ETSI GR ENI 001-2018 Experiential Networked Intelligence (ENI) ENI use cases (V1 1 1).pdf
《ETSI GR ENI 001-2018 Experiential Networked Intelligence (ENI) ENI use cases (V1 1 1).pdf》由会员分享,可在线阅读,更多相关《ETSI GR ENI 001-2018 Experiential Networked Intelligence (ENI) ENI use cases (V1 1 1).pdf(43页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GR ENI 001 V1.1.1 (2018-04) Experiential Networked Intelligence (ENI); ENI use cases Disclaimer The present document has been produced and approved by the Experiential Networked Intelligence (ENI) ETSI Industry Specification Group (ISG) and represents the views of those members who participate
2、d in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP REPORT ETSI ETSI GR ENI 001 V1.1.1 (2018-04)2 Reference DGR/ENI-001 Keywords artificial intelligence, management, network, use case ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.
3、: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made avail
4、able in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only
5、prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other
6、 ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or util
7、ized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to r
8、eproduction in all media. ETSI 2018. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are trademarks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare trademarks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. oneM2M lo
9、go is protected for the benefit of its Members. GSMand the GSM logo are trademarks registered and owned by the GSM Association. ETSI ETSI GR ENI 001 V1.1.1 (2018-04)3 Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g31 Scope 7g32 References 7g32.1 Normative references
10、 . 7g32.2 Informative references 7g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 8g34 Overview 9g34.1 Background 9g34.2 Overview of the ENI System 9g34.2.1 Brief Description 9g34.2.2 Expected Benefits . 10g35 General use cases . 10g35.1 Introduction 10g35.2 Infrastruct
11、ure Management 11g35.2.1 Use Case #1-1: Policy-driven IDC Traffic Steering . 11g35.2.1.1 Use case context 11g35.2.1.2 Description of the use case 11g35.2.1.2.1 Overview . 11g35.2.1.2.2 Motivation . 12g35.2.1.2.3 Actors and Roles 13g35.2.1.2.4 Initial context configuration 13g35.2.1.2.5 Trigger condi
12、tions . 13g35.2.1.2.6 Operational Flow of the actions . 13g35.2.1.2.7 Post-conditions 14g35.2.2 Use Case #1-2: Handling of Peak Planned Occurrences. 14g35.2.2.1 Use case context 14g35.2.2.2 Description of the use case 14g35.2.2.2.1 Overview . 14g35.2.2.2.2 Motivation . 15g35.2.2.2.3 Actors and Roles
13、 15g35.2.2.2.4 Initial context configuration 15g35.2.2.2.5 Triggering conditions 15g35.2.2.2.6 Operational flow of actions . 15g35.2.2.2.7 Post-conditions 16g35.2.3 Use Case #1-3: Energy optimization using AI 16g35.2.3.1 Use case context 16g35.2.3.2 Description of the use case 16g35.2.3.2.1 Overview
14、 . 16g35.2.3.2.2 Motivation . 17g35.2.3.2.3 Actors and Roles 17g35.2.3.2.4 Initial context configuration 17g35.2.3.2.5 Triggering conditions 18g35.2.3.2.6 Operational flow of actions . 18g35.2.3.2.7 Post-conditions 18g35.3 Network Operations . 19g35.3.1 Use Case #2-1: Policy-driven IP managed networ
15、ks 19g35.3.1.1 Use case context 19g35.3.1.2 Description of the use case 19g35.3.1.2.1 Overview . 19g35.3.1.2.2 Motivation . 19g3ETSI ETSI GR ENI 001 V1.1.1 (2018-04)4 5.3.1.2.3 Actors and Roles 20g35.3.1.2.4 Initial context configuration 20g35.3.1.2.5 Triggering conditions 20g35.3.1.2.6 Operational
16、flow of actions . 20g35.3.1.2.7 Post-conditions 21g35.3.2 Use Case #2-2: Radio Coverage and capacity optimization . 21g35.3.2.1 Use case context 21g35.3.2.2 Description of the use case 21g35.3.2.2.1 Overview . 21g35.3.2.2.2 Motivation . 22g35.3.2.2.3 Actors and Roles 22g35.3.2.2.4 Initial context co
17、nfiguration 22g35.3.2.2.5 Triggering conditions 22g35.3.2.2.6 Operational flow of actions . 22g35.3.2.2.7 Post-conditions 23g35.3.3 Use Case #2-3: Intelligent Software Rollouts . 23g35.3.3.1 Use Case context . 23g35.3.3.2 Description of the Use Case 23g35.3.3.2.1 Overview . 23g35.3.3.2.2 Motivation
18、. 23g35.3.3.2.3 Actors and Roles 24g35.3.3.2.4 Initial context configuration 24g35.3.3.2.5 Triggering conditions 24g35.3.3.2.6 Operational flow of actions . 24g35.3.3.2.7 Post-conditions 25g35.3.4 Use Case #2-4: Policy-based network slicing for IoT security . 25g35.3.4.1 Use Case context . 25g35.3.4
19、.2 Description of the Use Case 26g35.3.4.2.1 Motivation . 26g35.3.4.2.2 Actors and Roles 26g35.3.4.2.3 Initial context configuration 26g35.3.4.2.4 Triggering conditions 27g35.3.4.2.5 Operational flow of actions . 27g35.3.4.2.6 Post-conditions 27g35.3.5 Use Case #2-5: Intelligent Fronthaul Management
20、 and Orchestration . 27g35.3.5.1 Use Case context . 27g35.3.5.2 Description of the use case 28g35.3.5.2.1 Overview . 28g35.3.5.2.2 Motivation . 28g35.3.5.2.3 Actors and Roles 29g35.3.5.2.4 Initial context configuration 29g35.3.5.2.5 Triggering conditions 29g35.3.5.2.6 Operational flow of actions . 2
21、9g35.3.5.2.7 Post-conditions 29g35.4 Service Orchestration and Management . 29g35.4.1 Use Case #3-1: Context-aware VoLTE Service Experience Optimization . 29g35.4.1.1 Use case context 29g35.4.1.2 Description of the use case 30g35.4.1.2.1 Overview . 30g35.4.1.2.2 Motivation . 30g35.4.1.2.3 Actors and
22、 Roles 30g35.4.1.2.4 Initial context configuration 31g35.4.1.2.5 Triggering conditions 31g35.4.1.2.6 Operational flow of actions . 31g35.4.1.2.7 Post-conditions 31g35.4.2 Use Case #3-2: Intelligent network slicing management 31g35.4.2.1 Use case context 31g35.4.2.2 Description of the use case 31g35.
23、4.2.2.1 Overview . 31g35.4.2.2.2 Motivation . 32g35.4.2.2.3 Actors and Roles 32g35.4.2.2.4 Initial context configuration 33g3ETSI ETSI GR ENI 001 V1.1.1 (2018-04)5 5.4.2.2.5 Triggering conditions 33g35.4.2.2.6 Operational flow of actions . 33g35.4.2.2.7 Post-conditions 33g35.4.3 Use Case #3-3: Intel
24、ligent carrier-managed SD-WAN . 33g35.4.3.1 Use case context 33g35.4.3.2 Description of the use case 34g35.4.3.2.1 Overview . 34g35.4.3.2.2 Motivation . 34g35.4.3.2.3 Actors and Roles 35g35.4.3.2.4 Initial context configuration 35g35.4.3.2.5 Triggering conditions 35g35.4.3.2.6 Operational flow of ac
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGRENI0012018EXPERIENTIALNETWORKEDINTELLIGENCEENIENIUSECASESV111PDF

链接地址:http://www.mydoc123.com/p-733184.html