needs ofthe future ecological system.This white paper proposes the consortium networkecosystem,which is a system architecture that enables the circulation of resources andservices throug

9、h the collaboration of multiple networks.It is composed of multipleowner networks,and its participants can be individuals,families,government,enterprises,operators,etc.Through the consortium network,multiple consensustrustworthiness and rights protection can be achieved,enabling flexible sharing and

10、trading of resources and services between the owner networks.This white paper is mainly composed of six parts,including the new networkecology concept,typical scenarios and applications,design principles,architecture,related key technologies,as well as summary and prospects.The first chapter started

11、from the value factors and fusion trends of the 6G ecosystem and proposes theecological concept of the consortium network.The second chapter elaborated on the3/47typical applications,benefits,and potential new business models of the consortiumnetwork from three typical application scenarios:personal

12、 and home networks,government-enterprise and industry networks,andair-space-ground integratednetworks.The third chapter described the typical characteristics of the new networkmodeloftheconsortiumnetworkbasedonthenewecologicalconceptabove-mentioned.The fourth chapter proposed a“three-horizontal and

13、two-vertical”consortium network architecture.The fifth chapter elaborated on the key technologiesof the consortium network architecture.Finally,the sixth chapter concluded the paperand looks forward to future developments.4/47Explanation of Key Words in the PaperWordDefinitionNetwork Owner/OwnerThe

14、owners of various types of networks or terminaldevices that participate in various activities within theconsortium network(such as operators as one type ofowner,or industries,enterprises,households,andindividuals as different types of owners)typically usetheir corresponding identity within the conso

15、rtium as theiridentifier within the network.These owners can generallybe mapped to legal persons,such as operators,enterprises,or individuals,or consortium with legal person status(e.g.,a vehicle networking consortium).Owner Network/NetworkThe networks that are owned by operators,industries,enterpri

16、ses,households,or individuals(whether they beoperator networks,industry networks,enterprisenetworks,home networks,or personal networks).Consortium Network/Co-NetAcross-industry ecological network system formed by theinterconnection of multiple(distributed and autonomous)owner networks through specif

17、ic protocols(such asservice registration and discovery),based on multi-partyconsensus.This system enables flexible sharing andtrading of resources and services among various types ofnetwork owners.5/471.New Network Ecosystem Concept Towards 6GIn the traditional mobile communication industry,operator

18、s have played aleading role in connecting various ecosystem partners such as equipment vendors andterminal manufacturers With the development of 5G integrated application in multiplefields such as information consumption,real economy and livelihood services,therole of mobile communication network ha

19、s gradually evolved from primarily servingmobile terminal users to serving the whole industry and even industrial ecosystem.In the 6G era,this evolution will further accelerate.The 6G network will becomea comprehensive platform for the convergence of ODICT(Operation,Data,Information and Communicatio

20、n Technology),with air,land,sea and space completecoverage worldwide.It will provide services such as communication,sensing,computing,intelligence,and trustworthiness,enabling a wide range of newapplications and services.1.1.6G Ecological Value FactorsFigure 1-1:The Value Factors of Different Stage

21、of Mobile CommunicationNetworksWith the deepening application of ODICT in vertical industries,the determiningfactors for the effectiveness of communication technology applications have becomemore complex,evolving from performance requirement to multiple factors,including6/47industrial ecosystem,poli

22、cies,and overall solutions.These influencing factors covermultiple levels such as the upstream and downstream industry chains,externalenvironment,etc.As shown in Figure 1-1,the process of integrating ODICT intovarious industries can be divided into three stages:technical design,applicationdemonstrat

23、ion,and commercial implementation.The values and development factorsare different in each stage.In the technical design stage,the main values anddevelopment factors include performance indicators of the technology,standard,andtechnological innovation.At the same time,the influence of external promot

24、ion andbrand distinctiveness are also very important.In the application demonstration stage,as the technology deepens into various industry fields,the digitization level of theindustry,the maturity of the solution,and the acceptance of new technologies byapplication enterprises will directly affect

25、the effectiveness of integrated applications.Once the application demonstration is fully validated and enters the stage ofcommercial implementation,the overall industrial ecosystem environment factorssuch as profit margin,cost,business models,and operation models will become moreimportant.If a good

26、business model cannot be established and implemented,it isdifficult to maintain and develop the ecosystem.At the same time,this stage will alsodirectly reflect the supportive role of 6G in national policies and social livelihood.At present,5G technology has been deeply demonstrated and explored in m

27、anyindustries,and some projects have entered the stage of large-scale implementation.With the deepening and expansion of industry applications,6G will face moredemands for ecologically commercial implementation,assume more responsibilities,and provide support for various industries such as informati

28、on consumption,realeconomy,and peoples livelihood services.In the future,6G technology will facechallenges in adaptability,evolution,business models,green development,and otheraspects.This also means that the value and development factors of 6G networks areconstantly diversifying.These factors not o

29、nly reflect the key challenges of 6G,butalso are the key value factors that determine the effectiveness of 6G networkapplications.7/471.2.6G Ecosystem Integration TrendsIn the early stage of exploring the integration of ODICT applications,thetechnical design stage usually starts from the characteris

30、tics of each technology,thendesigns or searches for application scenarios,and mainly uses the Key PerformanceIndicator(KPI)to evaluate the effectiveness of network applications.Differenttechnologies with similar application effects are often in a competitive relationship.With the exploration of new

31、application scenarios,and after a period of applicationdemonstration,the focus of integrated applications has gradually shifted to large-scalecommercial implementation.In the process of potential application to commercialimplementation,The importance of subjective indicators including KVIs(Key Value

32、Indicators)such as adaptability,cost,ease of use,and KDI(Key DevelopmentIndicators)such as regulations,standards,new business models,and the restructuringof the industrial chain ecosystem,is gradually becoming prominent.The competitionbetween various technologies is not only about technical indicato

33、rs,but also acomprehensive trade-off between the overall application effect and cost-benefit.Thefuture 6G era will shift from technology substitution and integration to ecosystemsubstitution and integration.Figure 1-2:6G Ecosystem Integration Trends8/47As shown in Figures 1-2,6G/5G,RedCap,NB-IoT,and

34、 Passive IoT havedifferent focuses during design and planning,and each plays its own role in differenttracks.The final implementation of technology requires a comprehensive selection oftechnical characteristics(KVI indicators)and industrial characteristics(KDIindicators).The final application scenar

35、io may be divided into multiple sub tracks,and each technology(Passive IoT,RedCap,5G,Wi-Fi,UWB)based on its technicaland ecological characteristics occupies one or several tracks.Eventually,a certainbalance may be reached.There is a trend of collaboration of various technologies infuture application

36、s,rather than a completely substitutive and purely competitiverelationship.For example,some technologies have a competitive relationship in thepositioning of the main track,but due to differences in usability,safety,and costfactors,the final application is adapted to different sub scenarios,finally

37、forming arelated industrial ecosystem.1.3.Concept of Consortium Network EcologyWith the deepening development of 5G network and ODICT integration shiftfrom exploration of technology integration to integration and reconstruction ofindustrial ecology.In order to meet the diverse application needs of i

38、ndustries,industrial characteristics and technical characteristics are also interdependent.Technical characteristics originate from the demand introduction of industrialcharacteristics,and technical characteristics also support industrial characteristics.Atthe same time,various industries will also

39、work together to find the most suitableoperational and business models,and through continuous exploration and iteration,ultimately form a new and benign integrated ecosystem.The design concept of consortium networks is connecting multiple ownernetworks through specific protocols(such as service regi

40、stration and discovery)onthe basis of multi-party consensus trustworthiness,forming a cross industry ecologicalnetwork system.This system allows for flexible sharing and trading of resources andservices among various types of owner networks,thereby reflecting the value of each9/47own in the consorti

41、um network and organically integrating the ecology in which eachown operates,better adapting to the diverse customized needs of various industryapplications.The system can also design more flexible business models,operationmodels,and pricing models,making the network more suitable for the trend ofec

