page_number
int64
0
97
document_source
stringclasses
1 value
page_content
stringlengths
175
3.92k
0
/content/sample_data/Use-case-AN.pdf
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Technical Specification TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (28 October 2021 ) ITU-T Focus Group on Autonomous Networks Technical Specification Use cases for Autonomous Networks
1
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) i Summary This is a deliverable of the ITU -T Focus Group on Autonomous Networks (FG -AN). This document analyses use cases for autonomous networks. It provides use case descriptions and indicates the basic set of possible requirements for each use case. The use cases are divided into categories, priorities are indicated, and actor -interaction d iagrams are added. Keywords Artificial Intelligence, autonomous networks, components, machine learning, requirements, use cases Contributors: Abhay Shanker Verma TEC, Ministry of Communications India Email: as.verm a@gov.in Abhishek Dandekar Fraunhofer HHI Germany Email: abhishek.girish.dandekar@hhi - extern.fraunhofer.de Abhishek Thakur Institute for Development and Research in Banking Technology (IDRBT) India Email: AbhishekT@idrbt.ac.in Albert Cabellos -Aparicio Barcelona Neural Networking Universitat Politècnica de Catalunya Barcelona, Spain Email: alberto.cabellos@upc.edu Albert López -Brescó Barcelona Neural Networking Universitat Politècnica de Catalunya Barcelona, Spain Email: alopez@ac.upc.edu Alfons Mittermaier Highstreet Technologies GmbH Germany Email: alfons.mittermaier@highstreet - technologies.com Ammar Muthanna SPbSUT Russian Federation Email: ammarexpress@gmail.com Andrey Kucheryavy ITU-T SG11 Chairman Email: akouch@mail.ru Ashish S Sharma Fraunhofer HHI Germany Email: ashish.sanjay.sharma@hhi.fraunhofer.de Bing Qian China Telecom China Tel: +8618511588556 Email: qianbing@chinatelecom.cn Chi Wang Microsoft Email: wang.chi@microsoft.com
2
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) ii Cleverson Veloso NAHUM Federal University of Pará Brazil Email: cleversonahum@gmail.com Dan Xu China Telecom China Tel: +86 10 5090 2570 Email: xudan6@chinatelecom.cn Gerhard Wieser FRINX Slovakia Email: gwieser@frinx.io Gokhan Kalem Turkcell Teknoloji Turkey Email: gokhan.kalem@turkcell.com.tr Guillaume Quintard Email: guillaume.quintard@gmail.com Jiaxin Wei China Unicom China Email: weijx29@chinaunicom.cn Jose Alcaraz Calero University of the West of Scotland (UWS) United Kingdom Email: Jose.Alcaraz -Calero@uws.ac.uk Julius Schulz -Zander Fraunhofer HHI Germany Email: julius.schulz - zander@hhi.fraunhofer.de Khakimov Abdukodir SPbSUT Russian Federation Email: khakimov -aa@rudn.ru Laurent Ciavaglia Rakuten Mobile Japan Email: laurent.ciavaglia@rakuten.com Liya Yuan ZTE Corporation China Email: yuan.liya@zte.com.cn Marco Gramaglia University Carlos III of Madrid Spain Email: mgramagl@it.uc3m.es Michaela Blott Xilinx United States Email: mblott@xilinx.com Michele Polese Northeastern University United States Email: m.polese@northeastern.edu Miquel Ferriol -Galmés Barcelona Neural Networking Universitat Politècnica de Catalunya Spain Email: mferriol@ac.upc.edu
3
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) iii N. V. Narendra Kumar Institute for Development and Research in Banking Technology (IDRBT) India Email: NVNarendra@idrbt.ac.in Nik Sultana Illinois Institute of Technology United States Email: nsultana1@iit.edu Ozgur Ercetin Professor, Electronics Engineering Sabanci University Turkey Email: oercetin@sabanciuniv.edu Pål Hermunn Johansen Varnish Software Sweden Email: hermunn@varnish -software.com Paul Harvey Rakuten Mobile Japan Email: paul.harvey@rakuten.com Pradipta Biswas Indian Institute of Science (IISc) India Email: pradipta@iisc.ac.in Qi Sun China Mobile China Email: sunqiyjy@chinamobile.com Qi Wang University of the West of Scotland (UWS) United Kingdom Email: Qi.Wang@uws.ac.uk Ranjana Sivaram TEC, Ministry of Communications India Email: ranjana.sivaram@gov.in Salih Ergut Oredata Turkey Email: salih.ergut@oredata.com Shabnam Sultana Highstreet Technologies GmbH Germany Email: shabnam.sultana@highstreet - technologies.com Sirko Straube DFKI Germany Email: sirko.straube@dfki.de V. Udaya Sankar SRM University -AP India Email: udayasankar.v@srmap.edu.in Vijay Kumar Roy TEC, Ministry of Communications India Email: vk.roy@gov.in
4
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) iv Vishnu Ram O.V. Independent Expert India Email: vishnu.n@ieee.org Wei Gao China Unicom China Email: gaow25@chinaunicom.cn Yongsheng Liu China Unicom China Email: liuys170@chinaunicom.cn
5
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) v CONTENTS Page 1 SCOPE ................................ ................................ ................................ ................................ ................................ ..... 1 2 REFERENCES ................................ ................................ ................................ ................................ ........................ 1 3 TERMS AND DEFINITIONS ................................ ................................ ................................ ............................... 1 3.1 TERMS DEFINED ELSEWHERE ................................ ................................ ................................ ................................ . 1 3.2 TERMS DEFINED HERE ................................ ................................ ................................ ................................ ........... 1 4 ABBREVIATI ONS ................................ ................................ ................................ ................................ ................. 2 5 CONVENTIONS ................................ ................................ ................................ ................................ ..................... 3 6 INTRODUCTION ................................ ................................ ................................ ................................ ................... 3 7 USE CASES ................................ ................................ ................................ ................................ ............................. 4 7.1 IMPORT AND EXPORT OF KNOWLEDGE FOR AUTONOMOUS NETWORK ................................ ................................ .... 4 7.2 CONFIGURING AND DRIVING SIMULATORS FROM AUTONOMOUS COMPONENTS IN THE NETWORK ......................... 6 7.3 PEER-IN-LOOP (INCLUDING HUMANS )................................ ................................ ................................ .................... 8 7.4 CONFIGURING AND DRIVING AUTOMATION LOOPS FROM AUTONOMOUS COMPONENTS IN THE NETWORK ............. 9 7.5 DOMAIN ANALYTICS SERVICES FOR E2E SERVICE MANAGEMENT ................................ ................................ ....... 11 7.6 AUTOMATION AND INTELLIGENT OPERATION , MAINTENANCE AND MANAGEMENT (OAM) OF RADIO NETWORK 13 7.7 INTELLIGENT ENERGY SAVING FOR DATA CENTRES ................................ ................................ ............................. 14 7.8 AUTONOMOUS MASSIVE MIMO ................................ ................................ ................................ .......................... 15 7.9 NETWORK RESOURCE ALLOCATION FOR EMERGENCY MANAGEMENT BASED ON CLOSED LOOP ANALYSIS .......... 16 7.10 INTER -DOMAIN SERVICE AUTOMATION (IDSA) - FOR MICROFINANCE ................................ ............................ 20 7.11 AUTONOMOUS VERTICAL -DRIVEN EDGE SERVICE AND MIDDLE -MILE CONNECTIVITY FOR RURAL FINANCIAL INCLUSION (FI) ................................ ................................ ................................ ................................ ............................. 23 7.12 SIGNALLING FLOWS FOR AUTONOMOUS IMT-2020 NETWORK ................................ ................................ ....... 26 7.13 PLUG/PLAY OF NETWORK INSTANCE ................................ ................................ ................................ ............... 27 7.14 “GENERATIVE ADVERSARIAL SANDBOX ”: (OR HYBRID CLOSED LOOPS ) ................................ ......................... 28 7.15 OPEN, INTEGRATED , LOG ANALYSIS ................................ ................................ ................................ ............... 29 7.16 COMPOSE -ABLE , HIERARCHICAL CLOSED LOOPS ................................ ................................ ............................ 30
6
/content/sample_data/Use-case-AN.pdf
7.16 COMPOSE -ABLE , HIERARCHICAL CLOSED LOOPS ................................ ................................ ............................ 30 7.17 QUALITY OF EXPERIENCE (QOE) PREDICTION AS -A-SERVICE (QP AAS) ................................ ......................... 30 7.18 AUTONOMY APPLIED TO CDN S ................................ ................................ ................................ ...................... 33 7.19 ANALYSIS -DRIVEN EVOLUTION IN VIRTUALIZED RAN BASED ON DEVOPS ................................ ..................... 35 7.20 EVOLVING EDGE APPLICATIONS FOR VERTICALS USING PRIVATE 5G ................................ .............................. 37 7.21 EXPERIMENTATION AND “FIRE-DRILLS ” FOR PUBLIC SAFETY NETWORKS ................................ ....................... 39 7.22 MACHINE LEARNING FOR NETWORK AUTOMATION ................................ ................................ ........................ 40 7.23 AUTONOMOUS AGENTS (WITH VARIED COMPETENCE ) IN NETWORKS ................................ ............................. 42 7.24 AUTOMATED , ADAPTIVE ACCELERATION FOR AI @ EDGE ................................ ................................ .............. 44 7.25 ASSISTIVE NETWORKS : ADAPTATION OF COMMUNICATION SYSTEM BASED ON CHANGING USER ACCESSIBILITY NEEDS ................................ ................................ ................................ ................................ ................................ ....... 45 7.26 EV-AS-A-SERVICE : ACHIEVING ZERO TOUCH EVOLUTION IN A DELEGATED AUTONOMY CASE ....................... 47 7.27 EXPERIMENTATION AS A SERVICE : DIGITAL TWINS AS PLATFORMS FOR EXPERIMENTATION .......................... 50 7.28 EVOLUTION FROM SCENARIO -SPECIFIC , EXPLICIT -COORDINATION TO COORDINATION -FREE INTEROPERABILITY (ACHIEVED USING DATA -DRIVEN APPROACHES ) ................................ ................................ ................................ ........... 52 7.29 INTELLIGENT MAINTENANCE ASSISTANCE SYSTEM ................................ ................................ ......................... 54 7.30 DEMAND FORECASTING AND LIVE SERVICE MIGRATION METHODS IN EDGE COMPUTING SYSTEMS ................. 57 7.31 OPENCN: AN OPEN REPOSITORY OF INTENTS FOR CONTROLLERS AND MODULES ................................ ........... 59 7.32 AI ENABLED GAME THEORY -BASED MECHANISM FOR RESOURCE ALLOCATION ................................ .............. 61 7.33 SERVICE AUTOMATION USING WORKFLOWS ................................ ................................ ................................ ... 66 7.34 DISAGGREGATION AND PLACEMENT OF IN -NETWORK PROGRAMS ................................ ................................ .. 69 7.35 A FAST AND LIGHTWEIGHT AUTO ML LIBRARY (FLAML) ................................ ................................ .............. 71 7.36 CONNECTED AI (CAI) TESTBED : TESTBED FOR 5G CONNECTED ARTIFICIAL INTELLIGENCE ON VIRTUALIZED NETWORKS ................................ ................................ ................................ ................................ ................................ .... 73 7.37 NEGOTIATED BOUNDARIES IN AN FOR SEAMLESS NETWORK SHARING ................................ ........................... 75 7.38 AN ENABLED END -TO-END SUPPLY CHAIN ................................ ................................ ................................ ..... 78 7.39 TOWARDS OPENNESS IN AN ................................ ................................ ................................ ........................... 80 7.40 AWARENESS IN AN ................................ ................................ ................................ ................................ ........ 82
7
/content/sample_data/Use-case-AN.pdf
7.40 AWARENESS IN AN ................................ ................................ ................................ ................................ ........ 82 BIBLIOGRAPHY ................................ ................................ ................................ ................................ ........................... 85
8
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 1 Technical Specification Use cases for Autonomous Networks 1 Scope This Technical Specification analyses use cases for autonomous networks. It provides use case descriptions and indicates the basic set of possible requirements for each use case. The use cases are divided into categories, priorities are indicated, and acto r-interaction diagrams are added. 2 References [ITU -T Y.3172] ITU-T Recommendation Y.3172 (2019), Architectural framework for machine learning in future networks including IMT -2020 . [ITU -T Y.3173] ITU-T Recommendation Y.3173 (2020), Framework for evalua ting intelligence levels of future networks including IMT -2020 . [ITU -T Y.3174] ITU-T Recommendation Y.3174 (2020), Framework for data handling to enable machine learning in future networks including IMT -2020 . [ITU -T Y.3176] ITU-T Recommendation Y.3 176 (2020), Machine learning marketplace integration in future networks including IMT -2020 . [ITU -T Y.3179] ITU-T Recommendation Y.3179 (2021), Architectural framework for machine learning model serving in future networks including IMT -2020 . 3 Terms and definitions 3.1 Terms defined elsewhere This Technical Specification uses the following terms defined elsewhere: 3.1.1 application service [b-ITU-T X.1121] : a service like mobile banking, mobile commerce, and so on. 3.1.2 network service [b-ITU-T Y.3515] : a collection of network functions with a well specified behaviour. 3.2 Terms defined here This Technical Specification defines the following terms: 3.2.1 autonomous network (AN) components : logical functions which work together to achieve autonomous behaviour including evolution, exploration and adaption. NOTE – Examples of AN components are knowledge base and AN Sandbox. There may be other components enabling evolution, exploration and adaptation. 3.2.2 autonomous network (AN) configuration : a set of parameters which are input to the AN, which may control its behaviour. 3.2.3 autonomous network (AN) sandbox : an AN component which hosts simulators (which act as data generators and provi de action sinks), provide data handling interfaces to real network. This component is based on ML Sandbox [ITU -T Y.3172], but broader to include all types of AN experimentation as against only AI/ML model testing and validation.
9
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 2 3.2.4 industry vertical a pplications : Software realization of a workflow created by application services [ITU -T X.1121], to serve their customers’ specific needs. NOTE – e.g., a set of cloud native services which implement loan management in banking industry vertical. 3.2.5 indu stry vertical solution provider : a domain specific business enterprise with specific customer needs, a part of which may need the services of an ICT network. NOTE – e.g. A bank which offers financial services to its customers and uses a 5G network to conn ect to its customers. 3.2.6 knowledge : a collection of resources that helps in solving a specific type of problem. NOTE – Examples of resources are description of a problem along with the description of corresponding potential solutions to that type of problem. The descriptions may be in the form of standard metadata. Resources may include possible causes of the problem, corresponding solutions and their advantages, disadvantages and optimization approaches etc. Problems may have sub -problems e.g., QoE p roblems may have sub -problems including coverage problems and/or interference problems. 3.2.7 knowledge base: a logical collection of knowledge that are related in a specific manner. NOTE – Examples of logical collection are grouping of knowledge resource s with labels specifying their common relationship, graph of knowledge resources with edges representing the relationships, etc. Knowledge base may be used to solve problems in a particular domain such as access networks or core networks, etc. 4 Abbreviation s AI Artificial Intelligence AN Autonomous Networks CI/CD continuous integration and continuous delivery CN Controller ER Emergency Response GNN Graph Neural Networks GUI Graphical User Interface IDSA Inter -domain Service Automation KB Knowledge Base KPI Key Performance Indicator LCM Life Cycle Management MIMO Multiple Input Multiple Output ML Machine Learning MLFO Machine Learning Function Orchestrator mMTC Massive Machine Type Communications MNO Mobile Network Operator NF Network Function OSS Operational Support S ystem nRT RIC Near Real Time RIC QoE Quality of Experience
10
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 3 QoS Quality of Service QPaaS Quality of Experience (QoE) Prediction as -a-Service RAN Radio Access Network RIC RAN intelligent Controller RSRP Reference Signal Received Power SINR signal -to-interference -plus-noise ratio SLA Service Level Agreement TOSCA Topology and Orchestration Specification for Cloud Applications URLLC Ultra -reliable low -latency communication ZSM Zero Touch Service Management 5 Conventions In this Technical Specification, in alignment with the conventions of [Supplement 55 to ITU -T Y- series Recommendations] possible requirements which are derived from a given use case, are classified as follows: The keywords "it is critical" indicate a poss ible requirement which would be necessary to be fulfilled (e.g., by an implementation) and enabled to provide the benefits of the use case. The keywords "it is expected" indicate a possible requirement which would be important but not absolutely necessary to be fulfilled (e.g., by an implementation). Thus, this possible requirement would not need to be enabled to provide complete benefits of the use case. The keywords "it is of added value" indicate a possible requirement which would be optional to be fulfilled (e.g., by an implementation), without implying any sense of importance regarding its fulfilment. Thus, this possible requirement would not need to be enabled to provide complete benefits of the use case. 6 Introduction As the demand and expectation of communication networks has grown, so have user subscription and new service expectation. Network operators must find new ways to address these pressures while at the same time controlling operational cost. Autonomous networks are those that possess the ability to monitor, operate, recover, heal, protect, optimize, and reconfigure themselves; these are commonly known as the self -* properties. The impact of autonomy on the network will be in all areas including planning, security, audit, inventory, optimis ation, orchestration, and quality of experience. In this context, the main concepts studied by FG AN are exploratory evolution, real - time responsive experimentation and dynamic adaptation. Use cases studied in this document are based on contributions and discussions with domain experts or mentors. There are various types of use cases including those which are directly describing various autonomous behaviours and those which describe the applications which benefit from them. Collation of u se cases included specific effort to study the impacts to the key concepts under study in the FG AN. Effort was made to derive requirements and further to classify the requirements. A relation to the architecture is provided in the form of guidance to comp onents derived from the use cases. The main learnings from this use case analysis are: • while the use cases for AN are quite varied and requires support from domain experts, a common refrain has been the application of the key concepts mentioned above. • use case analysis may need to be continued as the field is still evolving.
