<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-king-rokui-ainetops-usecases-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="AINetOps Use Cases">Artificial Intelligence (AI) for Network Operations</title>
    <seriesInfo name="Internet-Draft" value="draft-king-rokui-ainetops-usecases-01"/>
    <author fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <email>rrokui@ciena.com</email>
      </address>
    </author>
    <author fullname="Cheng Li">
      <organization>Huawei</organization>
      <address>
        <email>c.l@huawei.com</email>
      </address>
    </author>
    <author fullname="Daniel King">
      <organization>Lancaster University</organization>
      <address>
        <email>d.king@lancaster.ac.uk</email>
      </address>
    </author>
    <date year="2025" month="September" day="15"/>
    <area>AREA</area>
    <workgroup>RTG</workgroup>
    <keyword>AI</keyword>
    <keyword>ML</keyword>
    <keyword>Artificial Intelligence</keyword>
    <keyword>Use Cases</keyword>
    <abstract>
      <?line 70?>

<t>This document explores the role of the IETF and IRTF in advancing
Artificial Intelligence for network operations (AINetOps), focusing on
requirements for IETF protocols and architectures. AINetOps applies AI/ML
techniques to automate and optimize network operations, enabling use
cases such as reactive troubleshooting, proactive assurance, closed-loop
optimization, misconfiguration detection, and virtual operator
assistance.</t>
      <t>The document addresses AINetOps for both single-layer IP or Optical
networks and multi-layer IP/Optical networks. It defines the concept of
AINetOps for networking and provides its operational benefits such as
network assurance, predictive analytics, network optimization,
multi-layer planning, and more. It aims to guide the evolution of IETF
protocols to support AINetOps-driven network management.</t>
    </abstract>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The increasing complexity of modern networks has driven the need for
innovative approaches to network operations and management. Artificial
Intelligence for Network Operations (AINetOps) has emerged as an
innovative concept, leveraging artificial intelligence (AI) and
machine learning (ML) to automate, enhance, and optimize network
management tasks. AINetOps offers the potential to reduce operational
costs, improve service reliability, and enhance user experiences by
enabling intelligent automation, predictive insights, and efficient
decision-making.</t>
      <t>The IETF and IRTF play a critical role in defining the protocols,
architectures, and standards that underpin global networking. As AINetOps
becomes integral to network operations, there is a growing need to
evaluate how existing IETF technologies can support AINetOps use cases
and to identify gaps that may require new or extended solutions. This
document aims to outline key AINetOps use cases, highlight associated
technical challenges, and propose requirements for protocols and
architectures to address these challenges effectively.</t>
      <t>The use cases considered in this document span multiple aspects of
network operations, including reactive troubleshooting, proactive
assurance (e.g., anomaly detection, predictive maintenance), closed-loop
optimization, and misconfiguration detection. Emerging capabilities, such
as generative AI for operational insights and virtual operator
assistants, further emphasize the need for a robust framework to support
AI-driven network management. Additionally, the multi-layered nature of
these use cases, encompassing IP, optical, and cross-layer optimization,
underscores the complexity of integrating AINetOps into existing
networks.</t>
      <t>This document provides a foundation for advancing IETF protocols and
architectures to enable AINetOps-driven network operations by exploring
these use cases, the requirements, and their implications.</t>
      <section anchor="background">
        <name>Background</name>
        <t>Efficient and coordinated use of resources is paramount for maintaining 
optimal performance and reliability of many network environments. The applicability 
of Artificial Intelligence is well-established, and the use cases are outlined
in this document.</t>
        <t>Editors note: Future versions of this document will include prior
IRTF and IETF work.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The following terms are used in this document:</t>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>AI:</dt>
            <dd>
              <t>Artificial Intelligence aims to create systems capable of performing
tasks that typically require human intelligence, such as understanding
natural language, recognizing patterns, and making decisions.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>ML:</dt>
            <dd>
              <t>Machine Learning is a subset of AI that involves training algorithms on
large datasets to enable them to learn patterns and make predictions or
decisions without being explicitly programmed.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Gen-AI:</dt>
            <dd>
              <t>Generative-AI is a subset of ML techniques that creates new content, such
as text, images, or audio, by learning from existing data.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>NLP:</dt>
            <dd>
              <t>Natural Language Processing is a field of AI that focuses on the
interaction between computers and humans through natural language.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>AINetOps:</dt>
            <dd>
              <t>Artificial Intelligence for Network Operations refers to the application
of AI, ML, and generative-AI techniques to enhance and automate network operations.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Closed-Loop Optimization:</dt>
            <dd>
              <t>Automated feedback-driven processes for continuously improving network 
performance and reliability.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Multi-Layer Optimization:</dt>
            <dd>
              <t>Addressing cross-layer dependencies and optimizing 
resources across different network layers, such as IP and optical layers.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>P-PNC: Packet Provisioning Network Controllers</t>
        </li>
        <li>
          <t>O-PNC: Optical Provisioning Network Controllers</t>
        </li>
      </ul>
    </section>
    <section anchor="ai-ml-deep-learning-and-gen-ai">
      <name>AI, ML, Deep Learning and Gen-AI</name>
      <t>Artificial Intelligence (AI) is the broad field dedicated to creating
   systems that can perform tasks typically requiring human
   intelligence, such as reasoning, problem-solving, and understanding
   language.  Within AI, Machine Learning (ML) is a subset that focuses
   on developing algorithms that enable computers to learn from and make
   decisions based on data, improving their performance over time
   without explicit programming.  Deep Learning is a further subset of
   ML that utilizes neural networks with many layers (hence "deep") to
   analyze various factors of data.  This approach is particularly
   powerful in handling large and complex datasets, making significant
   advancements in areas such as image and speech recognition, natural
   language processing, and autonomous systems.</t>
      <t>Generative AI (Gen-AI) is a specialized branch of ML that involves
   training models to generate new content, such as text, images, or
   music, by learning patterns from existing data, thereby enhancing the
   creative and adaptive capabilities of AI systems.  Deep Learning
   techniques are often employed in Gen-AI to create more sophisticated
   and realistic outputs, pushing the boundaries of what AI can achieve
   in terms of creativity and innovation.</t>
      <t><xref target="fig1"/> shows the relationship between AI, ML, Deep Learning, and
   Gen-AI.</t>
      <figure anchor="fig1">
        <name>Figure 1: Relationship between AI, ML, Deep Learning, and Gen-AI</name>
        <artwork align="center"><![CDATA[
          |-------------------------------------|
          |                  AI                 |
          |   |-----------------------------|   |
          |   |              ML             |   |
          |   |   |---------------------|   |   |
          |   |   |    Deep Learning    |   |   |
          |   |   |   |-------------|   |   |   |
          |   |   |   |   Gen-AI    |   |   |   |
          |   |   |   |             |   |   |   |
          |   |   |   |             |   |   |   |
          |   |   |   |-------------|   |   |   |
          |   |   |---------------------|   |   |
          |   |-----------------------------|   |
          |-------------------------------------|
]]></artwork>
      </figure>
    </section>
    <section anchor="definition-of-ainetops">
      <name>Definition of AINetOps</name>
      <t>Figure 2 illustrates the concept of AI for Network Operations
   (AINetOps), which leverages AI, ML, Gen-AI techniques and rule-based
   systems to enhance and automate network operations.  By integrating
   both historical and real-time streaming data, AINetOps employs
   advanced data analytics to uncover hidden patterns, establish data
   correlations, and provide trend forecasts and anomaly detection.
   These insights lead to significant operational benefits, including
   improved network performance, reduced downtime, and more efficient
   management of IP optical networks.  Additionally, AINetOps enables
   proactive and predictive analytics, allowing network operators to
   address potential issues before they impact users, thereby ensuring
   more resilient and reliable network operations.</t>
      <t>This draft introduces the term “Operational Benefit”, which
   encompasses the comprehensive suite of tools, and methodologies that
   facilitate the efficient management, debugging, troubleshooting,
   monitoring, configuration, and optimizing of IP Optical networks.
   These operational benefits might include network management systems,
   automated diagnostic tools, performance monitoring and telemetry
   systems, configuration management platforms, and optimization
   algorithms.  By leveraging these resources, operators can ensure the
   robust performance, reliability, and scalability of the network,
   ultimately enhancing service delivery and reducing operational costs.
   The integration of these operational benefits is crucial for
   maintaining seamless network operations and achieving strategic
   business objectives</t>
      <t>Section 5 expands the Operational benefits shown in Figure 2 and
   provides a detailed explanation of the various operational benefits
   offered by AINetOp.</t>
      <t><xref target="fig2"/> shows the relationship between AI, ML, Deep Learning, and
   Gen-AI.</t>
      <figure anchor="fig2">
        <name>Figure 2: Definition of AINetOp</name>
        <artwork align="center"><![CDATA[
    |------------|    |--------------|     |-----------------------|
    |            |    |  AI /        |     |                       |
    |    Big     |    |  ML /        |     |                       |
    |    Data    |  + |  Gen-AI/     |  =  |        AINetOps       |
    |            |    |  Rule-based  |     |                       |
    |            |    |              |     |                       |
    |------------|    |--------------|     |-----------------------|
                                               AINetOPS provides
                                               Operational Benefits
      Big Data: Historical or Real-time data
               (e.g., time series PM, Alarm, Topology, Log,
                OAM data, product content/documentation etc.)
]]></artwork>
      </figure>
    </section>
    <section anchor="operational-benefits-provided-by-ainetops">
      <name>Operational Benefits Provided by AINetOps</name>
      <t>AINetOps has the potential to revolutionize network operations by
   addressing the inherent complexity, scale, and dynamic nature of
   modern networks.  By applying various AI/ML/Gen-AI techniques,
   network operators can transition from traditional manual or rule-
   based operations to intelligent, automated systems capable of real-
   time adaptation, predictive insights, and optimized decision-making.</t>
      <t>This section outlines the following key areas where AINetOps can be
   applied effectively in network operations, leveraging both data-
   driven models and domain-specific knowledge.</t>
      <ul spacing="normal">
        <li>
          <t>Section 5.1 "Operator Network Assistance"</t>
        </li>
        <li>
          <t>Section 5.2 "Network active and reactive assurance".  This area is also
related to "Root Cause Analysis" Section 5.2.1</t>
        </li>
        <li>
          <t>Section 5.3 "Predictive Analytics" which includes "Proactive
 Network Assurance and Monitoring" Section 5.3.1, "Anomaly
 Detection" Section 5.3.2, "Trending and Forecasting"
 Section 5.3.3, "Predictive Maintenance" Section 5.3.4 and "Network
 Capacity Planning" Section 5.3.5</t>
        </li>
        <li>
          <t>Section 5.4 "Network Operational Insight".  This area can be
grouped into "Operational Insights Requiring No Further Analysis "
Section 5.4.1 and "Operational Insights Requiring Further Analysis
" Section 5.4.2</t>
        </li>
        <li>
          <t>Section 5.5 "Network Configuration Management"</t>
        </li>
        <li>
          <t>Section 5.6 "IP/Optical multi-layer Planning"</t>
        </li>
        <li>
          <t>Section 5.7 "Cross-Layer and Multi-Layer Optimization"</t>
        </li>
        <li>
          <t>Section 5.8 "Traffic Optimization"</t>
        </li>
        <li>
          <t>Section 5.9 "Closed-Loop Automation"</t>
        </li>
        <li>
          <t>Section 5.10 "Network Maintenance and Cleanup"</t>
        </li>
        <li>
          <t>Section 5.11 "Network API Construction"</t>
        </li>
        <li>
          <t>Section 5.12 "AI-Driven Security Monitoring"</t>
        </li>
        <li>
          <t>Section 5.13 "Multi Agent Interworking"</t>
        </li>
      </ul>
      <section anchor="operator-network-assistance">
        <name>Operator Network Assistance</name>
        <t>Powered by Gen-AI, the operator network assistant functions as a
   virtual network engineer, providing a real-time recommendations,
   insights, and automated solutions.  These systems use NLP for
   interface interaction, deep learning for anomaly classification, and
   contextual understanding to enhance operator decision-making.</t>
        <t>AI-powered operator assistants function as virtual network engineers,
   providing real-time recommendations, insights, and automated
   solutions.  These advanced systems leverage the power of natural
   language processing (NLP) to facilitate seamless and intuitive
   interactions between operators and the network management interface.
   By understanding and interpreting human language, these AI assistants
   can effectively communicate with operators, making it easier for them
   to manage complex network environments without needing extensive
   technical expertise.</t>
        <t>In addition to NLP, Operator Assistance can integrate other AINetOps
   functions to solve operators scenarios and use-cases.  This
   capability allows the system to provide timely alerts and
   recommendations, helping operators to address issues before they
   escalate into major disruptions.  The deep learning models
   continuously improve over time, becoming more adept at recognizing
   new types of anomalies and adapting to evolving network conditions.</t>
        <t>Furthermore, the contextual understanding capabilities of AI-powered
   operator network assistant significantly enhance operator decision-
   making.  By considering the broader context of network operations,
   including historical data, current network state, and external
   factors, the AI can offer more relevant and actionable insights.
   This holistic approach ensures that operators receive comprehensive
   guidance tailored to the specific circumstances of their network.  As
   a result, operators can make more informed decisions, optimize
   network performance, and maintain high levels of service reliability
   and efficiency.  In essence, AI-powered operator network assistants
   are transforming network management by augmenting human capabilities
   with advanced technology, leading to smarter and more proactive
   network operations.</t>
      </section>
      <section anchor="network-active-and-reactive-assurance">
        <name>Network active and reactive assurance</name>
        <t>Network active and reactive assurance and troubleshooting, both at the single-
   layer (IP or Optical) and multi-layer (IP over Optical), are critical
   components in maintaining the health and stability of modern IP,
   Optical, and IPoDWDM networks.  This process involves the
   identification and resolution of network issues as they arise,
   ensuring that any disruptions or degradations are promptly addressed.
   By employing AINetOps techniques, network engineers can quickly
   pinpoint the root cause of problems, whether they originate in the IP
   layer, the optical layer, or across both.  This reactive approach is
   essential for minimizing downtime and maintaining the quality of
   service expected by network users.</t>
        <t>In single-layer troubleshooting, the focus is on isolating and
   resolving issues within a specific layer of the network.  For
   example, in an IP network, this might involve diagnosing routing
   problems, addressing IP address conflicts, IP layer misconfiguration,
   hardware failure or resolving issues with network protocols.  In an
   optical network, single-layer troubleshooting could involve
   identifying fiber cuts, optical signal degradation, or equipment
   failures</t>
        <t>Multi-layer troubleshooting, on the other hand, requires a more
   integrated approach, as it involves identifying and resolving issues
   that span across multiple layers of the network.  This could include
   problems where an issue in the optical layer affects the IP layer,
   such as signal impairments that impact data transmission quality.  By
   effectively managing both single-layer and multi-layer
   troubleshooting, network engineers can ensure a more robust and
   resilient network infrastructure.</t>
        <t>The importance of assurance and troubleshooting cannot be
   overstated in today's high-demand network environments.  Rapid
   response to network issues is crucial to maintaining service
   continuity and meeting the expectations of end-users.  Advanced
   diagnostic tools and techniques, such as real-time monitoring,
   automated alerts, and detailed analytics, play a vital role in this
   process.  These tools enable engineers to quickly detect anomalies,
   assess their impact, and implement corrective actions.  Through
   continuous improvement of assurance and troubleshooting
   practices, network operators can enhance their ability to maintain
   network performance, reduce operational risks, and deliver a reliable
   and high-quality service to their customers.</t>
        <section anchor="root-cause-analysis">
          <name>Root Cause Analysis</name>
          <t>In the context of "Network active and reactive assurance," Root Cause Analysis
   (RCA) is a critical aspect that extends the reactive troubleshooting
   process to uncover the underlying reasons behind network issues.
   When an issue is detected in the network, RCA leverages advanced
   AINetOps techniques to correlate events across different layers of
   the network, whether it be IP, Optical, or a combination of both.