42、ological integration in future development,and better serving and applying thenetwork to various industries,ultimately forming a healthy operating ecologicalenvironment.10/472.TypicalScenariosandApplicationsofConsortiumNetworksThe consortium network covers various owners such as individuals,families

43、,governments,agencies,enterprises,and operators.These owners are able to integratetheir network resources into the consortium network,achieving mutual benefit.On theone hand,each owner can purchase and use the functions and services provided byother owners in the consortium network;On the other hand

44、,the network resources canalso be provided and sold to other owners for network use,and corresponding benefitscan be obtained from it.The consortium network is an interconnected tradingplatform that enables various owners to achieve security,trustworthiness,and rightsprotection.It not only provides

45、low-cost access to functions and services,but alsoincreases monetization capabilities,which can organically integrate the networkecology of various owners.2.1.Typical Scenarios(1)Personal and Home NetworkIn personal and family scenarios,individual and family owners can add personalor home networks t

46、o the consortium network.The minimalist form of personalnetwork can be generated by a single terminal device,such as mobile terminalhotspots,personal low altitude flying devices,intelligent connected vehicles,gatewaydevices,etc.Expanding operator networks from base stations to personal and homenetwo

47、rks through various communication technologies is a cost-effective deploymentsolution for future networks,which can fully utilize the potential of personal andhome devices to solve network coverage problems and enhance terminalcommunication capabilities.At the same time,individuals and family owners

48、 can rentout their network resources to other owners through the consortium network to obtaincorresponding profits.11/47Under the consortium network system,personal and home networks can becomea part of the 6G network ecosystem,playing an important role in global coverage,ubiquitous connectivity,and

49、 other aspects.It not only effectively extendshigh-frequency coverage,but also creates a new network sharing ecosystem forterminal light asset networking.At the same time,it has also built a new bridge for theintegration of ecological applications such as personal health management,smarthomes,and th

50、e Internet of Vehicles.(2)Government,Enterprise and Industry NetworkFor government,enterprises,and industry owners,their affiliated enterprisenetworks,park networks,or industry networks can be included in the consortiumnetwork system.For example,enterprise parks can share their deployed networkequip

51、ment with operators and rent their network spectrum and purchase networkoperation and maintenance services through consortium networks.In order to meetthe privacy and security requirements of enterprise network construction,dataprocessing and other tasks are left local,and only the necessary service

52、s are purchasedfrom operators,reducing the cost of enterprise network operation and maintenance.Atthe same time,enterprises can also provide computing,storage,data and othernetwork resources to other networks through consortium networks,reducing the costand complexity of network deployment while max

53、imizing the value-added of theirown resources through service flow.For operators,this approach can reduce network construction costs and becombined with industry dedicated networks to provide customized,cost-effectivesolutions for different types of enterprises.Under the consortium network system,in

54、novative models of on-demand transactions have emerged between networks,suchas buying to renting,with companies establishing networks and operators rentingsome of the companys network services.The enterprise network can also replace theoperators network to provide access functions,which can reduce n

55、etwork limitations,improve the cost return speed of vertical industry network services,and expand thecoverage range of the operators network.The capabilities of both parties can beexpanded,achieving a double-win situation.12/47(3)Integrated Network ofAir,Space,and GroundThe integrated network of spa

56、ce and ground is an important new type of networkarchitecture in the future,which involves multiple owners such as ground operators,satellite operators,government,enterprises,and individuals.In terms of actualdeployment and operation,due to the involvement of multiple stakeholders,theinterests and g

57、oals of each party may differ.The consortium network system canbetter coordinate the interests of all parties,balance their needs,and ensure thesmooth progress of network construction and operation.Satellite operator Acandynamically share satellite network resources with satellite operator B through

58、 theconsortium network.Low Earth orbit satellites can be shared by ground operators Cof other countries when they move to different countries.Through the consortiumnetwork,platform sharing between countries can be achieved,providing ubiquitousconnections,etc.And targeted services can be provided acc

59、ording to needs,such assatellites only used for signal transmission to meet the data security needs of groundoperators in other countries.In the scenario of air-space-ground integrated network,it involves multiplefactors such as cross domain,cross-border,and cross operator trustworthy security,right

60、s protection,as well as cost control and performance experience of the entiresystem.The architecture of the consortium network is very suitable for solvingcomplex business scenarios involving multiple parties and owners.Through adecentralized security architecture and rights protection mechanism,the

61、 consortiumnetwork flexibly shares and trades resources and services between various types ofowner networks.Thus,the value of each owner in the consortium network can bereflected,more suitable for complex and diverse customized needs,and more flexiblebusiness models,operation models,and pricing mode

62、ls can be designed.2.2.TypicalApplications and ServicesIn the ecosystem of consortium networks,each owner network can provide itsown resources in the form of functions and services to other networks for use and gain13/47profits.The potential functions and services that can be provided include:(1)Lea

63、sing of Spectrum,Computing Power,and other ResourcesIn the future,various applications oriented to virtual and augmented reality,8Kvideo stream,holographic projection,smart home,fog computing,integrated artificialintelligence services,unmanned aerial vehicles and autonomous vehicle will sharplyincre

64、ase the demand for spectrum and computing power and other resources.Throughthe consortium network,the efficiency of spectrum utilization can be improved,andmore possibilities of new resource management methods can be brought.And throughthe rights system,the consortium network can also establish a tr

65、ustworthiness andcooperation environment across owners,thereby achieving dynamic cross operatorspectrum sharing.At the same time,using encryption and anonymization technology,the consortium network can protect the privacy of spectrum sharing participants andthe security of shared data,and can achiev

66、e optimal spectrum allocation on smartcontracts through algorithms.(2)Sharing of Data,Models,and other ResourcesWith the development and application of artificial intelligence,the demand forsharing data,models and other resources in the future is gradually increasing.Unlikeleased resources such as s

67、pectrum and computing power,the rights protection systemfor data and big models is more complex due to the involvement of privacy,ownership,and secondary development value.Traditional purchase and lease modelscannot maximize the rights and interests of data and model providers.By utilizingconsortium

68、 networks,data and models can be flexibly formulated and traded.Inaddition,the consortium network can introduce a reasonable reward mechanism topromote resource sharing,thereby improving the utilization and benefits of varioustypes of resources in the owner network of the consortium network.(3)Roami

69、ng Services such as Cross OwnerAccess SwitchingThrough the consortium network,it is possible to coordinate independent ownernetworks,fully utilize the network resources of individuals,families,government,enterprises,and operators,achieve ubiquitous access,and provide secure and flexibleauthenticatio

70、n/authorization settings,providing users with more convenient cross14/47owner network roaming access,ensuring wireless service continuity.On the otherhand,it can also change traditional static protocols,regulate the behavior of variousowner networks within the consortium network,create a community o

71、f interests,improve the flexibility of roaming protocols,and improve cost-effectiveness,achieving safe sharing and double-win within the consortium network.(4)Trusted Security,Rights Protection and other ServicesIn addition to the sharing,leasing,and trading of network resources andcapabilities amon

72、g various owner networks,the consortium network can also providetrusted security,rights protection,and other system platform services for each ownerthrough its own system architecture.For example,by providing services such asidentity authentication,privacy protection,asset verification,and transacti

73、onprotection for owners,the consortium network can serve as a more comprehensive,secure,and trustworthy platform,providing broader support and protection for variousowners.2.3.Concept of New Business ModelThrough the design of consortium networks,there are more possibilities forfuture network busine

74、ss models,and some potential new business models can besummarized as follows:1Change of asset ownership mode.For example,the transformation fromheavy assets to light assets,and from purchasing physical products to purchasingfunctions and services.In the design of the consortium network,the owner can

75、 selectthe network functions and services provided by other owner networks according to itsown needs.The consortium network becomes an integrated business platform that canprovide a variety of service modes,capitalizes the capabilities of each owner network,and can select corresponding network appli

