consideration on automation of 5g network slicing with ... · resource utilization monitoring...

16
Consideration on Automation of 5G Network Slicing with Machine Learning V. P. Kafle, Y. Fukushima, P. Martinez-Julia, T. Miyazawa National Institute of Information and Communications Technology [email protected]

Upload: others

Post on 15-Mar-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

Consideration on Automation of 5G Network Slicing with Machine Learning

V. P. Kafle, Y. Fukushima, P. Martinez-Julia, T. MiyazawaNational Institute of Information and Communications [email protected]

Page 2: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 2

Presentation outline

• Introduction• Network slicing overview• Network automation functions• Machine learning (ML) techniques for networking• AI/ML for networks in SDOs and forums• Conclusion

Page 3: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 3

Introduction• Various services in 5G/IMT-2020 networks, diverse requirements:

– eMBB: very high throughput– mMTC: large connection density– URLLC: ultra-low latency

• Different services be served through network slices

Video, AR/VR,…

Smart meters, sensors,…

Automobile, eSurgery,…

eMBB

mMTC

URLLC

20Gbps

1ms

2x105/km2 5G Network

Page 4: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 4

Network slicing concept

• Network slicing allowscreating multiple virtualnetworks over the samephysical network– SDN and NFV are

supporting techniques

Network slice

Physical machineVirtual machine

Page 5: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 5

Network slices creation process flow

Infrastructure Provider

Virtual Network Operator (VNO)

Application Service Provider

Functions, protocolsQoS requirements

Network resource allocation/adjustment

Network slicesNetwork resource request

Service requirements

CloudEdge networkIoT devices Core network

Analysis

Various servicesAutonomous cars

SNS

Sensors & actuators

Control & management

Resource controller of substrate network

Page 6: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 6

Network functions requiring automation

Requirements analysis,environment analysis,topology determination

Planning and designStatic resource allocation,VNF placement, orchestration

Construction and deployment

Syslog analysis,behavior analysis,fault localization

Fault detectionDynamic resource allocation, adjustment;policy adaptation

Operation, control and management

Workload, performance, resource utilization

Monitoring

Traffic analysis, DPI, threat identification,infection isolation

Security

Page 7: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 7

Machine learning for networks – overview (1/3)- Classification of machine learning techniques- Figure source: N. Kato, et al., IEEE 

Wireless Commun., June 2017.

Page 8: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 8

Machine learning for networks – overview (2/3)- Reinforcement learning (RL) -

• RL achieves goals throughexperience

• RL agent gets percepts,performs actions tomaximize rewards

• Two factors characterizingRL techniques:

1. State transition model, e.g.known (e.g. MDP), unknown

2. Action policy, e.g.maximizing cumulativereward attainable from allfuture steps.

Environment(Controlled system)

States

Agent

s2

s3s4

s1

ActuatorsSensors

Percepts (state)

Actions

Reward

Page 9: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 9

Machine learning for networks – overview (3/3)- Deep learning -

• Based on artificial neural network• Learn and recognize patterns by processing a huge volume of data,

without requiring highly tuned or many rules• Learning can be supervised, semi-supervised, or unsupervised

Hidden layers

Input layer

Hidden layers

Output layer

Data from controlled system

Action to controlled system

Output layer

Input layer

Page 10: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 10

Network function and relevant ML techniques- Part 1-Network functions

Machine learning techniques

Purposes

Planning and design

Support vector machineGradient boosting decision treeSpectral clusteringReinforcement learning

- Classification of service requirements

- Forecasting trend, user behavior- Configuration of parameters

Operation and management

K-mean clusteringDeep neural networkReinforcement learning

- Clustering cells, users, devices- Routing, forwarding, traffic control- Decision making for dynamic

resource control, policy formulation

- Reconfiguration of parameters

Page 11: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 11

Example of ML for network operation: Network resource classification policy adaptation by SVM

– End-to-end network has 1000 units of resources:classified into type 1 (100 units) and type 2 (1 unit)

– Appling SVM to determine classification boundary– Two types of VN service requests: mission-critical,

and best-effort (BE) arriving as Poisson process– Measuring probability of mission critical service

request rejection due to insufficient resources

Scenario:

Results: Low probability of rejection with resource type classification by SVM

– α represents number of BE servicesallocated with type 2 for every type 1allocation

Total end-to-end resources = 1000 units

Edge Core Cloud

Time elapsed from the occurrence of an urgent contingency to the arrival of mission-critical VN service request

Pro

b. o

f req

uest

reje

ctio

n

Page 12: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 12

Example of ML for network operation: Network resource adaptation with reinforcement learning

– When mission-critical service request arrives, moveVNs of best-effort services to other routes

• In such as way that QoS requirements are metdespite fluctuation of traffic

– Three approaches (static, random, reinforcementlearning) are applied in 300 time slots.

Scenario:

Results: Better resource adaptation decision with reinforcement learning

– QoS requirements are met in most timeeven in faster changes in network traffic

SRC

E1

E2

C1

C2

C3

C4

C5

D1

D2

D3

DST

Occupied by the urgent contingency’s VN

12

1

12

1

1

1

1

12

1

1

1

VN for mission‐critical service

Page 13: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 13

Network function and relevant ML techniques- Part 2-Network functions

Machine learning techniques Purposes

Monitoring Spectral clusteringK-mean clusteringSupport vector machineDeep neural network

- Clustering of syslog data- Classification of operation modes- Forecasting resource utilization trend

Fault detection Principal component analysisIndependent component analysisLogistic regressionBayesian networks

- Classification of operation data - Detection of network anomaly- Predicting unusual behavior

Security Deep neural networkPrincipal component analysis

- Clustering users and devices- Detecting malicious behavior- Intrusion detection

Page 14: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 14

AI/ML for networks in SDOs and forums

• ITU-T FG ML5G (Est. in 11/2017)– Studying network architectures, use cases, and data formats for the adoption of

machine learning methods in 5G and future networks.

• ETSI ISG ENI (Experiential Network Intelligence) (Est. in 2/2017)– Defining a cognitive network management architecture based on AI methods and

context-aware policies; five deliverables have already been released

• ISO/IEC JTC 1/SC 42 Artificial Intelligence (Est. in 10/2017)– Developing ISO standards on big data reference architecture, AI concepts and

terminology, and AI systems framework, etc.

• TM Forum Smart BPM (Business Process Management)– Investigating the applicability of AI-based decision modeling in telecom business

processes for resource provisioning, fault management, QoS assurance, andcustomer management

Page 15: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

26-28 NovemberSanta Fe, Argentina 15

Conclusion• Summary

• Presented 5G network slicing scenarios and related functionsrequiring automation

– Discussed machine learning techniques for network functionautomation and showed performance improvement in two cases:

• Support Vector Machine for resource classification• Reinforcement Learning for resource adaptation

• Standardization relevancy– This work is related with ITU-T Study Group 13– Its use cases also discussed in FG ML5G (this week in Tokyo)

Page 16: Consideration on Automation of 5G Network Slicing with ... · resource utilization Monitoring Traffic analysis, DPI, threat identification, infection isolation Security. 26-28 November

Thank you