   This comprehensive approach ensures that the root cause of an issue
   is accurately identified, rather than just addressing the symptoms.
   Techniques such as graph-based analysis enable network engineers to
   visualize and trace the sequence of events leading to a problem,
   providing a clear pathway to the source of the issue.</t>
          <t>Moreover, natural language processing (NLP) for log analysis plays a
   significant role in RCA by automating the examination of vast amounts
   of log data generated by network devices.  NLP can sift through logs
   to identify patterns and anomalies that might be missed by manual
   inspection.  This capability is particularly useful in multi-layer
   networks where issues in one layer can propagate and manifest in
   another.  By efficiently parsing through logs and correlating data,
   NLP helps pinpoint the exact cause of disruptions, thereby reducing
   the mean time to resolution (MTTR).  Additionally, knowledge graph
   representations provide a structured and interconnected view of
   network components and their relationships, aiding in the rapid
   identification of fault points and their impact on the network.</t>
          <t>By accurately diagnosing the root cause of network issues, network
   operators can implement targeted corrective actions that address the
   core problem, preventing recurrence and ensuring long-term stability.
   This precision in troubleshooting not only minimizes downtime but
   also enhances the overall reliability and performance of the network.
   Furthermore, insights gained from RCA can inform proactive measures
   and optimization strategies, contributing to a more resilient network
   infrastructure.  In essence, RCA empowers network engineers with the
   tools and knowledge needed to maintain high service quality and meet
   the demands of modern, high-performance networks.</t>
        </section>
      </section>
      <section anchor="predictive-analytics">
        <name>Predictive Analytics</name>
        <t>Predictive analytics or advanced analytics uses historical and real-
   time network data, statistical algorithms, and ML techniques to
   identify the likelihood of future outcomes based on past data.  In
   the context of network operations, predictive analytics involves the
   use of these methodologies in following areas to anticipate network
   issues, optimize performance, and improve operational efficiency.  By
   examining patterns and trends in historical network data, predictive
   analytics can potentially forecast network problems before they
   occur, allowing for proactive management and maintenance.</t>
        <t>The core idea behind predictive analytics is to transform data into
   actionable insights.  For network operations, this means analyzing
   various metrics such as traffic patterns, latency, performance
   management (PM) data, and equipment performance to predict future
   states of the network.  For instance, by identifying trends that have
   historically led to network failures, predictive analytics can alert
   operators to potential future failures, enabling them to take
   preventive measures.  This proactive approach helps in minimizing
   downtime, enhancing service reliability, and optimizing resource
   allocation.</t>
        <t>In summary, predictive analytics in network operations is about
   leveraging historical data and advanced analytical techniques to
   foresee and address potential issues before they impact the network.
   This approach leads to more efficient, reliable, and secure network
   operations, ultimately enhancing the overall performance and user
   experience.  The AINetOps can address the following operator's
   scenarios.</t>
        <section anchor="proactive-network-assurance-and-monitoring-health-check">
          <name>Proactive Network Assurance and Monitoring (Health Check)</name>
          <t>Proactive Network Assurance and Monitoring represents a paradigm
   shift from the Network active and reactive assurance discussed in Section 5.2.
   Instead of waiting for issues to arise and then addressing them,
   proactive network assurance involves anticipating potential problems
   and implementing measures to prevent them from occurring.  This
   forward-thinking strategy leverages AINetOps to predict and mitigate
   network issues before they impact service quality.</t>
          <t>In single-layer proactive assurance, the focus is on continuously
   monitoring and analyzing the health of a specific layer IP or Optical
   layer of the network to identify early warning signs of potential
   issues.  For instance, in an IP network, this might involve analyzing
   traffic patterns to detect anomalies that could indicate an impending
   routing problem or hardware failure.  ML algorithms can be employed
   to predict IP address conflicts or protocol misconfigurations before
   they cause disruptions.  Similarly, in an optical network, proactive
   assurance could involve monitoring signal quality and fiber integrity
   to detect and address degradations before they lead to significant
   impairments or outages.</t>
          <t>Multi-layer proactive assurance takes this approach a step further by
   integrating monitoring and analysis across both the IP and optical
   layers.  This holistic view allows for the detection of complex
   issues that span multiple layers, such as optical signal impairments
   that could degrade IP data transmission quality.  By correlating data
   from both layers, AINetOps solution can provide insights into how
   changes in the optical layer might affect IP performance and vice
   versa.  This enables operators to take preemptive actions, such as
   optimizing signal paths or adjusting routing protocols, to maintain
   optimal network performance.</t>
          <t>The benefits of proactive network assurance and monitoring are
   substantial.  By identifying and addressing potential issues before
   they escalate, network operators can significantly reduce downtime
   and improve service reliability.  This proactive stance not only
   enhances the user experience by ensuring consistent network
   performance but also reduces operational costs associated with
   emergency troubleshooting and repairs.  Furthermore, the use of
   advanced analytics and machine learning in AIOps allows for
   continuous learning and improvement, enabling networks to become more
   resilient and adaptive over time.</t>
          <t>In today's dynamic and high-demand network environments, proactive
   network assurance and monitoring is one of the operational benefits
   provided by AINetOps and are essential for staying ahead of potential
   issues and maintaining a competitive edge.  By leveraging the power
   of AINetOp, network operators can transform their approach from
   reactive to proactive, ensuring that their networks are not only
   robust and resilient but also capable of delivering the high-quality
   service that users expect.  This shift towards proactive assurance
   represents a significant advancement in network management, paving
   the way for more intelligent, efficient, and reliable network
   operations.</t>
        </section>
        <section anchor="anomaly-detection">
          <name>Anomaly Detection</name>
          <t>A critical component of AINetOps in the context of predictive
   analytics is "Anomaly Detection", which leverages advanced ML
   algorithms to enhance network reliability and performance.  By
   employing ML techniques such as supervised, unsupervised or
   reinforcement learning, AINetOps can predict anomalies in real-time
   by analyzing vast amounts of network telemetry data.  Supervised
   learning models, trained on historical data, recognize known issues,
   while unsupervised models identify new anomalies by spotting
   outliers.  This comprehensive detection mechanism ensures both
   familiar and novel network issues are identified promptly.
   Predictive models, utilizing techniques like time-series forecasting,
   enable the identification of potential network problems, such as link
   failures or traffic congestion, before they occur.  By forecasting
   future network states based on historical and current data, these
   models provide early warnings, allowing for timely interventions to
   prevent unexpected downtime and maintain optimal performance.</t>
          <t>Clustering techniques further enhance anomaly detection by grouping
   similar data points to identify patterns and trends that signal
   imminent failures or suboptimal behavior.  This method allows ML
   models to discern subtle changes in network behavior that might
   otherwise go unnoticed.  For example, clustering can reveal traffic
   congestion patterns under specific conditions, enabling preemptive
   measures to alleviate potential issues.  Additionally, clustering
   helps identify the root causes of anomalies by correlating various
   network events and metrics, facilitating a more effective
   troubleshooting process.  By integrating these advanced ML
   techniques, AINetOps not only improves anomaly detection but also
   empowers network operators with the insights needed to maintain a
   high-performing and reliable network infrastructure.</t>
        </section>
        <section anchor="trending-and-forecasting">
          <name>Trending and Forecasting</name>
          <t>"Trending and Forecasting" operational benefit is distinct but is
   related to "Anomaly Detection" Section 5.3.2.  Trending and
   forecasting in the context of single-layer or multi-layer IP optical
   networks are pivotal components of predictive analytics, providing
   significant operational benefits through AINetOps.  In single-layer
   networks, such as purely IP or optical networks, trending involves
   analyzing historical data to identify patterns and behaviors over
   time.  For instance, in an IP network, trends in traffic volume,
   latency, and packet loss can be monitored to predict future network
   performance and capacity needs.  Similarly, in an optical network,
   trends in signal quality, attenuation, and equipment performance can
   be tracked.  By leveraging these trends, predictive models can
   forecast potential issues such as bandwidth bottlenecks or equipment
   degradation, allowing network operators to proactively optimize
   resources, plan for upgrades, and prevent service disruptions.</t>
          <t>In multi-layer IP optical networks, where both IP and optical layers
   interact, trending and forecasting become even more powerful.  This
   approach involves correlating data from both layers to gain a
   comprehensive understanding of network behavior.  For example, trends
   in optical signal impairments can be analyzed alongside IP traffic
   patterns to predict how physical layer issues might impact data
   transmission and overall network performance.  Forecasting in this
   multi-layer context can identify potential cross-layer issues, such
   as how an increase in optical signal noise might lead to higher IP
   packet error rates.  By anticipating these issues, network operators
   can implement preemptive measures, such as rerouting traffic or
   adjusting signal parameters, to maintain seamless service.  The
   integration of trending and forecasting through AIOps thus enhances
   the resilience and efficiency of IP optical networks, ensuring
   superior performance and reliability.</t>
        </section>
        <section anchor="predictive-maintenance">
          <name>Predictive Maintenance</name>
          <t>Predictive maintenance in the context of single-layer or multi-layer
   IP optical networks is other aspect of predictive analytics, offering
   substantial operational benefits through AINeetOps.  In single-layer
   networks, such as purely IP or optical networks, predictive
   maintenance involves using historical and real-time data to forecast
   when network components might fail or degrade.  For instance, in an
   IP network, data from routers and switches, such as CPU usage,
   temperature, and error rates, can be analyzed to predict hardware
   failures.  Similarly, in an optical network, monitoring parameters
   like signal strength, attenuation, and equipment performance helps
   predict when optical amplifiers or transceivers might need
   maintenance.  By accurately forecasting these maintenance needs,
   network operators can schedule interventions before failures occur,
   reducing unplanned downtime and extending the lifespan of network
   components.</t>
          <t>In multi-layer IP optical networks, predictive maintenance becomes
   even more effective by considering the interactions between the IP
   and optical layers.  This approach involves analyzing data from both
   layers to predict maintenance needs that could impact the entire
   network.  For example, if optical layer data indicates a gradual
   degradation in fiber quality, predictive models can assess how this
   might affect IP layer performance, such as increased packet loss or
   latency.  By understanding these cross-layer dependencies, network
   operators can prioritize maintenance activities that have the most
   significant impact on overall network health.  This proactive
   approach ensures that both layers of the network are maintained
   optimally, preventing cascading failures and maintaining high service
   quality.  Through the integration of predictive maintenance with
   AIOps, IP optical networks can achieve greater reliability,
   efficiency, and cost-effectiveness, ensuring uninterrupted service
   delivery to end-users.</t>
        </section>
        <section anchor="network-capacity-planning">
          <name>Network Capacity Planning</name>
          <t>Predictive analytics also plays a crucial role in capacity planning
   and performance management.  By forecasting future traffic demands,
   network operators can ensure that the infrastructure is adequately
   scaled to meet those demands without over-provisioning.  This not
   only optimizes the use of resources but also ensures that the network
   can handle peak loads efficiently.  Additionally, predictive
   analytics can help in identifying and mitigating potential security
   threats by analyzing traffic patterns and detecting anomalies that
   may indicate malicious activities.</t>
        </section>
        <section anchor="traffic-optimization">
          <name>Traffic Optimization</name>
          <t>Referring to Section 5.8 for details of AINetOps "Traffic
   Optimization".</t>
          <t>If "Traffic Optimization" is based on prediction of the traffic
   flows, it can be categorized as one of the areas of "Predictive
   Analytics".</t>
        </section>
      </section>
      <section anchor="network-operational-insights">
        <name>Network Operational Insights</name>
        <t>"Network Operational Insights" refers to the comprehensive visibility
   and understanding of an IP optical network's performance and
   behavior.  This concept involves collecting and analyzing detailed
   data about the network's operations.  By providing this valuable
   insight to network operators, they can gain a holistic view of the
   network's health and performance.  This enables operators to
   understand their network better and ensure a robust and resilient
   infrastructure.</t>
        <t>By having a detailed understanding of network usage patterns, traffic
   flows, and performance metrics, operators can make data-driven
   decisions to optimize resource allocation and improve overall
   efficiency.  This insight is particularly valuable in multi-layer IP/
   Optical networks, where the interplay between different network
   layers can be complex. <xref target="RFC5557"/> provides examples of the PCE 
   being using to optimize resource allocation.</t>
        <t>By leveraging these insights, operators can
   ensure that both the IP and optical layers are operating
   harmoniously, leading to optimal performance and cost efficiency.  In
   essence, Network Operational Insights empower operators with the
   knowledge needed to maintain a high-performing, resilient, and
   future-proof network infrastructure.</t>
        <t>The network operational insight can be grouped into two categories.
   By categorizing network operational insights into these two
   categories, operators can better prioritize their efforts and
   resources, ensuring both immediate and long-term network health and
   performance.</t>
        <section anchor="operational-insights-requiring-no-further-analysis">
          <name>Operational Insights Requiring No Further Analysis</name>
          <t>Network Operational Insights that fall under this category are those
   that can be obtained directly from existing data and real-time
   monitoring without the need for further analysis or simulation.
   These insights provide immediate, actionable information that can
   help network operators quickly identify and address issues.</t>
          <t>These insights are typically derived from real-time monitoring
   systems that continuously track network performance and health
   metrics.  For example, showing the Network Element (NE) with the
   highest alarms or displaying the current alarm table for a specific
   NE (e.g., NE 1.1.1.1) can provide immediate visibility into potential
   issues.  Similarly, identifying the NEs with the highest problems
   during the last hour or plotting the Bit Error Rate (BER) for the 10
   worst modems in a specific region (e.g., Northeast) allows operators
   to quickly pinpoint areas that require attention.  These insights are
   crucial for maintaining network stability and ensuring prompt
   resolution of emerging issues.</t>
          <t>These insights also include detailed information about network
   components and their performance.  For instance, identifying which
   photonic services cross a specific fiber (e.g., OTS1) or determining
   which modems are in use for a particular optical service (e.g., SVC-
   1) can help operators understand the current network configuration
   and its operational status.  Additionally, insights such as the
   average time to failure for similar equipment in the network or
   identifying geographic regions with higher rates of network issues
   provide valuable context for proactive maintenance and resource
   planning.  By leveraging these direct insights, operators can
   maintain a well-functioning network with minimal downtime and optimal
   performance.</t>
        </section>
        <section anchor="operational-insights-requiring-further-analysis">
          <name>Operational Insights Requiring Further Analysis</name>
          <t>Network Operational Insights in this category require deeper analysis
   and possibly simulation to derive meaningful conclusions.  These
   insights often involve complex scenarios where simple monitoring data
   is insufficient, and further investigation is needed to understand
   the underlying causes or to predict future behavior.</t>
          <t>Insights that require investigation and simulation often involve
   predictive analytics and scenario planning.  For example, determining
   whether an L0 optical service can be created between two cities
   (e.g., city A and Y) involves analyzing the current network topology,
   available resources, and potential constraints.  Similarly,
   understanding why an IP TE-tunnel cannot be established between two
   points (e.g., point A and B) may require simulation of different
   routing scenarios and examination of network policies.  These
   investigations help operators to not only troubleshoot current issues
   but also to plan and optimize future network expansions and
   configurations.</t>
          <t>These insights are crucial for long-term network health and