76、cation modes according to the needs.Possible ways are as follows:Basic function transaction mode:such functions as basic connection,calculation,storage service,communication control and execution,including paging,access,15/47mobility,etc.Platform service transaction mode:such as industrial applicati

77、on operation,network performance management,intention engine,use case analysis,intelligentdecision-making,data search,data analysis,etc.System transaction level service mode:such as digital assets,blockchain services,etc.2Change of network construction mode.In the traditional network,it is oftenlimi

78、ted by the cost of network construction,and can not fully meet the personalizedneeds of network construction.By using the consortium network,the networkdeployment,construction,operation and maintenance methods can be very flexible,which can achieve accurate positioning of needs,and provide customize

79、d servicesquickly,accurately and at low cost.3Change of pricing and billing mode.By using the trusted security,rightsprotection and other systems of the consortium network,and combining the extremecustomization and service type selection of the above two points,it is expected toachieve more targeted

80、 pricing and billing methods between networks,including rent,purchase,on-demand,quantity based,on time and other modes,so that the demandsides can obtain corresponding services at a lower cost.In the consortium network system,more new business models that adapt todiversified needs in various fields

81、and industry applications become possible.Suchmodels can create business operation models and ecosystems that adapt to thecharacteristics of future diversified network needs,which is one of the importantvalues of the consortium network.Under the adaptive operation and business model,the network can

82、better serve various industries,thus forming a benign operatingecological environment.16/473.Consortium Network Design ConceptAccording to the ecological concept of the consortium network,the networkecology of multiple owners can be organically combined.Through the collaborationbetween networks,netw

83、ork resources and network functions can flow amongnetworks in the form of services,expand the service scope of each network owner,and allow flexible sharing and trading of resources and services between various typesof owner networks,so as to reflect the value of each owner in the consortium network

84、.The consortium network can adopt flexible business mode,operation mode andpricing mode in different scenarios for various customized demands of industrialapplications,but they all have common characteristics.The basic characteristics of theconsortium network are as follows:3.1.NetworkAutonomyNetwor

85、k autonomy is the basic requirement of consortium network.The mostbasic unit in the consortium network is the owner network,with convenient functionalorganization and its own unique application scenarios and needs.Each member of theconsortium has independent decision-making power and control power,a

86、nd canindependently manage their own resources and traffics without being affected byother members.Each member can manage and configure its own network accordingto its own needs and policies.Its infrastructure rules,connection protocols,service-oriented functions,and openness can be customized accor

87、ding to scenariorequirements,so as to better adapt to different business scenarios and needs.Forexample,in the ToB(To Business)scenario,vertical industries can independentlybuild and manage networks according to their specific requirements to achieve fullcustomization.This autonomy helps ensure the

88、flexibility and scalability of theconsortium network,enabling it to adapt to changing needs and environments.17/473.2.Flexibility of Service RelationshipFlexibility of service relationship is one of the important characteristics ofconsortium network.On the one hand,the owner network capabilities in

89、theconsortium network vary considerably,and the specialized and extremely simplifiednetwork needs services provided by other networks.On the other hand,thecommunication-sensing,artificial intelligence,computing power and other functionsof the network cannot be optimized simply without the help of ed

90、ge networks andterminals.Therefore,in the future,the service relationship between the variousowners in the consortium network will change.Not only the operator network canserve as a service provider,but also various owners in the network can provideservices and obtain benefits according to their cap

91、abilities.This will build a newnetwork ecology,which means that the network is not only a kind of consumption,butalso an infrastructure that can widely generate productivity.All owners using otherowner networks can achieve production and consumption through the network.Fromthe perspective of infrast

92、ructure construction,various owners other than operators canbuild communication facilities in the authorized frequency band with permission.Endusers can access the network through such communication facilities.Operators rent orauthorize other owners to operate communication facilities,and the owners

93、 can obtainincome through rent and service sharing.In terms of services,various owners canprovide operators with services such as computing task offloading,AI(ArtificialIntelligence)learning assistance,and surrounding awareness,and operators pay forservices.From the perspective of data,various owner

94、s can gain income by selling orleasing their digital assets.On the one hand,the owner can obtain benefits by assistingthe operator.On the other hand,in addition to the interaction between owners andoperators,owners can also interact with each other to gain benefits,such as providingrelay for remote

95、users in other owner networks,providing data cache for other ownersto reduce transmission delay,etc.18/473.3.Distributed Collaboration and SharingAs one of the core characteristics of the consortium network,distributedcollaboration and sharing emphasize the collaboration between networks.There aredi

96、fferent kinds of networks in the consortium network,including the large network ofoperators,the government,enterprise and industry network.Through cross-network,cross-region and cross-business cooperation,the consortium network is formed to be acloser whole and achieve the common goal.By sharing net

97、work resources andfunctions,the owner network can acquire capabilities beyond its own,avoid repeatedconstruction of the network,and improve the efficiency of resource utilization.Thisalso helps to reduce the threshold for deploying networks,making it possible forsimplified networks,which is of great

98、 significance to the ToB industry.For example,small and medium-sized manufacturing enterprises do not need to build a completenetwork by themselves.They just need to deploy access network nodes and servicerouting gateways,and realize core networks,auxiliary computing power,artificialintelligence and

99、 other resources through the sharing of other networks,effectivelyreducing the cost of trial and error for enterprises.The distributed collaborativearchitecture has good scalability and can flexibly support application scenarios ofvarious scales and complexities.Through the sharing of network resour

100、ces andfunctions,it can realize the rapid deployment of the network and flexible expansion ofvarious applications and services,meet the growing network needs,reduce the costand time requirements of network updates,accelerate network iterations,and improvethe performance and quality of service of the

101、 entire network.Through distributedcollaboration,the network can better support various new businesses and applications,such as virtual reality/augmented reality,automatic driving,etc.Both large-scale IoTand small-scale smart home can be effectively supported under the distributedcollaborative archi

102、tecture.This helps to improve the user experience and meet thediverse needs of users.Distributed collaboration can reduce the operation andmaintenance cost of the network,reduce the dependence on the central node,andimprove the adaptability and maintainability of the network.Through distributed19/47

103、deployment and collaborative work,the system can achieve load balancing and faultredundancy between different nodes,thus improving the reliability and stability of theentire system.Distributed collaboration combines technologies such asdecentralization and cryptography to provide better security and

104、 privacy protectionand ensure the security and integrity of user data.3.4.Multi-party Trustworthiness and Security PrivacyAll network owners in the consortium network are equal,and there is no uppercentral node,so the consortium network relies on multi-party negotiation to ensure thetrustworthiness

105、of the entire network.Multi-trustworthiness provides trustworthinessthrough multi-owner negotiation and consensus,and ensures the trustworthiness ofinteraction according to the algorithm of blockchain like consensus mechanism.Multi-party trustworthiness also includes a smart contract mechanism that

106、runsautomatically,achieving that multi-party confirmation is a fact,which avoids the riskof unilateral default.The multi-party trustworthiness guarantees the trustworthiness ofthe network in different scenarios and needs,and realizes trustworthiness between anynode in the whole network.Multi-party t

107、rustworthiness also includes distributeddigital identity,which is an interactive credential.Distributed digital identity canachieve autonomous control of identity,generate real-time digital identity withdifferent contents according to needs,and protect other information of identity fromexposure.The

108、consortium network realizes active security immunity by MimicDefense,distribution and AI,forming the native security of the network.In addition,for the interactive content,the identity of the transmission receiver and thetransmission content are encrypted through symmetric encryption and asymmetrice

109、ncryption technology in the information transmission dimension,and privacycomputing is used in the information processing dimension to ensure that dataprocessing does not disclose information.20/473.5.IntelligentlyAutomatic OperationIntelligently automatic operation in the consortium network is not

110、only used toimprove network operation and maintenance efficiency and enhance networkcommunication performance in traditional networks,but also used to ensure multipleinteractions.The consortium network realizes the trusted interaction process betweenvarious owners through multi-party trusted technol

