Extending the ODA standards to enable B2B2X multi-party offerings across multiple domains
The DBM: Securing the supply chain - Phase VII Catalyst builds on the project’s DNA and earlier awards - which include Innovation, Business Impact, Contribution and the prized Moonshot award, to help trigger the work to uplift the ODA for interoperability and process automation for 5G and B2B2x partnership models
Extending the ODA standards to enable B2B2X multi-party offerings across multiple domains
Commercial context
Establishing a standard open digital architecture (ODA) for B2B2x partnerships is essential to enable value propositions such as CaaS with private 5G, similar services on 5G slices, SASE services with cloud compute, SAAS bundled with MPLS-VPN and business internet, and 5G data bundled with VR gaming.
There are many other applications where a standard ODA is critical - without it, seamless adoption of commercial models is impeded for many industry sectors otherwise on the cusp of providing sophisticated digital services. A prime example is the gaming industry: leading providers like AWS and Google, along with their VR/AR gaming service partners, require interoperability with the CSP and scalability to maintain quality of service (QoS) agreements with the end customer. This necessitates standardized partner onboarding, partner agreements-driven offer management, offer driven orchestration framework, and a dynamic settlement framework that takes into account usage on 5G core, edge, and number of instances etc. to enable seamless VR gaming over 5G standalone networks. Only by doing so can the industry ensure consistent gaming experiences across both the core and edge. This is also true of other sectors which require similar applications such as transportation, VPNs and streaming services.
The supply chain is also acutely affected by the absence of open standards. Enterprise and governments are keen to adopt zero-trust techniques within cybersecurity frameworks, but this requires standards to incorporate all partners in a supply chain. Ultimately, zero touch leveraging zero trust is crucial to enterprise and governments in their broader mission to integrate digital twins (DT) and AI into smart environments—be it factories, power grids, or office blocks. The shift towards a holistic zero-trust partner architecture from traditional ‘moat security’ models underpinned by VPNs is critical to remove the current reliance on manual processes, which exposes vulnerabilities, such as the use of USB sticks in the supply chain. Automated, secure zero-trust handshakes and zero-touch processes can significantly mitigate these risks.
The approach
The purpose of the DBM: Securing the supply chain - Phase VII Catalyst is to explore the B2B2x ODA requirements with ODA core workstreams and to find a way to trigger the work to uplift the ODA to be able to articulate B2B2x, to enable interoperability and process automation for 5G and B2B2x partnership models.
Gaming services and secure supply chains are just two of the compelling use cases which require a repeatable approach for CSPs and their partners. The work needs to ensure that the ODA model is being extended to simultaneously support the hundreds of other B2B2x use cases. A key part of this process is the standardization of the APIs across various applications especially in SCM, orchestration and settlement.
For gaming services, standards need to provide transparency in pricing and performance of network services, allowing consumers to pre-agree on price and QoS as they roam across different networks. This standardization involves aligning partner agreements and offer management, facilitating orchestration using the TMF Open APIs, accurate invoicing to the end customer which accounts for usage at the various network domains, and settlements between hyperscalers, CSPs, and gaming software vendors. The orchestration layer plays a crucial role in automating service registration and management on 5G slices, which dynamically allocates network resources to support high-performance VR gaming experiences. While this use case sounds familiar, at this moment in time it can only be deployed on a bespoke project basis, because the ODA requires additional capabilities which enable it as an agreed repeatable pattern.
The Catalyst uses a proprietary B2B2x approach to enable zero-trust and zero-touch processes which automate and secure interactions across the entire supply chain. Each device and endpoint within the supply chain undergoes a zero-trust handshake spanning all the supply chain partners, ensuring that only authenticated and authorized devices can access the network. This handshake is followed by zero-touch deployment, which automates the configuration and management of devices without manual intervention. By eliminating manual processes, the solution reduces vulnerabilities and enhances the overall security posture of the supply chain.
The automation applies to partner onboarding agreements, offer management, and shopping cart interactions to orchestration of the various services which involve underlay and overlay to in-life management of devices and resources – at every step there is security and efficiency. This comprehensive approach supports compliance with regulatory requirements and cybersecurity recommendations, and enables continuous monitoring and adaptive security measures.
While the Catalyst and ODA already include many of the capabilities to support these use cases, ODA still needs additional capabilities to articulate B2B2x. An earlier phase of this Catalyst made significant progress towards articulating a standard B2B2x framework, highlighting the need for several extensions to the ODA to support zero-trust repeatable patterns – captured in IG1317.
This Catalyst phase focuses on an advanced, production-grade demonstration to underscore the additional functional processes needed to deliver multi-party zero-trust requirements, as identified in IG1317. With this inspiration, the Catalyst team worked with the ODA API flow workstream to explore how to demonstrate the ODA gaps.
The work identified the need to extend the IG1228 sequence chart tooling to be able to articulate B2B2x so that the DBM outputs can be presented for the ODA API call workstream reviews. The B2B2x use case sequence charts can now be used to capture B2B2x use cases, assisting in the evaluation and development process. This work is in conjunction with the ODA API flow workstream to identify areas where new or current APIs or components are needed.
Wider application and value
The broader implications of standardizing B2B2x models and integrating zero-trust frameworks are profound. For the gaming industry, consumers will benefit from predictable and transparent network service agreements, which create consistency on pricing and quality. This means new revenue streams for network providers, cloud players, gaming service providers, automotive companies and many other organizations within the broader ecosystem. This ultimately paves the way for new and more efficient operational processes in a host of other verticals like healthcare vendors, large manufacturing enterprises and governments.
For the supply chain, and for the ‘smart’ services ecosystem in general, a standard model for zero trust and zero touch is fundamental. This is because it creates a clear method to protect against cybercrime, and of automating partnerships – not just for gaming and supply chain, but across all industries. This standardization will improve operational efficiency for all in the ecosystem and drive the deployment of innovative smart scenarios, such as smart factories and smart energy systems. The indirect impact on new revenues and cost reduction cannot be overstated, as enterprises and governments begin more meaningful digitization and gamification of their services using DT and AI, frameworks like this are the bedrock upon which they will be built.
As explained by Srijagadish Baddukonda, Architect – B2B at DT, “the implementation of these standards promises to reduce operating costs by 50-75% and increase average revenues per customer by three to five times. It addresses the pent-up demand for digitization, enhancing global digital transformation efforts. It enables different business models for CSPs by fostering a secure, standardized environment and paves the way for robust cybersecurity practices, compliance with regulatory standards, and provides a significant boost in trust and transparency among supply chain partners. Ultimately, it promotes a more cyber-resilient and innovative society, driving economic growth and ensuring the continuity of critical infrastructure.”