S3.2 Consideration On Automation of 5G Network Slicing VedKafle

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Consideration on Automation of 5G

Network Slicing with Machine Learning

V. P. Kafle, Y. Fukushima, P. Martinez-Julia, T. Miyazawa


National Institute of Information and Communications Technology
kafle@nict.go.jp
Presentation outline
• Introduction
• Network slicing overview
• Network automation functions
• Machine learning (ML) techniques for networking
• AI/ML for networks in SDOs and forums
• Conclusion

26-28 November
Santa Fe, Argentina 2
Introduction
• Various services in 5G/IMT-2020 networks, diverse requirements:
– eMBB: very high throughput
– mMTC: large connection density
– URLLC: ultra-low latency

Video,
eMBB
AR/VR,…
20Gbps

mMTC Smart meters,


2x105/km2 5G Network sensors,…
Automobile,
URLLC
1ms
eSurgery,…

• Different services be served through network slices

26-28 November
Santa Fe, Argentina 3
Network slicing concept
• Network slicing allows
creating multiple virtual Network slice
networks over the same
physical network
– SDN and NFV are
supporting techniques

Virtual machine Physical machine

26-28 November
Santa Fe, Argentina 4
Network slices creation process flow
Service requirements
Virtual Network Operator (VNO)

QoS requirements Functions, protocols


Application Service
Provider
Control & management Analysis
Network resource request
Various services Network slices
Autonomous cars

SNS

Sensors & actuators


Network resource
allocation/adjustment
Infrastructure Provider
Resource controller of substrate network

IoT devices Core network


Edge network Cloud

26-28 November
Santa Fe, Argentina 5
Network functions requiring automation
Planning and design Construction and deployment
Requirements analysis, Static resource allocation,
environment analysis, VNF placement,
topology determination orchestration

Fault detection Operation, control and management Monitoring


Syslog analysis, Dynamic resource Workload,
behavior analysis, allocation, adjustment; performance,
fault localization policy adaptation resource utilization

Security
Traffic analysis, DPI,
threat identification,
infection isolation

26-28 November
Santa Fe, Argentina 6
Machine learning for networks – overview (1/3)
Figure source: N. Kato, et al., IEEE
- Classification of machine learning techniques- Wireless Commun., June 2017.

26-28 November
Santa Fe, Argentina 7
Machine learning for networks – overview (2/3)
- Reinforcement learning (RL) -

• RL achieves goals through


experience
• RL agent gets percepts, Sensors Agent Actuators
performs actions to
maximize rewards Percepts
• Two factors characterizing (state) Reward
RL techniques: Environment Actions
1. State transition model, e.g. (Controlled system)
known (e.g. MDP), unknown
s1 s3
2. Action policy, e.g. s4
maximizing cumulative s2 States
reward attainable from all
future steps.

26-28 November
Santa Fe, Argentina 8
Machine learning for networks – overview (3/3)
- Deep learning -
• Based on artificial neural network
• Learn and recognize patterns by processing a huge volume of data,
without requiring highly tuned or many rules
• Learning can be supervised, semi-supervised, or unsupervised

Data from controlled system Hidden layers


Input Output
Input layer layer layer

Hidden layers

Output layer

Action to controlled system

26-28 November
Santa Fe, Argentina 9
Network function and relevant ML techniques
- Part 1-
Network Machine learning Purposes
functions techniques

Planning and Support vector machine - Classification of service


design Gradient boosting decision requirements
tree - Forecasting trend, user behavior
Spectral clustering - Configuration of parameters
Reinforcement learning
Operation and K-mean clustering - Clustering cells, users, devices
management Deep neural network - Routing, forwarding, traffic control
Reinforcement learning - Decision making for dynamic
resource control, policy
formulation
- Reconfiguration of parameters

26-28 November
Santa Fe, Argentina 10
Example of ML for network operation:
Network resource classification policy adaptation by SVM

Prob. of request rejection


Total end-to-end resources = 1000 units

Edge Core Cloud

Scenario:
– End-to-end network has 1000 units of resources:
classified into type 1 (100 units) and type 2 (1 unit)
– Appling SVM to determine classification boundary Time elapsed from the occurrence of an urgent contingency
– Two types of VN service requests: mission-critical, to the arrival of mission-critical VN service request
and best-effort (BE) arriving as Poisson process
Results: Low probability of rejection with
– Measuring probability of mission critical service resource type classification by SVM
request rejection due to insufficient resources
– α represents number of BE services
allocated with type 2 for every type 1
allocation

26-28 November
Santa Fe, Argentina 11
Example of ML for network operation:
Network resource adaptation with reinforcement learning
VN for by
Occupied mission‐critical service
the urgent contingency’s VN
1 1 1
E1 C1 1 D1
1
1 C4
2 1
SRC 1 1
C2 D2 DST
2 2
E2 1
C5 1

C3 D3
Scenario:
– When mission-critical service request arrives, move
VNs of best-effort services to other routes
• In such as way that QoS requirements are met Results: Better resource adaptation
despite fluctuation of traffic decision with reinforcement learning
– Three approaches (static, random, reinforcement – QoS requirements are met in most time
even in faster changes in network traffic
learning) are applied in 300 time slots.

26-28 November
Santa Fe, Argentina 12
Network function and relevant ML techniques
- Part 2-
Network Machine learning techniques Purposes
functions

Monitoring Spectral clustering - Clustering of syslog data


K-mean clustering - Classification of operation modes
Support vector machine - Forecasting resource utilization trend
Deep neural network

Fault detection Principal component analysis - Classification of operation data


Independent component analysis - Detection of network anomaly
Logistic regression - Predicting unusual behavior
Bayesian networks

Security Deep neural network - Clustering users and devices


Principal component analysis - Detecting malicious behavior
- Intrusion detection

26-28 November
Santa Fe, Argentina 13
AI/ML for networks in SDOs and forums
• ITU-T FG ML5G (Est. in 11/2017)
– Studying network architectures, use cases, and data formats for the adoption of
machine learning methods in 5G and future networks.
• ETSI ISG ENI (Experiential Network Intelligence) (Est. in 2/2017)
– Defining a cognitive network management architecture based on AI methods and
context-aware policies; five deliverables have already been released
• ISO/IEC JTC 1/SC 42 Artificial Intelligence (Est. in 10/2017)
– Developing ISO standards on big data reference architecture, AI concepts and
terminology, and AI systems framework, etc.
• TM Forum Smart BPM (Business Process Management)
– Investigating the applicability of AI-based decision modeling in telecom business
processes for resource provisioning, fault management, QoS assurance, and
customer management

26-28 November
Santa Fe, Argentina 14
Conclusion
• Summary
• Presented 5G network slicing scenarios and related functions
requiring automation
– Discussed machine learning techniques for network function
automation and showed performance improvement in two cases:
• Support Vector Machine for resource classification
• Reinforcement Learning for resource adaptation

• Standardization relevancy
– This work is related with ITU-T Study Group 13
– Its use cases also discussed in FG ML5G (this week in Tokyo)

26-28 November
Santa Fe, Argentina 15
Thank you

You might also like