   performance optimization.  Identifying the most common failure points
   in the network or detecting signs of degradation in wireless network
   performance requires a combination of historical data analysis and
   predictive modeling.  By simulating different maintenance activities
   based on current network health, operators can prioritize tasks that
   will have the most significant impact.  For instance, understanding
   what maintenance activities are needed based on the current network
   health can help in scheduling proactive maintenance that prevents
   future outages.  These insights enable operators to take a strategic
   approach to network management, ensuring sustained performance and
   reliability over time.</t>
        </section>
      </section>
      <section anchor="network-configuration-management">
        <name>Network Configuration Management</name>
        <t>AI can assist in automating the generation and enforcement of network
   configurations, significantly enhancing network reliability and
   performance.  By leveraging AI/Gen-AI algorithms, network operators
   can automate the creation of configuration templates that are
   precisely tailored to specific network requirements.  These templates
   can encompass a wide range of settings, such as Quality of Service
   (QoS) parameters, Access Control Lists (ACLs), tunnel configurations,
   and service configuration ensuring that each network segment is
   optimized for its intended purpose.  This automation not only speeds
   up the deployment process but also reduces the likelihood of human
   errors that can occur during manual configuration, leading to a more
   robust and efficient network infrastructure.</t>
        <t>Furthermore, AINetOps can play a role on validation of network
   configuration, i.e., "network configuration audit".  AINetOps plays a
   crucial role in validating configurations against predefined network
   configuration, ensuring that all network setups comply with intent
   configuration.  By continuously monitoring network configurations,
   AINetOps can detect and flag any deviations or misconfigurations that
   could pose security risks or operational inefficiencies.  For
   example, an AI system can identify inconsistencies in ACLs that might
   allow unauthorized access or detect suboptimal QoS settings that
   could degrade service quality.  By proactively addressing these
   issues, AINetOps helps maintain the integrity and performance of the
   network, enabling operators to focus on strategic initiatives rather
   than troubleshooting configuration errors.  This proactive approach
   to configuration management not only enhances network security and
   efficiency but also supports the dynamic and scalable nature of
   modern network environments.</t>
      </section>
      <section anchor="ipoptical-multi-layer-planning">
        <name>IP/Optical Multi-layer Planning</name>
        <t>Multi-layer planning is an approach that integrates the planning of
   IP and optical networks based on traffic patterns, network
   simulations, and capacity planning.  By analyzing these factors, IP
   optical network can be designed to optimize resource allocation,
   enhance network efficiency, and ensure the network can handle current
   and future demands, resulting in a more resilient and scalable
   infrastructure.</t>
      </section>
      <section anchor="cross-layer-and-multi-layer-optimization">
        <name>Cross-Layer and Multi-Layer Optimization</name>
        <t>AI can address the dependencies between different network layers,
   such as IP and optical layers, by integrating data and decision-
   making across these layers.  Multi-layer optimization algorithms
   ensure resource efficiency and performance by aligning the goals of
   individual layers, such as minimizing power consumption at the
   physical layer while maintaining SLA guarantees at the application
   layer.</t>
        <t>Moreover, Network Operational Insights facilitate informed decision-
   making for network optimization and capacity planning.  By having a
   detailed understanding of network usage patterns, traffic flows, and
   performance metrics, operators can make data-driven decisions to
   optimize resource allocation and improve overall efficiency.  This
   insight is particularly valuable in multi-layer IP/Optical networks,
   where the interplay between different network layers can be complex.
   By leveraging these insights, operators can ensure that both the IP
   and optical layers are operating harmoniously, leading to optimal
   performance and cost efficiency.  In essence, Network Operational
   Insights empower operators with the knowledge needed to maintain a
   high-performing, resilient, and future-proof network infrastructure</t>
      </section>
      <section anchor="traffic-optimization-1">
        <name>Traffic Optimization</name>
        <t>Another AINetOps operational benefits is "Traffic Optimization" where
   IP/Optical network traffic flows can be monitored and appropriate
   adjustments to network protocols, network topology, network
   configuration, load balancing, bandwidth allocation and so on can be
   dynamically initiated.  AINetOps traffic optimization considers
   multiple factors such as latency, packet loss, and link utilization,
   enabling networks to adapt to changing conditions in real time.</t>
        <t>Expanding on this, AINetOps traffic optimization leverages advanced
   algorithms to continuously monitor network conditions and predict
   potential congestion points before they impact service quality.  By
   analyzing historical data and real-time metrics, machine learning
   models can forecast traffic patterns and proactively adjust routing
   decisions to ensure optimal performance.  For instance, AINetOps can
   reroute traffic through less congested paths when high utilization is
   detected, balancing the load and enhancing overall network
   efficiency.  This intelligent management reduces latency and packet
   loss while maximizing bandwidth utilization.</t>
        <t>Furthermore, traffic optimization enhances the network's ability to
   respond to sudden changes in demand, such as peak usage times or
   unexpected traffic spikes.  Traditional static configurations may
   struggle with such fluctuations, leading to bottlenecks and degraded
   performance.  With AI, the network can dynamically reconfigure itself
   in real-time, redistributing traffic loads and reallocating bandwidth
   as needed.  This adaptability reduces the need for manual
   interventions and allows network operators to focus on strategic
   initiatives.  In essence, AI-driven traffic optimization enables
   networks to be more resilient, responsive, and capable of delivering
   consistent high-quality service.</t>
        <t>Note that "Traffic Optimization" AINetOps operational benefits is
   closely related to "Predictive Analytics" covered in Section 5.3.</t>
      </section>
      <section anchor="closed-loop-automation">
        <name>Closed-Loop Automation</name>
        <t>Closed-loop automation systems use AI to adjust network
   configurations based on real-time data dynamically.  Reinforcement
   learning (RL) algorithms and policy-based decision frameworks can
   automate traffic engineering, resource allocation, and fault
   remediation tasks.  AI-driven systems ensure optimal network
   performance without human intervention by continually monitoring
   network state and applying corrective actions.</t>
      </section>
      <section anchor="network-maintenance-and-cleanup">
        <name>Network Maintenance and Cleanup</name>
        <t>AI can automate cleanup operations by identifying and resolving
   transient issues, removing redundant configurations, and optimizing
   resource utilization.  These tasks may involve the identification of
   "stale" network states or unused resources, enabling networks to
   operate more efficiently.</t>
      </section>
      <section anchor="network-api-construction">
        <name>Network API Construction</name>
        <t>Another significant operational benefit of implementing AINetOps in
   single-layer or multi-layer IP/Optical networks is the generation of
   various Network Controller APIs.  These APIs are essential for the
   seamless integration of network controllers (whether IP, Optical, or
   multi-layer) with Operational Support Systems (OSS) or other network
   controllers.  A key advantage of this operational benefit is that
   operators do not need to possess in-depth knowledge of the APIs.
   Typically, network operators spend considerable time creating and
   verifying APIs to integrate IP or Optical network elements with the
   broader management layer, including OSS/BSS.  By developing robust
   and versatile APIs, network operators can ensure smooth communication
   and coordination between different network management systems,
   thereby enhancing overall network efficiency and performance</t>
        <t>The APIs developed for network controllers serve as a bridge,
   enabling the OSS to interact with the underlying network
   infrastructure in a more dynamic and automated manner.  This
   integration allows for real-time data exchange, automated
   provisioning, and efficient fault management, which are essential for
   maintaining optimal network performance.  Moreover, these APIs
   facilitate the orchestration of network resources across different
   layers, whether it be IP or Optical, ensuring that the network can
   adapt to varying demands and conditions with minimal manual
   intervention.</t>
        <t>AINetOps leverages the power of Generative AI (Gen-AI) to further
   enhance this integration process.  By translating the operator's
   intent into precise network controller APIs, Gen-AI enables a more
   intuitive and user-friendly approach to network management.  This
   translation capability ensures that even complex operational
   requirements can be seamlessly converted into actionable commands for
   the network controllers.  This not only reduces the operational
   burden on network engineers but also significantly enhances the
   agility and responsiveness of the network to changing conditions and
   user demands.</t>
      </section>
      <section anchor="ai-driven-security-monitoring">
        <name>AI-Driven Security Monitoring</name>
        <t>AI is becoming a cornerstone of modern network security, enabling
proactive, adaptive, and intelligent measures to safeguard network
operations against a rapidly evolving threats. By leveraging AI, network
operators can enhance their ability to detect, prevent, and respond to
threats in real-time while automating complex     security processes.
This section details the key areas where AI drives security enhancements
in network operations.</t>
        <section anchor="threat-detection-and-mitigation">
          <name>Threat Detection and Mitigation</name>
          <t>AI significantly enhances threat detection and mitigation through ML and
deep learning. By analyzing vast amounts of network traffic data, AI
models identify unusual patterns and behaviors indicative of malicious
activity. This includes detecting anomalies that signal threats like
zero-day attacks or insider threats, generating real-time alerts, and
incorporating external threat intelligence to recognize known attack
signatures. Together, these capabilities enable faster response times and
improved threat recognition.</t>
        </section>
        <section anchor="intrusion-detection-and-prevention">
          <name>Intrusion Detection and Prevention</name>
          <t>AI improves intrusion detection systems (IDS) and intrusion prevention
systems (IPS) by enhancing accuracy and reducing false positives. It
achieves this through behavioral analysis, which identifies unauthorized
access or suspicious activities, and automated responses that isolate
compromised devices or block malicious IP addresses. Additionally, AI's
adaptive learning capabilities ensure continuous updates to address new
threats in dynamic environments.</t>
        </section>
        <section anchor="security-policy-automation">
          <name>Security Policy Automation</name>
          <t>Using AI would simplify the creation and enforcement of security policies
by automating configurations and adjustments, reducing the potential for
human error. It dynamically updates firewall rules and access controls
based on real-time threat intelligence, assigns risk scores to network
devices and applications to prioritize enforcement, and ensures
compliance with regulatory standards by monitoring for deviations and
recommending corrective actions.</t>
        </section>
      </section>
      <section anchor="multi-agent-interworking">
        <name>Multi Agent Interworking</name>
        <t>As seen in the use cases above, the usage of agents introduces various challenges,
spanning from the definition of APIs that can be used by the various agent to the
interworking with already existing components of the Network Management and Control stack.
New challenges arise when we move from a single agent to a multi-agent architecture.
When multiple agents are deployed we need to consider how they discover each other, 
how they interwork with the discovered agents and how they are kept in synch.</t>
        <t>The discovery aspect could be relatively simple in the short term, when few agents will
be deployed in the network and it could be possible to manually configure each agent
with the identifiers and capabilities of the other agents to interact with. With the evolution 
of AI based architectures with more and more agents being part of the architecture, 
mechanisms to advertise their presence and more important their capabilities will be required.</t>
        <t>The second aspect to consider is the interworking between them. As of today the way we 
interact with agents is mostly based on LLM, but would that be the best way for
interacting between them as well? Probably a more machine oriented type of language,
encoding and protocols would have better performances.</t>
      </section>
    </section>
    <section anchor="ainetops-scenarios-and-use-cases">
      <name>AINetOps Scenarios and Use-cases</name>
      <t>{Editor's note: This is a work in progress. More use cases will be added, and existing ones will be revised.}</t>
      <t>This section further expands Section 5 by exploring scenarios and use cases for applying AINetOps in network operations, focusing on their architectural, procedural, and protocol-level requirements.  Each use case highlights how AINetOps can be leveraged to address challenges in network management and optimization, while identifying the relevant IETF protocols, interfaces, and data models that are evolved or need enhancement.</t>
      <t>For every use case described, the following dimensions are examined to provide a comprehensive understanding of its implications and requirements.</t>
      <ul spacing="normal">
        <li>
          <t>Architecture: The high-level architecture necessary to support the use case, including control-plane and data-plane interactions, as well as integration points for AI-driven systems</t>
        </li>
        <li>
          <t>Interfaces and APIs: The key interfaces between AI systems and network elements, including management APIs (e.g., NETCONF, RESTCONF, gNMI) and telemetry interfaces</t>
        </li>
        <li>
          <t>Protocols: IETF protocols involved in enabling the use case, and potential extensions to existing protocols to accommodate AI-driven operations.</t>
        </li>
        <li>
          <t>Data Models: The data models required to represent network state, telemetry, policies, and configurations</t>
        </li>
        <li>
          <t>Processes and Procedures: Workflow considerations for integrating AI systems into existing operational practices, including training, validation, and deployment.</t>
        </li>
        <li>
          <t>Alignment with IETF Standards: Analysis of how existing IETF standards can be leveraged or extended to support the use case.</t>
        </li>
      </ul>
      <section anchor="network-active-and-reactive-assurance-1">
        <name>Network Active and Reactive Assurance</name>
        <t>Network active and reactive assurance, both at the single-
   layer (IP or Optical) and multi-layer (IP over Optical), are critical
   components in maintaining the health and stability of modern IP,
   Optical, and IPoDWDM networks.  This process involves the
   identification and resolution of network issues as they arise,
   ensuring that any disruptions or degradations are promptly addressed.
   By employing AINetOps techniques, network engineers can quickly
   pinpoint the root cause of problems, whether they originate in the IP
   layer, the optical layer, or across both.  This reactive approach is
   essential for minimizing downtime and maintaining the quality of
   service expected by network users.</t>
        <t>In single-layer troubleshooting, the focus is on isolating and
   resolving issues within a specific layer of the network.  Multi-layer
   troubleshooting, on the other hand, requires a more integrated
   approach, as it involves identifying and resolving issues that span
   across multiple layers of the network.  This could include problems
   where an issue in the optical layer affects the IP layer.</t>
        <t>In both reactive and active assurance, network faults have already occurred. These faults may include impairments such as optical fiber cuts, IP packet drops, IP link latency issues, or Threshold Crossing Alarms (TCA), among others.</t>
        <t>As illustrated in <xref target="_figure-reactive-assurance"/>, reactive assurance assumes that a fault occurs in the IP/Optical network (Step A) and is subsequently detected by the operator through various means (Step B). Detection methods may include alarm monitoring, performance telemetry data analysis, or customer reports indicating service disruptions. To initiate troubleshooting, the operator can launch the AIOps-Assistant, which acts as the front-end interface for AINetOps (Step C). The assistant then utilizes the backend assurance and troubleshooting mechanisms, leveraging a Gen-AI multi-agent framework. In Step D, a dynamic workflow is executed to diagnose the issue and identify potential root causes. Optionally, at Step E, the Gen-AI dynamic workflow can recommend remedial actions to resolve the issue and implement these actions in a closed-loop fashion, ensuring automated network recovery.</t>
        <figure anchor="_figure-reactive-assurance">
          <name>Multi-layer Reactive Assurance Using Gen-AI</name>
          <artwork><![CDATA[
                                         |-------------------|
                                         |  Gen-AI based     |
                      (E) |--------------|  Multi-Agent      |
                          |              |  Dynamic workflow |
                          |              |-------------------|     
                          |                      ^
                          v                      | (D)    
                  |---------------|              |
                  |   P-PNC(s),   |        |-----------|    
                  |   O-PNC(s),   |        |   AIOps   |
                  |   MDSC        |        | Assistant |
                  |---------------|        |-----------|  
                          ^                      ^
                          | (A)                  | (C)
               +----------|----------+           |
               |                     |          (B)
               |  IP/Optical Network |          
               |                     |
               +---------------------+