11
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 4 • derivation of architecture concepts and proof of concepts from the use cases is important. 7 Use cases 7.1 Import and export of knowledge for autonomous network Use case id FG-AN-usecase -001 Use case name Use of knowledge in autonomous network Base contribution [FGAN -I-12-R1] Creation date 21/January/2021 Use case context Discussions during ITU webinar on autonomous networks (3 November 2020) Use case description To satisfy the key concepts of autonomous networks (evolution, experimentation and adaptation) while minimizing human intervention requires knowledge. This knowledge may include representation of data about the environment in which the autonomous system is operating, possibl e actions and consequences, key configuration options, potential parameter indices and other types of logic. This use case concerns use of knowledge in the actors in the AN. Following are related steps in this use case scenario: 1. Knowledge is imported from outside or peer entities of autonomous network components 2. Knowledge is referred internally in autonomous network components e.g. for driving evolution, driving exploration, configuration of automation loops etc. 3. Generate report for human cons umption 4. Knowledge is stored and updated within the autonomous network components 5. Knowledge is exported from autonomous network components to outside or peer entities. Open issues - Representation mechanisms and transfer protocols for knowledge. - Capabilities of knowledge base (KB) component that allows storage, query, export, import and modification of knowledge using standard mechanisms is under study. - reference points and interfaces between AN and KB is yet to defined. Use case category Cat 1 : describes a scenario related to core autonomous behaviour itself. Reference • [b-Clark], [b -AN2020], [b -Jimenez -Ruiz], [b -Myklebust ], [b-Turing] 7.1.1 Use case requirements Critical requirements ● AN-UC01-REQ -001: It is critical that AN enable exchange of knowledge between the various components in the AN implementing the various key AN functionalities like evolution, exploration and adaptation. ● AN-UC01-REQ -002: It is critical that AN enable optimization of knowledge bases. NOTE – Examples of optimizations applied on the knowledge bases are access policies, granularity of storage, interconnection between various knowledge bases and relation between problems and solutions, addition of new knowl edge. ● AN-UC01-REQ -003: It is critical that AN enable creation of reports on the use of knowledge bases, for consumption of humans and machines. NOTE – Example of contents of reports are metrics on access by various components in the AN, other network ser vices in and outside its administrative domains. ● AN-UC01-REQ -004: It is critical that AN enable exchange of knowledge between various components in the AN, and other network services in the same administrative domain.
12
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 5 ● AN-UC01-REQ -005: It is critical th at AN use knowledge base for mapping high level use case description to controller description. NOTE – Controller description may use languages such as TOSCA, whereas use case descriptions may be unstructured. The high -level use case description is to be c onverted to a structured controller specification, also known as Intent, by AN orchestrator. In this process of “conversion”, it may utilize the help of humans (using GUIs) who can better understand unstructured information, and/or auto -controller generato rs. Expected requirements ● AN-UC01-REQ -006: It is expected that AN enable exchange of knowledge between various components in the AN, and entities in other administrative domains. NOTE – Examples of entities in other administrative domains are network ser vices which are not implementing AN functionalities. Added value requirements ● AN-UC01-REQ -007: it is of added value that AN use Auto -controller generators that are functions which generate controller specifications, using the existing repository in openC N, the knowledge base and an analytics function aided by AI/ML e.g., GNN, recommendation engine. 7.1.2 Use case specific figures NOTE 1 – multiple AN components (1 … n) may be present in the system. Figure 1: actor interaction for Use of knowledge in autonomous network
13
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 6 NOTE 2 – actor interaction captured in this figure may not reflect the strict time sequence of activities . 7.2 Configuring and driving simulators from autonomous components in the network Use case id FG-AN-usecase -002 Use case name Configuring and driving simulators from autonomous components in the network Base contribution [FGAN -I-12-R1] Creation date 21/January/2021 Use case context Discussions during ITU workshop on autonomous networks, discussions during review of ITU SG 13 work item on Sandbox, discussions during ITU AI/ML in 5G Challenge 2020. Use case description To explore and experiment with various scenarios in autonomous behaviour, the autonomous network component requires access to simulators. Simulators help evaluate the outcome of possible options without potential adverse fallouts in the real network. Long te rm study of simulation results is common by human researchers to understand the evolutionary needs of the network too. In this respect, autonomous network components need to interface with, configure and drive the different simulators. Following are rel ated steps in this use case scenario: 1. Autonomous network components decide the scenarios for exploration and experimentation. 2. Autonomous network components interact with the Sandbox to configure specific simulators which can perform the required experimentation. 3. Sandbox monitors the simulators and reports the completion of simulations. 4. The results are analysed by Autonomous network components and further actions (like updating knowledge base) are taken. Open issues 1. Are simulators encapsulated in Sandbox? Or are they open to direct interface from autonomous network components? 2. There are heterogeneous simulators and uniform interface with simulators do not exist. This makes their interface and configuration non -standard and difficult to implement. 3. Additional scenarios like addition of new simulation capabilities, flagging of new requirement for simulation etc. need to be handled. Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Reference [b-Y.ML -IMT2020 -SANDBOX] 7.2.1 Use case requirements Critical requirements Figure 2: Component cloud for Use of knowledge in autonomous network
14
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 7 ● AN-UC02-REQ -001: It is critical that AN components arrive at potential scenarios for exploration and experimentation. NOTE – AN components may independently arrive at different scenar ios for exploration and experimentation based on several factors like the functionalities they implement, current status of their knowledge, etc. e.g., exploration strategies for access control may be based on game theory approaches or combinatorial optimization approaches. ● AN-UC02-REQ -002: It is critical that autonomous networks (AN) components trigger experimentation in AN Sandbox. NOTE – AN compone nts may independently trigger experimentation by configuring simulators in the AN Sandbox. ● AN-UC02-REQ -003: It is critical that autonomous networks (AN) Sandbox collate, aggregate triggers for experimentation to form a coherent, experimentation pipelin e, the execution of which is monitored and reported by AN Sandbox to AN components. ● AN-UC02-REQ -004: It is critical that autonomous networks (AN) components analyse the reports from the AN sandbox while considering the steps in AN behaviour. NOTE – the steps in AN behaviour which depends on the analysis of reports from AN sandbox includes steps in evolution and update of knowledge 7.2.2 Use case specific figures Figure 3: actor interaction for Configuring and driving simulators from autonomous components in the network
15
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 8 Figure 4: Component cloud for Configuring and driving simulators from autonomous components in the network 7.3 Peer -in-loop (including humans) Use case id FG-AN-usecase -003 Use case name Peer-in-loop (including humans) Base contribution [FGAN -I-12-R1] Creation date 21/January/2021 Use case context Discussions during ITU workshop on autonomous networks, discussions during review of ITU SG 13 work item on MLFO, discussions during ITU AI/ML in 5G Challenge 2020. Use case description To guide the autonomous behaviour autonomous network component requires access to peers. Peers include humans and other autonomous entities. Exchange of information with peers help in taking better decisions. In this respect, autonomous network components need to interface with, exchange information with various other autonomous network components and humans. Following are related steps in this use case scenario: 1. Autonomous network components decide to take guidance from other autonomous entities (peers like humans). 2. A message exchange with the peer is initiated. 3. The results of the exchange are analysed by Autonomous network components and further actions (like updating knowledge base) are taken. Open issues 1. Are some peers more equal than others (e.g. humans)? 2. What are the messages exchanged? e.g. request for comments? report on status? capability exchange? Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Reference [b-Y.ML -IMT2020 -MLFO] 7.3.1 Use case requirements Critical requirements ● AN-UC03-REQ -001: It is critical that autonomous networks (AN) components enable synchronous or asynchronous, interoperable exchange of feedback or information from peers regarding the dec isions and choices related to AN behaviour. NOTE 1 – Peers may include humans and machines. Feedback may include exchange of information regarding AN behaviour such as evolution, experimentation and adaptation. Contents of the information
16
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 9 exchanged may include capabilities and status of components i n the AN e.g., knowledge base, orchestration, simulators, etc. NOTE 2 – Format of information exchange is for future study. 7.3.2 Use case specific figures Figure 5: actor interaction for Peer -in-loop (including humans) Figure 6: Component cloud for Peer -in-loop (including humans) 7.4 Configuring and driving automation loops from autonomous components in the network Use case id FG-AN-usecase -004 Use case name Configuring and driving automation loops from autonomous components in the network Base contribution [FGAN -I-12-R1] Creation date 21/January/2021 Use case context Inspired by discussions on “demand mapping” during Y.3173 and discussions during ITU AI/ML in 5G Challenge 2020. Use case description There are different automation loops in various domains of the network, already proposed by different standards bodies and industry bodies. To reflect the decisions of autonomous behaviour in the network, the autonomous network component requires access to automation loops. Automation loops help implement the decisions taken by the autonomous component in the network. Moreover, it is possible that
17
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 10 automation loops provide valuable inputs for autonomous components to be considered for say further experimenta tion. In this respect, autonomous network components need to interface with, configure and drive the different automation loops. Following are related steps in this use case scenario: 1. Autonomous network components decide the configurations of automat ion loops. 2. Autonomous network components interact with the automation loops to configure specific scenarios which can perform the required automation. 3. Automation loops monitor the automation and reports the status of automation. 4. The results are analysed by Autonomous network components and further actions (like updating knowledge base) are taken. NOTE - Please see [ML5G -I-221] for an example of “influencing analytics service” for E2E service management. Question -8 discussed the possibility for ZSM framework consumer to select and provision the type of ML model to be used for domain specific analytics in ZSM scope. Open issues 1. Where are the automation loops hosted? Are they open to direct interface from autonomous network components? 2. There are heterogeneous automation loops and uniform interface do not exist. This makes their interface and configuration non -standard and difficult to implement. 3. Additional scenarios like addition of new automation capabilities, flagging of new requirement for auto mation etc. need to be handled. Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Reference • [ITU -T Y.3173] 7.4.1 Use case requirements Critical requirements ● AN-UC04-REQ -001: It is critical that autonomous networks (AN) components decide the type of closed loops and manage the closed loops. NOTE – AN components may decide the type and structure of closed loops based on their analysis of reports, monitoring and other information exchanges. Management of closed loops may include instantiating, deletion, updating , and other operations on closed loops. ● AN-UC04-REQ -002: It is critical that autonomous networks (AN) components consider the capability and flexibility offered by closed loops to configure them to perform specific automation tasks. ● AN-UC04-REQ -003: It is critical that closed loops m onitor the specific parameters of automation tasks and report them to AN components. NOTE – specific parameters of automation tasks may include data input to automation, analytics used in the closed loop, actions taken as part of automation. It may also i nclude failures, error logs, etc. ● AN-UC04-REQ -004: It is critical that AN components consider the reports from closed loops while deciding the AN behaviour. NOTE – Examples of AN behaviour are evolution, experimentation and adaptation.
18
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 11 7.4.2 Use case specifi c figures Figure 7: actor interaction for Configuring and driving automation loops from autonomous components in the network Figure 8: Component cloud for Configuring and driving automation loops from autonomous components in the network 7.5 Domain analytics services for E2E service management Use case id FG-AN-usecase -005 Use case name Domain analytics services for E2E service management Base contribution [FGAN -I-12-R1] Creation date 21/January/2021 Use case context Based on discussions with ETSI ZSM via [ML5G -I-221]
19
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 12 Based on presentations on [FGAN -I-135]. Use case description Section 6.5.3.2 of [ETSI ZSM ARCH] describes the domain analytics services which provide domain -specific in sights and generate domain -specific predictions based on data collected by domain data collection services and other data. Following are related steps in this use case scenario: 1. Autonomous network components act as a ZSM service consumer. 2. ZSM provides closed loop (CL) management and other domain and cross domain services (including analytics) to AN components. 3. Discovery of ZSM services is done by AN components 4. ZSM service performs the E2E service management based on the interaction with autonom ous network component. a. examples of interactions are: managing subscriptions, configuring analytics, request analysis results, etc. See Clause 6.5.3.2.1 of [ETSI ZSM ARCH] b. Other Examples in the context of Zero Touch provisioning mentioned in [FGAN -I-135]. Open issues Open issues (refer also those discussed in [ML5G -I-221]). 1. Hierarchies of CL may be deployed in other AN domains and ZSM domains. In this case interoperability of these deployments may be studied. 2. how to integrate ZSM services as “service -x”? Use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Reference [b-ETSI GS ZSM 002] 7.5.1 Use case requirements Critical requirements ● AN-UC05-REQ -001: It is critical that AN support discovery and consumption of the services provided by different types of closed loop service automation frameworks. NOTE – Examples of different types of closed loop service automation frameworks are ETSI ZSM [ETSI ZSM ARC H] and FRINX machine [FGAN -I-135]. Examples of actions taken by AN after the consumption of services provided by closed loop service automation frameworks are managing subscriptions, configuring analytics, request analysis results, etc. 7.5.2 Use case specific f igures Figure 9: Component cloud for Domain analytics services for E2E service management
20
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 13 7.6 Automation and intelligent operation, maintenance and management (OAM ) of radio network Use case id FG-AN-usecase -006 Use case name Automation and intelligent OAM(operation, maintenance and management) of radio network Base contribution [FGAN -I-008] Description Background : Dynamic radio environment, network structure, user behaviour, and user distribution drive the network needs to be monitored and optimised continually. Currently, it consumes experts a lot of time and labor work to discover problems, analyze root cause, and then formulating solutions of radio networks. Therefore, AI and big data technology is necessary to achieve f ull process automation and intelligent management of wireless network. Specifically, wireless network autonomous management includes real -time monitoring of data quality, quasi -real-time diagnosis of abnormal cells, root cause analysis, recommended solut ions, and evaluation of processing effects. ⚫ Real-time monitoring of data quality It is needed to firstly collect real -time data from the 4/5G integrated network management, then compares the consistency of the number of network elements from the data, and achieves data quality monitoring and warning through the visualization panel. ⚫ Quasi -real-time diagnosis of abnormal cells Using several categories of KPI performance indicators, the ML algorithm (e.g. OneClassSVM ) is used to diagnose network elements in t hese categories of scenarios such as residential and colleges on a daily/weekly basis, and distribute them to frontline managers according to the abnormal probability. ⚫ Root cause analysis and recommended solutions Through collecting tens of thousands of expert experiences, and radio network knowledge bases have been established through knowledge graphs to develop intelligent recommendation algorithms and search engines, and to directly provide reasons and recommend solutions of each abnormal network element to first -line experts, thus reducing troubleshooting time and error rate. ⚫ Evaluation of processing effects Through a mature evaluation system, the effectiveness of the solution to each abnormal problem is evaluated after the implementation, and then the knowledge base and recommendation algorithm are optimized, and the intelligence level of the entire process is continuously improved. Category Category 1 - Use case for autonomous behaviour Reference None 7.6.1 Use case requireme nts Critical requirements ● AN-UC06-REQ -001: It is critical that autonomous networks enable discovery of problems in underlay networks, analysis of root cause, and formulation of solutions.
