Dynamic information network with built-in artificial intelligence

Keywords: user-centric network, decentralized technology, software-configured network, virtualized network function, digital user domain, 6G platform artificial intelligence, proactive network service provision, intelligent subscriber access management


The architecture of the user-oriented network, which involves the use of a dedicated subscriber network that combines all the necessary functions for the provision of information services, has been studied. Considering the advantages of UCN technology, it is determined that the user-centric architecture of the radio network is naturally and ideally combined with a decentralized technology that is invulnerable to DDoS attacks and single points of failure (SPOF). The peculiarities of planning the operation of large network systems under the condition of guaranteed provision of information services are considered using existing solutions obtained as a result of research on the operation of data centers and their application on a network scale with support for several tenants and parallelism. The obtained results of research on distributed systems indicate that the main goal should be to increase efficiency, not optimality. The peculiarities of providing each client device with its own "private" virtual instance of the core network through a decentralized structure of virtual machines or containers using flexible software-configured networks (SDN) and virtualized network functions (NFV) have been studied. The ideology of the UCN architecture is considered, which is to form a fundamental, flexible, secure and reliable network architecture with a simple structure and a full set of functions. The specified functional characteristics increase the reliability of the 6G network. The peculiarities of the formation of the user's digital domain based on the UCN approach with a well-defined boundary containing data resources such as user profile, service profile and resource profile (including network resources and end equipment resources) are studied. As a result, the rules for managing valuable digital assets owned by the user in full compliance with regulatory requirements for security and privacy have been defined.


1. 3GPP, System architecture for the 5G system, 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 23.501, Aug. 2020, version 16.5.1.
2. I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol. 11, no. 1, pp. 17–32, 2003.
3. M. Grieves, Digital twin: Manufacturing excellence through virtual factory replication, White paper, vol. 1, pp. 1–7, 2014.
4. Васильківський, М., Нікітович, Д., & Болдирева, О. (2022). Керування доступом до інформаційних даних в інтелектуальних інфокомунікаційних мережах. Measuring and computing devices in technological processes, (4), 5–17.
5. Васильківський, М., Варгатюк, Г., & Болдирева, О. (2022). Дослідження архітектури штучного інтелекту для інфокомунікаційних мереж 6G. Measuring and computing devices in technological processes, (4), 62–70.

Abstract views: 0
PDF Downloads: 0
How to Cite
Vasylkivskyi, M., Boldyreva , O., Onyshchuk , D., & Hnatenko , Y. (2023). Dynamic information network with built-in artificial intelligence. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (50), 36-45. https://doi.org/10.36910/6775-2524-0560-2023-50-05
Computer science and computer engineering