  Legend:
  (A) A fault happened in the network 
      (e.g., Fiber cut, IP packet drop, TCA crossing etc.)
  (B) Operator is aware of the network issue
  (C) To start troubleshooting, Operator starts AIOps-Assistant
  (D) Start troubleshooting using Gen-AI multi-agent dynamic workflow
  (E) Optional remedial actions

]]></artwork>
        </figure>
        <t>In both reactive and active assurance, network faults have already occurred. These faults may include impairments such as optical fiber cuts, IP packet drops, IP link latency issues, or Threshold Crossing Alarms (TCA), among others.</t>
        <t>The active assurance and troubleshooting process is illustrated in <xref target="_figure-active-assurance"/>. In contrast to <xref target="_figure-reactive-assurance"/>, active assurance assumes that a fault occurs in the IP/Optical network (Step A) and is subsequently detected automatically by higher-layer controllers (Step B). These controllers may employ detection methods that include monitoring alarms, analyzing performance telemetry data, or processing customer reports indicating service disruptions. To initiate troubleshooting, the detection logic launches the AIOps-Assistant, which serves as the front-end interface for AINetOps (Step C). Steps D and E are identical to those depicted in <xref target="_figure-reactive-assurance"/>.</t>
        <figure anchor="_figure-active-assurance">
          <name>Multi-layer Active Assurance Using Gen-AI</name>
          <artwork><![CDATA[
                                         |-------------------|
                                         |  Gen-AI based     |
                      (E) |--------------|  Multi-Agent      |
                          |              |  Dynamic workflow |
                          |              |-------------------|     
                          |                      ^
                          v                      | (D)    
                  |---------------|              |
                  |   P-PNC(s),   |  (C)   |-----------|    
              (B) |   O-PNC(s),   | -----> |   AIOps   |
                  |   MDSC        |        | Assistant |
                  |---------------|        |-----------|
                          ^
                          | (A)
               +----------|----------+
               |                     |
               |  IP/Optical Network |          
               |                     |
               +---------------------+

  Legend:
  (A) A fault happened in the network 
      (e.g., Fiber cut, IP packet drop, TCA crossing etc.)
  (B) The higher layer Controller notifies Operator
  (C) To start troubleshooting, AIOps-Assistant starts automatically
  (D) Start troubleshooting using Gen-AI multi-agent dynamic workflow
  (E) Optional remedial actions

]]></artwork>
        </figure>
        <t>More to be added.</t>
      </section>
      <section anchor="network_proactive_assurance">
        <name>Network Pro-active Assurance</name>
        <t>Unlike reactive and active assurance, proactive assurance does not wait for a fault to occur in the IP/Optical network. Instead, the network is continuously monitored through a series of trending and forecasting processes designed to detect early signs of deterioration that may eventually lead to faults.</t>
        <t>As illustrated in <xref target="_figure-proactive-assurance"/>, achieving proactive assurance involves running multiple processes that continuously monitor network performance. These processes collect and analyze a wide array of network telemetry data, including performance monitoring (PM) data, alarms, logs, network topology, and inventory details (Step A). By employing various techniques including advanced AI/ML algorithms, these processes provide real-time trending and forecasting insights, identifying patterns and anomalies that could indicate potential degradation (Step B).</t>
        <t>When these background processes detect any signs of deterioration or anomalous behavior, they trigger the AIOps-Assistant for further investigation (Step C). The AIOps-Assistant then leverages a Gen-AI multi-agent framework to initiate the assurance and troubleshooting procedures. In Step D, a dynamic workflow is executed to thoroughly diagnose the emerging issue and identify potential root causes. Optionally, at Step E, the Gen-AI dynamic workflow can recommend remedial actions to resolve the identified issues. These recommendations can be implemented in a closed-loop fashion, ensuring automated network recovery and continuous improvement of network performance. This proactive approach not only mitigates the risk of unexpected network faults but also optimizes operational efficiency by addressing issues before they escalate into service-impacting events.</t>
        <t>Furthermore, by integrating advanced analytics with automated corrective measures, proactive assurance enhances overall network resilience. It enables network operators to maintain a high quality of service and reliability, even in complex and dynamic network environments.</t>
        <figure anchor="_figure-proactive-assurance">
          <name>Multi-layer Pro-active Assurance Using Gen-AI</name>
          <artwork><![CDATA[
                                            |-------------------|
                                            |  Gen-AI based     |
         (E) |------------------------------|  Multi-Agent      |
             |                              |  Dynamic workflow |
             |                              |-------------------|   
             |                                        ^
             v                                        | (D)    
      |---------------|                               |
      |   P-PNC(s),   |  (B)   |-----------| (C)  |------------|
  (A) |   O-PNC(s),   | <----> | Monitoring| ---->| AIOps      |
      |   MDSC        |        | Processes |      | Assistant  |
      |---------------|        |-----------|      |------------|
              ^
              | 
    +---------|-----------+
    |                     |
    |  IP/Optical Network |          
    |                     |
    +---------------------+

  Legend:
  (A) Collect the IP/Optical telemetry data, inventory, logs etc.
  (B) Processes which monitor the network
  (C) Upon detection of potential issue, start AIOps-Assistant 
  (D) Start troubleshooting using Gen-AI multi-agent dynamic workflow
  (E) Optional remedial actions

]]></artwork>
        </figure>
        <t>More to be added.</t>
      </section>
      <section anchor="network-anomaly-detection">
        <name>Network Anomaly Detection</name>
        <t>Network anomaly detection is a critical component of modern network security and management, aimed at identifying deviations from normal network behavior that may indicate potential threats or operational issues. With the increasing complexity of networks and the growing    sophistication of cyber threats, traditional rule-based detection methods are often insufficient. The integration of Artificial Intelligence (AI) and Machine Learning (ML) techniques offers a more dynamic and adaptive approach to detecting anomalies in real-time. This section outlines the architecture, interfaces, protocols, data models, and alignment with IETF standards necessary to implement an effective AI-driven network anomaly detection system. The design and implementation of such systems may use some relevant technologies, such as RFC 8345 (YANG Data Model for Network Topologies), RFC 6241 (NETCONF Protocol), and RFC 8529 (YANG Schema Mount).</t>
        <t>Machine learning would provide a key function in network anomaly detection as it can be seamlessly integrated into the architecture, via the “Analysis Layer” described in the figure above. By leveraging ML techniques, it would be possible to identify deviations from normal behavior, uncovering anomalies that might be imperceptible to human network engineers.</t>
        <t>An ML technique using unsupervised learning is particularly well-suited for network anomaly detection, as the network infrastructure is typically dynamic and evolving by nature. While machine learning requires large volumes of high-quality data and substantial computational resources for training, its benefits outweigh these challenges. Machine learning models offer generalizability, robustness, and reduced dependence on manual fine-tuning. More importantly, they enable the detection of complex and previously unseen anomaly patterns, enhancing network security, reliability, and operational efficiency.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture for network anomaly detection using AI typically involves a distributed system where data collection, analysis, and    response mechanisms are decoupled but interconnected. The system comprises the following key components:  </t>
            <t>
o Data Collection Layer: Responsible for gathering network traffic data from various sources such as routers, switches, and endpoints. 
   This layer may leverage protocols like IPFIX (RFC 7011) for flow data export.  </t>
            <t>
o Analysis Layer: Utilizes machine learning (ML) models to detect anomalies in the collected data. This layer may include both real-time and batch processing capabilities.  </t>
            <t>
o Response Layer: Executes predefined actions based on the analysis results, such as alerting administrators, blocking malicious traffic,or reconfiguring network devices. This layer may integrate with DOTS (RFC 8811) to mitigate DDoS attacks.  </t>
            <t>
The architecture should be scalable to handle large volumes of data and adaptable to incorporate new AI models as they evolve.  </t>
            <t><xref target="fig_NAD"/> illustrates the high-level architecture of an AI-based network anomaly detection system:</t>
          </li>
        </ul>
        <figure anchor="fig_NAD">
          <name>Architecture of network anomaly detection system</name>
          <artwork><![CDATA[
                         +-------------------+
                         |                   |
                         |    Analysis       |
            +----------->|      Layer        |------------+
            |            |     (AI/ML)       |            |
            |            +-------------------+            |
            |                                             |
            |                                             v
   +-------------------+                       +-----------------+
   |                   |                       |                 |
   |  Data Collection  |                       |    Response     |
   |      Layer        |<------+       +-------|      Layer      |
   |                   |       |       |       |                 |
   +-------------------+       |       |       +-----------------+
                               |       |resolve incidents, etc
                      monitor  |       |
                               |       v
                        +-------------------+     
                        |  Network Devices  |       
                        | (Routers, Switches|      
                        | Endpoints, etc.)  |      
                        +-------------------+   
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs  </t>
            <t>
To facilitate interoperability and integration with existing network management systems, the following interfaces and APIs are recommended:  </t>
            <ul spacing="normal">
              <li>
                <t>Northbound API: Provides a standardized interface for external systems to query anomaly detection results and receive alerts.This API should align with RESTCONF <xref target="RFC8040"/> for consistency with IETF standards.</t>
              </li>
              <li>
                <t>Southbound API: Allows the anomaly detection system to interact with network devices for data collection and response actions. This API may use NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> for device management.</t>
              </li>
              <li>
                <t>Model Management API: Enables the deployment, updating, and monitoring of AI models used in the analysis layer. This API should support secure communication as defined in <xref target="RFC8446"/> (TLS 1.3).</t>
              </li>
            </ul>
            <t>
These APIs should adhere to RESTful principles or other widely adopted standards to ensure ease of integration.  </t>
            <t><xref target="fig_NAD_Intf"/> illustrates the interaction between the anomaly detection system and external components via the defined interfaces:</t>
          </li>
        </ul>
        <figure anchor="fig_NAD_Intf">
          <name>Interfaces of network anomaly detection system</name>
          <artwork><![CDATA[
    +-----------------------------------------------------------+
    |                       External Systems                    |
    +-----------------------------------------------------------+
       ^                          ^ 
       |  Northbound API          | Model Management API
       |                          |   
       |                 +-------------------+
       |                 |                   |
       |                 |    Analysis       |
       |    |----------->|      Layer        |------------|
       |    |            |     (AI/ML)       |            |
       |    |            +-------------------+            |
       |    |                                             |
       |    |                                             v
   +-------------------+                       +-----------------+
   |                   |                       |                 |
   |  Data Collection  |                       |    Response     |
   |      Layer        |<------|       |-------|      Layer      |
   |                   |       |       |       |                 |
   +-------------------+       |       |       +-----------------+
                               |       |
             Southbound API    |       | Southbound API 
  (NETCONF, IPFIX,BGP-LS, etc) |       v (NETCONF, PCEP, BGP, etc)
                        +-------------------+     
                        |  Network Devices  |       
                        | (Routers, Switches|      
                        | Endpoints, etc.)  |      
                        +-------------------+   
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Protocols  </t>
            <t>
The following protocols are suggested for communication between the components of the anomaly detection system:  </t>
            <ul spacing="normal">
              <li>
                <t>NETCONF/RESTCONF: For configuring and managing network devices and retrieving operational data, as defined in <xref target="RFC6241"/> and <xref target="RFC8040"/>.</t>
              </li>
              <li>
                <t>gRPC/HTTP2: For high-performance communication between the analysis layer and other components, leveraging HTTP/2 <xref target="RFC7540"/>) for efficient data transfer.</t>
              </li>
              <li>
                <t>MQTT: For lightweight, publish-subscribe messaging between distributed components, particularly in IoT environments, as specified in <xref target="RFC7252"/> (CoAP) or MQTT 5.0 (OASIS Standard).</t>
              </li>
            </ul>
            <t>
The choice of protocol should consider factors such as latency, bandwidth, and security requirements.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
Data models for network anomaly detection should be designed to capture both the structure and semantics of network traffic data. The following models are recommended:  </t>
            <ul spacing="normal">
              <li>
                <t>YANG Data Models: For representing network configuration and state data in a structured format, as defined in <xref target="RFC7950"/> and extended by <xref target="RFC8345"/> for network topologies.</t>
              </li>
              <li>
                <t>JSON/XML Schemas: For defining the format of data exchanged between components via APIs, consistent with <xref target="RFC8259"/> (JSON) and <xref target="RFC7303"/> (XML).</t>
              </li>
              <li>
                <t>Feature Vectors: For representing the input data to AI models, which may include packet headers, flow statistics, and behavioral patterns. These vectors should align with the IPFIX Information Model <xref target="RFC7012"/> for flow data representation.</t>
              </li>
            </ul>
            <t>
These data models should be extensible to accommodate new types of network data and evolving AI techniques.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
The development of AI-based network anomaly detection systems should align with existing IETF standards and working groups, such as:  </t>
            <ul spacing="normal">
              <li>
                <t>NETMOD (Network Modeling): For leveraging YANG data models <xref target="RFC7950"/>, <xref target="RFC8345"/> and NETCONF/RESTCONF protocols <xref target="RFC8040"/>.</t>
              </li>
              <li>
                <t>MILE (Managed Incident Lightweight Exchange, concluded): For standardizing the exchange of security incident information, as outlined in <xref target="RFC8329"/>.</t>
              </li>
              <li>
                <t>DOTS (DDoS Open Threat Signaling ,concluded): For coordinating responses to distributed denial-of-service attacks, as defined in <xref target="RFC8811"/>.</t>
              </li>
              <li>
                <t>Awaiting to add more WGs, BGP-LS, PCE, etc.</t>
              </li>
            </ul>
            <t>
Collaboration with these groups ensures that the anomaly detection system integrates seamlessly with existing IETF frameworks and contributes to the broader goal of network security and management.</t>
          </li>
        </ul>
      </section>
      <section anchor="network-predictive-maintenance">
        <name>Network Predictive Maintenance</name>
        <t>More to be added.</t>
      </section>
      <section anchor="detection-of-network-misconfiguration">
        <name>Detection of Network Misconfiguration</name>
        <t>More to be added.</t>
      </section>
      <section anchor="generate-node-configuration">
        <name>Generate Node Configuration</name>
        <t>Generate node config with certain customer requirement (e.g., certain QOS, policy, ACL, tunnels, …)</t>
        <t>More to be added.</t>
      </section>
      <section anchor="cognitive-search-on-internal-operator-data">
        <name>Cognitive Search On Internal Operator Data</name>
        <t>The operation of IP and optical networks comprises a wide range of management, monitoring and optimization tasks, including equipment configuration (switches, routers, OTNs, etc.), implementation of network policies, fault detection, troubleshooting, and capacity planning. The execution of such tasks usually requires access,  comprehension and analysis of specific documentation containing information about network topologies, hardware inventory, vendor specifications, and pre-defined procedures.</t>
        <t>Given the capacity of LLMs to understand natural language, including technical jargon, and their ability to process large amounts of information in short times, they can be used to build useful tools that support the network operational work, by executing comprehensive cognitive searches through the different documentation available to the operational teams, providing fast and concrete answers to technical enquiries, and making the access to such information a more efficient and interactive process.</t>
        <t>To provision an LLM with such knowledge requires either a fine-tuning training job, that retrains an existing LLM, or the implementation of a RAG based architecture, where the information coming from the documentation is stored in a knowledge base and provided as context to the LLM. For this scenario, the RAG based approach has some specific advantages like lower computational cost, faster deployment, no need of retraining when the documentation is updated, and easier scalability.</t>
        <t>Therefore, it is often the default approach for this type of solutions. Next section provides an architectural overview of how a RAG based system can be implemented to provide cognitive  search for network operations.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
In a RAG based architecture, a knowledge base is created by using an embedding model capable of splitting and transforming the content of different documents into numerical representations (vectors), and storing them in a data base, also known as Vector Data Base. The general process executed by the system every time a query is made by a user can be summarized in the following steps:  </t>
            <ol spacing="normal" type="1"><li>
                <t>Retrieval: The query made by the user is transformed by the embedding model and used to search and retrieve relevant information from the Vector Data Base.</t>
              </li>
              <li>
                <t>Augmentation: The information retrieved from the Vector Data Base is used to augment the query made by the user, adding context that might be unknown to the LLM.</t>
              </li>
              <li>
                <t>Generation: The augmented query is sent to the LLM, which then generates and answer in natural language that is finally delivered to the user.</t>
              </li>
            </ol>
          </li>
        </ul>
        <artwork><![CDATA[
  