21
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 14 NOTE – Wireless network autonomous management may include real -time monitoring of data quality, quasi -real-time diagnosis of abnormal cells, root cause analysis, recommended solutions, and evaluation of processing effects. ● AN-UC06-REQ -002: It is critical that AN enables data quality and monitoring and visualization. NOTE – Data quality may need real -time monitoring, evaluation with respect to openKB, and reporting may be done using an online GUI or a report to human. Data quality may be u seful to analytics services. ● AN-UC06-REQ -003: It is critical that AN enables capturing and using the knowledge from domain experts and AI/ML mechanisms for recommendation of solution for root cause analysis. NOTE – Example of representation formats for knowledge is knowledge graphs. Expected requirements ● AN-UC06-REQ -004: It is expected that AN uses AI and big data technology to achieve full process automation and intelligent management of wireless network. Added value require ments ● AN-UC06-REQ -005: It is of added value that a varying set of KPIs are monitored to identify faults. ● AN-UC06-REQ -006: It is of added value that AN solutions may be monitored optimized and continuously improved (themselves). NOTE – e.g. the OpenKB and recommendation algorithms may be optimized. 7.6.2 Use case specific figures None . 7.7 Intelligent energy saving for data centres Use case id FG-AN-usecase -007 Use case name Intelligent Energy Saving for Data Centers Base contribution [FGAN -I-008] Description Background : The rapid growth of mobile Internet, cloud computing and other business drives the need of large -scale data centers. Data centers consume large amounts of energy to run and maintain their cooling system and facilities, servers and o ther devices. Traditional methods cannot efficiently reduce the energy costs of data centers. Therefore, AI mechanisms are introduced to analyze the monitoring data and adjust the configurations automatically. Intelligent energy saving solution include a s eries of autonomous behaviour, such as automatic data acquisition, AI-based energy consumption modelling and inference, facilities parameters control policies decision, facilities adjustment actions implementation, energy saving result evaluation and contr ol policies continuous optimization. Category Category 2 - Application of autonomous behaviour Reference None 7.7.1 Use case requirements Critical requirements
22
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 15 ● AN-UC07-REQ -001: It is critical that autonomous networks (AN) support data acquisition, representation, analysis of collected data and adaptation of configurations in underlays such as data centers. NOTE – Data acquisition and data representations may use industry stand ards. Analysis may use ML techniques. Adaptations may use underlay specific APIs. Adaptations may be arrived at using controllers or workflows or closed loops . Expected requirements ● AN-UC07-REQ -002: It is expected that autonomous networks (AN) support re presentation, autonomous analysis and continuous optimization of policies. NOTE – Policies may be related to domain specific workflows and decisions e.g. energy usage in data centers. 7.7.2 Use case specific figures None. 7.8 Autonomous massive MIMO Use case id FG-AN-usecase -008 Use case name Autonomous Massive MIMO Base contribution FGAN -I-30 Creation date 27/January/2021 Use case context Use case description Massive MIMO is a key technology in 5G, which can effectively improve the vertical coverage and system capacity in complex scenarios by using large - scale antenna array and three -dimensional beam -forming. Compared with traditional antenna, there are more d imensions of parameters to adjust for massive MIMO large -scale antenna array, including horizontal lobe width, vertical lobe width, azimuth, dip angle and beam number. Each dimension can be fine adjusted by setting a reasonable step size and theoretically and there may be tens of thousands possible combination of antenna parameter weights in a cell. Therefore, manual optimization and adjustment based on scenario/service changes can be very hard in consideration of multi -cell coordination. The autonomous mas sive MIMO use case is about helping operators quickly converge and achieve optimal adjustment of antenna parameters with AI capabilities of multi -dimensional analysis and prediction. The general workflow is: 5G base station collects position information fr om UE and sends it to the network management system, which then calculates the distribution of UE and finds the optimal weight combination with ML algorithms based on the target RSRP/SINR distribution in the current scenario, so as to maximize the utilizat ion of system capacity and guarantee the user experience. Open issues ⚫ How to achieve a balance between coverage, communication traffic and spectrum efficiency? ⚫ How to ensure a satisfactory speed of parameter adjustment? Use case category Cat 2: application of autonomous behaviour Reference
23
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 16 7.8.1 Use case requirements Critical requirements ● AN-UC08-REQ -001: It is critical that autonomous networks (AN) support identification of parameters which can be optimized, including ML parameters, based on the use case. NOTE – Example of use case is parameter optimization for massive MIMO large -scale antenna array, including horizontal lobe width, vertical lobe width, azimuth, dip angle and beam number. ● AN-UC08-REQ -002: It is critical that autonomous networks (AN) support identification of data whi ch can be collected to analyse and infer, based on the use case. NOTE – Examples of data are distribution of UE, the target RSRP/SINR distribution in the current scenario. ● AN-UC08-REQ -003: It is critical that autonomous networks (AN) support identificat ion of KPIs which need to be optimized. NOTE – Examples of KPIs are system capacity and QoE. ● AN-UC08-REQ -004: It is critical that autonomous networks (AN) support optimization of KPIs in distributed deployments which require multicell coordination. 7.8.2 Use case specific figures None . 7.9 Network resource allocation for emergency management based on closed loop analysis Use case id FG-AN-usecase -9 Use case name Network resource allocation for emergency management based on closed loop analysis Base contribution FGAN -I-090-R2 Creation date 22/April/2021 Use case context Discussions during [FGAN -I-055-R1], [FGAN -I-054-R1], [FGAN -I-072] Use case description Telecommunication systems are critical pillar of emergency management. A set of hierarchical A I/ML based closed loops could be used to intelligently deploy and manage slice for emergency responders in the affected area. A higher closed loop in the OSS can be used for detecting which area is affected by the emergency and deploy a slice for emergency responders to that area. It can then set a resource arbitration policy for the lower closed loop in RAN. The lower loop can use this policy to intelligently share RAN resources between the public and emergency responder slice. It can also intelligently ma nage ML pipelines across the edge and emergency responder devices by using split AI/ML models or offloading of inference tasks from the devices to the edge. Following are related steps in this use case scenario: 1. MNO may instruct OSS to detect certain set o f emergencies and provide connectivity to emergency responders according to predefined SLA. NOTE - e.g. this input may be provided using an operator intent. 2. OSS might deploy a closed loop to achieve this. It might collect data from sources like network analytics data, social media scraping, input from emergency responders etc.
24
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 17 NOTE - e.g. such inputs may be provided from nRT -RICs or other xNFs in the network. 3. OSS might use AI/ML models to detect emergency and deploy an ER slice to the location. It might also create high level strategy/policy to reallocate resources among the slices. NOTE - e.g. such closed loops may be hosted in non -RT RIC and may be used for predictive resource allocations to specific edge locations based on predicted needs, in turn based on detected emergency. NOTE - the policy to reallocate resources may depend, among other things, on the type of emergency e.g. a natural disaster, earth quak e, a law and order situation, traffic accidents, etc. 4. RAN domain might use this high -level strategy/policy and possibly other inputs from emergency responders to create a closed loop to arbitrate resources among RAN NSSIs. NOTE - e.g. such closed loops ma y be hosted nearer to edge e.g. nRT RIC. The policy input from higher loop may indicate, among other things, the different sources of data for the lower loop. 5. RAN domain closed loop might also decide to offload inference tasks from ER devices to the edge or use split AI/ML model to run inference tasks on edge and ER device. This decision might be taken based on available network and compute resources. NOTE - e.g. some layers of the AI/ML model may be hosted in the wearable devices of the emergency responde rs, which will help in say locating of persons under distress using various inputs. Relation with autonomous behavior - 1. Workflows for the closed loops are independent of each other. The only interaction between closed loops is via high level intents over t he inter-loop interface. 2. Closed loops can create new closed loops in other network domains without human intervention. 3. Although loops are deployed in hierarchical fashion, each loop has the ability to evolve independently. It can use different models and ML pipelines as required. Each loop may move up or down the autonomy levels as defined in [ITU -T Y.3173]. 4. Closed loops have ability to split and provision AI/ML models to other closed loops in automated fashion. 5. By making closed loops in edge domain autonomous, we also enable lesser orchestration delay, better privacy and flexibility for verticals (e.g., industrial campus networks). 6. Higher loops can use historical knowledge available to them to optimize and generalize lower loops using high -level intent. This increases efficiency of lower loops while preserving their autonomy. (e.g., higher loop might know certain kind of ML models are good for cyclone emergency management based on previous cyclones.) NOTE: This use case might be well aligned w ith the use case “Composable, hierarchical closed loops” in [FGAN -I-072] and others above. Open issues (as seen by the proponent) 1. The "propagation" and "escalation" of intents is something which needs study.
25
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 18 2. mixing the concept of "declarative" poli cies with "top -level" intent with the concept of (propagation/escalation) needs study. 3. recursive decomposition coupled with recursive policy mapping 4. The components (“nodes”) of the high -level service are decomposed into more concrete services (possib ly recursively). Declarative policies must be “translated” into more concrete declarative policies on the decomposed services in conjunction. – how to do this? 5. By coupling “event/condition/action” control loops with TOSCA’s substitution mapping feature, you can make these control loops “cascading”, i.e. they can propagate down from high -level abstract “intent” statements to low-level device reconfigurations, and they can escalate back up if necessary. This is an aspect of TOSCA policies that needs study. Notes on use case category Cat 1: describes a scenario related to core autonomous behavior itself. Notes on priority of the use case High has the potential to impact future network architectures and use cases. Reference [b-ETSI GS ZSM 001] 7.9.1 Use case requirements Critical requirements ● AN-UC09-REQ -001: it is critical that AN allow interaction between closed loops via high level intents. NOTE – Closed loops may create new closed loops in other network domains without human intervention. ● AN-UC09-REQ -002: it is critical that AN allow each loop to evolve independently, using different analytical, optimization mechanisms including ML models and ML pipelines as required. NOTE – Each loop may move up or down the autonomy levels as defined in [ITU -T Y.3173] Expected requirements ● AN-UC09-REQ -003: it is expected that Closed loops have ability to provision or recommend AI/ML models to other closed loops in automated fashion. ● AN-UC09-REQ -004: it is expected that closed loops in edge domain may be autonomous, in order to enable lesser orchestration delay, better privacy and flexibility for verticals (e.g., industrial campus networks). ● AN-UC09-REQ -005: it is expected that higher loops use the knowledge base available to them to optimize and generalize lower loops using high -level intent. NOTE –This increases efficiency of lower loops while preserving their autonomy. (e.g., higher loop might know certa in kind of ML models are good for cyclone emergency management based on previous cyclones.)
26
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 19 7.9.2 Use case specific figures Figure 10: actor interaction for Network resource allocation for emergency management based on closed loop analysis NOTE 1 – Create a high -level abstract model for closed loops, and then create declarative policies for that high-level model that express the “intent” of creating ML pipelines. The components (“nodes”) of the high - level service are decomposed into more concrete ser vices (possibly recursively). Declarative policies must be “translated” into more concrete declarative policies on the decomposed services in conjunction. For example, “non -RT” level service may impose certain closed loop requirements on a RIC that impleme nts the ML pipeline. “nRT” level service may impose some other closed loop requirements on a RIC that implements that ML pipeline. This recursive decomposition coupled with recursive policy mapping happens all the way down until service components can get realized on the available resources. At that point, the low -level declarative policies must be translated somehow into imperative policies (e.g. if jitter exceeds a certain threshold, re -prioritize the traffic associated with the service). NOTE 2 – “imperative” policies that use the “event/condition/action” pattern, vs. declarative policies use a “capabilities/context/constraints” pattern. Declarative policies are more suitable for top -level “intent” statements, but they need to be translated (by th e orchestrator) into corresponding “imperative” policies in order to be actionable. The "propagation" and "escalation" of intents: the “event/condition/action” statements are the control loops you’re referring to that make sure that service components comp ly with desired behavior at all times. By coupling “event/condition/action” control loops with TOSCA’s substitution mapping feature, you can make these control loops “cascading”, i.e. they can propagate down from high - level abstract “intent” statements to low-level device reconfigurations, and they can escalate back up if necessary. NOTE 3 – The events are generated (using notifications) by nodes in the service topology model. The conditions are evaluated based on attribute values of nodes in the service t opology model. The actions are performed on the service topology model first, and then propagated to the external world (the “resources”)
27
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 20 7.10 Inter -domain service automation (IDSA) - for microfinance Use case id FG-AN-usecase -010 Use case name Inter -domain se rvice automation (IDSA) - for microfinance Base contribution AN-I-060 Creation date 29/March/2021 Use case context Discussions regarding cloud interoperability in 5G use case lab Use case description Microfinance applications may be hosted by non -experts in 5G or any form of cloud / ICT technologies. The end -user requirements are domain -specific e.g. loan management, banking account/ledger management etc. The main stakeholders who are enterprises (e.g. banks) may be knowledgeable and would like to focus only in their business workflows (as against cloud / ICT technologies). The underlying cloud infrastructure (for that matter the application design) and the network infrastructure (5G, 6G, or (x+1)G) is immaterial to a bank / finance manager. However, from a technology perspective the following rewards are desired to be reaped: 1. Give the best end -user experience: e.g. reduce down -time for services, reduced latencies for services, security and data priv acy, intelligent services, by exploiting the best cloud service deployment for the microfinance application. e.g. edge, load balancing, secure messaging across multi -cloud, hybrid -cloud, AI/ML services via distributed cloud, etc. 2. Insulate the end -user f rom xG -> (x+1)G migration: by providing interoperable, standard, backward compatible networking abstraction technologies. Integrating service lifecycle management pipeline provides agility to service development and testing. 3. Mitigate the risk of increa sed integration service costs : by using open source technologies, standards, benchmarking, automating in test beds. 4. Automate: reducing human involvement reduces training costs for banks, operational costs in networks and brings other benefits like intelligent fault isolation without depending on 3rd party service providers. NOTE - devops [ b-ISO/IEC 23167] [ b-ITU-T Y.3515], CI/CD [ b-ITU-T Y.3525] are exampl es of service lifecycle management pipelines. Following are related steps in this use case scenario: 1. Intent based cloud service specification 2. processing of intent and development, validation in Sandbox/testbed. Testbed components (e.g. simulators, data mod els) are selected based on intent. 3. Evaluation and analysis of test results based on key parameter indices (KPI) specifications in the intent. 4. derivation of optimal configuration, cloud service deployment , management and orchestration. 5. intent based network service deployment , management and orchestration. 6. Single “cockpit” for monitoring the services 7. Autonomous, Intelligence -guided, technology -agnostic migration of services from one version of underlying technology to another e.g. xG -> (x+1)G and edge -> fog. 8. Reports from various parts of the underlying technologies are provided to humans in regular intervals or event based. Open issues (as seen by the proponent) 1. Handling of accounting for such services is not clear.
28
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 21 Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - Enables vertical driven applications and network evolution. Reference 7.10.1 Use case requirements Critical requirements ● AN-UC10-REQ -001: It is critical that autonomous networks (AN) consider inputs from industry vertical solution provider regarding the required service characteristics, using an intent - based mechanism, while deciding the development and deployment options for industry vert ical applications and network services. NOTE – AN can autonomously decide the best possible development and deployment option for network services which can support the verticals. This has to be based on the requirements of the applications [ITU -T Y.3178] . E.g. for banking applications, service characteristics may include latency on banking transactions, mean time between service failures, level of privacy of each field in the customer profile, etc. Examples of deployment options may include edge, core clo ud, enterprise network, using specific hardware etc. ● AN-UC10-REQ -002: It is critical that, AN abstracts the management (creation, deletion and update) of the industry vertical applications and network services, from the industry vertical solution provide r. NOTE – underlying domain orchestration, network specific technologies and APIs are abstracted by AN towards the industry vertical solution provider. E.g. banking applications may be hosted as web applications (on popular web frameworks with or without an accompanying mobile component), enterprise applications (e.g. J2EE based). They may be instantiated as cloud -native applications, may use distributed architecture across private/public clouds etc. Service management infrastructure supporting the applica tions may include brokers, workflow managers and schedulers. Irrespective of such deployment and management variance, AN provides abstracted interfaces to verticals which hides such complexities. ● AN-UC10-REQ -003: It is critical that, AN validates any ch anges to the application and network services in a sandbox environment before applying it in the network. NOTE – Autonomous behaviour may result in automated creation, deletion and update of applications and/or network services. The impact of such modified applications and/or network services has to be studied before they are applied in the network. This may be done by using a testbed or sandbox with simulators or even a digital twin-based environment. Specific emphasis may be applied on maintaining compati bility of the modifications with the applications and network services in the network. ● AN-UC10-REQ -004: It is critical that, AN continuously monitors the application and network services in the network. NOTE – monitoring may be done to find erroneous behaviour, faults, gaps in architecture, design, bugs, etc. Monitoring may identify the gaps in end -to-end service implementations with respect to changing intents of the verticals. Thus, monitoring may also be use d to find the need for evolution in underlying network domains. ● AN-UC10-REQ -005: It is critical that, AN produces regular and asynchronous reports for human consumption. NOTE – reports to humans may summarize all monitored values, analysis, decision poin ts and explanations for such decisions by the AN.
29
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 22 Expected requirements ● AN-UC10-REQ -006: It is expected that, AN provide automated triggers to service lifecycle management pipeline for management (creation, deletion and update) of application and network services. NOTE 1 – devops [ b-ISO/IEC TS 23167] , [b-ITU-T Y.3515], CI/CD [ b-ITU-T Y.3525] are examples of service lifecycle management pipelines. NOTE 2 – As part of management of applications, AN may analyse the gaps, faults and issues in the curre nt design and implementation of end -to-end service. Mitigation of such issues may be triggered to the devops pipeline. However, the level of automation of the solution may depend on the capabilities of the devops pipeline. ● AN-UC10-REQ -007: It is expecte d that, the AN configuration includes the set of reference points which may be used for integration into end -to-end network services and applications. NOTE – Even though AN exposes abstracted interfaces for application management to verticals, to achieve the integration of network services, AN may use open interfaces or closed black boxes. The availability of open interfaces and corresponding components is to be made known to AN via configurations. Such configurations may be dynamically changing based on a vailability of new components and interfaces. ● AN-UC10-REQ -008: It is expected that, the AN proposes “recipes” of network services and applications which may satisfy a particular intent from the vertical. NOTE – Recipes may include a combination of exis ting application components, network service components, corresponding configuration options, etc. ● AN-UC10-REQ -009: It is expected that, the AN is updated at runtime by the underlying domain orchestration about the supported set of reference points in th e domain, available set of network service and application components, which may be used for integration into end -to-end network services and applications. NOTE – Runtime changes, triggered by the operator or 3rd parties, in the underlying domains are made aware to the AN. Such updates may be abstracted and passed by the AN to the verticals, where relevant, for information or policy decisions. Added value requirements ● AN-UC10-REQ -010: It is of added value that, the AN proposes a modified “recipe” of network services and applications which may bridge a gap, fix a fault or solve issues in the current design and implementation of end -to-end services. NOTE – Modified recipe may be based on analysis of gaps, issues, or faults encountered while monitoring of network services and applications.