111、ogy.Due to the lack of centralnodes or central institutions,the enforcement of third-party guarantees cannot beachieved.Therefore,the consortium network realizes the interaction and automaticexecution of contracts through intelligence.If a contract is formed through consensus,funds will be transferr

112、ed after the service is completed.The use of traditional methodsmay cause problems such as fund delay and arrears.The consortium network uses anintelligent way to ensure its operation.It adds an intelligent automatic executionfunction to the contract,and automatically transfers funds after the servi

113、ce ends.Theservice provider cannot prevent this behavior from happening through coercive means.Not only in the field of contracts,but also in other interaction modes,intelligence canensure the reliable interaction.21/474.Consortium Network System and Architecture4.1.Overview of System andArchitectur

114、eThe architecture of an consortium network can be summarized as threehorizontal and two vertical,consisting of three layers including the owner networklayer,interconnection layer,and network application layer,as well as consortiumrights management and consortium trustworthiness guarantee that run th

115、rough thethree layers.The owner network layer is the foundation of the consortium network,which includes various owner networks in the consortium network,each with its ownidentity,resources,services,etc.On top of it is the interconnection layer that connectsvarious owner networks,providing the abili

116、ty to register,discover,and call services,and achieving communication and collaboration between networks.At the top is thenetwork application layer of the consortium,which provides the ability to callunderlying services for various applications,and can achieve but not limited toubiquitous access,res

117、ource sharing,data circulation and other service capabilities.Consortium right management provides strategic planning and right managementfunctions,providing automatic contract execution,transaction strategy formulation,and other capabilities for each layer.Consortium trustworthiness guarantee provi

118、destrustworthiness and security guarantees for the entire consortium network,maintaining multiple capabilities such as multi-party consensus and privacyprotection.22/47Figure 4-1:Consortium network system and architecture.4.2.Owner Network LayerThe owner network layer is the foundation of the consor

119、tium network,composedof various independent owner networks.The owner network can be operatorsnetworks,government,enterprise and industry networks,as well as the personal andfamily networks.The owner network first needs to achieve self operation withoutrelying on external factors.It is an autonomous

120、owner,and all decisions andmanagement are made by the network owner.The owner can dominate the elementsin the network,which is the prerequisite for forming an consortium network.Theowner network can include sub-layers of networks,as well as users such as terminals.These individuals within the networ

121、k interact with other external owner networks andindividuals within the owner network through the owner network.The owner network also includes three basic elements:network identity,networkresources,and network data.Network identity is one of the foundations ofinter-connectivity between networks.Whe

122、n interacting with other networks,networkidentity is required as a credential for authentication and an identifier for contentdistribution.The consortium network is a distributed network structure without acentralized management organization,so the network identity of the consortiumnetwork needs to

123、use distributed identity mechanisms,such as DID(Decentralized23/47Identity).Network resources are an important component of inter network sharing andservices.Resources can be wireless spectrum resources,network infrastructure suchas communication,computing power,perception,or digital resources.Netwo

124、rk dataand models,together as the main elements of artificial intelligence and big dataanalysis,cannot adopt the same sharing policy as traditional resources,such as themanagement and operation data of the network itself and individual privacy data inthe network。Network data and models require a spe

125、cialized processing method.4.3.Interconnection Layer(1)Architecture OverviewThe interconnection layer is the key to achieving inter-connectivity betweennetworks,and it is viewed horizontally as a bus based network architecture.Thevarious networks in the consortium network have equal status with othe

126、rs,andtraditional centralized control cannot be deployed here.Therefore,the interactionbetween networks is achieved through a bus based interconnection architecture.Autonomous networks interact with other owner networks through interfaces on thebus,which avoids the exponential complexity of connecti

127、on management that comeswith increasing network numbers.And the bus architecture supports flexible networkjoining and exiting,without causing too much impact on other networks in theconsortium network.In a bus architecture,the interaction between networks is carriedout in the form of services,which

128、have different implementation forms.The twomainstream implementation methods currently available are distributed networkfunction management and decentralized blockchain.Distributed network functionmanagement uses Distributed Networks Management Function(DNMF)units asinteractive interfaces to complet

129、e service management by forming a registry.Decentralized blockchain style uploads information to blockchain like nodes andcompletes higher-level service transactions through multi-party consensusmechanisms.(2)Distributed Network Function Management24/47The consortium network supports high-level open

130、 and diversified networks andmulti-modal network architectures.However,the discovery and management ofnetwork topology is a major challenge that needs to be addressed.Based on keytechnologies such as computing power,data,AI,and security,the existing NRF(Network Storage Function)and SCP(Service Capab

131、ility Exposure Function)havebeen expanded to form a new network functional unit,DNMF.Figure 4-2:Figure 4-2 DNMF consortium network architectureThe DNMF within the consortium network not only maintains the basicinformation of the network control plane units,but also maintains theinformation,such as n

132、etwork function information,resource information,serviceinformation,etc,which is generated on demand based on traffic characteristics innon-operator networks.By maintaining multiple types of information,diversifiednetwork platforms can adapt to the various scenario requirements of 6G.At the same tim

133、e,DNMF provides external interfaces for various networks andundertakes the management,authentication,networking and other tasks of eachnetwork.This is conducive to achieving elastic self-organization of network topology,while implementing trusted and secure network discovery and communicationmechani

134、sms,improving the security and reliability of the entire network.DNMF isused to achieve information maintenance and updating,automatic registration,25/47deregistration,and preservation in network granularity.The information maintainedby this network function includes the service information of owner

135、 network itself,theservice information connected to other networks,and the topological connectionrelationships between networks.The service information includes owneridentification,owner network type,DNMF address information,owner networkfunctional attributes,owner network location information,owner

136、 network service areainformation,data network information,slice information,computing power resources,etc.Each network can carry out collaborative control,billing reward monitoring,maindigital asset application management and so on through DNMF.(3)Blockchain-like DecentralizationThe blockchain-like

137、decentralized architecture uses blockchain-like technologyas the bus for network interaction.The blockchain modules of each network areinterfaces on the bus,which can be divided into blockchain transaction consensusfunction modules,blockchain ledger recording function modules,and custom functionmodu

138、les.When the network owner can provide services to the outside world,theblockchain module can publish service list information,digitally sign it,and thenform transaction information to broadcast.If other network owners verify that thesignature and information correspond,the transaction information c

139、an be written intothe block.When network owners need services,they can also use the same process aspublishing service information to actively publish recruitment or reward information.When the services of the network owner change,the same process can be used topublish service updates and write them

140、into blocks.The network owner regularlyreceives and stores this information.4.4.NetworkApplication LayerThe network application layer is the highest layer in the consortium networksystem,and on the basis of the lower two layers,the network application layer isdirectly connected to the actual applica

141、tion.On the one hand,this layer can provide26/47common network basic application services,such as ubiquitous access,resourcesharing,data circulation,etc.On the other hand,this layer can provide a lower levelmapping management interface for other applications undertaken on it.In this regard,the netwo

142、rk application layer has functions of calling,organizing,and aggregating,which can arrange various resources and basic functions at the lower level,mapapplications to relevant management and control units,provide precise on-demandsupport for applications,and achieve cross owner network level service

143、 guaranteecapabilities.4.5.Consortium Right ManagementConsortium right management is an important support for achieving neworganizational models and ecosystems in consortium networks.Consortium rightmanagement includes strategic rules and right control.The strategic rules are mainlyreflected in the

144、incentive mechanism,which plays the role of resource exchange rules.It stipulates how the network negotiates the exchange of different resources,includingthe quantity and value in exchange,allowing for the personalized exchange rulesbetween networks.The representative of right control is smart contr

145、act,which is atechnical upgrade version of the contract.The contract is recorded through code and isenforced when the conditions or deadlines are met.In practice,it is also necessary tocooperate with multi-party trustworthiness technology to ensure that the results ofmandatory execution become a maj

146、ority recognized fact.Therefore,consortium rightmanagement guides and coordinates the establishment of contracts betweennetworks,and through technical design,ensures the mandatory execution ofcontracts,eliminates the phenomenon of breach of contract,and effectively supportsthe development of various

