欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI GR NGP 006-2018 Next Generation Protocols (NGP) Intelligence-Defined Network (IDN) (V1 1 1).pdf

    • 资源ID:733229       资源大小:877.80KB        全文页数:35页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI GR NGP 006-2018 Next Generation Protocols (NGP) Intelligence-Defined Network (IDN) (V1 1 1).pdf

    1、 ETSI GR NGP 006 V1.1.1 (2018-06) Next Generation Protocols (NGP); Intelligence-Defined Network (IDN) Disclaimer The present document has been produced and approved by the Next Generation Protocols (NGP) ETSI Industry Specification Group (ISG) and represents the views of those members who participat

    2、ed in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP REPORT ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 2 Reference DGR/NGP-006 Keywords framework, next generation protocol ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42

    3、00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electroni

    4、c versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing docume

    5、nt is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents i

    6、s available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form

    7、or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in al

    8、l media. ETSI 2018. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are trademarks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare trademarks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. oneM2M logo is protected f

    9、or the benefit of its Members. GSMand the GSM logo are trademarks registered and owned by the GSM Association. ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Inform

    10、ative references 5g33 Abbreviations . 6g34 Overview 6g35 Background 6g35.1 Continuous Evolution of Network 6g35.2 Functional and Systemic Requirement . 7g35.3 Rapid Development of Machine Learning Technologies . 8g36 Benefits of Introducing AI into Network . 9g36.1 Towards Fully Autonomic Network .

    11、9g36.2 Response to the challenge of complexity . 9g36.3 Response to the challenge of variation . 10g36.4 Insights of the Network and Improve the Utilization . 10g36.5 To Be Predictive . 11g36.6 Potential Decision Efficiency . 12g36.7 Potential Business Model . 12g37 Design Goals of IDN 12g37.1 Goal

    12、of IDN 12g37.2 Deployment models: Centralized, distributed and Hybrid . 13g37.3 Wired and wireless consideration . 14g37.4 Security and Privacy Considerations 16g37.5 Multi-objectives Resolution . 17g38 The proposed IDN Architecture . 17g38.1 Reference Architecture . 17g38.2 Comparing System design

    13、21g38.2.1 Overview 21g38.2.2 Distributed Architecture . 23g38.2.3 Centralized Architecture . 23g38.2.4 Hybrid Architecture 24g38.3 Controlling Loop 25g38.3.1 AI-Enhanced Close Loop 25g38.3.2 AI-Enhanced Open Loop 27g38.3.3 Traditional Loop . 29g38.3.4 Internal Loop 29g38.3.5 UNI Loop 29g38.4 Core Su

    14、pport Technologies 29g38.4.1 Network modelling . 29g38.4.2 Measurement and Data Orchestration . 30g39 Potential Standardization Works 31g39.1 Overview 31g39.2 Measurement 32g39.3 Data Centric standards 32g39.4 Control Centric standards . 33g3Annex A: Authors Essential, or potentially Essential, IPRs

    15、 notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be give

    16、n as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Trademarks The present document may include trademarks and/or tradenames which are asserted and/or registered by their

    17、 owners. ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does not constitute an endorsement by ETSI of products, services o

    18、r organizations associated with those trademarks. Foreword This Group Report (GR) has been produced by ETSI Industry Specification Group (ISG) Next Generation Protocols (NGP). Modal verbs terminology In the present document “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “ca

    19、nnot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 5 1 Scope The scope of the present

    20、document is to specify the self-organizing control and management planes for the Next Generation Protocols (NGP), Industry Specific Group (ISG). 2 References 2.1 Normative references Normative references are not applicable in the present document. 2.2 Informative references References are either spe

    21、cific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks includ

    22、ed in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 https:/ i.2 https:/www.thes

    23、un.co.uk/tech/4141624/facebook-robots-speak-in-their-own-language/. i.3 Reed S, Akata Z, Yan X, et al.: “Generative adversarial text to image synthesis“, in ICML 2016. i.4 Oord A, Dieleman S, Zen H, et al.: “Wavenet: A generative model for raw audio“, arXiv:1609.03499, 2016. i.5 LeCun, Yann, Yoshua

    24、Bengio, and Geoffrey Hinton: “Deep learning“, in Nature 521.7553 (2015): 436-444. i.6 Kingma D P, Welling M.: “Auto-encoding variational bayes“, in ICLR 2014. i.7 Goodfellow, Ian, et al.: “Generative adversarial nets“, in NIPS 2014. i.8 Cisco White Paper. NOTE: Available at https:/ i.9 https:/arxiv.