30
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 23 7.10.2 Use case specific figures Figure 12: actor interaction for Inter -domain service automation (IDSA) - for microfinance 7.11 Autonomous vertical -driven edge service and middle -mile connectivity for rural financial inclusion (FI) Use case id FG-AN-usecase -011 Use case name Autonomous vertical -driven edge service and middle -mile connectivity for rural financial inclusion (FI) Base contribution AN-I-060 Creation date 31/March/2021 Use case context Discussions regarding rural broadband architecture(s) and feedback from survey to banks during summer 2020 Figure 10: Inter -domain service automation
31
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 24 Use case description Digital Financial Inclusion in many geographies are limited because of lack of network availability and low reliability of connection. Frequently bank branches have to fall back on costly and complex connectivity through satellites. Other than the capital and operational aspects, the bank staff also needs to handle the link failover and maintenance activities in case of issues. Furthermore, such solutions do not allow local community to utilize the network. Autonomous last hop connectivity both through 4G /5G as well as other non 3GPP heterogeneous networks need to be seamlessly enabled to operate in an affordable manner. The solution is likely to provide the following benefits: 1. Based on the requirements from the verticals, provide connectivity for rural FI sites independent of network providers/large -Telco. 2. Allow the connectivity to be shared with local community to ensure better return on investments. 3. Edge compute and related infrastructure can enable more compelling deployments for digital FI as well as other verticals (e.g. short term tele -commute / interviews etc.). 4. Automate operations and security audits: reducing human involvement in maintaining and running the edge / last hop reduces training costs for banks, operational costs in networks and brings other benefits like intelligent fault isolation without depending on 3rd party service providers, continuous audit of deployed solution for security etc. Following are related sub -systems and associated steps in this use case scenario: 1. Deploy mi cro-servers/nano -data-centres for the edge. 2. Enable heterogeneous network connectivity. 3. Autonomous, Intelligence -guided handling of alignment / interference / mobility related challenges for various last hop approaches. 4. Automate on -boarding of community u sers and community specific apps, their billing/payments etc. 5. Single “cockpit” for monitoring the services and health of infra to local -bank - staff/managed -service -provider. 6. Reports from various parts of the underlying technologies are provided to humans in regular intervals or event based. This includes sharing of usage details with authorized management systems, These reports may be used for tracking the usage at a granular level, mapped to the vertical and the tracking the corresponding benefits from the infrastructure e.g. for the purpose of extending subsidies to such infrastructure. Open issues (as seen by the proponent) 1. Policy framework for such an autonomous community network anchored by a specific vertical needs to be understood. Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - Enables vertical driven applications and network evolution. Reference 7.11.1 Use case requirements Critical requirements ● AN-UC11-REQ -001: It is critical that autonomous networks (AN) utilize heterogeneous network connectivity options at the edge, in the last -mile, including the commissioning,
32
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 25 provisioning, configuration, integration, main tenance and optimization, in a seamless, real -time and easy-to-use manner. NOTE – Especially in rural settings the technology of choice may vary considerably depending on various factors like availability of technology, ease of deployment, low power consu mption, etc. Currently, in such deployments, it is invariably upon the industry vertical solution provider to also take on the responsibility of integrating and maintaining these varied last mile connectivity options. It is important that AN brings togethe r various such technologies under one umbrella, at the edge, to provide seamless integration and maintenance. Some of the operations in the lifecycle of the last mile connectivity may need real -time interventions, some of it may need deep domain expertise and some of it may require training – all of which may not be possible in certain rural settings. ● AN-UC11-REQ -002: It is critical that autonomous networks (AN) enable sharing of the various network connectivity options at the edge, across the community driven industry vertical applications. NOTE – With an emphasis on providing maximum connectivity and application services to the local community, the best available option for connectivity need to be chosen, if needed, dynamically. ● AN-UC11-REQ -003: It is critical that autonomous networks (AN) enable onboarding of industry vertical applications at run -time. NOTE – Evolution of needs in a local community may result in changing application requirements. ● AN-UC11-REQ -004: It is critical that autonomous netw orks (AN) enable common, open, interoperable, adaptable mechanisms for managing end -users, based on the needs of the local community. NOTE – Onboarding, billing, problem -resolutions and other end -user management functions need to be agnostic, community -driven at the edge. Based on the use cases, the mechanisms for end -user management has to adapt. E.g. for low -mobility rural areas, a relevant tariff plan needs to be offered. ● AN-UC11-REQ -005: It is critical that autonomous networks (AN) enable a single -window of monitoring the heterogeneous underlying technologies. NOTE – Complexities of monitoring, administering, maintaining the complexities of the underlying technologies need to be hidden from the industry vertical solution provider as well as the local communities. 7.11.2 Use case specific figures
33
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 26 Figure 11: Actors in Autonomous vertical -driven edge service 7.12 Signalling flows for autonomous IMT -2020 network Use case id FG-AN-usecase -012 Use case name Signalling flows for autonomous IMT -2020 network Base contribution AN-I-064 Creation date 21 March 2021 Use case context Signalling flows between data analysis function and other network functions, to achieve self -analysis and self -optimization Use case description Data analysis function (DAF) is introduced in IMT -2020 network [ b-ITU-T Y.3104]. The signalling flow between DAF and other network functions(e.g. SMF, PCF, NACF and AF) describes data collection and analysis result providing. The procedure in Figure 1 is used by DAF to collect data on event (s) related to SMF by invoking SmfEv entSubscription service. Figure 1 Signalling flow for Data Collection from SMF 1. The DAF subscribe to or unsubscribe from a (set of) Events(e.g. UE IP address, UP path change, PDU Session Establishment/ Release, and etc.) by invoking the SmfEventSubscr iption_Subscribe service operation. 2. The SMF notifies the DAF (e.g. with the event report) by invoking SmfEventSubscription_Notify service operation. 1. SmfEventSu bscription _Subscribe / SmfEventSu bscription _Unsubscribe 2. SmfEventSub scription _ NotifyDAF SMF
34
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 27 The procedure in Figure 2 is used by NF service consumers (e.g. SMF) to request analytics information from DAF by invoking DafAnalysis_Request service. Figure 2 Signalling flow for Analytics Subscribe/Unsubscribe from DAF 1. SMF subscribes to or unsubscribe from a (set of) data analytic events by invoking the DafAnalysisSubscriptions_Subscrib e service operation. -Subscription requirements of data analytic events may include: -Load information of UPF 2. The DAF notifies the SMF about analysis events by invoking DafAnalysisSubscriptions _Notify service operation. Use case category ▪ Cat 1: aut onomous behaviour in IMT -2020 network Reference • [b-Q.IMT2020 -PIAS ] 7.12.1 Use case requirements Critical requirements ● AN-UC012-REQ -001: It is critical that autonomous networks (AN) enable flexible provisioning and subscription of analysis parameters in network functions. NOTE – Examples of analysis parameters are events, notifications, corresponding information and event handing control lers. Network functions may dynamically provision or subscribe to controllers and corresponding parameters. 7.12.2 Use case specific figures None. 7.13 Plug/play of network instance Use case id FG-AN-usecase -013 Use case name Plug/play of network instance Base contribution AN-I-072 Creation date 13 April 2021 Use case context Discussions regarding FGAN -I-017 and deep dive Use case description Benefits of open architecture approach include: *) reducing CAPEX through a prosperous multi -vendor ecosystem with scale economics. However, more the number of interfaces, more the effort in integration. This needs to be mitigated using automation. *) Rich application space enabled using hierarchical controllers. The hierarchical control loops with varying time criticalities (<10ms (at edge) < 1s (at near edge) < multi -second (at orchestrator)) were discussed in FGAN -I-017. However, provisioning of applications at various levels and corresponding coord ination with capabilities of the network functions is a challenge. 1. DafAnalysisSu bscriptions _Subscribe 2. DafAnalysisSub scriptions _ NotifySMF DAF
35
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 28 In this context, we introduce the use case “Plug/play of network instance” in open architecture. NOTE - The network instance can be network resource, network function, network slice and net work services [ b-ETSI GS ZSM 001]. Following are related steps in this use case scenario: 9. Addition of SRCs [ITU -T Y.3172]: network instance is plugged into the network. Data collection functions supported by this new SRCs are analysed. 10. Bottom -up bootstrapping of infrastructure layer (using cloud orchestration), network as a service (NaaS, using ONAP), services layer (using service orchestration), based on these new SRCs. OR Top down bootstrapping of apps, services, NaaS, infrastructure, based on these new SRCs. Open issues E2E automation frameworks for composition of infrastructure, NaaS and services do not exist. Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Reference 7.13.1 Use case requirements Critical requirements ● AN-UC013-REQ -001: It is critical that autonomous networks (AN) enable plug and play of network functions in the underlay and subsequent seamless participation of such network functions in the AN functions. NOTE – Examples of AN functions are creation and hosting of controllers. Plug and play may be executed by manual or autonomous mechanisms. 7.13.2 Use case specific figures None. 7.14 “Generative adversarial Sandbox”: (or hybrid closed loops) Use case id FG-AN-usecase -014 Use case name “Generative adversarial Sandbox”: (or hybrid closed loops) Base contribution FGAN -I-017 Creation date 13/Apr/2021 Use case context Discussions regarding FGAN -I-017 and deep dive Use case description In addition to open interfaces between various RAN components, a rich ecosystem of simulators is evolving. This allows implementation of various “hybrid” closed loops – part of the closed loop (e.g. data generation) is implemented in simulators whereas res t of the closed loop (e.g. analysis and action) are implemented in another part of the test network using real network functions (NF). In this context, we introduce the use case “Generative adversarial Sandbox: or hybrid closed loops”. Following are rel ated steps in this use case scenario: 5. Based on the inputs from the NF (e.g. data from SRC) and existing closed loops, simulator configurations and capabilities are autonomously scripted. 6. Hybrid closed loops are autonomously composed – with parts of the closed loop in real NF and parts of it in simulators.
36
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 29 7. Similar to Generative adversarial Networks, hybrid closed loops are evaluated and tested using 2 -part network – one simulated and another real network functions. 8. The results are analysed and ranked. Open issues 4. does the open interfaces extend to simulators? 5. how to rank the experiments? 6. data models may be different in various interfaces with simulators. Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Referen ce 7.14.1 Use case requirements Critical requirements ● AN-UC014-REQ -001: It is critical that autonomous networks (AN) enable creation of hybrid closed loops with parts of the closed loops hosted in real network functions as against other parts of it in simulated network functions. NOTE – Examples of parts of closed loops are modules which generate data, modules which implement domain specific functions, modules which provide APIs for implementation of adapting decisions from controllers . ● AN-UC014-REQ -002: It is critical that autonomous networks (AN) enable testing and valid ation of closed loops using the parts of hosted in simulated network functions. NOTE – Examples of such testing are robustness related test scenarios, security and vulnerability testing scenarios. 7.14.2 Use case specific figures None. 7.15 Open, integrated, log anal ysis Use case id FG-AN-usecase -015 Use case name Open, integrated, log analysis Base Contribution FG AN 2nd virtual meeting Creation date FGAN -I-017 Use case context Discussions regarding FGAN -I-017 and deep dive Use case description Fault prediction and isolation based on log analysis is an important existing use case. Logs are generally implemented in unstructured text with no standard formats. With a disaggregated network service implementation, correlating logs from various vendors becomes a challenge. This throws cold water on the fault prediction and fault isolation algorithms based on logs. In this context, we introduce the use case “Open, integrated, log analysis”. Following are related steps in this use case scenario: 4. Collection of logs from various open interfaces and NFs 5. Correlation and Analysis of the collected logs, across various open interfaces and NFs. 6. Identification of optimization mechanisms based on log analysis. Open issues Use case category Cat 2: descri bes a scenario related to application of autonomous behaviour in the network. Reference
37
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 30 7.15.1 Use case requirements Critical requirements ● AN-UC015-REQ -001: It is critical that autonomous networks (AN) enable correlation and identification of relevant logs, their access using open interfaces, analysis and resulting optimization of network underlays to apply specific adaptations. 7.15.2 Use case specific figures None. 7.16 Compose -able, hierarchical closed loops Use case id FG-AN-usecase -016 Use case name Compose -able, hierarchical closed loops Base contribution FGAN -I-017 Creation date 13/Apr/2021 Use case context Discussions regarding FGAN -I-017 and deep dive Use case description There are different automation loops in different levels of the architecture. High level use cases (like log -analysis based fault prediction) require access to capabilities of various network instances. This in turn may be provided by multiple vendors or opensource providers. Thus, provisioning and management of closed loops should be driven hierarchically. In this context, we introduce the use case “Compose -able, hierarchical closed loops”. Following are related steps in this use cas e scenario: 5. declarative specifications decide the high level aspects of closed loops. 6. they are in turn correlated with declarative specifications for network services. 7. these are in turn used to generate detailed declarative specifications for closed loops in different parts of the network. 8. orchestrators at various levels generate commands to provision and manage the closed loops based on these generated declarative specifications. 9. the declarative specifications and/or closed loop components may be stored/up dated for regeneration of closed loops at any point of time. Open issues Use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Reference 7.16.1 Use case requirements Critical requirements ● AN-UC016-REQ -001: It is critical that autonomous networks (AN) enable composition of hierarchical closed loops using declarative specifications. ● AN-UC016-REQ -002: It is critical that autonomous networks (AN) enable derivation of controllers or closed loops at various levels of the network. ● AN-UC016-REQ -003: It is critical that autonomous networks (AN) enable management of declarative specifications of closed loops or controllers. NOTE – Management operations on declarative specifications may include creation, storage, update , delete, etc. 7.16.2 Use case specific figures 7.17 Quality of Experience (QoE) Prediction as -a-Service (QPaaS) Use case id FG-AN-usecase -017
38
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 31 Use case name Quality of Experience (QoE) Prediction as -a-Service (QPaaS) Base contribution FGAN -I-110 Creation date 16 June 2021 Use case context "Review of academic papers on QoE Predictions." FGAN -I-110 Use case description Intelligent and autonomous troubleshooting is a crucial enabler for the current 5G and future 6G networks. Autonomous troubleshooting is chall enging for several reasons, one of which is the availability of a wide range of applications that future networks will support. Traditionally, the methods to gain insight into the delivered quality of service and the users' experience have been through controlled laboratory experiments, where users' opinions have been collected. The results are then reported in Mean Opinion Scores (MOS), corresponding to the average of users' views. These methods are often referred to as subjective quality assess ment, and there are standardized methods for conducting them. In this use case, an application or network service (NS) provider will use a QoE - Prediction -as-a-Service (QPaaS) autonomous system to conduct and follow -up QoE measurement and prediction. Firstly, the autonomous system will conduct subjective tests to measure the user experience from participating users. The locations and specifications of which users will be selected and how the users' responses affect the QoE will depend on the application a nd will be learned by the autonomous system. The autonomous system will also measure relevant user parameters to map user opinions and application KPIs. Secondly, the autonomous system will follow applicable network KPIs and map network and application KPIs. Thirdly, based on this mapping, the autonomous system will enable the application provider to predict the QoE of its users based on network KPIs regardless of their participation. The autonomous system continuously (or periodically) improve the prediction accuracy by random subjective tests or user behavior analysis. Related steps in this use case scenario are:. • Application or network service (NS) provider demands and deploys QoE prediction as -a-service (QPaaS) from a third -party server. o Applicat ion or NS provider provides a mechanism to collect/use user feedback and network metrics . • Identify a method of measurement for QoE: o Perform subjective tests, e.g., video streaming, two -way communications, etc. User opinions on a scale of 1 -5 or thumbs up/down. o Perform user behavior analysis, e.g., gaming, AR/VR, driver assistance, etc. In a group of gamers connected via various CSP (communication service providers), if the gamers from a particular CSP face delays or a specific cell site (geographic area ) is facing latency, the gaming scores and avatar -behaviour itself leave enough clues on the QoE. Similarly, on AR/VR, the level of engagement/interaction, or in assisted driving, the level of coordination between vehicles, can be measured. • QPaaS server, c ollects/processes network and application KPIs. • QPaaS server determines a mapping between application KPIs and application QoE metric (MoS) using (supervised) machine learning. o This mapping may be used by the application server for future objective testing of user QoE.
39
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 32 • QPaaS server collects/processes relevant network service KPIs and forms a mapping between network KPI and application KPI (or MoS) using (supervised) machine learning. o The NS provider may use this mapping for future objective testing of netw ork performance given the application. • Perform periodic verification with subjective tests/user feedback, and improve learning based on the results. Due to various applications, QoE measurement and prediction is a significant issue in future networks. The network should be able to autonomously perform QoE measurement and mapping of network KPI to QoE metrics. NOTE - as applications and network services evolve, so do their corresponding KPIs and the mappings (user satisfaction parameters, to ap plication KPIs, and to network KPIs). See related open issues below which handles information exchange between evolving applications and NS and QPaaS. Open issues (as seen by the proponent) • How are application KPIs provisioned in the QPaaS server? How is this done for new applications? Can we transfer knowledge gained from Sandbox in on - boarding new applications and services and corresponding mappings? • How do you access relevant network KPIs? • How are network KPIs provisioned in QPaaS server? How is th is done for new NS (network services)? • How do you select users to collect data from? • How do you ensure the privacy of the user and network service data? E.g., federated learning may allow privacy for user data. • How much training data do you need to colle ct for objective QoE measurement? • Can you perform reinforcement learning to improve the QoE model? Notes on use case category • Cat 2: describes a scenario related to the application of autonomous behavior in the network. Notes on priority of the use case High. QoE is an essential metric for user satisfaction. Although QoE measurement is well analyzed in the context of video st reaming, there is no general definition for a wide variety of applications. This autonomous service will allow future application developers to model and track the QoE of their applications online. QoE tracking will enable application developers to updat e network slices dynamically. Reference [b-Jahromi], [b -Pierucci ], [b-Bouraqia ], [b-Liu] 7.17.1 Use case requirements Critical requirements ● AN-UC017-REQ -001: It is critical that autonomous networks (AN) use both subjective information from users and QoE information derived and analysed from network services to arrive at the application QoE metric. NOTE – subjective information from users may include user opi nions and subject measures e.g. opinions on a scale of 1 -5 or thumbs up/down about a streamed video. Examples of QoE information derived and analysed from network services are the level of engagement/interaction in an online game, or analysis of gaming sco res and avatar behaviour. ● AN-UC017-REQ -002: It is critical that autonomous networks (AN) learn and update the process of information collection from users and derivation from network services.