147、 upper level applications.4.6.Consortium Trustworthiness GuaranteeConsortium trustworthinessguarantee provides trustworthy interaction betweenvarious network owners in the entire consortium network.Due to the equal27/47relationship between network owners and the lack of coordination and managementby

148、 upper level institutions,achieving equal exchange of resources must be achievedthrough negotiation mechanisms between networks.The consortium trustworthinessguarantee provides capabilities such as multi-party consensus,proactive security,andprivacy protection.Multi-party consensus is the foundation

149、 for implementingincentive mechanisms,where through a certain mechanism of multi-party negotiation,consensus on resource exchange is formed.It regulates the methods used by multipleparties in the negotiation process to reach the final consensus,which can bepredetermined default rules or self defined

150、 methods by multiple parties.The activesecurity capability is formed through the distributed characteristics of the consortiumnetwork,coordinating various owner networks to form complementary active securitycapabilities,and achieving preventive measures.The privacy protection capabilityprotects the

151、privacy content of each owner during the interaction process,allowing theinteraction to be supported by trustworthy owners outside of the participating partieswithout disclosing privacy content to the outside world.28/475.Related Key Technologies5.1.Autonomous Digital IdentityThe advent of consortiu

152、m networks marks a transition of communicationnetworks from closed,unitary systems towards open,distributed,and interconnectedframeworks that encompass a wide array of actors and stakeholders,such as spectrumtraders,cable and satellite service providers,IoT and Over-The-Top(OTT)serviceproviders,whic

153、h play pivotal roles in network connectivity and related services1.Within the context of the consortium network,the role of Mobile Network Operators(MNOs)changed from conventional single network operators to the connectivityfacilitators,orchestrating the interactions among a diverse set of participa

154、nts.Thissignifies that network connectivity is transitioning into a service that spans multipledomains,dependent on the allocation of resources among various trustworthinessdomains within the consortium network.As an increasing number of participantsengage in the consortium networks where operations

155、 are disaggregated,the need forinterfaces capable of bridging these domains grows.As a result,trustworthiness is akey design principle,necessitating to be established among all parties and theirnetworks through unified access management.Consortium network is running on effective coordination among p

156、articipants,including cloud services,edge computing,and hardware suppliers,to cultivate anecosystem of diverse services from stakeholders.Thus,the coordination must beeconomically viable and provide seamlessly connectivity.As a result,participants inthe consortium network requires an interface guara

157、ntee secure authentication andauthorization,fulfilling the demands of identity and key management within a PublicKey Infrastructure(PKI).Therefore,consortium networks target at facilitatingcollaboration between various emerging and traditional participants,whilemaintaining security and trustworthine

158、ss within an open,distributed environment.Such a network architecture catering to the demands of future communications in29/47flexibility,scalability,and efficiency.Within this framework,6G encounter a varietyof challenges regarding authentication and authorization processes.For instance,5Gmobile us

159、ers primarily utilize symmetric encryption for authentication.However,during roaming,operators may employ secure transport layer protocols based onasymmetric encryption and pre-shared public keys for inter-operator communication.To implement asymmetric encryption authentication within consortium net

160、works,it isnecessary to establish and maintain a complex PKI,while also ensuring secureinterconnectivity among different operators.Moreover,the lack of a globally trusted Certificate Authority(CA),coupled withgeopolitical differences and the need to prevent single points of failure or attack,makes e

161、stablishing a unified,centralized PKI-based identity management impractical.In 5G,GSMArecommends that each MNO operates at least one root CAto mitigatesingle points of failure or attack2,but this does not solve the issue of creating auniversally trusted Certificate Authority.Furthermore,the implemen

162、tation of personaldata protection laws like GDPR in Europe heightens user concerns over data handling.In consortium networks,MNOs find it difficult to comply with privacy andtransparency regulations due to the centralized handling of personal data bythemselves and their partners.Thus,in 6G consortiu

163、m networks,a new,unifiedidentity management system is essential to overcome system heterogeneity,the lackof a universally trusted CA,and heightened personal data protection requirements.The digital identity management system in 6G must meet the universal requirementsof various stakeholders,including

164、 but not limited to users,IoT devices,MNOs,virtualmobile networks,cloud or IoT operators,manufacturers,and even network functions(NFs).While centralized PKI is viable in secure and trusted settings,it faces challengeswith interoperability,compliance with data protection regulations,and geopoliticalc

165、onstraints.Thus,consortium networks must explore alternatives,like theDecentralized Identifiers(DID)proposed by W3C3,providing a unified,secure,andtamper-proof identity management solution across domains,eliminating the relianceon centralized authorities.owners within consortium networks,including b

166、oth30/47space-based and terrestrial systems,can leverage smart contracts andblockchain-inspired technologies to document and safeguard service entitlements.This approach facilitates expanded services and cooperation,better preparing them toaddress the evolving demands and challenges of future commun

167、ications.The designof self-sovereign digital identities should adhere to the following principles:1Privacy Protection:Designed to safeguard the real identity and personal data ofthe identity subject,utilizing technologies like smart contracts and blockchain forsecure,transparent handling.2Interopera

168、bility:Ensure universal access and recognition across consortiumnetwork owners with a unique,machine-readable,standardized format,crucial formulti-stakeholder collaboration.3Verifiability:Cryptographically verifiable,allowing subjects to prove theiridentity ownership and others to validate shared pe

169、rsonal data,enhancing transactionand interaction security.4Scalability:Capable of adapting to diverse applications,evolving technologies,and emerging needs,offering versatile verification methods suitable for ownersranging from individuals to corporations.5Independence:Operate independently of any c

170、orporations,organizations,orgovernments,including identity providers and CAs,ensuring a decentralized,resilient,and secure system.Self-sovereign digital identity introduces a novel method for identitymanagement,enabling identities to be managed in a unified and decentralized mannerwithout reliance o

171、n centralized identity providers or CAs.Utilizing distributed ledger,self-sovereign digital identities provide a decentralized manner for cross-domainaccess management within a unified network.Distributed ledgers enable themanagement of access records for non-privacy-sensitive data among all partici

172、pantsby storing permissions in a format of verifiable credential.This approach shifts fromcentralized to decentralization storage,with authorization data dispersed among theowners like customer devices,which reduces the risk of single points of failure orattacks upon CAs and enables MNOs to better a

173、dhere to privacy principles.31/475.2.Distributed Service ManagementService management is an important mechanism in the service-baseedarchitecture.Compared to previous generations of traditional network architectures,5G network functions use service-based interactions between each other,with eachnetw

174、ork function providing one or more services for other network functions.Whentwo network functions communicate,they will play different roles.The NF sendingthe request plays the role of service consumer,and the NF accepting the request playsthe role of service provider.Service management is the mecha

175、nism used to determinehow service consumers can find service providers that provide the requested services.This mechanism relies on the centralized NF in the network,namely NRF.Other NFsin the same network register their services to the NRF,which then manages theservices they provide.The service inv

176、ocation between different networks furtherdepends on the interaction between the NRFs of each network.For 6G consortium network,the distribution trend of network architecture will bemore significant.The entire consortium network is composed of numerousindependent owner networks belonging to differen

177、t owners.owners can not only beoperators,but also government,enterprise,industry customers,or individual andhousehold users.The form of owner networks also far exceeds the scope of public landmobile networks constructed by operators.Considering the flexibility of service relationships in alliance ne

178、twork,thesignaling involved in service management need to carry more information,and thefrequency of occurrence will also increase.The traditional NRF-based managementmechanism need to be further enhanced to meet requirements of distributed servicemanagement,while introducing function like SCP to ac

179、hieve service routing andforwarding between networks.In addition,diverse network ecosystem participantsmean that service management mechanisms need to build a trustworthy and fairoperating environment,and provide distributed service management capabilities toencourage cooperation among all parties,u

180、ltimately achieving efficient flow ofresources and data throughout the entire alliance network.Finally,the current service32/47management of 5G networks mainly focus on the NF level,while the distributedservice management of alliance networks need to further consider network-leveldiscovery and negot