    25、org/abs/1701.07274. i.10 ETSI TR 121 905: “Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Vocabulary for 3GPP Specifications (3GPP TR 21.905)“. i.11 ETSI TS 136 401: “LTE; Evolved Universal Terrestrial Radio Access Network (E-UTRA

    26、N); Architecture description (3GPP TS 36.401)“. ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 6 3 Abbreviations For the purposes of the present document, the abbreviations given in ETSI TR 121 905 i.10 and the following apply to scenarios that include mobile network architectures: 3GPPTM 3rdGeneration Parti

    27、cipation Project AI Artificial Intelligence DHCP Dynamic Host Configuration Protocol E-W East and West (direction) IDN Intelligence-Defined Network IETF Internet Engineering Task Force IP Internet Protocol ISG Industry Specific Group ML Machine Learning NE Network ElementNGP Next Generation Protocol

    28、s NMS Network Management System N-S North and South (direction) OAM Operation And Management OSPF Open Shortest Path First QoE Quality of Experience 4 Overview The Next Generation Protocols (NGP), ISG aims to review the future landscape of Internet Protocols, identify and document future requirement

    29、s and trigger follow up activities to drive a vision of a considerably more efficient Internet that is far more attentive to user demand and more responsive whether towards humans, machines or things. A measure of the success of NGP would be to remove historic sub-optimised IP protocol stacks and al

    30、low all next generation networks to inter-work in a way that accelerates a post-2020 connected world unencumbered by past developments. The NGP ISG is foreseen as having a transitional nature that is a vehicle for the 5G community and other related communications markets to first gather their though

    31、ts together and prepare the case for the Internet communitys engagement in a complementary and synchronised modernisation effort. Therefore NGP ISG aims to stimulate closer cooperation over standardisation efforts for generational changes in communications and networking technology. The present docu

    32、ment focuses on proposing a new Intelligence-Defined Network (IDN) architecture and a gap analysis of current architectures. The intelligence technologies can learn from historical data, and make predictions or decisions, rather than following strictly predetermined rules. On one hand, the IDN can d

    33、ynamically adapt to a changing situation and enhance its own intelligence with by learning from new data. On the other hand, IDN can also aim at supporting human-based decision by pre-processing data and rendering insights to users through advanced user interfaces and visualisations. The integration

    34、 with various network infrastructures, such as SDN, NFV it provides data analysis/learning services to a variety of applications, and generate network-level policies to intervene the network to run as the applications expected. ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 15 The core of the Network Brain i

    35、s mostly composed by a variety of AI relevant technologies such as machine learning algorithms, data-mining algorithms, expert systems, etc. As described in clause 6.3, the Network Brain also represents an interface to applications so that developer could easily create specific tasks without handlin

    36、g the data analysis/mining/learning by themselves. Middle layer: Network Orchestration and Controlling This layer is to interpret the network-level policies generated by the Network Brain into device-level policies/configurations and deliver them to corresponding devices. SDN controller is an instan

    37、ce of the middle layer. Based on the Network Brain generated policies, this layer could make some simple decision by itself so that a quick control loop could be formed to control the devices behaviour in a much more efficient way. Under layer: Network Devices There are different kinds of network de

    38、vices: NFV infrastructure, SDN-managed devices, Intelligent Devices (which could directly interact with the Network Brain), and Traditional Devices. As the Figure 3 shows, the wireless part of IDN is composed of a number of distinct mobile intelligent network decision entities. One centralized cross

    39、-domain IDN decision entity sits in upper layer. Below it in the network layer reside many distributed decision entities. Each of these entities is made up of four key components: wireless data collection, analysis RAN internal functional split is still under discussion, such Functions similar to E-

    40、UTRAN as listed in ETSI TS 136 401 i.11. 7.4 Security and Privacy Considerations When security relevant decisions are made based on the use of intelligent analytics or automated intelligent decision making, care should be taken to understand the new security challenges. When, for example, more intel

    41、ligent decisions are enabled through the collection of ever more data, it needs to be analysed how that potentially enables attackers to easier feed data that derails the intelligent system ability to distinguish good from bad behaviour. As i.1 and i.2 reported, many companies have been puzzled by t

    42、he unprecedented “attack“ that the legal and safe operations and data cause unexpected result. The traditional security problems are caused by the bugs in design or implementation. These two may become the typical examples of potential new security challenges. The future system should include the ab

    43、ility that can deal with the following problems but not limited. Negative Data: the training system should have the ability to recognize data which may induce the system to become in an unexpected form on purpose. This problem will be serious in every data-fed system and it never happened in the pas

    44、t design. Conflict Data: the training system should have the ability that can recognize the data which may cause confliction to the current known strategies or states. This problem may happen when user or device execute its private rules in a large and share area unintentionally or intentionally. Co

    45、ntent data transmitted through network contains private data about users. Whereas AI techniques are powerful tools to automate network management functions, systematizing the large collection and processing of data presents some risk regarding the privacy of users. Indeed, predicting the location of

    46、 a mobile users can clearly help in allocating resources in a RAN but it is also a privacy breaches. A future AI-based system should take in considerations the two following: Limitation of private data. Privacy can be leaked out from collected or post-processed data. Decisions algorithms may need it

    47、. Thus, any algorithms should clearly specify the mention of information it uses to get as input/output and clearly limits according to it. Therefore, acquiring non used data should be excluded. As a result, this will prevent to gather potential private information which is not use and also improve

    48、the scalability of the collection process. Such a limitation has to be also compatible with legislation. ETSI ETSI GR NGP 006 V1.1.1 (2018-06) 17 Data security. The IDN architecture should include the necessary mechanisms to avoid unfortunate data leakage. First, collected data should be accessible

    49、by only specific algorithms that use them in an appropriate way. Second, collected data could have a maximum lifetime to be then discarded when being meaningless for further processing. Third, the IDN architecture should prevent any algorithms (for instance provided by a third party) aiming at discretely supporting private data exfil


    注意事项

    本文(ETSI GR NGP 006-2018 Next Generation Protocols (NGP) Intelligence-Defined Network (IDN) (V1 1 1).pdf)为本站会员(figureissue185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开