40
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 33 NOTE 1 – For example the parameters collected, the mechanisms for collecting and the sample set for collection may be learnt and updated. Also the mapping between the application QoE metric and the information collected from users and derived from network services may evolve over a period of analysis. NOTE 2 – the mapping between the application QoE metric and the information collected from users and derived from network services may be modelled using AI/ML techniques. ● AN-UC017-REQ -003: It is critical that autonomous networks (AN) evolve and update the mapping between application QoE metric, network KPIs a nd application KPIs. NOTE – the process of evolution and updation may be triggered by application feature additions, network service updates or user device updates. Expected requirements ● AN-UC017-REQ -004: It is expected that autonomous networks (AN) enable the plugin of QoE prediction algorithms which may be integrated based on abstract APIs exposed from AN, which are agnostic to the type of application and the specific underlying network technology. 7.17.2 Use case specific figures Figure 12: actor interaction for Quality of Experience (QoE) Prediction as -a-Service (QPaaS) 7.18 Autonomy applied to CDNs Use case id FG-AN-usecase -18 Use case name Autonomy applied to CDNs Base contribution FGAN -I-079, FGAN -I-019 Creation date 15/April/2021 Use case context Discussions regarding AN -I-019, FGAN -I-079 Use case description [AN-I-019] intro duced Autonomous content delivery networks (CDN), especially looking at a few key aspects of CDN and what makes them unique, focusing on several of their properties and approaches we can leverage to increase their autonomy. With increasing bandwidth of ne tworks, proliferation in the connected devices, increasing demand of content (e.g. live video, cloud gaming, 360 video), build -your-own approach to CDNs enabled by cloud services, cloud based CDNs
41
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 34 are attractive but with several challenges. However caching based on data analysis remains unsolved while CDN providers struggle to provide rich content at high QoE. [AN-I-019] called out specific aspects that need programmability - routing, caching and eviction. Importance of logging and metrics were called out on request/response metadata, timing information, internal logic decisions. Current implementations of closed loops for managing CDNs are simplistic e.g. Standard auto scaling in the context of CDN, increasing the stream -per-node approach by hardware beef -up (better compute, more cores, more memory, L1 cache, networking including PCIe 4.0, cryptographic acceleration) There exists an opportunity to better QoE using evolution and experimentation concepts in FG AN. The following considerations are important to note in the context of autonomous CDNs: 1) metric for success: CDNs usually define their success based on whether they can serve the user traffic. But this has a cyclic effect because the ability to attract traffic depends on how well CDNs process the traffic they currently have. The challenging part is the metric used to judge the CDN, examples: a) incorporating the current number of requests into the score would be useful. b) if there is anonymised access to user quality of experience (QoE) data, how fast the page loaded, it would be a useful metric. c) another option is to measure the response time from the CDN (usually abridged to the hit ratio) d) include other overlays in the measurement e.g. control planes, service management, tiered storage design. e) going beyond auto scaling to h ealing, load balancing and edge compute, concurrency, 2) adapting the possible caching strategies: Memory intensive contents require large memory in CDN. a) based on the treatment of various type of content and CDN use cases in the cache. e.g. live vide o that is cached for a brief period of time, VoD, live transcoding. To reduce the time to live (TTL) to avoid keeping infrequently popular objects in cache b) bypass the cache for large objects, or for certain classes of users, or particular extensions c) use the disk, or explicitly forbid it d) take advantage of flexibility provided by virtual cache 3) as far as open source and standards go: (decouple the components) a) open -caching is pushing to provide a subset of metrics b) perhaps an opportunity to der ive “upstream” gaps in standards and lead an opensource proof of concept (PoC). c) study of an open, interoperable CDN components – e.g. caching, transcoding, analytics which can help independent evolution of the CDN pipeline, while taking advantage of the work in other bodies e.g. encode/decode, AI, graphics. and hardware evolution e.g. compute/mem/network/acceleration. d) similarly, take advantage of the software deployment trajectory towards cloud native. Following are related steps in this use case sc enario: 1. outer -loop: Represent the “QoS/QoE requirements” in an intent, deployment considerations (e.g. hardware, cloud) are to be captured in the intent. software/CDN pipeline considerations are to be captured here too.
42
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 35 2. based on analysis, derive the cache policy, action: auto scaling/traffic routing, geographic location (e.g. edge), decide storage configurations, APIs and concurrency mechanisms. 3. experiment to determine a good combo of KPIs, data measurement, polici es, action areas (e.g. scaling, positioning) 4. inner -loop: Adapt the CDN and corresponding configurations based on the above, with tangible, demonstrable benefits in QoE. 5. feedback to intent evolution – to step 1 above. Open issues (as seen by the prop onent) 1. Can we capture the app -specific constraints (e.g. hit ratio) in a standard fashion? (for inputs to perhaps other SDOs) 2. what are the traffic characteristics relevant to CDNs for 6G? Notes on use case category Cat 2: describes a scenario relate d to application of autonomous behaviour in the network. 7.18.1 Use case requirements Critical requirements ● AN-UC018-REQ -001: it is critical that AN enables representation of QoS/QoE requirements in an intent, and additionally deployment considerations (e.g. hardware, cloud) and software/CDN pipeline considerations are to be captured in the intent. are to be captured here too. ● AN-UC018-REQ -002: it is critical that AN enable adaptations based on analysis. ● AN-UC018-REQ -003: it is critical that AN enable experiment to determine a good combo of KPIs, data measurement, policies, action areas (e.g. scaling, positioning) ● AN-UC018-REQ -004: it is critical that AN enable the tracing of adaptations on configurations to tangible, demonstrable benefits in QoE. ● AN-UC018-REQ -005: it is critical that AN enable feedback to intent evolution. NOTE – Feedback may include parameters for representation in the intent, additional deployment considerations, and adaptations. 7.18.2 Use case specific figures None. 7.19 Analysis -driven evolution in virtualized RAN based on devops Use case id FG-AN-usecase -19 Use case name Analysis -driven evolution in virtualized RAN based on devops Base Contribution AN-I-072 Creation date 22/April/2021 Use case context Discussions in the FG AN meeting during [AN -I-072] Use case description Open radio access network (e.g. O -RAN) a rchitectures allow disaggregated evolution of RAN components. Programmability and interfaces exposed by RAN components in open RANs allow developers the opportunity to create applications (e.g. xApps) based on data from RAN. In parallel, development metho dologies like devops are being applied to enable rapid introduction of services to networks. At the same time, technology evolution in the form of 6G is in progress. This use case links the dev and ops cycle on one side to the programmability offered by new RAN architectures like O -RAN.
43
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 36 An analysis of RAN services and applications (e.g. data, messages, interfaces, logs, etc from xApps and rApps) can provide valuable i nformation regarding software evolution and technology evolution and deployment evolution. Following are related steps in this use case scenario (with O -RAN as example architecture): 1. Analysis of heterogeneous RAN components, corresponding splits, capabilities, deployment options and interfaces and data models (e.g. E2 nodes and E2AP support). 2. Analyse the information in the near real time RAN intelligent controller (nRT RIC) 3. Discover the capabilities of various RAN nodes and instantiate (potenti ally cloud -native versions of ) applications (e.g. xApps) based on RIC SDKs. 4. Provision and analyse the closed loops at near real time RIC. 5. In correlation with the non RT RIC, analyse the devops cycle at the near real time RIC to provision new types of CNFs in the near real time RIC and new types of E2 nodes (or new capability -needs in E2 nodes). 6. In the non RT RIC, analyse the devops cycles of near RT RIC, new capability needs of E2 nodes, arrive at new use cases (e.g. what are the users not able to do with the current network and why?) Describe the relation with autonomous behaviour (if any). - this use case is related to the evolution and experimentation aspects. It takes advantage of the increased data gathered from RAN via the open interfaces and the devops style of RIC application development to automate specific aspects of the evolution process. Open issues (as seen by the proponent) - E2AP message structure may need to be predetermined and has to be agreed with E2 node vendors. - unified RIC SDK space is needed. Notes on use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High - has the potential to impact future network architectures and use cases. References • [b-DISH -AWS] , [b-ONF -auto-service] 7.19.1 Use case requirements Critical requirements ● AN-UC019-REQ -001: it is critical that AN enables analysis of heterogeneous RAN components, corresponding splits, capabilities, deployment options and interfaces and data models NOTE – e.g. E2 nodes and E2AP support. ● AN-UC019-REQ -002: it is critical that AN enables discovery of the capabilities of various RAN nodes and instantiate (potentially cloud -native versions of) applications. NOTE – Examples of applications are xApps. ● AN-UC019-REQ -003: it is critical that AN enables provisioning and analysis of clo sed loops at near real time locations. NOTE – near real time RIC is an example of near real time location. ● AN-UC019-REQ -004: it is critical that AN in correlation with the orchestrator, analyse the devops cycle at the near real time locations to provisi on new types of network functions in the near real time locations
44
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 37 NOTE – Further examples of new types of network functions are new types of E2 nodes (or new capability - needs in E2 nodes). 7.19.2 Use case specific figures None. 7.20 Evolving edge applications for verticals using private 5G Use case id FG-AN-usecase -20 Use case name Evolving Edge applications for verticals using Private 5G Base contribution [AN-I-065] Creation date 22/April/2021 Use case context Discussions during [AN-I-065] Use case description Vertical network applications like corrosion detection and intruder detection needs to be enabled at the edge using AI/ML. These applications allow : Inspection and surveillance services for critical industrial infrastructu res. Multi -domain (core and edge) e2e deployment of applications, on demand, is needed. 5G orchestration platform allows distributed deployment of applications, especially in exploiting the capabilities at an edge environment. This allows network operators to manage the unique KPIs of services at edge sites without exposing the network architecture. By providing an environment to develop and deploy edge applications, to serve specific needs of verticals, network operators are able to create an ecosystem fo r value creation, especially for domain -focussed small businesses. Following are related steps in this use case scenario: 1. enterprises deploy private 5G network slices at edge 2. the applications and KPIs are analysed at the edge 3. network management and optimization approaches are triggered based on this analysis 4. tailor made applications which are specifically tuned for the needs of the enterprise are offered to the enterprise. NOTE - this fits well with the concept of NetApps and network applicati on orchestrator (NAO) [AN -I-065], decoupling the network operations logic from service provider logic and providing clear business roles. 6. the process facilitates experimentation and evaluation of candidate solutions. 5. edge network evolution and adaptation is triggered based on the analysis. Describe the relation with autonomous behaviour (if any). - this use case is related to the evolution and experimentation aspects. It takes advantage of the increased deployment flexibility provided by private 5G networks. edge -core information exchange is used to trigger experimentation and adaptation of the edge. - there is also an expectation of alignment with domain specific experiments and matching KPIs based on innovations in the verticals. Open issues (as seen by the proponent) - lack of standard mechanisms for representing and experimenting with digital twin -like mechanisms for experimenting. - lack of standards in edge -core communication for evolution and adaptation. - lack of repository for domain -specific 3rd party applications which can be deployed at the edge. - lack of inputs and experts from verticals.
45
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 38 Notes on use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High - has the potential to impact future service deployment at the edge - standards gaps are visible. - potential collaboration with EU projects. References • 7.20.1 Use case requirements Critical requirements ● AN-UC020-REQ -001: It is critical that autonomous networks (AN) interface with network application orchestration platforms at edge networks to provide both local, vertical -specific, including real time analytics as well as remote, general, including non -real time analytics . NOTE – network application orchestration platforms may coordinate with edge analytics and edge service management to abstract the edge network architecture to the AN. ● AN-UC020-REQ -002: It is critical that autonomous networks (AN) provide both network management and optimization and application management and optimization services to application orchestration platforms at the edge. NOTE – while network management and optimization provides specific inputs to the edge about the network architecture, appl ication management and optimization services may provide specific inputs on placement, functionalities and other aspects of applications. Expected requirements ● AN-UC020-REQ -003: It is expected that autonomous networks (AN), provide tailor -made recipes f or application management and optimization specific to verticals deployed at the edge. NOTE – these recipes may be the result of offline, generalized analytics at the AN. These recipes may be considered by NAO while designing, developing and deploying applications at the edge. Added value requirements ● AN-UC020-REQ -004: It is of added value that autonomous networks (AN), consider feedback from NAO, and continuously optimize the tailor -made recipes for application management and optimization specific to verticals deployed at the edge. NOTE – the feedback from NAO will not contain the details of net work architecture or user details at the edge.
46
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 39 7.20.2 Use case specific figures Figure 13: actor interaction for Evolving Edge applications for verticals using Private 5G 7.21 Experimentation and “fire-drills” for public safety networks Use case id FG-AN-usecase -21 Use case name Experimentation and “fire-drills” for public safety networks Base contribution [AN-I-055-R1] Creation date 22/April/2021 Use case context Discussions during [AN -I-055-R1] Use case description Emergency response and public safety needs resilient, on -demand network setup and management. This will require inputs from verticals including emergency responders. Experimentation and trial runs may be mandated in certain regions. Based on th e new technologies used in evolving the networks, there are different ways of deploying public safety networks. To validate the readiness of such networks, experiments need to be designed, even for the rare scenarios. In fact for public safety networks, th e design of rare scenarios is more important than the “sunny -day” success scenarios. It is also important that the experimentation matches step with the evolution of technologies used for implementing the public safety networks. Following are related st eps in this use case scenario: - step 0: continuous analysis of external inputs and creation of strategies for experiments (experiments are equivalent to "fire drills") - step 1: closed loops are formed in sandboxes, "fire drills" are conducted and analyse d. - step-2: based on the “success” or failure of the rare scenarios, network optimization may be triggered. Describe the relation with autonomous behaviour (if any). - this use case is related to the evolution and experimentation aspects. It applies the principle similar to GAN for experimenting, validating the preparedness of public safety networks.
47
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 40 Open issues (as seen by the proponent) - need mechanisms for representing the current state of readiness of the network to handle emergencies. - need mechanisms for modelling and automation and validation of such controlled experiments in the context of public safety networks Notes on use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High - addresses an important end -user scenario - potential collaboration with other groups working in the area of public safety networks. Reference 7.21.1 Use case requirements Critical requirements ● AN-UC021-REQ -001: It is critical that autonomous networks (AN) enable continuous analysis of external inputs and creation of strategies for experiments. ● AN-UC021-REQ -002: It is critical that autonomous networks (AN) enable closed loops formation in sandboxes, where specific tests could be c onducted and analysed on those closed loops. ● AN-UC021-REQ -003: It is critical that autonomous networks (AN) trigger network optimizations based on the “success” or failure of the rare scenarios in sandboxes. 7.21.2 Use case specific figures None. 7.22 Machine learni ng for network automation Use case id FG-AN-usecase -22 Use case name Machine Learning for Network Automation Base contribution AN-I-014 Creation date 02/Feb/2021 Use case context Discussions regarding AN -I-014 Use case description [AN-I-014] introduced Machine Learning -enabled network automation and the required “tailoring” of ML apps for networks. [AN-I-014] called out specific aspects that need consideration in network while applying ML: requirements from each domain, specificiti es (time, data and error) of each domain. Reference architecture was discussed including a ML orchestration layer. Considerations on algorithm design including trade -offs were discussed. The concept of “sub -problems” in networks and the limited role of ML were discussed too. The challenge in mix -match of data with ML (with respect to security, location, interoperability, etc) was discussed. A potentially top -down approach to service optimization was discussed. Following are the additional considerations in this use case: 1. Domain specific characteristics (called “specificities” in AN-I-14) may not be known beforehand to the solution designer, especially given the loosely coupled architecture of future networks and ML. 2. In addition to domain -specificiti es, service based specificities may be important too. Even in case of multi -domain services, specificities could be captured per -domain, E2E, at service level. So when we add new tenants, we
48
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 41 need a way to dynamically capture their specificities + the domai ns which their corresponding specificities. 3. Agile dev and deployments in future networks may need dynamic discovery of trade -offs per service. Considering the service life cycle as day -0 (design), day-1 (deployment), day -2 (monitor), day -3 (optimization ), day -4 (re -design), day-5 (evolution), feedback loops are important to enable rapid development and reduce time to market for new services. 4. run -time discovery of “sub -problems” Following are related steps in this use case scenario: 1. ML pipelines c onfigure policies in the network based on the network QoS feedback. 2. Service metrics and related policies are provisioned in the ML pipelines based on the monitoring and analysis of errors. 3. service redesign and optimization is triggered based on “su b-problems” and “specificities” discovered. 4. network/domain specificities are tracked and similarly optimization problems are tracked. These are input to the service evolution. Open issues (as seen by the proponent) 1. Considering "achieve optimal operation in one domain only is risky" and "cross -tenant metrics exchange" is needed, and considering the SA5 1:many relationship with vendors in 28.530, what are the possible feedback from the CSP and CSCs? Other than the stock "metric feedback" a nd "policy" to the NF, is there an orthogonal feedback to "ev" to "dev" which can potentially create new NFs? 2. How do we discover “sub -problems” on the fly? 3. How to do dynamic discovery of trade -offs per service? 4. what tools we have to “design algori thm”? Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - has the potential to impact future service development and evolution. - reuses MLFO and Y.3 172 architecture. Reference 7.22.1 Use case requirements Critical requirements ● AN-UC022-REQ -001: It is critical that autonomous networks (AN) enable, in case of multi - domain services, specificities per -domain, E2E. NOTE – This includes a way to dynamically, autonomously capture their specificities + the domains which their corresponding specificiti es. ● AN-UC022-REQ -002: it is critical that AN enable agile dev and deployments in future networks dynamic discovery of trade -offs per service. NOTE – Considering the service life cycle as day -0 (design), day -1 (deployment), day -2 (monitor), day -3 (optimi zation), day -4 (re-design), day -5 (evolution), feedback loops are important to enable rapid development and reduce time to market for new services. ● AN-UC022-REQ -003. it is critical that AN enable run -time discovery of “sub -problems”. 7.22.2 Use case specific fi gures None.