181、iation issues.As a distributed accounting system,blockchain is an organic combination of aseries of existing mature technologies,including distributed consensus,peer-to-peercommunication technology,etc.It effectively records the ledger and supports differentbusiness logic.From an external perspectiv

182、e,blockchain systems have thecharacteristics of multi-party writing,joint maintenance,public ledger,decentralization,and immutability,making it naturally suitable for the variousdemands of distributed service management in consortium networks.Figure 5-1:Blockchain based distributed service managemen

183、t solutionThe overall description of the blockchain based distributed service managementscheme is shown in Figure 5-1.In the consortium network,there are severalindependent owner networks,each of which deploys service nodes representing itsown owner.These service nodes,as blockchain nodes,together f

184、orm a blockchainnetwork as the distributed service management base of the consortium network.Service nodes provide service registration,update,deletion,invocation,and routingnegotiation for the owner network,and record service information and invocation33/47records on the blockchain.By utilizing fea

185、tures such as smart contracts and chain datastructures,the solution achieves the recording and protection of service rights,providing a method to protect the interaction between owners within the consortiumnetwork that share common goals but do not fully trustworthiness each other.Specifically,each

186、owner network joining the consortium network initiatesregistration/update/deletion requests for network capabilities or NF services todistributed service nodes belonging to the same owner.The distributed service nodethat receives the request will write the request content into the transaction,and th

187、eblockchain network will reach a consensus on the transaction.Autonomous networkscan query blockchain through distributed service nodes at any time to obtain thenecessary information.When specific content is needed,the distributed service nodesnegotiate routing,record call records on the blockchain,

188、and ultimately complete thecall.5.3.Right ManagementRightincludes rights and interests,generally referring to the roles,status,rights,and benefits assigned to owners.The protection of right not only promotes faircompetition among various network owners,enhances cooperation andtrustworthiness,but als

189、o benefits network stability and sustainable development,which is crucial for the success of consortium networks.The protection of right needsto be supported by right management,which can be divided into three functions:rightstrategy,right control,and right execution.Figure 5-2:Right in consortium n

190、etworkRight strategy is the management of policy rules in the network.In consortium34/47networks,there are various types of network owners.For example,in the internet ofvehicles,there are various network owners such as vehicle manufacturers,telecommunications operators,software and platform provider

191、s,government agencies,insurance companies,maintenance and service providers,and data analysis companies.These owners collaborate with each other in the car networking ecosystem,jointlypromoting the development and application of car networking technology to improvetraffic safety,efficiency,and conve

192、nience.By clarifying right of all parties in thenetwork through strategic rules,it is possible to balance and coordinate the needs ofvarious owners,which is conducive to achieving multi-party governance anddouble-win outcomes in the internet of vehicles.It can be seen that right strategyformulation

193、is the core of right management.Specifically,right strategy managementincludes the formulation of various strategic rules such as owner control,rightdivision,and right trading.The control strategy rules for right owners includejudgment of owner qualifications,legality,provisions of laws and regulati

194、ons onowners,provisions of contract agreements on owners,and confirmation of owneridentity.The right owner control strategy ensures right of legitimate owners andprevents illegal or non compliant owners from obtaining right.The right contentstrategy rules clarify the ownership rights,network informa

195、tion rights,service usagerights,and other rights of each owner in the consortium network,as well as theincentives/rewards that each owner should receive for their contributions to thenetwork.The right trading strategy rules stipulate various rules that both parties mustcomply with during the transac

196、tion process,such as whether there is third-party proof,how to control the transaction cycle,whether the transaction is revocable,whether toagree to scoring,specific scoring strategies,how telecom blockchain selects ledger,whether privacy protection is required,and the degree of privacy protection.R

197、ight control is the management and control of the process of right interaction.There are many processes of rights interaction in the network,such as rightsconfiguration confirmation,rights registration discovery,rights request response,etc.,which require interaction between both and even multiple pa

198、rties of the networkowner.The process of confirming right allocation refers to the network determining35/47the right information of participating owners(such as ownership,management,pricing,sharing ratio,etc.)based on right strategy rules,and sending the rightinformation to the corresponding network

199、 owner that owns the right,so that thenetwork owner can not only understand its own rights in the network,but also chooseto accept or reject the rights configured by the network.The process of discoveringrights registration refers to each network owner being able to register the rightsinformation co

200、rresponding to the resources and services they provide to a centralizedrights information database or use blockchain,so that users of resources and servicescan conduct fair transactions on the premise of seeing and recognizing these rightsinformation.The process of rights request response refers to

201、the network owneractively initiating requests for its own rights based on its own capabilities,and themanagement party(such as notary public,trading platform party)or user in theconsortium network responds to the rights request.Right execution is the management of the actual execution process of rig

202、htstrategies and right controls.Right execution involves a series of operations andactivities related to right to ensure the effective implementation and maintenance ofright management.Specifically,the operations carried out by rights include:determining and setting the rights of network owners,quer

203、ying rights of networkowners,modifying or updating rights,terminating or revoking rights of networkowners,and restoring terminated or damaged rights.In right management,right strategy provides guidance for right control and rightexecution.Right control ensures the effective implementation of right s

204、trategy,whileright execution is the specific means to achieve right strategy.Through thecollaborative work of these three functions,comprehensive protection of right ofnetwork owners can be achieved.5.4.Multi-Party Consensus Based TrustworthinessIn distributed systems,the lack of a commonly trusted

205、centralized authority leadsto the unreliability of resource and service exchanges between nodes.Consequently,36/47there is a pressing need for trustworthiness establishment.One approach involvesestablishing a trustworthiness evaluation system based on past behavior of nodes,where one could determine

206、 the confidence level of nodes through credit scoring.However,its efficacy is contingent on the history of interactions,limiting itsreliability for new or infrequent interactions.To overcome this limitation,the conceptof multi-party consensus has emerged,fundamentally establishing trustworthinessthr

207、ough the collective participation and negotiation of multiple parties.Atypicalrealization is blockchain-based consensus mechanism,which utilize decentralizedledgers and smart contracts to enable autonomous trustworthiness establishment andmanagement,eliminating the need for external validation.Block

208、chain addresses data security and sharing issues in traditionalcommunication networks by enhancing network resilience and adaptability inenvironments where trustworthiness is not assumed.Early in consortium networkdevelopment,integrated blockchain plays a crucial role,allowing for tight interactionb

209、etween the blockchain and communication networks,encompassing both offline andonline interaction.For instance,in blockchain-based identity verification,informationowners or authorized parties store credentials or hash values on the blockchain.Through a communication request,a network owner verifies

210、the credentials ofrequester against the blockchain.If authentication successes,the connection requestwill be accepted,enabling a flexible and secure verification mechanism withinconsortium networks.As consortium networks evolve,blockchain will become increasingly integratedand embedded to communicat

211、ion networks,developing into an essential component.In this integration,blockchain algorithms,communication protocols,and enablingfunctions will be fully incorporated into the functionalities and protocols ofcommunication networks.In such an intertwined form,blockchain operations,including writing a

212、nd searching,will occur in real-time and online as part of thecommunication process.Implementing blockchain technology in communicationnetworks for real-time applications presents several challenges,and three coreobjectives must be prioritized:37/471.Blockchain Theoretical Basis for Consortium Netwo

213、rks:ConsortiumNetworks require a real-time and scalable blockchain system as a reliable foundation.Developing theories specifically designed for consortium networks,while consideringthe distinct features of various network types,is crucial to guarantee the successfulapplication of blockchain in a ra

214、nge of diverse and evolving environments.2.Adaptive Blockchain Architecture for Consortium Networks:The architectureneeds native design to meet the unique demands of consortium networks,includingdeterministic low latency and high throughput,and privacy considerations.It iscrucial to develop an archi

215、tecture that efficiently processes data and signaling,ensuring immutable recording.3.Blockchain Platform Tailored to Consortium Networks:Building a cloud-edgeintegrated blockchain platform tailored for communication networks is vital infacilitate the exchange of services and resources among network