 |-----------|                                           |---------|   
 |           |<----------------Response------------------|         |
 |  Network  |                                           |         |
 |  Operator |                       |--------------|    |         | 
 |           |---Query-------------->|   Query +    |    |         |
 |-----------|            |          |   Context +  |--->|   LLM   |
                          |          |   Prompt     |    |         |
                          |          |--------------|    |         |
                          |                  ^           |---------|
                          |                  |            
                          v                  |            
               |---------------|        |----------|      
               |   Embedding   | -----> |  Vector  |    
               |     Model     |        |    DB    |
               |---------------|        |----------|
                           ^              
                           |
                           |
          |----------------|------------------|
          |                |                  | 
 |++++++++|++++++++++++++++|++++++++++++++++++|+++++++++++|
 |        |                |                  |           |
 |   |----------|    |----------------|    |----------|   |
 |   | Network  |    |    Method of   |    |  Vendor  |   |
 |   | Topology |    |  Procedure MOP |    |   docs   |   |    
 |   |----------|    |----------------|    |----------|   |
 |                                                        |
 |  Internal Operator documentation                       |
 |++++++++++++++++++++++++++++++++++++++++++++++++++++++++|

]]></artwork>
        <t>As previously mentioned, the documents stored in the Vector Database for this specific use case correspond to various types of Network Operation Documentation. Thus, this system serves as a powerful tool, offering quick and efficient access to complex information across different areas of the Network Operations landscape, including network infrastructure, Standard Operating Procedures, security documentation, incident reports, and more.</t>
        <t>More to be added.</t>
      </section>
      <section anchor="network-operator-assistant">
        <name>Network Operator Assistant</name>
        <t>Operator-Assistant as a virtual-expert-network-engineer.</t>
        <t>More to be added.</t>
      </section>
      <section anchor="gen-ai-based-network-operational-insights">
        <name>Gen-AI based Network Operational Insights</name>
        <t>More to be added.</t>
      </section>
      <section anchor="network-traffic-prediction">
        <name>Network Traffic Prediction</name>
        <t>Telefonica use-case: Traffic-prediction using AI</t>
        <t>More to be added.</t>
      </section>
      <section anchor="multi-layer-use-case">
        <name>Multi-layer Use-case</name>
        <t>Multi-layer aspect of above use-cases, e.g.,</t>
        <t>More to be added.</t>
      </section>
      <section anchor="multi-layer-network-planning">
        <name>Multi-layer Network Planning</name>
        <t>Several innovations have been developed at the IETF for multi-layer network (MLN) planning. This activity is involves coordinating and optimizing multiple network layers, such as IP, optical, and transport layers, to improve efficiency, resilience, and scalability. The Internet Engineering Task Force (IETF) has developed several technologies and standards to facilitate multi-layer network planning, including protocols for path computation, topology exchange, and resource optimization.</t>
        <t>The components and interfaces for MLN planning include:</t>
        <ul spacing="normal">
          <li>
            <t>Path Computation Element (PCE)</t>
          </li>
          <li>
            <t>Generalized Multi-Protocol Label Switching (GMPLS)</t>
          </li>
          <li>
            <t>Traffic Engineering Database (TED) and Topology Exchange</t>
          </li>
          <li>
            <t>Abstraction and Control of Traffic Engineered Networks (ACTN)</t>
          </li>
          <li>
            <t>YANG Models for Network Topologies and Node Inventory</t>
          </li>
        </ul>
        <t>These enabling technologies are discussed in the following sub-sections.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The Abstraction and Control of Traffic Engineered Networks (ACTN) ACTN <xref target="RFC8453"/> architecture provides a framework for virtualized network resource control and abstraction, enabling efficient multi-layer coordination between packet and optical networks. It defines key functional components like the Multi-Domain Coordinator (MDSC), which facilitates policy-based control and end-to-end service planning and provisioning.</t>
          </li>
          <li>
            <t>Interfaces and APIs  </t>
            <t>
The Path Computation Element (PCE) is a fundamental component of a Software Defined Networking (SDN) system, responsible for computing optimal traffic paths and dynamically adjusting them based on network conditions or demand. Originally designed for deriving paths for MPLS, and GMPLS, Label Switched Paths (LSPs), PCE delivers these computed routes to the LSP's head end via the Path Computation Element Communication Protocol (PCEP).  </t>
            <t>
The PCE architecture <xref target="RFC4655"/> enables efficient path computation for traffic-engineered networks by offloading complex calculations to a dedicated entity. Stateful PCE <xref target="RFC8051"/> and <xref target="RFC8231"/> extends the PCE framework by maintaining real-time network state awareness, allowing dynamic path optimization across layers. The Hierarchical PCE (H-PCE) <xref target="RFC6805"/> architecture supports multi-layer and multi-domain path computation by allowing collaboration between multiple PCEs.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
To be added.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
The YANG data modeling language is a cornerstone for MLN planning. It provides a structured way to represent network elements, configurations, and operational states, enabling programmatic control and integration across multiple network layers. Several IETF YANG models provide network topology, traffic engineering, optical transport, and service abstraction.  </t>
            <t>
A core YANG model for MLN planning is the Network Topology Model <xref target="RFC8345"/>, which provides a generic framework for representing network nodes, links, and supporting attributes. This model would facilitate an AI-enabled planning system to define multi-layer relationships, such as the mapping between optical, ethernet, and IP layers, enabling a holistic approach to MLN planning.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
To be added.</t>
          </li>
        </ul>
      </section>
      <section anchor="causality-discovery">
        <name>Causality Discovery</name>
        <t>Causality discovery: you want to know to be updated by Vincenzo.</t>
        <t>More to be added.</t>
      </section>
      <section anchor="network-clean-up">
        <name>Network Clean Up</name>
        <t>Clean-up procedure in the network</t>
        <t>More to be added.</t>
      </section>
      <section anchor="multi-agent-interworking-1">
        <name>Multi Agent Interworking</name>
        <t>As briefly introduced in chapter 5, effectively deploying multiple AI agents for network management introduces significant interworking challenges that must be addressed for successful and reliable operation. These challenges span several key areas:</t>
        <ol spacing="normal" type="1"><li>
            <t>Communication and Coordination:  Multiple agents operating in a shared network environment
  need to communicate effectively to coordinate their actions.  This includes sharing information
  about network state, learned models, and planned interventions.  A lack of standardized
  protocols and data models can lead to the need to deploy expensive and time consuming adaptation
  layers.  It is also extremely important to determine the appropriate communication frequency
  and granularity to avoid overloading the communication network between them while keeping
  a sufficient level of details to avoid suboptimal or even harmful decisions due to incomplete information.</t>
          </li>
          <li>
            <t>Conflict Resolution and Decision Fusion:  When multiple agents are responsible for overlapping
  or interdependent network functions, conflicts in their decisions are inevitable.  For example,
  one agent might decide to reroute traffic to alleviate congestion, while another agent
  simultaneously decides to scale down resources in the same area.  Effective conflict resolution
  mechanisms are needed to prioritize actions, negotiate solutions, and ensure that the overall
  impact on the network is positive.  This requires defining clear roles and responsibilities
  for each agent, establishing decision fusion strategies, and potentially incorporating a central
  arbitration mechanism, like for example in the case of coordination of multiple PCEs. Furthermore,
  handling conflicting information from different agents, potentially due to noisy or incomplete data,
  requires robust data validation and aggregation techniques.</t>
          </li>
          <li>
            <t>Consistency and Stability:  The dynamic nature of networks requires agents to continuously learn and
  adapt.  However, independent learning by multiple agents can lead to inconsistencies in their
  learned models and behaviors, potentially causing instability in the network.  For example,
  different agents might learn different optimal routing strategies, leading to oscillations
  and unpredictable network performance.  Mechanisms for sharing learned knowledge, synchronizing models,
  and ensuring convergence towards a stable and consistent global state are essential.
  This could involve techniques like federated learning or distributed consensus protocols.</t>
          </li>
          <li>
            <t>Trust and Security:  In a multi-agent environment, trust and security become critical concerns.
  Agents might be vulnerable to malicious attacks or faulty behavior, which can compromise the entire network.
  Robust authentication and authorization mechanisms are needed to ensure that only legitimate agents
  can access and control network resources. Establishing trust between agents, potentially through
  reputation systems or blockchain technologies, can also enhance the overall security and resilience of the network.</t>
          </li>
          <li>
            <t>Scalability and Management:  As the number of agents and the complexity of the network increase,
  managing the interactions between agents becomes increasingly challenging.  Scalable architectures
  and management frameworks are needed to handle the growing communication overhead, coordination complexity,
  and resource requirements. One possible option to overcome this problem could be leveraging on a
  hierarchical agent structure. As previously introduced, in order to allow for scalability, it is also
  important to foresee advertisement protocols/extensions to let the agents learn about their counterparts
  and their capabilities.  </t>
            <t>
Addressing these interworking challenges is essential for realizing the full potential of AI agents in network management. Developing standardized protocols, robust coordination mechanisms, and scalable management frameworks will pave the way for autonomous networks.</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
Multi agent architecture can be extremely complex, but figure  <xref target="_figure-multi-agent"/> tries to capture the main interwokring issues of this scenario. An example with an arbitrary number of agents (N) connecting to different components of the management and control stack (SDN controllers, observability function, assurance function, and others) is provided.</t>
          </li>
        </ul>
        <figure anchor="_figure-multi-agent">
          <name>Multi-agent architecture</name>
          <artwork><![CDATA[
 
      |------------|         (A)           |------------|
      |  Agent #1  | <-------------------->|  Agent #N  |
      |------------|                       |------------|
            |   |                           |  ^      |  
            |   +------------------+    --- +  |      +--+                    
            v                      |    |      |         |     
      |---------------|            v    V      |         V
      |   P-PNC(s),   |      |--------------|  |      |------------|
      |   O-PNC(s),   |      | Observability|  |  ... | Assurance  |
      |   MDSC        |      |              |  |      |            |
      |---------------|      |--------------|  |      |------------|
              ^                                |
              |                                v
    +---------|------------------------------------------------+
    |                                                          |
    |                      IP/Optical Network                  |          
    |                                                          |
    +----------------------------------------------------------+