49
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 42 7.23 Autonomous agents (with varied competence) in networks Use case id FG-AN-usecase -23 Use case name Autonomous agents (with varied competence) in networks Base contribution FGAN -I-052_att Creation date 04/Mar/2021 Use case context Discussions regarding FGAN -I-052_att Use case description [AN-I-052] introduced autonomous Systems in hostile environments. Estimation and judgement of competence as key criteria for det ermining the right level of autonomy was the focus. Levels of autonomy for unmanned systems were introduced, especially ranging from “sub-functions” to single functions to single system to teams. A framework for robot autonomy was discussed with correspond ing guidelines. Based on these, the characteristics for operations in hostile environments were listed. [AN-I-052] called out the requirements for operations with autonomous systems. Relation between the needed level of autonomy depending on environment a nd type of task in contrast to capabilities of the system in combination with policies. Systems should provide the best possible support and hence the autonomy level has to be adjusted such that humans only have to intervene when it is necessary and makes sense. Due to dynamics during missions in hostile environments, the systems have to adapt their autonomy level at run -time (or humans have to do it) according to the situation and the corresponding requirements. The existing stage levels of autonomy have t o be extended by the ability of switching the level in run -time (judgement by design vs. judgement in run time) A simple workflow scheme for autonomy with varying autonomy levels was discussed. This included task specification by human and task understand ing, feasibility check, task planning, task execution by system. Request for support to human and control by human can be to any of these workflow steps. Monitoring of performance levels by humans and learning by the system are added steps. Autonomy lev el and dependency on competence were discussed. Competence analysis as a weighted function of capabilities needed, capabilities existing, existing options for actions and existing constraints was described. Following are the additional considerations in th is use case: 1. Taking telco service design, development, deployment and operations (ops) as an example - the levels of autonomy may be applied in follows: (a) service design is done by designers (100% designer interaction, no ops interaction) (b) existi ng software development kits (SDKs) and application programming interfaces (APIs) are exercised to create applications (e.g. rApps or xApps) – (high level designer interaction, high code but low ops interaction) (c) configuration of existing or new service s in real time environments (e.g. distributed unit (DU) – mid level designer interaction, high ops involvement). (d) service deployment and QoE measurement in customer premises (e.g. VoD – no code, low designer interaction, collaborative, high ops involve ment). Thus, it may be relevant to consider the nature of the task in addition to the type of environment. e.g. for the ops engineers design phase is a “difficult environment” (due to low involvement) and for the service designers customer premises is a “difficul t environment” (due to constraints in site visits). Thus, it may be relevant to consider a multi -agent system where the agents have varied competences (capabilities + options for actions + constraints). Following are related steps in this use case sce nario: 1. Problem detected in the network (e.g. video performance degradation for customers)
50
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 43 - e.g. scenario: ops agents collect debug data. analysis agents with matching capabilities are deployed at the nRT RIC and triggered to analyse the data. 2. fault isolation (e.g. in CU, DU, user plane, control plane) - e.g. scenario: collaborative analysis is used to pin -point the cause of failure. this may involve multi -agent team communication to do the steps in the workflow described in AN -I- 052 3. fault correction (e.g. parameter configuration) - e.g. scenario: may involve service upgrade or software reconfig. 4. analysis of task performance by agents - e.g. scenario: collaborative analysis is used to collect data from the agents – including whe re the human interactions were needed. 5. trigger creation of new agents with new capabilities. - e.g. scenario: location and capabilities are selected based on the next higher level of autonomy to reduce human interaction in this scenario. Open issues (as seen by the proponent) - need coordination of multi -agent systems to avoid conflicts. - need mechanisms for adapting autonomy based on competence at run -time and flagging human (or higher level) assistance - need multi -domain orchestration to positio n the agents at various network domains. - In some cases, hardware capability adaptation may be needed which may need new physical network functions (PNF). Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - has the potential to impact future service development and evolution. Reference [b-Beyerer], [b -Hesse] 7.23.1 Use case requirements Critical requirements ● AN-UC023-REQ -001: It is critical that autonomous networks (AN) enable, autonomous agents to collect debug data. NOTE – For example analysis agents with matching capabilities are deployed at the nRT RIC and triggered to analyse the data. ● AN-UC023-REQ -002: It is critical that autonomous networks (AN) enable, fault isolation (e.g. in CU, DU, user plane, control plane) using collaborative analysis is used to pin -point the cause of failure. NOTE - this may involve multi -agent team communication to do the steps in the workfl ow. ● AN-UC023-REQ -003: It is critical that autonomous networks (AN) enable, fault correction (e.g. parameter configuration) using service upgrade or software reconfig. ● AN-UC023-REQ -004: It is critical that autonomous networks (AN) enable analysis of tas k performance by agents NOTE – Collaborative analysis is used to collect data from the agents – including where the human interactions were needed. ● AN-UC023-REQ -005: It is critical that autonomous networks (AN) enable creation of new agents with new capa bilities. NOTE – Example location and capabilities are selected based on the next higher level of autonomy to reduce human interaction in this scenario. 7.23.2 Use case specific figures None.
51
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 44 7.24 Automated, adaptive acceleration for AI @ edge Use case id FG-AN-usecase -24 Use case name Automated, adaptive acceleration for AI @ edge Base contribution FGAN -I-046 Creation date 04/Mar/2021 Use case context Discussions regarding FGAN -I-046 Use case description [AN-I-046] introduced Spatial Architectures whi ch scale performance & resources to meet the application requirements and Scaling to fit into available resources – in the context of DNN. It also discussed that reduced precision can be highly effective to reach communication requirements. Spatial archite ctures can exploit custom arithmetic at a greater degree. Further, it discussed topologies fully co designed for hardware architecture, where the Circuit is the DNN [ b-Umuroglu ]. Adjust the parameters of DNN (=lookup table (LUT) contents) while iterating o n training dataset until accuracy. [AN-I-046] showed results (with an example of intrusion detection) that spatial processing, customized arithmetic and learned circuits can help scale to communication throughput and latency requirements. I-046 also talked about [FINN -R] and Providing tool s and platforms for exploration of DNN compute architectures. ML engineers can create specialized hardware architectures on an FPGA with spatial architectures and custom precision. Design and runtime software tools (e.g. FINN) for DNN to FPGA development starting with training or learning reduced precision DNNs, using ONNX based intermediate representation, perform optimization on this intermediate representation, to create a DNN hardware IP, was discussed. Thus, it may be relevant to consider the follow ing aspects for this specific use case: 1) AI -enabled applications are increasingly being deployed at the edge. Low latency, low power consumption and small footprint are considerations for AI applications at the edge. Accelerated, AI -enabled applications at the edge are important enablers for future networks. 2) As AI technology evolves, AI models evolve, the acceleration platform must also be adaptable and at the same time satisfying the requirements above. Also, reduced time to market, development time and cost to reach production readiness, are important factors influencing deployment decisions by network operators. fully customized circuit board is developed for each application may not fit this bill. 3) pluggable solutions into a larger edge applicati on, providing both the flexibility of a custom implementation with the ease -of-use and reduced time - to-market of an off -the-shelf solution, are needed. 4) Adaptive computing includes hardware that can be highly optimized for specific applications such as Field Programmable Gate Arrays (FPGAs). In addition to FPGAs, new types of adaptive hardware such as adaptive System - on-Chip (SoC) which contains FPGA fabric, coupled with one or more embedded CPU subsystems, have been introduced recen tly. 5) prebuilt platforms and APIs, software tools enable full customization of the adaptive hardware, enabling even more flexibility and optimization. This can be used to design highly flexible, yet efficient systems at the edge. 6) exploiting the develo pment and adoption of standards in interface and protocols at the edge, different AI -enabled edge applications can use similar hardware components. Following are related steps in this use case scenario:
52
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 45 1. Given an AI/ML model layered architecture, the following considerations needs to be applied – (a) concurrency in processing of layers, (b) fragmentation/buffering between layers vs. offloading of layers into compute (c) precision vs. performance and energy efficiency. 2. given the specific goals and co nstraints of the AI/ML model, consider the target platform architecture and “sacrificable” precision to explore the model architecture and layer compositions. 3. transformation of a AI/ML model -> intermediate representation -> optimization -> hardware imp lementation -> evaluation -> back to training/modelling. 4. derive feedback for hardware adaptation and design. Open issues (as seen by the proponent) - the role played by MLFO is not clear (need further study). - the intersection with Y.3179 has to be studied further. - dependencies with specific hardware architectures and specific types of neural network (NN) topologies need further study. - the role played by training techniques need further study - the role played by cycle -faithful simulators like [scalesi m] has to be studied further. Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - has the potential to impact AI/ML operations and optimization in relation with hardware evolution. Reference [b-Blott ], [b-Xilinx], [b-Umuroglu ], [b-SCALE -Sim] 7.24.1 Use case requirements Critical requirements ● AN-UC024-REQ -001: It is critical that autonomous networks (AN) enable, analysis of concurrency in processing of layers in a DNN, fragmentation/buffering between layers vs. offloading of layers into compute and analysis of precision vs. performance and energy efficiency. ● AN-UC024-REQ -002: It is critical that autonomous networks (AN) consider the target platform architecture and “sacrificable” precision to explore the ML model architecture and layer compositions. ● AN-UC024-REQ -003: It is critical that autonomous networks (AN) enable transformation of a AI/ML model -> intermediate representation -> optimization -> hardware implementation -> evaluation -> back to training/modelling. ● AN-UC024-REQ -004: It is critical that autonomous networks (AN) derive feedback for hardware adaptation and design. 7.24.2 Use case specific figures None. 7.25 Assistive networks : Adaptation of communication system based on changing user accessibility needs Use case id FG-AN-usecase -25 Use case name Assistive networks: Adaptation of communication system based on changing user accessibility needs. Base contribution Editor, Discussions about common user profile (CUP) Creation date 10/May/2021 Use case context Discussions about common user profile (CUP)
53
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 46 Use case description This contribution attempts to describe a use case where: For both disabled and the able-bodied, as the accessibility requirements evolve, adaptations need to be applied on the network, device and user profiles need to align with the changing needs of the user. The scope of assistive technologies needs to be broadened to “assistive networ ks”. Assistive networks can be thought of E2E network slices that include assistive, adaptive, and rehabilitative connectivity for persons with specific needs. It also includes the automated mechanisms used in selecting, locating, using and customizing the networks. Assistive networks promote greater independence by enabling people to connect to the devices and network more autonomously. Environmental models exist for surroundings but building on top of such environment models to adapt the connectivity to t he user with specific requirements is the need of the hour. User model and simulations are needed to provide inputs to AN. Development of standard definitions are needed for application model, assistive network, context modelling, environmental model and c ommon user profile, metadata, simulation and virtual instance in the context of AN. Individualization needs to be added as an important dimension of AN for future networks. Reuse of common user profile (CUP) to automate the collection, analysis and adaptat ion of the network and applications is proposed here. Following are related steps in this use case scenario: 1. Environment model including the network environment is built for the user. e.g. radio propagation models, signal strengths with respect areas, mobility prediction models. 2. User model is accessed and updated. e.g. user specific constraints, user inside a car wearing seat belt has limited mobility within the car. Similarly for elderly and children, persons under emergency needs. 3. Simulations are used (offline and/or real time) to determine the changes and adaptations needed in the network to satisfy the needs of the user. e.g. digital twins which include environment simulations and user specific criteria. 4. Adaptations are applie d to the network and the context. e.g. drone based coverage is provided, reconfigurable intelligent surface (RIS) configurations or beam configurations to provide better coverage. 5. generalizations and evolutions are studied for applicability in a larger context. e.g. continuous update of models, transfer of model parameters across domains for easy learning, evolution of network simulators and context for new encountered scenarios. Describe the relation with autonomous behaviour (if any). - this use case i s related to adding environment sensing and adaptation to include inclusivity in the evolution and experimentation aspects. It takes advantage of the existing studies in Q11/9. Open issues (as seen by the proponent) - standard mechanisms for capturing envir onment in the context of network requires further study. - simulations and experiments in relation to user model, specific user needs and network characteristics needs further study.
54
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 47 Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High - has the potential to evolve assistive future network architectures and further enable new use cases. References [b-J.acc -us-prof] , [b-Biswas] , [b-AVA -1], [b-AVA -2], [b-ISO/IEC 24756] , [b-ISO 9241 -129], [b-KUKA ] 7.25.1 Use case requirements Critical requirements ● AN-UC025-REQ -001: It is critical that autonomous networks (AN) enable, creation and representation of environment model including the network environment for the user with assistive needs. NOTE – e.g. radio propagation models, signal strengths with respect areas, mobility prediction models. ● AN-UC025-REQ -002: It is critical that autonomous networks (AN) enable updation of user model. NOTE – e.g. user specific constraints, user inside a car wearing seat belt has limited mobility within the car. Similarly for elderly and ch ildren, persons under emergency needs. ● AN-UC025-REQ -003: It is critical that autonomous networks (AN) enable Simulations (offline and/or real time) to determine the changes and adaptations needed in the network to satisfy the needs of the user. NOTE – e.g. digital twins which include environment simulations and user specific criteria. ● AN-UC025-REQ -004: It is critical that autonomous networks (AN) enable Adaptations applied to the network and the context. NOTE – e.g. drone based coverage is provided, rec onfigurable intelligent surface (RIS) configurations or beam configurations to provide better coverage. ● AN-UC025-REQ -005: It is critical that autonomous networks (AN) enable generalizations and evolutions which are studied for applicability in a larger c ontext. NOTE – e.g. continuous update of models, transfer of model parameters across domains for easy learning, evolution of network simulators and context for new encountered scenarios. 7.25.2 Use case specific figures None. 7.26 Ev-as-a-service: Achieving zero touch evolution in a delegated autonomy case Use case id FG-AN-usecase -26 Use case name Ev-as-a-service: Achieving zero touch evolution in a delegated autonomy case. Created by Editor Mentor Laurent Ciavaglia Creation date 10/May/2021 Use case context Discussions during and after FGAN -I-005 Use case description This contribution attempts to describe a use case where: - A multi -domain architecture is assumed. Each domain may have its own orchestrator.
55
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 48 NOTE - Example in FG -AN-usecase -20, NAO is mentioned. MANO/NFVO is used in the NFV domain, service orchestrator may be used similar to ONAP in the communication domain. - Closed loops are assumed in each domain, managed by the corresponding orchestrators. - (For the purposes of this use case), it is assumed that each closed loop enables autonomous behaviour in that domain for specific use cases e.g. resource scaling based on load. NOTE - The autonomous behaviour enabled by use case specific closed loops and managed by domain orchestrators can be extended to any number of management domains. - Current frameworks [ITU -T Y.3172 ], [ITU -T Y.3179 ], [b-ETSI ZSM 002] assume offline development and provi sioning of services which form the closed loops. e.g. AI/ML model training based on data from the network, followed by model serving in the network. - This use case introduces an evolution (Ev) function which analyses the inputs from the closed loops (and ot her context information in the domain orchestrator) to trigger creation of new services which can cater to the evolving needs of the domains. - The triggers may be input to devops pipeline. This may result in creation of new framework services or new applica tions or new VNFs or new configurations or new AI/ML models etc - These may then be tested and evaluated in an experimental setup (e.g. Digital twins, Sandbox, etc) and deployed in corresponding domains using the domain orchestrators. In summary, the use ca se proposes to monitor, identify the need for ev, generate new f() to support this need, “(re -)inject” that function through devops pipeline into the closed loops. Note that this may require multi -domain coordination to modify the closed loops and may be c hallenging from an implementation perspective. Implementation may depend on the capabilities provided by the underlying closed loop frameworks e.g. ZSM. Levels of “mutation” of CL: There can be a spectrum of adaptation changes to the closed loops (CL): a) no adaptation at all – same input to the CL, always leads to the same output. b) limited adaptation – CL improves utility over time, so same input may not lead to the same output (after improvement). c) full -fledged evolution, involving development and i njection of new functions. The capability of underlying closed loop frameworks may be factor in deciding the level of adaptation possible in the AN. Division of responsibility between the controller and the CL: 1) “dumb” vs. “intelligent” closed loops: dumb CL may allow full fledged re - configurations and re -injections of functions which may allow overall mutation of its functionality over time. Whereas an “intelligent” closed loop may use its intelligence to limit external influence by the controller. I n any case, the domain orchestrator should know the mutation -capabilities of the CL. In case of limitations encountered for adaptations, the CL (or domain orchestrator) should be able to escalate the requirement to higher domains. 2) timescale of Ev has to be agreed between the CL and the orchestrator. Following are related (example) steps in this use case scenario: 1. Enterprise/vertical provides intent for application/service 2. A corresponding slice is created by NAO.