216、owners,accommodating various forms of networks.5.5.AI Empowered Network IntelligenceThe interaction between the owner networks in consortium networks is frequent,and relying solely on fixed strategies and manual control is rough and slow.At thesame time,it cannot meet the trustworthiness of the inte

217、raction.Therefore,intelligently automatic operation has been widely applied in consortium networking.By utilizing advanced algorithms and model libraries,including machine learning,deep learning,and reinforcement learning algorithms,and through large-scalelanguage model training and distributed gene

218、ration of multiple networks,the entirenetwork can achieve a higher level of autonomy.The network can achieve functionssuch as automated decision-making,resource management,and traffic scheduling.This will help improve the operation efficiency and response speed of the network,and reduce operation co

219、sts.For example,nodes can collaboratively adjust routing andtraffic allocation based on traffic load conditions to improve network performance.Atthe same time,intelligently automatic operation will also support personalized service38/47needs,providing users with a higher quality and efficient networ

220、k experience.As theenvironment and traffic requirements change,the network can automatically adjust itsoperating parameters and strategies to adapt to the changing environment andrequirements.This helps to improve the flexibility and scalability of the network.Intelligently automatic operation is al

221、so reflected in the rapid response and handlingof abnormal events.By monitoring and analyzing network status data in real-time,thenetwork can detect abnormal events in a timely manner and handle them quickly.Thishelps to reduce the risk of failures and improve the reliability of the network.Meanwhil

222、e,intelligent automatic operation also helps improve the adaptability of thenetwork.5.6.Other Technologies(1)Rapid Establishment of Network ServicesWith the assistance of multi-party consensus and distributed service management,multiple network owners within an alliance network can establish network

223、 servicewith clients,part of whom are even not affiliated with the subjects.Simultaneously,with the exponential growth in access demands,the quality of service(QoS),multi-party management,and security are confronted with significant challenges.Thetechnology for fast establishment of network service

224、will provide an efficient andsecure provision of network services under the premise of ensuring QoS,thus offeringa solution to the dilemma of cross-domain access in the alliance network.In conventional schemes,clients are required to sign contracts with networkowners in advance if they want to be of

225、fered network service.Only after buildingtrustworthiness between clients and subjects can the network owners provide therequired service to the clients.However,through the technology of fast establishmentof network service,the subjects can immediately provide network service to clientsonce the clien

226、ts send requests.By splitting service and signing smart contractsmultiple times,the technology can skip the complex process of establishingtrustworthiness and thereby manage to rapidly establish network service.39/47Figure 5-3:Scheme for establishment of network serviceFig.5-3(b)illustrates the work

227、ing principle of this technology,whose workflowcan be described as follows.In the beginning,the client sends a service request to the network ownerwithin the alliance network.Upon receiving the request,the network owner immediately provides serviceto the client.The whole service process is divided i

228、nto multiple rounds.Each round beginswith a trial service for a given duration provided by the network owner.Before the end of each trial service,the client commits to paying the fees tothe network owner by signing a smart contract.The fees include the cost for the trialservice the client already re

229、ceived and the cost for the remaining duration in thecurrent round,thus compensating for the risk the network owner takes in offering probono services.If the client honestly signs the smart contract and commits to paying asdemanded,the network owner immediately provides the rest of the service and a

230、lsouploads the smart contract to the blockchain network before the end of this round.Once the block containing the smart contract is successfully added to the blockchain,the fees are automatically transferred from the client to the network owner.If the client refuses to pay in respect of the smart c

231、ontract,the network ownerceases to provide the rest of the service and terminates their cooperation.40/47 If both sides act honestly,they can complete the round and then start a newround by repeating the steps above until the successful completion of the wholeservice.The client can terminate the ser

232、vice by refusing to pay in a specific round,andthe network owner can stop providing services as well to halt the cooperation.This cross-domain access framework for fast establishment of network servicehas the following advantages:If clients are unsatisfied with the network service provided by the su

233、bjects inthe alliance network or detect any improper conduct.,they can leave at any round,thus ensuring QoS and addressing the limited oversight of off-chain operations indistributed systems.By utilizing the concept of multiple interactions,the framework eliminates therelatively complex process of e

234、stablishing trustworthiness and provides faster networkservice.Furthermore,it reduces access latency and brings more immediate andefficient service by allowing the subject to provide service before the smart contract isuploaded to the blockchain network.Since clients do not need to establish trustwo

235、rthiness with the subjects in thealliance network in advance,the framework is more flexible compared withconventional schemes.Therefore,it enhances the trustworthiness relationship betweenclients and subjects and also incentivizes cooperation between both sides withoutrelying on trusted third partie

236、s,thus facilitating the efficient handling ofhigh-frequency service establishment requests and tackling the problem of surgingdemands in the alliance network.(2)Blockchain-based Network Layer SolutionBlockchain security significantly depends on consensus nodes.However,thechallenge is magnified in co

237、mmunication networks due to device diversity,dataheterogeneity,and complexity,complicating the assurance of consensus nodereliability.The risk of malicious base stations blocking information spreadnecessitates Byzantine Fault Tolerant(BFT)protocols for owner network layerdissemination,aiming for eff

238、icient,universally trusted networks.Traditional Practical41/47Byzantine Fault Tolerance(PBFT)protocols face scalability issues in networks withmany base stations.Adual-layer blockchain consensus approach overcomes theseissues,better aligning with the needs for fast consensus,parallel processing,high

239、throughput,low latency,cost-efficiency,scalability,and security in communicationnetworks.Figure 5-4:Structure of DAG-based cross-chain collaborative CMFigure 5-4 illustrates the cross-chain collaboration consensus structure based onthe Directed Acyclic Graph(DAG)blockchain.The Chain 1,Chain 2,Chain

240、3represent an independent local blockchain system which can be constructed in A1,O1,O2,E2,F1-c,F1-u,CUS-Plane and M-plane.Besides,the number of local chainsystem should be predetermined to prevent generation of malicious local chain system.Through partition independence and cross-layer collaboration

241、,this approach achievesan effective integration with communication networks.By ensuring security,privacy,and resource slice independence at the base layer,it addresses the decentralizationneeds of a universally trusted network without overly simplifying the complexityinvolved through two layers of t

242、he consensus:DAG-based cross-chain collaborativeconsensus and independent consensus in the local blockchain system.1Layer 1:PoW-based block generation consensus mechanismEvery node in the whole blockchain system will generate and receive transactioninformation only in the local chain system.For exam

243、ple,a node in Chain1 blockchain42/47system can only receive transaction information within Chain 1,not from Chain 2 orother independent local blockchain system.When blockchain nodes receivetransaction information,it will verify transaction legitimacy by verifying transactioncompleteness and transact

244、ion validity.When transaction verification failed,it will notbe packaged into new block.During the verification,the blockchain node tries tosolve a PoW problem which co-proposed by local chain system information(used toadjust block generation rate)and blockchain difficulty information(used to assure

245、that PoW problem difficulty level is same for each local blockchain system and assurethat PoW problem is different for new block).The first node that solved PoW problemcan broadcast the new block with the successfully verified data set.2Layer 2:DAG-based cross-chain collaborative consensusStep 1:If

246、a node generated a new block,the node will be awarded with certainweight(say 1)and the node needs to verify two different blocks(call it head)thatwith weight 1(this information stored locally in DAG ledger)for the blocklegitimacy and cross-chain transaction verification.Step 2:When verification pass

247、ed,the block will broadcast to the globalblockchain nodes.Step 3:The new block in local blockchain system is now as the head in theblockchain system,which wait for verification by node in other blockchainsystems.Step 4:Only a transaction is legal globally when the accumulated weight meetsthe thresho

248、ld of the consensus.Note:The weight in DAG is accumulated by the number of blocks that generatedafterwards.Due to the“longest chain”rule,which is the transactions in the longestchain blocks is legal globally,malicious forks(diverges mainchain into twoblockchains with an honest chain(where the chain