  Legend:
  (A) Inter Agent communication for coordination

]]></artwork>
        </figure>
        <t>Alternatively, a hierarchical solution can be foreseen, with an agent (H-Agent) specifically designed for coordinating agents, or an agent designated to play the role of H-Agent in addition to its duties, as shown in <xref target="_figure-h-agent"/>:</t>
        <figure anchor="_figure-h-agent">
          <name>Multi-agent hierarchical architecture</name>
          <artwork><![CDATA[
                        |------------|
                        |  H-Agent   | 
                        |------------| 
                  (A)      |     |    (A)
            +--------------+     +----------------+               
            |                                     |
            V                                     V
      |------------|                       |------------|
      |  Agent #1  |                       |  Agent #N  |
      |------------|                       |------------|
            |   |                           |  ^      |  
            |   +------------------+    --- +  |      +--+                    
            v                      |    |      |         |     
      |---------------|            v    V      |         V
      |   P-PNC(s),   |      |--------------|  |      |------------|
      |   O-PNC(s),   |      | Observability|  |  ... | Assurance  |
      |   MDSC        |      |              |  |      |            |
      |---------------|      |--------------|  |      |------------|
              ^                                |
              |                                v
    +---------|------------------------------------------------+
    |                                                          |
    |                      IP/Optical Network                  |          
    |                                                          |
    +----------------------------------------------------------+

  Legend:
  (A) H-Agent to Agent communication 

]]></artwork>
        </figure>
        <t>More to be added.</t>
      </section>
      <section anchor="network-traffic-management">
        <name>Network Traffic Management</name>
        <t>Flow placement, traffic engineering/steering along with network resource defragmentation are among important aspects of network operations that can benefit from artificial intelligence.</t>
        <t>Network routing protocols automate flow placement for best-effort traffic.  Traffic engineering and steering are commonly based on statistical analysis and historical trends of network traffic. They are mostly implemented via configurations and tunnel setups, often employing scripts for automation purposes.</t>
        <t>While there are some proactive approach to network resource defragmentation, reactive methods are still quite common.  There are short-term approaches and longer-term views on employing AI to address traffic management.</t>
        <section anchor="short-term-approaches">
          <name>Short term approaches</name>
          <t>In the short-term, AI models train on operator's network traffic patterns and employ a set of APIs to connect to network configuration equipment in order to add, remove, and modify configurations and perform different traffic management related tasks. Model training can be either off-line or on-line.</t>
          <t>Initially, AI models perform their inference tasks exclusively based on their training on historical network traffic patterns, and topology changes in a centralized manner.  In more advanced approaches, the models not only train on network traffic patterns, and network topology changes, but also  learn how to interpret and digest external events. This added capability allows the AI models to be more effective in performing their traffic management tasks.</t>
          <t>Generally speaking, IETF/IRTF can work on describing and providing synthetic networks along with synthetic traffic that can be used to train AI models. Furthermore, IETF/IRTF can also define and provide expected reasonable traffic flows.</t>
          <ul spacing="normal">
            <li>
              <t>Offline training  </t>
              <t>
During off-line training, external events, network monitoring information (available via protocols such as SNMP), historical data from traffic engineering  databases, network topology changes, and other traffic-related data from the operator's network are collected over time. This data is then used later  during the training and model performance evaluation process.  </t>
              <t>
There is potential to define a set of APIs to collect information or enable a query mechanism to pull the required training data, particularly for external events.  </t>
              <t>
Selecting the important features from the entire dataset is another crucial aspect of training.  </t>
              <t>
IETF/IRTF can certainly play a role in both of the above-mentioned cases.</t>
            </li>
          </ul>
          <figure anchor="_figure-off-line">
            <name>AI assisted traffic management: Offline training</name>
            <artwork><![CDATA[
   +---------+     External Events                 
   | Outside |----------------------------|   (A)+(B)
   |  world  |                            |
   +---------+                            |
                                          |
                                          V 
   +-----------+              +--------------------------+
   |  Network  |..............|    Dataset Repository    |
   +-----------+              |    ------------------    |
                              | Network monitoring data  |
                              |           +              |
                              | Topology changes         |
                              |           +              |
                              | Historical data from     |
                              | TE-DB, etc.              |
                              +--------------------------+
                                           |
                                           | (B)
                                           |
                                           V
                                 +------------------+   
                                 |  AI model        |
                                 |  under training  |
                                 +------------------+          

  Legend:
  --- Potential IETF defined and standardized interface.
  (A) Extracting and storing outside world events data.
  (B) Important features for training model for traffic management

]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>Online training  </t>
              <t>
Online training takes a more real-time approach. Here model training is based on processing data incrementally as it becomes available. This method is particularly suitable for scenarios such as network traffic management which require real-time learning and adaptation to changes.  </t>
              <t>
A traffic management AI model under online training uses the same input sources as it does in offline training. However, unlike offline training, the data here is not stored in a repository but streamed into the training process. As such, the ground truth for model performance evaluation in online training is derived from observation of actual real time world events and network behavior, rather than stored data.  </t>
              <t>
The training process therefore requires a mechanism to extract important features from the stream of incoming real-time network data and outside world events. These extracted features are then fed to the training process for adjusting model's parameters in a dynamic manner.  </t>
              <t>
IETF/IRTF can work to standardize the mechanisms to identify important feature and implement the above mentioned required real-time data delivery and feature extraction.</t>
            </li>
          </ul>
          <figure anchor="_figure-online-line">
            <name>AI assisted traffic management: On-line training</name>
            <artwork><![CDATA[
  +---------+     External Events          
  | Outside |-------------------------------------| (A)+(B)
  |  world  |                                     |
  +---------+                                     |
                                                  |
                                                  V
                                            +------------+   
  +-----------+          (A) + (B)          |  AI model  |
  |  Network  |---------------------------->|   under    |
  +-----------+                             |  training  |
                                            +------------+
                real-time stream of                                          
                Network monitoring info             
                         +           
                Topology changes    
                         +            
                Historical data    
                from TE-DB, etc.   
                                      

  Legend:
  --- Potential IETF defined and standardized interface.
  (A) Extracting and storing outside world events data.
  (B) Important features for training model for traffic management

]]></artwork>
          </figure>
        </section>
        <section anchor="inference">
          <name>Inference</name>
          <t>Inference phase for traffic management requires an interface to translate AI model's output to a set of network operation tasks and configuration commands. With this information readily available, existing protocols such as NETCONF can be employed to manage the network.</t>
          <figure anchor="_figure-Inference">
            <name>AI assisted traffic management: Inference</name>
            <artwork><![CDATA[
+---------+        External Events            
| Outside |-------------------------------------| (A)+(B)
|  world  |                                     |
+---------+                                     |
                                                |
                                                V
                                          +------------+   
+-----------+          (A) + (B)          |  AI model  |
|  Network  |---------------------------->|     in     |
+-----------+                             |  operation |
      ^                                   +------------+
      .         real-time stream of             |                             
      .         Network monitoring info         | (C)
      .                  +                      V
      .         Topology changes          +------------+
      .                  +                | AI output  |
      .         Data from TE-DB, etc.     | to network |
      .                                   | config     |
      .                                   | translator |
      .                                   +------------+
      .                                         .
      . .........................................
                   Configuration commands 


  Legend:
  --- Potential IETF defined and standardized interface.
  (A) Extracting and storing outside world events data.
  (B) Important features for training model for traffic management
  (C) Standardized output of the AI model delivered for translation

]]></artwork>
          </figure>
        </section>
        <section anchor="longer-term-view">
          <name>Longer term view</name>
          <t>Over time, the full integration of AI models and network elements will transform networks from their current state into agent-based or Agentic networks. In a distributed version of Agentic networks, each node is accompanied by an AI agents. Once trained, these agents work together to address flow placement, traffic steering/engineering, and other network related tasks such as traffic management, network resource defragmentation, and even routing.</t>
          <t>While being different from networks managed by a set of interworking multi agents , the Agentic networks face some of the same challenges outlined in the multi agent interworking section of the document. However, in Agentic networks, distributed training of the agents and proper knowledge sharing between them can enhance their collective training performance and can potentially alleviate some of these difficulties.</t>
          <t>In these networks, AI agents trained on local traffic patterns and external events will exchange knowledge and network state information through a set of protocols in a distributed manner in order to address network related tasks. Agentic networks will potentially offer highly automated, streamlined, and tunnel-less traffic management that is currently available only for best-effort traffic.</t>
          <t>In addition to the potential standardization opportunities outlined in the previous section, IETF/IRTF can alo play a role in defining and standardizing the followings:</t>
          <ul spacing="normal">
            <li>
              <t>Training  </t>
              <ul spacing="normal">
                <li>
                  <t>Mechanisms for distributed training and knowledge sharing</t>
                </li>
                <li>
                  <t>Mechanisms for feeding traffic and overall network state information to agents for training purposes.</t>
                </li>
                <li>
                  <t>Mechanisms for feeding external events information to agents during training.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Inference  </t>
              <ul spacing="normal">
                <li>
                  <t>Mechanisms for distributing agents' decisions and inference results.</t>
                </li>
                <li>
                  <t>Mechanisms for feeding traffic and overall network state information to agents during inference phase.</t>
                </li>
                <li>
                  <t>Mechanisms for feeding external events information to agents during inference phase.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>There is also potentially a need to define mechanisms to identify flow requirements to the agents during network operations.</t>
            </li>
          </ul>
          <t>The following figure depicts an example of an Agentic network.</t>
          <figure anchor="_figure-Agentic-networks">
            <name>Distributed agentic networks</name>
            <artwork><![CDATA[
+---------+                  (C) + (D)                +---------+
| Outside |-------------------------------------------| Network |
| world   |    |                  |             |     |         |
+---------+    |                  |             |     +---------+
               |                  |             |
               |                  |             |--------|
               |                  |                      |
               V                  V                      V
        +------------+      +------------+          +------------+
    |-->|  AI Agent  |  |-->|  AI Agent  |      |-->|  AI Agent  |
    |   |------------|  |   +------------+ ...  |   +------------+
    |   |            |  |   |            |      |   |            |
    |   |   Node-1   |  |   |   Node-2   |      |   |   Node-n   | 
    |   +------------+  |   +------------+      |   +------------+
    |                   |                       |
    |                   |                       |
    |-------------------------------------------|
                       (A) + (B)

 Legend: 
  --- Potential IETF defined and standardized interfaces
  (A) APIs/Interfaces/Protocols for distributing training
      and knowledge sharing.
  (B) APIs/Interfaces/Protocols for distributing agents'
      decisions and inference results.  
  (C) APIs/Interfaces/Protocols for feeding regionally
      observed traffic and network state info. to agents
      for training and inference.
  (D) APIs/Interfaces/Protocols for feeding regionally
      observed external events info. to agents for
      training and inference.

]]></artwork>
          </figure>
          <t>More to be added.</t>
        </section>
      </section>
      <section anchor="ai_drive_resilience_testing">
        <name>AI-Driven Resilience Testing</name>
        <t>This use case leverages AI to design and execute fault injection
   scenarios that test the resilience of IP/optical networks under
   simulated failure conditions. By proactively introducing controlled
   disruptions-such as packet drops, latency spikes, or optical signal
   degradation-AI assesses the network's ability to detect, respond, 
   and recover from faults. This approach enhances network robustness 
   by identifying weaknesses and validating automated recovery 
   mechanisms before real failures occur, addressing both single-layer
   (IP or optical) and multi-layer (IP over optical) scenarios.</t>
        <t>The AI system analyzes historical failure data (e.g., fiber cuts,
   equipment outages), real-time telemetry (e.g., latency, BER), and
   external factors (e.g., weather events, traffic surges) to model
   probable failure points. It then injects faults, monitors the
   network's response, and refines recovery strategies, potentially in a
   closed-loop manner. For example, an AI model might predict a high-risk
   optical link based on trending attenuation, simulate a fiber cut, and
   evaluate whether IP-layer rerouting maintains SLAs. If recovery is
   suboptimal, it suggests adjustments (e.g., updating TE policies) and
   retests.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture integrates an AI Fault Injection Engine with network
 controllers and elements to simulate faults and assess resilience
 across IP and optical layers. <xref target="architecture_for_ai_derive_resilience"/>
 illustrates this design, showing the AI Fault Injection Engine
 interfacing with P-PNC, O-PNC network controllers, which manage the
 IP/optical network. The engine designs fault scenarios, injects them
 via controller APIs, collects telemetry feedback, and triggers
 recovery actions as needed. This centralized approach leverages
 existing IETF control-plane components, ensuring compatibility with
 multi-layer coordination frameworks like ACTN.</t>
          </li>
        </ul>
        <figure anchor="architecture_for_ai_derive_resilience">
          <name>Architecture for AI-Driven Resilience Testing</name>
          <artwork><![CDATA[
                 |----------------------------|
                 |      AI Fault              |
                 |      Injection Engine      |
                 |----------------------------|
                 |      Fault Scenario        |
                 |      Design & Analysis     |
                 |----------------------------|
                       ^                |
                   (B) |                | (C)
                       |                v
           |-----------------------------------------|
           |  packet controller (P-PNC),             |
           |  optical controller (O-PNC),            |
           |  and/or higher layer controllers (MDSC) |
           |-----------------------------------------|
                               ^
                          (A)  |
                               v
                 |-----------------------------|
                 |                             |
                 |       IP/Optical Network    |
                 |                             |
                 |-----------------------------|

