To view PDF files

You need Adobe Reader 7.0 or later in order to read PDF files on this site.
If Adobe Reader is not installed on your computer, click the button below and go to the download site.

Global Standardization Activities

Standardization Trends of Automated Intelligent Management for Access Systems in the Broadband Forum

Hiroshi Ou

Abstract

To reduce operational costs in future access systems, research and development aimed at automating the network management and control by network operators is advancing. This article outlines the standardization of automated intelligent management for access systems within the Broadband Forum, highlighting the content that has been standardized thus far and providing an outlook on future developments.

Keywords: automated intelligent management, network automation, SDN/NFV

PDF PDF

1. Requirements for future access systems

As the scale of networks expands, operating expense (OPEX) increases proportionally. Therefore, reducing OPEX has become crucial for telecommunications operators. In broadband services, in particular, network issues are often addressed based on customer complaints, making it essential to improve the efficiency of network maintenance and operations to reduce the operators’ workload. Network management and control are heavily reliant on individual experience and skills. With the anticipation of maintaining a vast number of network devices, such as those connected through Internet of Things, innovative solutions are needed to radically reduce the workload of telecommunications operators.

The maintenance and management workload for home networks and access networks constitutes a significant portion of the overall maintenance and management efforts for end-to-end (E2E) services. Therefore, in future access systems, there is an expectation to automate the management and control of home and access networks to enhance maintenance and operational efficiency and reduce OPEX.

2. Overview of Broadband Forum

The Broadband Forum (BBF) is a global industry forum that promotes the adoption of broadband services and develops system management and control protocol specifications as well as interoperability specifications [1]. The BBF comprises over 150 companies and organizations, including service providers and system/chip vendors worldwide, and it has produced more than 200 Technical Reports (TR) to date. Figure 1 illustrates the organizational structure of the BBF. The Service Provider Action Council, shown in Fig. 1, is where service providers discuss and set the agenda and policies for the BBF. Based on these discussions, technical deliberations are conducted within various work areas that make up the technical committees tasked with developing specifications.


Fig. 1. BBF organizational structure.

The BBF has focused on specifying various technologies for managing and controlling access systems that incorporate virtualization/componentization technologies such as software-defined network (SDN) and network functions virtualization (NFV). Among the access network standardization development organizations and industry organizations, the BBF is the most actively involved. It has been working on specifications for Network Configuration Protocol (NETCONF)*1/Yet Another Next Generation (YANG)*2 models for various access systems, virtualized architecture and interfaces for Cloud Central Office (CO)*3, specifications for the virtual ONU Management Control Interface (vOMCI) for managing and controlling virtualized optical network units (ONUs), and specifications for automated intelligent management (AIM) that automates management and control. This article introduces the specifications for AIM, which were completed as TRs in 2023.

*1 NETCONF: A network management protocol that supports remote control by a centralized controller. When used in combination with YANG data models, it ensures interoperability between network devices from various vendors and the controller.
*2 YANG: A common data modeling language that abstracts various configurations and structures of network devices, as well as the data models described using that language.
*3 Cloud CO: The next-generation central office (a telecommunications equipment housing center owned by telecom operators) that incorporates virtualization/cloud technologies.

3. Specifications of AIM

In the BBF context, AIM has been specified as TR-436 “Access & Home Network O&M Automation/Intelligence” [2] and TR-486 “Interfaces for AIM” [3]. TR-436 specifies the architectural requirements for implementing AIM, while TR-486 specifies the interface requirements between the functional blocks that constitute the architecture. By applying this technology to the management and control of home and access networks, it is expected to automate processes traditionally carried out by operators, such as identifying the cause of communication failures and executing recovery. Additionally, it can automate the optimization of communication quality by reducing interference between different wireless local area networks. As this technology becomes a standard specification, it is anticipated that the full range of automation functions will be implemented efficiently and become widely used.

3.1 AIM architecture

Figure 2 shows the reference architecture of AIM, created on the basis of TR-436. In AIM, the state and information of the managed entities (MEs) are collected, and appropriate settings are analyzed on the basis of predetermined policies in accordance with the changes in this information, thereby automating the management and control of the MEs. The main functional components for implementing AIM are as follows:


Fig. 2. AIM reference architecture.

  • AIM Decision Element (DE): Performs the collection of state and information and conducts analysis on the basis of policies.
  • E2E AIM Orchestrator, Domain AIM Orchestrator: Sets the analysis policies specified by the operator in the AIM DE.

The analysis results (new settings) from the AIM DE are applied to the MEs through the SDN controller. The series of processes from collecting information from the MEs to executing control is referred to as a pipeline in AIM. The E2E AIM Orchestrator and Domain AIM Orchestrator are responsible for creating and managing these pipelines. The term “domain” represents the area controlled by a single AIM pipeline, which is defined abstractly in the specifications to allow for widespread application of the AIM architecture. For example, access networks, edge networks, and transport networks can each be regarded as domains, but the definition is not limited to these examples. Additionally, the specifications include methods for domain federation to achieve automated management and control not only within a single domain but also across multiple domains.