56
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 49 3. Corresponding resources are allocated by NFV MANO 4. NSaaS may be instantiated using ONAP/SO. 5. use case specific closed loops are instantiated in each domain e.g. power optimization, interference management, resource utilization, self -x. 6. Ev as a Service is instanti ated in the zero touch framework. 7. Based on the analysis of inputs from use case specific closed loops and domain orchestrators, Ev triggers configurations, updates, service instantiation, new closed loops, even new service development (using triggers to Devops pipeline). 8. After testing and validation, such updates are reflected in the domains and use case specific closed loops. Describe the relation with autonomous behaviour (if any). - This use case proposes Ev -as-a-service scenario in relation to zero - touch frameworks. Open issues (as seen by the proponent) - interfaces between NAO and other orchestrators are to be studied. - interface with devops pipeline is not automated (as of now). - Human interaction in the process is to be studied - Whet her AI/ML services need special treatment in this process? - what supporting enablers are needed to enable Ev? How do we evaluate whether the proposed Ev meets the KPIs? Notes on use case category Cat 2: describes a scenario related to application of autono mous behaviour in the network. Notes on priority of the use case High - enables integration and interaction with zero touch frameworks. References [b-ETSI GS ZSM 001] , [b-ETSI GS ZSM 002] , [b-ETSI GR ZSM 009 -3], [b- Ciavaglia -1], [b-ETSI GS ZSM 013] , [ITU -T Y.3172] , [ITU -T Y.3179] 7.26.1 Use case requirements Critical requirements ● AN-UC026-REQ -001: It is critical that evolution function (Ev) in autonomous networks (AN) analyses the inputs from domain specific closed loops (and other context information in the domain orchestrator) to trigger management (creation, update and delete) of network services, which may in turn participate in the closed loops. NOTE – The management (creation, update and delete) of network services, over a number of iterations, may result in evolution. ● AN-UC026-REQ -002: it is critical that the modifications to network services and applications may be tested and evaluated in an experimental setup and deployed in corresponding domains using the domain orchestrators. NOTE – Examples o f experimental setups used for testing and evaluation of network services and applications are Digital twins, Sandbox, etc. Expected requirements ● AN-UC026-REQ -003: it is expected that management of network services or applications or VNFs or configurations or AI/ML models is done at runtime in coordination with devops pipelines. ● AN-UC026-REQ -004: it is expected that domain specific closed loops allow management of network services or applications or VNFs or configurations or AI/ML models in coordination with AN components. NOTE – There can be a spectrum of adaptation changes (levels of “mutation”) of network services: a) no adaptation at all
57
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 50 b) limited adaptation – improves utility over time c) full -fledged evolution, involving development and injection of new functions. The capability of underlying closed loop frameworks may be factor in deciding the level of evolution and adaptation possible in the AN. Added value requirements ● AN-UC026-REQ -005: It is of added value that Ev function in autonomous networks (AN) act as consumer of mutation functions provided by underlying service management frameworks and in turn provides evolution service to underlying service management frameworks. NOTE – Example of a service management framework is ETSI ZSM [ b-ETSI GS ZSM 001]. 7.26.2 Use case specific figures None. 7.27 Experimentation as a service: Digital twins as platforms for experimentation Use case id FG-AN-usecase -27 Use case name Experimentation as a service: Digital twins as platforms for experimentation. Base contribution FGAN -I-058 Creation date 10/May/2021 Use case context Discussions d uring presentation of FGAN -I-058 Use case description [FGAN -I-058] described a digital twin as a representation of a physical and/ or logical object. The contribution proposed to build Digital Twins of Computer Network infrastructures. Some examples of the (hypothetical) questions which could be answered using digital twins were l isted as: Which is the best network upgrade given a budget? Which is the best link upgrade to accommodate a new customer? Can we support a new customer SLA with the current network capacity? etc. The impact of digital twins in Network Planning and Upgradin g, Troubleshooting and Performance Analysis, What -if Analysis were described in [FGAN -I-058]. This makes digital twins a perfect environment for experimentation in the context of autonomous networks. [FGAN -I-058] took the approach of using neural networks (NN) to build digital twins. The approach using graph ne ural networks (GNN) was described. It generalizes to unseen topologies, routings and traffics. Specific example of Routenet was described. RouteNet can generalize to unseen topologies, routings and traffic matrices. DRL+GNN looks as a promising technique for real -time network optimization was introduced in [ FGAN -I-058]. Autonomous networks (AN) aim to remove the human from the control loop. This poses hard ch allenges to offer 100% guarantees once the AN products are deployed in networks. In order to achieve mature solutions for autonomous network control, it will be essential for AN vendors to validate in advance that their products will operate successfully i n the target customer networks, before they are actually deployed. A DT can be used to estimate accurately the resulting network performance of an experimentation approach and the effect after applying the actions produced by the AN, thus determining what network scenarios are well -supported by the product. After a comprehensive validation test, the vendor can apply the adaptations to the network.
58
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 51 Following are examples of scenarios in this use case: Scenario -1: preparation of DT: import network configurations (may include closed loops?) into digital twin. This sets the stage for preparation of simulations in the DT. Scenario -2: trigger of DT for simulations : update of network configurations in digital twin (if any, by engineer), followed by simulations in digital twin and generation of asynchronous events. These events are consumed by AN engine and may in turn result in experimental configurations/updates from the AN engine towards the DT. This cycle may continue based on the sequ ence of simulations and scenarios in the DT. The validation of KPIs in the DT as a result of experimentation and adaptations by the AN engine is an important step. Scenario -3: trigger of AN engine by operator : update of network policy/configurations by en gineer, which triggers AN engine to corresponding experiments or configurations towards the digital twin. Experimentation may be configured in the digital twin and corresponding events and KPIs may be used to evaluation the result of the experimentation. T his may result in selecting the best possible sequence of actions or adaptations towards the network. The validation of the AN engine actions is an important step here. Scenario -4: trigger based on evolution : Other triggers for experiments in AN engine ma y include inputs from evolution functionality. Experimentation and evaluation of actions or adaptations towards the network are same as above. Following are related steps in this use case scenario: 1. Import environment into DT, trigger simulations in DT and validate the results, especially the use case specific closed loops. 2. AN -triggered experiments and adaptations are tested using corresponding simulator settings in DT and evaluating the impact in simulations. Describe the relation with autonomous beh aviour (if any). - this use case is related to the concept of experimentation. Open issues (as seen by the proponent) - what are the features of the digital twin? what are the APIs that the digital twin expose? - how to configure closed loops in DT? - we discussed “a marketplace of DTs and you choose the one that fits your particular needs” – this needs further study. - If a DT is trained with certain capabilities, can we transfer the training using p2p interface to new DT? - How to take advantage of GNNs for generalisability and explainability? - Are there standard interfaces for integrating AI/ML with digital twin? Is Y.3172 applicable here? Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High References [b-Rusek] , [b-Almasan]
59
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 52 7.27.1 Use case requirements Critical requirements ● AN-UC027-REQ -001: It is critical that AN enable import of simulation environment into DT, trigger simulations in DT and validate the results, especially the use case specific closed loops. ● AN-UC027-REQ -002: It is critical that AN -triggered experiments and adaptations are tested using corresponding simulator settings in DT and the impact in simulated environment is evaluated. 7.27.2 Use case specific figures Figure 14: Experimentation as a service 7.28 Evolution from scenario -specific, explicit -coordination to coor dination -free interoperability (achieved using data -driven approaches) Use case id FG-AN-usecase -28 Use case name Evolution from scenario -specific, explicit -coordination to coordination -free interoperability (achieved using data -driven approaches) Base contributions [FGAN -I-091], [FGAN -I-029] Creation date 27/May/2021 Use case context Discussions during [FGAN -I-091], [FGAN -I-029] Use case description Deep learning is being used to address challenging problems in wireless communications such as modulation recognition, radio fingerprinting and many other scenarios. The advantages of this approach include the capability to address wide -range of scenarios, where a mathematical model is difficult to make (e.g. channel estimation, beam management for future networks). Existing solutions mostly rely on explicit coordination between the transmitter (TX) and the receiver (RX), introducing problems of interopera bility and necessity for standards. Such signalling messages eat into the costly spectrum and complicate protocol design. A data -driven approach based on neural networks (NN) is an alternative to achieve coordination -free interoperability.
60
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 53 Example -1 for the use case: Millimeter wave (mmWave) communication with large antenna arrays is a promising technique to enable extremely high data rates. Because of their highly directional transmissions, radios operating at millimeter wave (mmWave) frequencies need to perform beam management to establish and maintain reliable mmWave links. Transmitter (TX) and the receiver (RX) need to coordinate to select the beam pair that yields the highest beamforming gain. Currently 5G NR defines the stages of exhaustive beam swe ep (EBS) as: initial access (IA) and beam tracking. For both IA and beam tracking, the 3rd Generation Partnership Project (3GPP) NR standard for 5G communications utilizes synchronization signal blocks (SSBs). Beam management for the IA procedure in 3GPP NR involves: 1) beam sweep: base station transmits directional Synchronization Signals (SSs) to cover all the TXBs of a certain codebook. Each beam is swept with an SSB, which is a group of 4 OFDM symbols and 240 subcarriers in frequency. 2) beam measureme nt: the User Equipment (UE) itself, if configured for directional reception, performs a directional scan, measuring the quality of each beam pair 3) beam decision: the UE selects the beam to be used to perform initial access 4) beam reporting: During the next SSB in the selected direction, the UE acquires information on the time and frequency resources in which the base station will be in receive mode for the random access message using the same TXB I-091 explained receiver can associate Signal -to-Nois e-Ratio (SNR) levels to beams without explicit coordination with the transmitter. pilot -less estimation technique. the RX infers the Angle of Arrival (AoA) and the TXB by passively eavesdropping on data transmissions to other users in the network. leveragi ng a data-driven approach based on convolutional neural networks (CNNs) to achieve coordination -free beam management in mmWave networks. based on a unique “signature” of the beam from the impairments . inferring (i) the Angle of Arrival (AoA) of the beam an d (ii) the actual beam being used by the transmitter through waveform -level deep learning on ongoing transmissions between the TX to other receivers. Experimentation: experimental data collection campaign with two software - defined radio testbeds, and by us ing multiple antennas, codebooks, gains and locations (iv) 3 different AoAs; (v) multiple TX and RX locations. Evaluation criteria: An upper bound on the expected search time of the proposed algorithm. The proposed technique reduces latency by up to 7x wit h respect to the 5G NR initial beam sweep in a default configuration and with a 12-beam codebook. Following are related steps in this use case scenario: 1. Based on the analysis of data from the network, reference points are selected by Ev() where data -driven NN based approaches can be applied to reduce signalling. Ev() should cherry -pick the reference points which has the best trade -offs in terms of benefits (e.g. spectral efficiency, latency, etc) as against the cost of training. Ev() should also help in understanding the experimentation approaches to follow. 2. Based on the scenario under study (for evolution), experimentation is setup and data sources are provisioned and ML pipelines are setup [Y.3172].
61
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 54 3. Based on the evaluation of the AI/ML models in the sandbox, they are injected into the network functions (NFs). 4. Control and data flows are modified according to the evolved netwo rk. Relation with autonomous behaviour - Open issues (as seen by the proponent) Notes on use case category Cat 1: describes a scenario related to core autonomous behavior itself. Notes on priority of the use case High has the potential to impact fut ure network architectures and use cases. Reference [b-O’Shea -1], [b-O’Shea -2], [b-Jagannath] , [b-Mao] , [b-AI4Good -1], [b- AI4Good -2], [b-AI4Good -3] 7.28.1 Use case requirements Critical requirements ● AN-UC028-REQ -001: It is critical that AN enable selection of reference points are based on evolution where data -driven NN based approaches can be applied to reduce signalling. NOTE – Ev() should cherry -pick the reference points which has the best trade -offs in terms of b enefits (e.g. spectral efficiency, latency, etc) as against the cost of training. Ev() should also help in understanding the experimentation approaches to follow. ● AN-UC028-REQ -002: It is critical that AN enable, based on the scenario under study (for evolution), experimentation setup and data sources provisioning and ML pipelines setup [ ITU-T Y.3172]. ● AN-UC028-REQ -003: It is critical that AN enable, injection of ML models into the network functions (NFs), Based on the evaluation of the AI/ML models in the sandbox, ● AN-UC028-REQ -004: It is critical that AN enable, modification of Control and data flows according to the evolved network. 7.28.2 Use case specific figures None. 7.29 Intelligent maintenance assistance system Use case id FG-AN-usecase -029 Use case name Intelligent Maintenance Assistance System Base contribution FGAN -I-108 Creation date 24/June/2021 Use case context Discussions in the weekly meeting during presentation of FGAN -I-108 Use case description The intelligent maintenance assistance system is an intelligent service system for network operation and maintenance. The system combines AI algorithms and AR capabilities to provide intelligent assistance for front line staff of operators in aspects of networ k operation and maintenance. The system includes backstage support system and AR glasses app. The backstage support system is deployed in cloud servers in the form of micro -service, and is connected with the network management system of operators to exchan ge data. The AR glasses app is used for staff's on -site work. The backstage support system provides the following functions. 1. AI algorithms and AR capabilities for system. Developers can also use these algorithms to develop applications.
62
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 55 1) AI algorith ms include Bar code / QR code recognition, OCR, device port recognition. 2) AR capabilities include image recognition and tracking, 3D object recognition and tracking, visual simultaneous localization and mapping (SLAM). 2. The data management function can help implement equipment data transmission, storage, and management, including network resource data, equipment status data, equipment operation data, etc. 3. The system management function includes user management, authority management, system operation management, parameters configuration and other functions to ensure the stable and reliable operation of the system. The AR glasses app provides the following functions. 1. Information collection. Staff can collect pictures through the camera of AR glasses and upload them to the backstage support system. The AI algorithms in the backstage support system can recognize the collected pictures and save the recognition results. Here, the staff can collect the text information of the labels of devices to supplement a nd update the information in the backstage support system. 2. Data visualization. The data managed in the backstage support system can be displayed on the AR glasses. This function can provide the display of alarm information, base station information, equipm ent information, electricity consumption and network status, to assist the network operation and maintenance of staff. 3. Remote guidance of experts. Through the camera of AR glasses, experts get the situation of the work site and provide remote guidance. The steps in this use case are as below: 1. Using AR glasses (and other external sensors), collect data about the environment, which includes equipment label, port, electricity consumption etc. This step may include barcode / QR code recognition, OCR, Device port recognition etc. 2. AI based co gnition analysis, perception visualization and other analysis algorithms are applied on the collected data to create a virtual model of planning and design to real environment to assist network designers. This step may include application of Image recognit ion and tracking, 3D object recognition and tracking, Visual SLAM. 3. This model is then used in conjunction with real data for maintenance and optimization by intelligence maintenance assistance system. This step may involve query of the virtual model, a nalysis of real alarms, cell data, along with the virtual model, to create intelligence assistance for frontline workers. This step may use network data management, system management and core algorithms for the whole system. The output from this step may i nclude 3D models which can be rendered in AR glasses, AI processed network information for display, real -time remote guidance information. 4. As the network services evolve and new network functions are plugged in (virtual or physical), the following evolution steps are applied: a. AR app is updated to collect new data, including new equipment data, and new sensors and new environment information. b. backstage support system is updated with new data management systems, core algorithms etc
63
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 56 5. Perio dic or asynchronous reports are produced for human consumption regarding the operation of intelligent maintenance assistant system. 6. A software development kit (SDK) may be exposed to 3rd party developers who may develop new applications to analyse the AR-collected data. This may in turn help operators to provide new value -added applications in the intelligent maintenance assistant system. Open issues (as seen by the proponent) 1. How autonomy can be applied to simply this process or enhance to enable more? 2. The bidirectional relationship: how the (real world) AR+AI system feeds the (digital world) network management & ops (databases) + how the network supports the AI+AR system, e.g. by providing inventory and processes information and access to controls? Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High has the potential to impact future service development and evolution. Reference 7.29.1 Use case requirements Critical requirements ● AN-UC029-REQ -001: It is critical that autonomous networks (AN) enable collection of environment data related to network operation and maintenance using automated techniques such as augmented reality (AR) glasses. ● AN-UC029-REQ -002: It is critical that autonomous network s (AN) enable analysis of environment data related to network operation and maintenance using cloud and AI techniques. ● AN-UC029-REQ -003: It is critical that autonomous networks (AN) provide intelligent assistance, rendered using automated techniques such as AR, for network operation and maintenance. NOTE – The intelligent assistance may be produced using analysis by AI/ML on the collected data from AR . ● AN-UC029-REQ -004: It is critical that autonomous networks (AN) update the data collection mechanisms and data analysis mechanisms along with the result rendering mechanisms based on the analysis by AI/ML on the collected data from AR and the evolution of the underlay networks. ● AN-UC029-REQ -005: It is critical that autonomous networks (AN) pro vide periodic and/or asynchronous updates to humans about the operation of the intelligent assistant system. Expected requirements ● AN-UC029-REQ -006: It is expected that autonomous networks (AN) enable exposure of programming capabilities to 3rd party dev elopers for creation of novel applications which can help automated operation and maintenance of network, including evolution and adaptation of network functions. NOTE – Such novel applications may analyse the data collected using AR, suggest new data collection mechanisms based on gaps in collected data, suggest new analytical methods, or suggest new targets for application of analysis.