Legend:
  (A) Fault injection commands (e.g., disable link, drop packets,
      degrade signal)
  (B) Telemetry feedback (e.g., latency, packet loss, BER)
  (C) Recovery actions (e.g., reroute traffic, adjust optical 
      parameters)

]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs  </t>
            <t>
The AI Fault Injection Engine interfaces with network controllers
 using standard management and telemetry APIs. NETCONF (RFC 6241) or
 RESTCONF (RFC 8040) enables fault injection by sending commands to
 disable interfaces, drop packets, or adjust optical parameters (e.g.,
 signal power). Real-time telemetry is collected via gNMI (gRPC Network
 Management Interface) or OpenConfig streams, providing metrics like
 latency, packet loss, and Bit Error Rate (BER). External data sources
 (e.g., weather APIs, threat intelligence feeds) may integrate via REST
 APIs to enrich fault scenario design.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
Several IETF protocols support this use case. PCEP (RFC 5440)
 extensions could enable dynamic path recomputation during fault
 scenarios, testing traffic engineering resilience. BGP (RFC 4271) or
 OSPF (RFC 2328) adjustments validate routing protocol stability under
 simulated failures. For optical layers, OTN (G.709) or ASON (G.8080)
 signaling protocols facilitate fault injection (e.g., simulating fiber
 cuts). Telemetry protocols like IPFIX (RFC 7011) or SNMP (RFC 3411)
 provide feedback data, though streaming alternatives (e.g., gNMI) are
 preferred for real-time needs.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
YANG models are central to representing fault injection and resilience
 data. The base Network Topology Model (RFC 8345) can be extended with
 new YANG modules to define fault parameters (e.g., failure type,
 duration, scope) and resilience metrics (e.g., recovery time, SLA
 compliance). OpenConfig YANG models for interfaces (e.g.,
 openconfig-interfaces) and optical transport (e.g.,
 openconfig-terminal-device) support fault execution and telemetry
 collection. A new YANG model may be needed to standardize fault
 injection workflows and outcomes.</t>
          </li>
          <li>
            <t>Processes and Procedures  </t>
            <t>
The process begins with AI training on historical failure data,
 synthetic scenarios, and real-time network state, using ML techniques
 like supervised learning for fault prediction and reinforcement
 learning for recovery optimization. Fault injection tests are
 scheduled (e.g., off-peak) or triggered on-demand, with operator
 oversight via an AIOps-Assistant interface (similar to 6.8). Post-test
 analysis generates reports on resilience gaps, updates network
 policies (e.g., QoS, routing), and refines the AI model's training
 dataset. Closed-loop automation may execute recovery actions
 autonomously, validated by subsequent tests.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
This use case aligns with ongoing IETF efforts in multiple working
 groups. The Network Management Research Group (NMRG) explores AI
 applications in networking, providing a foundation for fault injection
 methodologies. The Traffic Engineering Architecture and Signaling
 (TEAS) working group's work on resilience and path computation (e.g.,
 RFC 8453 for ACTN) supports multi-layer testing. Extensions to YANG
 (NETMOD), PCEP (PCE), and telemetry protocols (OPSAWG) could
 standardize fault injection and resilience assessment, fostering
 interoperability across vendor implementations.</t>
          </li>
        </ul>
      </section>
      <section anchor="energy_efficiency_optimization">
        <name>Energy Efficiency Optimization</name>
        <t>This use case employs AI to optimize energy consumption across IP/optical
   networks by dynamically adjusting network resources based on traffic
   demand, equipment performance, and environmental conditions. With
   routers, switches, and optical amplifiers contributing significantly to
   power usage, AI-driven energy management reduces operational costs and
   carbon footprints while maintaining performance and reliability. It
   addresses both single-layer (IP or optical) and multi-layer (IP over
   optical) scenarios.</t>
        <t>The AI system analyzes real-time telemetry (e.g., power usage, link
   utilization), historical patterns (e.g., peak/off-peak traffic), and
   external factors (e.g., electricity costs, cooling needs) to identify
   energy-saving opportunities. Actions include powering down idle ports,
   rerouting traffic to consolidate active paths, tuning optical signal
   parameters, or scheduling high-energy tasks during low-cost periods. For
   instance, during off-peak hours, the AI might deactivate redundant IP
   interfaces or reduce optical amplifier gain, ensuring SLAs are met with
   minimal power draw.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture for energy efficiency optimization mirrors the
 centralized design used for AI-Driven Resilience Testing (see <xref target="ai_drive_resilience_testing"/>). Figure 12 illustrates this, with the AI Energy Optimization
 Engine replacing the AI Fault Injection Engine, interfacing with P-PNC and O-PNC to manage the IP/optical network. The engine
 collects telemetry and external data, computes energy-efficient
 configurations, and applies them via controller APIs. In this context,
 (A) represents energy optimization commands (e.g., power down ports,
 adjust signal gain), (B) denotes telemetry feedback (e.g., power usage,
 traffic load), and (C) indicates configuration updates (e.g., reroute
 traffic, schedule operations).</t>
          </li>
          <li>
            <t>Interfaces and APIs  </t>
            <t>
The interfaces and APIs are largely identical to those in <xref target="ai_drive_resilience_testing"/>,
 adapted for energy optimization. NETCONF (RFC 6241) or RESTCONF (RFC
 8040) delivers commands to adjust power states or reroute traffic, while
 gNMI or OpenConfig streams provide real-time telemetry (e.g., power
 consumption, utilization). External inputs, such as electricity pricing
 or weather data, integrate via REST APIs to inform optimization,
 consistent with the approach in <xref target="ai_drive_resilience_testing"/>.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
The protocols align closely with those in <xref target="ai_drive_resilience_testing"/>, tailored for
 energy goals. PCEP (RFC 5440) supports traffic rerouting to consolidate
 paths, reducing energy use. BGP (RFC 4271) or OSPF (RFC 2328) adjustments
 optimize routing efficiency. For optical layers, OTN (G.709) signaling
 tunes power settings (e.g., lowering laser output). Telemetry protocols
 like IPFIX (RFC 7011) or SNMP (RFC 3411) provide feedback, with streaming
 alternatives (e.g., gNMI) preferred for real-time needs, as noted in
 <xref target="energy_efficiency_optimization"/>.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
YANG models for energy optimization build on those in <xref target="ai_drive_resilience_testing"/>. The
 Network Topology Model (RFC 8345) can be augmented to define
 energy-specific parameters (e.g., power states, utilization thresholds)
 and metrics (e.g., watts consumed, energy cost), extending the
 fault-related models from <xref target="energy_efficiency_optimization"/>. OpenConfig models for interfaces and
 optical transport support power adjustments and telemetry, with a
 potential new YANG model to standardize energy efficiency policies.</t>
          </li>
          <li>
            <t>Processes and Procedures  </t>
            <t>
The process begins with AI training on historical energy usage, traffic
 patterns, and cost data, using reinforcement learning for policy
 optimization and time-series analysis for demand forecasting.
 Optimization runs continuously or on a schedule, with operator oversight
 via an AIOps-Assistant (similar to 6.8). Post-optimization, the AI
 evaluates energy savings against performance impacts, updating policies
 and retraining as needed. Closed-loop automation applies adjustments,
 validated by telemetry, following the workflow principles in <xref target="ai_drive_resilience_testing"/>.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
This use case aligns with IETF efforts in sustainability and network
 management, paralleling <xref target="ai_drive_resilience_testing"/> standardization ties. The Operations and
 Management Area Working Group (OPSAWG) supports telemetry and efficiency
 metrics, while the Traffic Engineering Architecture and Signaling (TEAS)
 working group's path optimization work (e.g., RFC 8453 for ACTN) enables
 energy-efficient rerouting. Extensions to YANG (NETMOD), PCEP (PCE), and
 telemetry standards (OPSAWG) could standardize energy optimization,
 leveraging the same frameworks proposed in <xref target="ai_drive_resilience_testing"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="ai-driven-green-energy-optimization">
        <name>AI-Driven Green Energy Optimization</name>
        <t>This use case leverages AI to optimize network and compute operations by
   prioritizing resources powered by green energy sources (e.g., solar,
   wind) over conventional ones, while ensuring performance requirements
   (e.g., latency, throughput) are met. As networks increasingly rely on
   distributed compute elements like Virtual Network Functions (VNFs) or
   edge servers, selecting energy sources for these workloads impacts both
   sustainability and cost. This applies to single-layer (e.g., IP compute
   nodes) and multi-layer (e.g., IP over optical with compute) scenarios.</t>
        <t>The AI system analyzes real-time telemetry (e.g., latency, traffic load),
   energy source data (e.g., green vs. conventional availability), and
   external factors (e.g., renewable energy forecasts) to decide where and
   how to execute compute tasks. For example, in a mobile core network, a
   media optimizer VNF processing mobility traffic could be instantiated on
   a green-energy-powered server in a specific NFVi Point of Delivery (PoD)
   or datacenter instead of a conventionally powered one, provided latency
   SLAs are not violated. If green resources are unavailable or
   insufficient, the AI shifts workloads or adjusts traffic paths
   dynamically, balancing sustainability with service quality.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture integrates an AI Green Energy Optimization Engine with
 both compute orchestration and network control layers to manage workload
 placement and traffic across IP/optical networks and NFVi PoDs or
 datacenters. <xref target="architecture_for_ai_derive_green"/> illustrates this design,
 showing the AI engine interfacing with an NFV Orchestrator (NFVO) to shift
 compute jobs (e.g., VNFs) between PoDs/datacenters based on green energy
 availability, and optionally with P-PNC and O-PNC for traffic adjustments.
 The engine collects telemetry and energy data, computes optimal configurations,
 and applies them via orchestration and controller APIs.</t>
          </li>
        </ul>
        <figure anchor="architecture_for_ai_derive_green">
          <name>Architecture for AI-Driven Green Energy Optimization</name>
          <artwork><![CDATA[
                 |----------------------------|
                 |   AI-based Green Energy    |
                 |   Optimization Engine      |
                 |----------------------------|
                       ^                |
                   (B) |                | (C)
                       |                v
           |-----------------------------------------|
           |  packet controller (P-PNC),             |
           |  optical controller (O-PNC),            |
           |  and/or higher layer controllers (MDSC) |
           |                    &                    |
           |                   NFVO                  |
           |-----------------------------------------|
                               ^
                          (A)  |
                               v
                 |-----------------------------|
                 |                             |
                 |   NFVi PoDs / Datacenters   |
                 |              &              | 
                 |   IP/Optical Network        |
                 |                             |
                 |-----------------------------|

 Legend:
   (A) Optimization commands (e.g., instantiate VNF on green PoD, 
       reroute traffic)
   (B) Telemetry feedback (e.g., latency, energy source, compute load)
   (C) Configuration updates (e.g., shift VNFs, adjust network paths)
   NFVO: Network Function Virtualization Orchestrator

]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs  </t>
            <t>
Interfaces extend those in <xref target="ai_drive_resilience_testing"/> and <xref target="energy_efficiency_optimization"/>,
 with a focus on compute orchestration. The NFVO uses ETSI NFV MANO APIs (e.g., Os-Ma-nfvo
 reference point) to instantiate or migrate VNFs across NFVi PoDs/
 datacenters based on green energy availability. NETCONF (RFC 6241) or
 RESTCONF (RFC 8040) manages traffic adjustments via P-PNC/O-PNC when
 needed, while gNMI or OpenConfig streams provide telemetry (e.g.,
 latency, server energy type). REST APIs integrate external data like
 green energy availability or weather forecasts, consistent with <xref target="ai_drive_resilience_testing"/>.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
Protocols align with <xref target="ai_drive_resilience_testing"/> and <xref target="energy_efficiency_optimization"/>,
 with additions for compute management. PCEP (RFC 5440) enables traffic rerouting to align with
 green-energy-powered nodes, while BGP (RFC 4271) or OSPF (RFC 2328)
 adjusts routing paths. OTN (G.709) signaling supports optical
 adjustments if involved. For compute, ETSI NFV protocols (e.g.,
 VE-Vnfm-vnf for VNF management) complement network protocols. Telemetry
 uses IPFIX (RFC 7011) or SNMP (RFC 3411), with streaming options (e.g.,
 gNMI) preferred, as in <xref target="ai_drive_resilience_testing"/>.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
YANG models build on <xref target="ai_drive_resilience_testing"/> and <xref target="energy_efficiency_optimization"/>,
 with compute-specific extensions. The Network Topology Model (RFC 8345) can be augmented to
 include NFVi PoD/datacenter attributes (e.g., energy source, compute
 capacity) and metrics (e.g., carbon footprint, latency). OpenConfig
 models for interfaces and ETSI NFV YANG models (e.g., for VNF
 descriptors) support configuration and telemetry. A new YANG model may
 standardize green energy optimization across network and compute domains.</t>
          </li>
          <li>
            <t>Processes and Procedures  </t>
            <t>
The process starts with AI training on historical traffic, latency, and
 energy source data, using reinforcement learning to optimize green
 energy use and predictive models for renewable availability.
 Optimization runs continuously, shifting VNFs to green PoDs/datacenters
 or adjusting traffic when viable, with operator oversight via an AIOps-
 Assistant (similar to 6.8). Post-optimization, the AI assesses
 sustainability gains against performance, updating policies and
 retraining. Closed-loop automation adjusts configurations, validated by
 telemetry, following <xref target="energy_efficiency_optimization"/> workflow.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
This use case aligns with IETF sustainability and compute-network
 integration efforts. The Operations and Management Area Working Group
 (OPSAWG) supports telemetry for energy metrics, while the Computing in
 the Network Research Group (COINRG) and Network Function Virtualization
 Research Group (NFVRG) address compute placement, applicable to VNFs.
 The Traffic Engineering Architecture and Signaling (TEAS) working
 groups efforts (e.g., RFC 8453 for ACTN) enable green-energy-aware
 routing. Extensions to YANG (NETMOD), PCEP (PCE), and telemetry
 standards (OPSAWG) could standardize this, leveraging <xref target="ai_drive_resilience_testing"/>
 and <xref target="energy_efficiency_optimization"/> frameworks.</t>
          </li>
        </ul>
      </section>
      <section anchor="ai-driven-policy-enforcement-and-compliance-auditing">
        <name>AI-Driven Policy Enforcement and Compliance Auditing</name>
        <t>This use case leverages AI to automate the enforcement of network
   policies and auditing of compliance with regulatory standards and
   internal guidelines. By continuously monitoring network configurations,
   traffic, and security postures, AI ensures that policies are
   consistently applied and compliance requirements are met. This use case
   addresses both single-layer (e.g., IP) and multi-layer (e.g., IP over
   optical) scenarios, as well as cross-domain environments.</t>
        <t>The AI system analyzes real-time telemetry (e.g., configuration
   changes, traffic flows, security logs), historical data, and external
   inputs (e.g., regulatory updates, threat intelligence) to enforce
   policies and audit compliance. For example, AI can detect unauthorized
   changes to firewall rules, enforce encryption standards for sensitive
   data, or ensure that network configurations align with GDPR
   requirements. If violations are detected, AI can automatically
   remediate issues or alert operators for manual intervention.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture integrates an AI Policy Enforcement and Compliance
 Engine with network controllers, security systems, and orchestration
 platforms. <xref target="architecture_for_ai_derive_policy_enforcement"/> illustrates
 this design, showing the AI engine interfacing with P-PNC, O-PNC and Security
 Information and Event Management (SIEM) systems. The engine collects telemetry,
 enforces policies, and audits compliance, applying corrective actions
 via controller APIs.</t>
          </li>
        </ul>
        <figure anchor="architecture_for_ai_derive_policy_enforcement">
          <name>Architecture for AI-Driven Policy Enforcement and Compliance Auditing</name>
          <artwork><![CDATA[
             |-----------------------------------|
             |   AI-based Policy Enforcement &   |
             |   Compliance Engine               |
             |-----------------------------------|
                       ^                |
                   (B) |                | (C)
                       |                v
           |-----------------------------------------|
           |  packet controller (P-PNC),             |
           |  optical controller (O-PNC),            |
           |  and/or higher layer controllers (MDSC) |
           |-----------------------------------------|
                               ^
                          (A)  |
                               v
                 |-----------------------------|
                 |                             |
                 |       IP/Optical Network    |
                 |                             |
                 |-----------------------------|