249、is expanded by honest nodes)and amalicious chain)require computing resources larger than 51%.43/47Figure 5-5 Cross-chain transaction confirmation processFigure 5-5 shows the cross-chain transaction confirmation process,where Chain1 User lunch transaction with Chain 2 User.It shows that the transacti

250、on informationin independent blockchain systems will broadcast to the blocks in that system.Besides,Transaction lunched by Chain 1 User or lunched by Chain 2 User is the samein the scope of transaction confirmation process.It also shows that different layershave connections to achieve cross-chain co

251、llaborative consensus.To reduce the effectcaused by interconnection,this consensus mechanism verifies cross-chain transactionand ordinary transaction in different way.Cross-chain transaction verification isdistributed to all the interconnected nodes in the global blockchain system,whichgreatly impro

252、ves the difficulty of double spending on cross-chain transaction.Verification of cross-chain transaction is a supplement for ordinary transactionverification original blockchain system.By this method,it can collaborate blockchainsystem and ensure that each local blockchain system keep its independen

253、ce.44/476.Conclusion and OutlookEinstein once said:Aproblem cannot be solved from the level that causes it toarise.After decades of development,the industry generally believes that in the 6G era,mobile communication networks need to rise to higher dimensions in order to open upnew business spaces an

254、d expand customer base,create new growth points andbusiness models.The consortium network has emerged,which organizes networksbelonging to different owners(such as ground and satellite operator networks,government,enterprise and industry networks,households and personal networks)together.Through int

255、erconnectivity,trustworthy security,and right protection,it formsan ecosystem where resources,functions,and services can be shared and traded witheach other.While reducing resource acquisition costs,it increases monetizationcapabilities,creating a lighter and more cost-effective,higher-return on inv

256、estmentand more ubiquitous network infrastructure.The ecosystem of consortium networks cannot be achieved overnight.Althoughthis white paper is called the consortium network system and architecture white paperfor 6G,it does not mean that it is necessary to wait for 6G to start the technology andindu

257、strial practice of consortium networks.In fact,in recent years,relevant practiceson a global scale have been constantly evolving.The domestic IMT2030 hasconducted discussions and tests on the architecture of distributed owner networks andblockchain trusted networks.In Europe,there are architecture d

258、esigns represented bysubnets/networks of networks,and in the United States,there are commercialpractices represented by HELIUM that combine WEB3 and wireless communicationnetworks.These practices provide some early validation of relevant technologies orbusiness models for the consortium network.Base

259、d on this,the consortium networkcan rebuild its system and architecture and embark on a more stable,feasible,andconsensus based development path.As the worlds first white paper titled consortium network,this white paper onlycovers the basic concepts,value scenarios,core features,system and architect

260、ure,and45/47key technologies of consortium network.The purpose is to introduce consortiumnetwork to telecommunications industry practitioners and non telecommunicationsindustry partners,and invite experts and scholars from industry and academia to jointhe ecosystem of consortium network,continuously

261、 improve the business andtechnical system of the consortium network,and promote its continuous evolutiontowards maturity.46/47Abbreviation in the PaperAbbreviationFull nameODICTOperation Data Information Communication TechnologyKPIKey Performance IndicatorKVIKey Value IndicatorKDIKey Development Ind

262、icatorToBTo BusinessAIArtificial IntelligenceDIDDecentralized IdentityDNMFDistributed Networks Management FunctionNRFNetwork Repository FunctionSCPService Capability Exposure FunctionMNOMobile Network OperatorsPKIPublic Key InfrastructureCACertificate AuthorityNFNetwork FunctionISIdentity SubjectSBA

263、Service-based ArchitectureQoSQuality of ServicePBFTPractical Byzantine Fault ToleranceDAGDirect Acyclic GraphPoWProof of Work47/47White Paper Contributors:NumberMain contributors1ZTE Corporation2China Telecom Research Institute3Beijing University of Posts and Telecommunications4Southeast University5CICT Mobile6China Unicom Research Institute7VIVO

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(全球6G技术大会:2024年面向6G的联盟网络体系架构白皮书(英文版)(48页).pdf)为本站 (白日梦派对) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
会员动态
会员动态 会员动态:

 172**75... 升级为标准VIP wei**n_...  升级为标准VIP 

wei**n_... 升级为标准VIP  wei**n_... 升级为高级VIP

135**82... 升级为至尊VIP  130**18... 升级为至尊VIP

wei**n_... 升级为标准VIP wei**n_... 升级为至尊VIP 

 wei**n_... 升级为高级VIP 130**88...  升级为标准VIP 

 张川 升级为标准VIP  wei**n_... 升级为高级VIP

 叶**  升级为标准VIP wei**n_... 升级为高级VIP 

138**78...  升级为标准VIP  wu**i 升级为高级VIP

wei**n_...  升级为高级VIP wei**n_... 升级为标准VIP 

 wei**n_... 升级为高级VIP  185**35... 升级为至尊VIP

wei**n_... 升级为标准VIP  186**30... 升级为至尊VIP 

156**61...  升级为高级VIP  130**32...  升级为高级VIP

 136**02... 升级为标准VIP   wei**n_... 升级为标准VIP

 133**46... 升级为至尊VIP  wei**n_...  升级为高级VIP

 180**01... 升级为高级VIP  130**31... 升级为至尊VIP 

wei**n_... 升级为至尊VIP 微**...   升级为至尊VIP

 wei**n_... 升级为高级VIP   wei**n_... 升级为标准VIP 

 刘磊  升级为至尊VIP  wei**n_... 升级为高级VIP 

班长 升级为至尊VIP  wei**n_... 升级为标准VIP 

176**40... 升级为高级VIP  136**01... 升级为高级VIP 

159**10...  升级为高级VIP  君君**i... 升级为至尊VIP

 wei**n_... 升级为高级VIP  wei**n_...  升级为标准VIP

 158**78... 升级为至尊VIP   微**... 升级为至尊VIP

185**94...  升级为至尊VIP  wei**n_...   升级为高级VIP

139**90... 升级为标准VIP 131**37... 升级为标准VIP 

钟**   升级为至尊VIP wei**n_...  升级为至尊VIP

139**46...  升级为标准VIP wei**n_... 升级为标准VIP  

wei**n_...  升级为高级VIP 150**80... 升级为标准VIP

wei**n_... 升级为标准VIP  GT 升级为至尊VIP 

186**25... 升级为标准VIP  wei**n_... 升级为至尊VIP 

 150**68... 升级为至尊VIP  wei**n_...  升级为至尊VIP

 130**05... 升级为标准VIP  wei**n_... 升级为高级VIP

wei**n_...  升级为高级VIP wei**n_...  升级为高级VIP

 138**96... 升级为标准VIP  135**48... 升级为至尊VIP

wei**n_... 升级为标准VIP  肖彦 升级为至尊VIP

 wei**n_... 升级为至尊VIP   wei**n_...  升级为高级VIP

wei**n_...  升级为至尊VIP   国**... 升级为高级VIP

158**73...  升级为高级VIP wei**n_...  升级为高级VIP

 wei**n_... 升级为标准VIP  wei**n_... 升级为高级VIP

136**79... 升级为标准VIP  沉**... 升级为高级VIP

 138**80... 升级为至尊VIP 138**98... 升级为标准VIP 

  wei**n_... 升级为至尊VIP wei**n_...  升级为标准VIP

 wei**n_... 升级为标准VIP  wei**n_... 升级为至尊VIP

189**10...  升级为至尊VIP wei**n_...  升级为至尊VIP

  準**... 升级为至尊VIP 151**04... 升级为高级VIP 

 155**04... 升级为高级VIP   wei**n_... 升级为高级VIP 

sha**dx... 升级为至尊VIP 186**26... 升级为高级VIP

136**38...  升级为标准VIP  182**73... 升级为至尊VIP

 136**71... 升级为高级VIP 139**05... 升级为至尊VIP 

 wei**n_... 升级为标准VIP wei**n_...  升级为高级VIP