64
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 57 7.29.2 Use case specific figure s 7.30 Demand forecasting and live service migration methods in edge computing systems Use case id FG-AN-usecase -030 Use case name Demand forecasting and live service migration methods in edge computing systems Base contribution FGAN -I-109 Creation date 01 July 2021 Use case context Discussions in the weekly meeting during presentation of FGAN -I-109 Use case description Virtualization and cloudification of services have enabled automation, flexible placement and programmability to network topology. Efficiency of service delivery can be significantly improved using these techniques. However, there are significant challenge s to host Ultra -reliable low -latency communication (URLLC) and massive machine type communications (mMTC) services in 5G, in centralized topologies. Monitoring of networks by telco operators have revealed that network topology is not static and load is not uniform over a long service time. This use case describes a dynamic network topology and service placement using the Genetic Algorithm to analyze and predict services. In addition, an efficient forecasting and live migration methods of service as an appl ication to edge computing systems are introduced. This approach can enable intelligent allocation of operator equipment resources, for providing flexible and efficient topologies. Simulation based analysis of results proved that the network equipment effic iency can significantly be increased by these techniques. The optimization of mobile edge computing network performance for a service by addressing the service placement problem is described below: “Match -making” and analytics service is hosted by REx p latform, exposed as APIs to 3rd party service providers. Services (e.g. gaming) can now utilize the resources at the edge efficiently. Edge network reports the resource status (and other metadata) to the REx platform via the “REx client”@the edge. 3rd party service provider Figure 15: Figure 16: Actor interaction for intelligent maintenance
65
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 58 interfaces with the REx platform via “REx client”@service provider for service deployment at the edge. In addition, the following extensions are proposed: - REx platform will host “composition” service for controllers (closed loops). - Edge networks will expose APIs to deploy and manage controllers - REx platform will analyse the requirements from applications and manage the composition service towards the edge networks. - The sub/pub mechanism described in [FGAN -I-109_att] is extended to include controller metadata. 1. Registration of MEC on the platform will include controller capabilities. 2. Pub MEC status information to the platform will include controller status. 3. Service provider subscribed to this platform receives information about available MECs along with the controllers. 1. Connection, Discovery and capability exchange (info exchange) between the hosted (prediction) service and clients (e.g. REx server and client) on the network operator side (edge) and the (application) service provider s on the ISP side. 2. Data (including traffic characteristics and controller metadata) is measured and analysed to predict the resource utilization and automation at the edge. 3. Placement of services, migration, and composition of corresponding control lers are managed by REx platform. Open issues (as seen by the proponent) #where is the prediction done? is it done at edge Rex client or Rex server? #is the prediction online?real -time? #Is the use of the intelligent aspects (genetic algorithm) trained/evolved/updated online as the system runs, or is there an a priori training step. #in slide 8: can we show where is the prediction done? #where is the migration decision taken? #slide -6: can we map the arrow numbers to the step numbers in the pseudo code in slide 7? #Investigate service composition. #investigate the trust aspects – how to relate/fit. #investigate autonomy metrics – to describe the achievement of the use case. in terms of sec, availability – workflow execution vs. adaptability. Notes on use case category Cat 2: describes a scenario related to application of autonomous behaviour in the network. Notes on priority of the use case High has the potential to impact future service development and evolution. Reference [b-AI4Good -4] 7.30.1 Use case requirements Critical requirements ● AN-UC030-REQ -001: it is critical that AN integrate with Edge networks that will expose APIs to deploy and manage controllers ● AN-UC030-REQ -002: it is critical that AN enable analysis of the requirements from applications and manage the composition service towards the edge networks. ● AN-UC030-REQ -003: it is critical that AN enable sub/pub mechanism including controller metadata.
66
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 59 NOTE – Thus, Registration of MEC on the platform will include controller capabilities. Pub MEC status information to the platform will include controller status. Service provider subscribed to this platform receives information about available MECs along with the contr ollers. ● AN-UC030-REQ -004: it is critical that AN enable Connection, Discovery and capability exchange (info exchange) between the hosted (prediction) service and clients on the network operator side (edge) and the (application) service providers on the ISP side. ● AN-UC030-REQ -005: it is critical that Placement of services, migration, and composition of corresponding controllers are managed by domain specific orchestrators. 7.30.2 Use case specific figures Figure 17: actor interaction for Demand forecasting and live service migration 7.31 OpenCN: An open repository of intents for controllers and modules Use case id FG-AN-usecase -031 Use case name OpenCN: An open repository of intents for controllers and modules Base contribution None Creation date 21 July 2021 Use case context Discussions during 3rd virtual meeting of FG AN, ITU -T Y.3176, Webinars supporting ITU AI/ML in 5G Challenge Use case description As controllers/closed loops evolve to solve practical problems in the networks, this use case aims to provide a baseline repository (called OpenCN ) of intents for different forms of controllers. As in the case of various opensource repositories and AI/ML marketplaces, an open repository will form a baseline for reusable definitions for controllers, provide components for composing and chaining toge ther controllers. In addition, open repo will increase trust in controllers. Metadata related to controllers which describes the controllers and related modules would be enables discovery and other related services like subscription/publication
67
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 60 of new con trollers etc. Metadata also allows to specify guidelines for integrating controllers with service -x and underlays. Not only does the baseline intents allow stakeholders to reuse, extend and interoperate controller implementations, but it also allows the de velopment of an ecosystem of services around it – providing customizations (adaptations), integrations (post experimentations) and finally evolutions. NOTE - collaboration/integration of OpenCN with closed loop frameworks e.g. ETSI ZSM may be explored. Steps in the use case are as follows: - Initial version of controllers are formed from intent or composition from modules (by evolution controllers) - These may be stored in the repo labelled as “untested” or candidate controllers - Experimentation (Ex) ma nager pulls the candidates from the repo and (uses AN sandbox to) evaluate and test and compare the controllers - Evolution (Ev) manager uses the open repo to pull and apply ev strategies - Operational (Op) controllers are stored in the open repo and pulle d and deployed in underlays by various closed loop automation frameworks. NOTE - Standardized intent formats may be used for storing controllers. Open issues (as seen by the proponent) - there is no unified standard format for intents for closed loops - there are no opensource solutions to convert intents to closed loops. Notes on use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High has the potential to impact future service development and evolution. Reference 7.31.1 Use case requirements Critical requirements ● AN-UC031-REQ -001: it is critical that AN enable storage of controllers in an open repository. NOTE – Experimentation (Ex) manager pulls the candidates from the repo and (uses AN sandbox to) evaluate and test and compare the controllers. Evolution (Ev) manager uses the op en repo to pull and apply ev strategies. Operational (Op) controllers are stored in the open repo and pulled and deployed in underlays by various closed loop automation frameworks.
68
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 61 7.31.2 Use case specific figures Figure 18: actor interaction for open repository of intents 7.32 AI enabled game theory -based mechanism for resource allocation Use case id FG-AN-usecase -032 Use case name AI enabled Game theory based mechanism for resource allocation Base contribution FGAN -I-134 Creation date 06 July 2021 Use case context Discussions during 3rd virtual meeting of ITU FG AN Use case description With the advent of Internet of Things, large number of devices may be trying to connect to the network. Macro base station may be capacity limited to serve these devices. An alternative is device to device communication, but complexity of algorithms and privacy concerns are limiting factors here. Another option is deploying small base stations known as small cells and each small cell try to serve set of users. Microcell, metro cell, Pico cell and femtocells are collectively known as small cells and network containing all these base stations are termed as Heterogeneous networks. To optimize the use of bandwidth, we assume co -channel deployment mechanisms, macro cell and small cells will share the same set of sub -channels. Transmission among small cell s may cause interference not only among them but also to the macro cell users. Hence we need to consider efficient resource allocation algorithms to mitigate interference among them so as to satisfy QoS constraints of all the devices/users. Distrib uted algorithms may be needed to mitigate the interference since there may not be coordination (e.g. X2 interface) among the small cells. In this scenario, we would like to propose distributed resource allocation (subchannel allocation and power al location to each subchannel) so as to satisfy QoS requirements of all the devices. NOTE - Game theory based model is proposed and to reach equilibrium points we will be proposing both traditional based algorithms like ML algorithms.
69
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 62 Story -1 for the use ca se: In an enterprise deployment of small cell, say in a factory floor, low latency is required for certain UEs, e.g. robotic arms or self -guided vehicles such as in Industry 4.0 use cases. Macro cell coverage is limited in such indoor factory floors and interference is a problem. Resource allocation for low - latency UEs in the presence o f interference and low coverage by macro is the problem addressed in this “story”. ● Co-existence of UEs that require low latency service and that does not require low latency service o Each small cell can allocate certain channels (power has to be allocated via game theory) to UEs that require low latency (high priority basis) and for other UEs it can allocate channel and power by playing game model o Power allocation is based on UEs rate requirement ● Serving UEs that all require low latency o The small cell that serves these users can act as a leader and other cells can act as a follower. o Here priority will go to the leader and after allocation of resource by this cell, all others will allocate resources accordingly by playing stackelberg game model. ● Given th e measurements such as channel gains observed by user on a particular subchannel along with Interference plus noise on that channel → we need to allocate channel and power per subchannel so as to satisfy user requirements (e.g., rate, low latency) o Here chan nel allocation matrix and power per subchannel (Known as Nash Equilibrium -NE point) has to be computed iteratively via game theory approach. We can use three different kind of algorithms such as traditional optimised algorithm, reinforcement learning algor ithm and genetic algorithm. o We can compare the above algorithms for better usage. o Once we create data set that consists of various measurements - channel gains, interference plus noise, set of sub channels, user per cell, user requirements along with NE poi nt → we can train the supervised learning model and this model sits at the Small BSs to obtain subchannel allocation and power per subchannel depends on the local measurements along with other inputs at each small BSs. o #compare the output from SL with trad itional methods. ● Suppose there are multiple users try to access the channel at a particular time and resources are scarce, then we need to schedule the users into different frame durations (msec). For this we consider auctioning mechanism to schedule the user in a particul ar time slot. Utility for each auction is a function of user requirements such as rate, latency etc., ● Once we perform user scheduling, then we can allocate channel and power per channel according to algorithm described above. ● In the above procedure we are performing both time domain and frequency domain scheduling separately. story -2: surveillance videos – high UL rate is required for cameras – macro cell coverage and interference is problem. Allocation for rate -required UEs in the presence of interferenc e and low coverage by macro. Priority allocation for UL intensive UEs to achieve QoS. story -3: power constrained – wearables etc – privacy – user specific data cannot be exposed to 3rd party – to do analytics, no data should be taken out of the trust zone (enterprise or private network). All AI/ML, analytics etc needs to be done within the private network.
70
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 63 The steps in the use case (related to autonomy) are: 1. Controllers are formed based on, e.g. Intents and/or Evolution (Ev) to optimize resource allocation with various considerations including latency, throughput or privacy preserving analytics. 2. Modelling of inter -controller interaction using game theory: “Players” in the game would be the equivalence classes of controllers. “players” may be selected from the evolvable population. 3. (Initial) Strategies/gains/payoffs are defined and initialized for each equivalence class and game is modeled. 4. Players [controllers] can be cooperating or non -cooperating. They may participate in the ga me based on trust. 5. Modelling of strategies/gains/payoff for each player (controller) may change based on Evolution. 6. Use experimentation (Ex) to study the model (strategies/gains ) which is evolved and the elements of trust in this game can be studied. And also to investigate the strategies for maximizing the gains, either by cooperation or non -cooperation. 7. Adaptations to be applied to the Controllers are arrived at – in the form of changes to strategies, gains/payoffs and trust. Formation o f new “players” may be part of adaptation. 8. Outer loop: Collect the data from the set of solutions, train the AI/ML model. infer the equilibrium from the new input data using trained model. Open issues (as seen by the proponent) 1. what are the control lers trying to achieve as players? – use case story. 2. How to quantify computational cost? 3. how to evaluate whether other controllers (players) are trustable (among themselves, whereas so far FG have thought of whether controllers are trusted/deployable)? – take this aspect of trust an input from another layer. a. #using AI/ML to overcome some of the disadv . of game theory. What are those? – “the different Nash equilibria and the approaches to reach them could be learnt over some experiments using AI/ML. And then the learnings could be used to optimize these experiments”. 4. in the context of trust: players can be selfish, transparent. This understanding may change as Ev progress. Trust index can be studied. – “this is a new problem” 5. how to use RL (need quick feedback) here? use real network or simulated data? – Use different RL mechanisms like 0 regret. Use simu lated data. #convergence may take long time in RL. Use DTwin to introduce RL in AN. 6. Small cell coverage is small, num of users is less, so the distribution of service requirement is sparse (?). – as the coverage density increases, to serve large num of users… capacity also increases…specific indoor scenario like factory…but for the resour ce allocation may be more complicated for macro cell.. interference with macro may be considered.. game with macro (coordination with macro) may be considered later. Notes on use case category Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High Justification: the architecture components derived and introduced here will help in defining meta -evolution controllers [I -98]. Reference [b-Sankar -1, [b-Sankar -2], [b-Ahmad ], [b-Al-Turjman] , [b-Ciavaglia -2]
71
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 64 7.32.1 Use case requirements Critical requirements ● AN-UC032-REQ -001: It is critical that autonomous networks (AN) enable characterisation of controllers using metadata, which may be updated dynamically based on monitoring of the controllers. NOTE – The metadata associated with controllers would be used for modelling controllers as players. Example – the closed loops aiming to optimize transmit power and those intending to optimize coverage may be modelled as players in a game. Expected requirements ● AN-UC032-REQ -002: It is expected that autonomous networks (AN) enable experimentation with various gaming strategies, payoffs and equilibria with controllers are players. NOTE – Experimentation may be conducted in the Sandbox and coordinated e.g. by exper imentation manager, may result in analysis of strategies, payoffs and equilibria. ● AN-UC032-REQ -003: It is expected that autonomous networks (AN) enable classification of controllers with respect to trustability of controllers. NOTE – Parameters related to measurement of trust as applied to controllers and the methods of classification may be out of scope of this particular use case. ● AN-UC032-REQ -004: It is expected that autonomous networks (AN) enable analysis of experimentation resu lts with AI/ML based techniques. NOTE – Learnings from AI/ML may be used in optimizing the gaming strategies, payoffs and equilibria. ● AN-UC032-REQ -005: It is expected that autonomous networks (AN) enable adaptation of controllers with new strategies. NOTE – Learnings from AI/ML may be used in optimizing the gaming strategies, payoffs and equilibria. ● AN-UC032-REQ -006: It is expected that autonomous networks (AN) enable derivation and application of different combinations of game theory mec hanisms such as auction theory based on the use case specification. NOTE – Use case specification may be captured and formalized in the form of Intent. Derivation of game theory mechanisms such as auctioneer may use human or automated mechanisms. Applicati on or integration of such mechanisms in underlays may use specific architecture and interface considerations such as in Open RAN.
72
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 65 7.32.2 Use case specific figure Figure 20: component cloud for AI enabled Game theory based resource allocation Figure 19: AI enabled Game theory based resource allocation
73
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 66 Figure 21: AI enabled Game theory based resource allocation 7.33 Service automation using workflows Use case id FG-AN-usecase -033 Use case name Service automation using workflows Base contribution FGAN -I-135 Creation date 27 July 2021 Use case context Follow up discussions after TIP webinar on automation Use case description Network automation scenarios in fut ure networks include large scale automation of management of network devices, services and retrieval of operational state data from a network. User specific workflows, along with modularized tasks are one of the mechanisms to achieve this automation. Comb ined with an interworking of OpenConfig NETCONF & YANG models, vendor native models, and the CLI, use specific, customized solutions can be created and dockerized containers can be designed and tested. The workflows are defined using a JSON based domain sp ecific language (DSL) by wiring a set of tasks together. The tasks are either control tasks (fork, conditional, etc.) or application tasks (i.e. encoding a file) that are executed on a remote device. Atomic tasks are chained together into more complex work flows. NOTE - The FRINX Machine distribution comes pre -loaded with a number of standardized workflows. Steps in this use case are as follows: Step-1: create or compose workflow: Operations or functions on workflows include: In addition to create, the workflow designer can also - edit a workflow - delete a workflow These operations may be achieved using a workflow manager. This may include an API based interface or a GUI based i nterface. A graphical user interface may be used to create, edit or run workflows and monitor any open tasks. The GUI may also help in explainability. NOTE - This would help to on -board new services (e.g. in network underlays) and view their status.
74
/content/sample_data/Use-case-AN.pdf
Error! Reference source not found. (2021 -10) 67 NOT E- the composing step (from the GUI) may produce output in a generic form (e.g. TOSCA or YANG) and translating this representation of workflows into deployable instances can be using a generic and can take different types of inputs and produce different ty pes outputs. Step-2: store in Resource database : workflow specification and execution data are stored in a resource database. Step-3: link Tasks : A task corresponds to a worker utilized in the workflow. Tasks in our workflow may receive input parameters and execution logic of our task may be implemented in python functions called worker. Worker tasks may be registered in the main python file “main.py” in the same directory where you just created your worker. NOTE - All workers which one want to use in Fri nx Machine must be included in this file. Step-5: deploy workflows: Workflows may be deployed on simulated underlays and their performance and benchmarking may be tested and monitored. Workflows may also be deployed on real network underlays once their pe rformance in the experimentation is satisfactory. Step-4: Monitor: The following service states may be mapped to workflows: - experimental state: workflows which are deployed in the sandbox are in experimental state. In combination with simulators, these are tested and experimented upon. - evolutionary state: workflows which are in ev state are selected for evolution, and based on ev strategies, various experiments may be designed for them. - deployed state: workflows which are in deployed state are in combination with service -x, acting upon real underlays. They may be monitored for performance and other parameters. Description of the relation (if any) of the use case with autonomous behavi our or the key technical enablers. - In the context of the use case, controllers (closed loops) are represented as workflows. Modules are modelled as tasks. - controller specification and module specifications are created using designer, sanity checked an d stored in the resource db. - workflow manager is used to visualize the controllers, monitor and analyse - deploy will link service -x with controllers Open issues (as seen by the proponent) • FFS Notes on use case category • Cat 1: describes a scenario related to core autonomous behaviour itself. Notes on priority of the use case High Justification: gives potential collaboration opportunities and reuse possibilities. Reference [b-FRINX -1], [b-FRINX ], [b-TIP 5G ] 7.33.1 Use case requirements ● AN-UC033-REQ -001: It is critical that autonomous networks (AN) enable creation of controllers in a generic format agnostic to the type and characteristics of the underlay network.

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
8
Add dataset card