We next explain the details of the AIM DE. The AIM DE is composed of a combination of sub-functions known as the collection function (CF), pre-processing function (PPF), and model function (MF). The CF is responsible for collecting status and information from the MEs. The PPF executes initial processing, such as filtering and statistical processing, on the collected data before analysis. The MF conducts analysis on the pre-processed collected data. Analysis methods include rule-based approaches, which make decisions on the basis of predefined logic, and machine-learning-based approaches, such as deep learning. Since the content of the PPF and MF depends on the desired automated management and control, specific implementations are not prescribed in the specification, allowing for a high degree of flexibility. Figure 3 shows example implementations of the AIM DE. As illustrated in the figure, each sub-function can be flexibly combined, and multiple AIM DEs can be connected, permitting versatile implementations. These sub-functions are implemented on the network functions virtualization infrastructure (NFVI) shown in Fig. 2.


Fig. 3. Examples of AIM DE implementation.

3.2 AIM interfaces

Table 1 shows the AIM interfaces created on the basis of TR-486. The segments in which each interface is used are illustrated in Fig. 2. AIM interfaces are broadly categorized into management interfaces, which are used for generating, managing, and monitoring AIM pipelines, and pipeline interfaces, which are used as part of the AIM pipeline.


Table 1. Interfaces specified within AIM.

The following interfaces fall under management interfaces:

  • Cm-Ma-e2e-aimo
  • Oe2e-aimo-Ma-d-aimo
  • Od-aimo-De

On the other hand, the following interfaces fall under pipeline interfaces:

  • De-Nf-sdn
  • De-Me
  • De-Mb

As described in Table 1, management interfaces adopt the representational state transfer application programming interface (RESTful API)*4 or RESTCONF*5 as the protocol, which are common as programmable APIs. The pipeline interfaces, on the other hand, adopt NETCONF and gRPC (Google Remote Procedure Call), which was created to facilitate efficient inter-device communication, as protocols. While TR-486 specifies the protocols and data-modeling languages, it does not go so far as to specify concrete YANG data models. It is anticipated that future revisions will expand on this.

*4 RESTful API: An API designed according to REST (Representational State Transfer), which is one of the architectural principles for implementing web systems.
*5 RESTCONF: A protocol based on REST for retrieving and updating network device configurations. It is designed to access data defined in YANG and can coexist with NETCONF.

4. Future prospects

As a latest topic in future access systems, we have introduced the standardization content of AIM within the BBF. Discussions on revising the specifications to enhance this technology are ongoing at the BBF. Specifically, these discussions include improving the completeness of domain federation features, extending functionalities to accelerate automated management and control, and expanding features from the perspectives of security and power saving. NTT will continue to participate in these efforts within the BBF and contribute to international standardization activities by presenting requirements as a telecommunications operator.

References

[1] K. Asaka and H. Ujikawa, “Standardization Trends of Virtualized Access Systems by the Broadband Forum,” NTT Technical Review, Vol. 16, No. 7, pp. 44–49, July 2018.
https://doi.org/10.53829/ntr201807gls
[2] BBF TR-436, Feb. 2021.
https://www.broadband-forum.org/pdfs/tr-436-1-0-0.pdf
[3] BBF TR-486, Dec. 2023.
https://www.broadband-forum.org/pdfs/tr-486-1-0-0.pdf
[4] TM Forum, Open API Directory,
https://www.tmforum.org/oda/open-apis/directory
[5] BBF TR-411, Apr. 2021.
https://www.broadband-forum.org/pdfs/tr-411-1-0-0.pdf
Hiroshi Ou
Research Engineer, Access Systems Design Group, Optical Access Systems Project, NTT Access Network Service Systems Laboratories.
He received a B.E. and M.E. in computer science and engineering from Waseda University, Tokyo, in 2009 and 2011. He joined NTT Access Network Service Systems Laboratories in 2009, where he researched optical access networks and systems and optical-wireless converged networks. From 2016 to 2020, he was with NTT DOCOMO, where he developed Long-Term Evolution and 5G base stations. In 2020, he returned to NTT Access Network Service Systems Laboratories. He has contributed to several standardization organizations, including ITU-T (International Telecommunication Union - Telecommunication Standardization Sector) Question 2/Study Group 15, Full Service Access Network, IEEE P1904.1, and O-RAN Work Group 5. His current interests are the All-Photonic Network and real-time control of it. He is a member of the Institute of Electronics, Information and Communication Engineers.

↑ TOP