 Legend:
  (A) Policy enforcement commands (e.g., block traffic, adjust QoS)
  (B) Telemetry feedback (e.g., configuration changes, security logs)
  (C) Compliance reports and alerts

]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs  </t>
            <t>
The AI engine interfaces with network controllers and security systems
 using standard management and telemetry APIs. NETCONF (RFC 6241) or
 RESTCONF (RFC 8040) delivers policy enforcement commands, while gNMI or
 OpenConfig streams provide real-time telemetry (e.g., configuration
 changes, traffic flows). SIEM systems integrate via REST APIs to
 provide security logs and threat intelligence.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
The protocols align with existing IETF standards. PCEP (RFC 5440)
 supports traffic engineering adjustments to enforce QoS policies, while
 BGP (RFC 4271) or OSPF (RFC 2328) ensures routing compliance. For
 security, protocols like IPsec (RFC 4301) and TLS (RFC 8446) enforce
 encryption standards. Telemetry protocols like IPFIX (RFC 7011) or SNMP
 (RFC 3411) provide feedback, with streaming alternatives (e.g., gNMI)
 preferred for real-time needs.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
YANG models are central to representing policies and compliance data.
 The Network Topology Model (RFC 8345) can be extended to define policy
 parameters (e.g., access control, encryption) and compliance metrics
 (e.g., audit logs, violation counts). OpenConfig YANG models for
 interfaces and security support configuration and telemetry. A new YANG
 model may standardize policy enforcement and compliance workflows.</t>
          </li>
          <li>
            <t>Processes and Procedures  </t>
            <t>
The process begins with AI training on historical configuration data,
 security logs, and regulatory requirements. Policy enforcement runs
 continuously, with operator oversight via an AIOps-Assistant (similar
 to 6.8). Post-audit, the AI generates compliance reports, updates
 policies, and retrains as needed. Closed-loop automation applies
 corrective actions, validated by telemetry.</t>
          </li>
          <li>
            <t>Alignment with IETF  </t>
            <t>
This use case aligns with IETF efforts in network management, security,
 and policy enforcement. The Operations and Management Area Working
 Group (OPSAWG) supports telemetry for compliance metrics, while the
 Security Area Working Group (SEC) addresses policy enforcement.
 Extensions to YANG (NETMOD), PCEP (PCE), and telemetry standards
 (OPSAWG) could standardize this use case, leveraging frameworks
 proposed in <xref target="ai_drive_resilience_testing"/> and
 <xref target="energy_efficiency_optimization"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="ai-driven-network-slicing-optimization">
        <name>AI-Driven Network Slicing Optimization</name>
        <t>This use case leverages AI to optimize the creation, management, and
   performance of network slices in 5G and beyond. By dynamically
   allocating resources, predicting SLA violations, and coordinating
   across multiple domains, AI ensures that each slice meets its
   performance requirements while efficiently utilizing the underlying
   physical infrastructure. This use case addresses both single-domain
   (e.g., RAN) and multi-domain (e.g., RAN, transport, core) scenarios.</t>
        <t>The AI system analyzes real-time telemetry (e.g., traffic patterns,
   resource utilization), historical data, and external inputs (e.g.,
   service requirements, network topology) to optimize network slices.
   For example, AI can allocate additional bandwidth to a slice
   experiencing high traffic or reroute traffic to prevent congestion.
   If SLA violations are predicted, AI can take proactive measures
   (e.g., scaling resources, adjusting configurations) to ensure
   compliance.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture  </t>
            <t>
The architecture integrates an AI Network Slicing Optimization Engine
 with the NSMF (Network Slice Management Function) and NSSMFs (Network
 Slice Subnet Management Functions) for RAN, Core, and Transport
 domains. <xref target="architecture_for_ai_derive_5g_ns"/> illustrates this
 design, showing the AI engine interfacing with the NSMF, which
 coordinates with the NSSMFs to manage and optimize network slices.
 The engine collects telemetry, predicts SLA violations, and provides
 optimization recommendations to the NSMF, which implements changes via
 the NSSMFs.</t>
          </li>
        </ul>
        <figure anchor="architecture_for_ai_derive_5g_ns">
          <name>Corrected Architecture for AI-Driven Network Slicing Optimization</name>
          <artwork><![CDATA[
                 |------------------------------|
                 |                              | 
                 |   AI-based Network Slicing   |
                 |   Optimization Engine        |
                 |                              |
                 |------------------------------|
                       ^                |
                   (B) |                | (C)
                       |                v
             |---------------------------------------|
             |     RAN, Core, and Transport NSSMF    |
             |---------------------------------------|
                               ^
                          (A)  |
                               v
             |---------------------------------------|
             |                                       |
             |    Physical Network Infrastructure    |
             |    (RAN, Core, Transport)             |
             |                                       |
             |---------------------------------------|

Legend:
   (A) Optimization commands (e.g., adjust slice resources, 
       reroute traffic)
   (B) Telemetry feedback (e.g., slice performance, 
       resource utilization)
   (C) SLA compliance reports and alerts
   NSSMF: Network Slice Subnet Management Function 
   (RAN, Core, Transport)

]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs  </t>
            <t>
The AI engine interfaces with the NSMF using standard management and
 telemetry APIs. The NSMF communicates with the NSSMFs using 3GPP-
 defined interfaces (e.g., Nsmf_PDUSession_Create,
 Nsmf_EventExposure_Subscribe). The AI engine collects telemetry via
 gNMI or OpenConfig streams and provides optimization recommendations
 to the NSMF via REST APIs.</t>
          </li>
          <li>
            <t>Protocols  </t>
            <t>
The protocols align with 3GPP and IETF standards. The NSMF and NSSMFs
 use 3GPP-defined protocols (e.g., HTTP/2 for service-based
 interfaces). For transport, protocols like PCEP (RFC 5440) and BGP
 (RFC 4271) support traffic engineering adjustments. Telemetry
 protocols like IPFIX (RFC 7011) or SNMP (RFC 3411) provide feedback,
 with streaming alternatives (e.g., gNMI) preferred for real-time
 needs.</t>
          </li>
          <li>
            <t>Data Models  </t>
            <t>
YANG models are central to representing slice configurations and
 performance data. The Network Topology Model (RFC 8345) can be
 extended to define slice parameters (e.g., latency, bandwidth) and
 metrics (e.g., resource utilization, SLA compliance). 3GPP YANG
 models for RAN, Core, and Transport support configuration and
 telemetry. A new YANG model may standardize network slicing
 optimization workflows.</t>
          </li>
          <li>
            <t>Processes and Procedures  </t>
            <t>
The process begins with AI training on historical traffic data, slice
 configurations, and SLA requirements. Optimization runs continuously,
 with operator oversight via an AIOps-Assistant (similar to 6.8).
 Post-optimization, the AI evaluates slice performance, updates
 configurations, and retrains as needed. Closed-loop automation
 applies corrective actions, validated by telemetry.</t>
          </li>
          <li>
            <t>Alignment with IETF and 3GPP  </t>
            <t>
This use case aligns with 3GPP efforts in network slicing and IETF
 efforts in network management and traffic engineering. The Operations
 and Management Area Working Group (OPSAWG) supports telemetry for
 slice performance metrics, while the Traffic Engineering Architecture
 and Signaling (TEAS) working group's work on path optimization (e.g.,
 RFC 8453 for ACTN) enables slice-aware routing. Extensions to YANG
 (NETMOD), PCEP (PCE), and telemetry standards (OPSAWG) could
 standardize this use case, leveraging frameworks proposed in
 <xref target="ai_drive_resilience_testing"/> and
 <xref target="energy_efficiency_optimization"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="other-use-cases">
        <name>Other Use Cases</name>
        <t>To be discussed and agreed.</t>
        <ul spacing="normal">
          <li>
            <t>Architecture</t>
          </li>
        </ul>
        <t>To be added.</t>
        <ul spacing="normal">
          <li>
            <t>Interfaces and APIs</t>
          </li>
        </ul>
        <t>To be added.</t>
        <ul spacing="normal">
          <li>
            <t>Protocols</t>
          </li>
        </ul>
        <t>To be added.</t>
        <ul spacing="normal">
          <li>
            <t>Data Models</t>
          </li>
        </ul>
        <t>To be added.</t>
        <ul spacing="normal">
          <li>
            <t>Alignment with IETF</t>
          </li>
        </ul>
        <t>To be added.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>To be discussed in future versions of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC5557">
        <front>
          <title>Path Computation Element Communication Protocol (PCEP) Requirements and Protocol Extensions in Support of Global Concurrent Optimization</title>
          <author fullname="Y. Lee" initials="Y." surname="Lee"/>
          <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
          <author fullname="D. King" initials="D." surname="King"/>
          <author fullname="E. Oki" initials="E." surname="Oki"/>
          <date month="July" year="2009"/>
          <abstract>
            <t>The Path Computation Element Communication Protocol (PCEP) allows Path Computation Clients (PCCs) to request path computations from Path Computation Elements (PCEs), and lets the PCEs return responses. When computing or reoptimizing the routes of a set of Traffic Engineering Label Switched Paths (TE LSPs) through a network, it may be advantageous to perform bulk path computations in order to avoid blocking problems and to achieve more optimal network-wide solutions. Such bulk optimization is termed Global Concurrent Optimization (GCO). A GCO is able to simultaneously consider the entire topology of the network and the complete set of existing TE LSPs, and their respective constraints, and look to optimize or reoptimize the entire network to satisfy all constraints for all TE LSPs. A GCO may also be applied to some subset of the TE LSPs in a network. The GCO application is primarily a Network Management System (NMS) solution.</t>
            <t>This document provides application-specific requirements and the PCEP extensions in support of GCO applications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5557"/>
        <seriesInfo name="DOI" value="10.17487/RFC5557"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="RFC7540">
        <front>
          <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
          <author fullname="M. Belshe" initials="M." surname="Belshe"/>
          <author fullname="R. Peon" initials="R." surname="Peon"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients.</t>
            <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP's existing semantics remain unchanged.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7540"/>
        <seriesInfo name="DOI" value="10.17487/RFC7540"/>
      </reference>
      <reference anchor="RFC7252">
        <front>
          <title>The Constrained Application Protocol (CoAP)</title>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
          <author fullname="K. Hartke" initials="K." surname="Hartke"/>
          <author fullname="C. Bormann" initials="C." surname="Bormann"/>
          <date month="June" year="2014"/>
          <abstract>
            <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
            <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7252"/>
        <seriesInfo name="DOI" value="10.17487/RFC7252"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC8345">
        <front>
          <title>A YANG Data Model for Network Topologies</title>
          <author fullname="A. Clemm" initials="A." surname="Clemm"/>
          <author fullname="J. Medved" initials="J." surname="Medved"/>
          <author fullname="R. Varga" initials="R." surname="Varga"/>
          <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
          <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
          <author fullname="X. Liu" initials="X." surname="Liu"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8345"/>
        <seriesInfo name="DOI" value="10.17487/RFC8345"/>
      </reference>
      <reference anchor="RFC8259">
        <front>
          <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
          <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
          <date month="December" year="2017"/>
          <abstract>
            <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
            <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="90"/>
        <seriesInfo name="RFC" value="8259"/>
        <seriesInfo name="DOI" value="10.17487/RFC8259"/>
      </reference>
      <reference anchor="RFC7303">
        <front>
          <title>XML Media Types</title>
          <author fullname="H. Thompson" initials="H." surname="Thompson"/>
          <author fullname="C. Lilley" initials="C." surname="Lilley"/>
          <date month="July" year="2014"/>
          <abstract>
            <t>This specification standardizes three media types -- application/xml, application/xml-external-parsed-entity, and application/xml-dtd -- for use in exchanging network entities that are related to the Extensible Markup Language (XML) while defining text/xml and text/ xml-external-parsed-entity as aliases for the respective application/ types. This specification also standardizes the '+xml' suffix for naming media types outside of these five types when those media types represent XML MIME entities.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7303"/>
        <seriesInfo name="DOI" value="10.17487/RFC7303"/>
      </reference>
      <reference anchor="RFC7012">
        <front>
          <title>Information Model for IP Flow Information Export (IPFIX)</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7012"/>
        <seriesInfo name="DOI" value="10.17487/RFC7012"/>
      </reference>
      <reference anchor="RFC8329">
        <front>
          <title>Framework for Interface to Network Security Functions</title>
          <author fullname="D. Lopez" initials="D." surname="Lopez"/>
          <author fullname="E. Lopez" initials="E." surname="Lopez"/>
          <author fullname="L. Dunbar" initials="L." surname="Dunbar"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="R. Kumar" initials="R." surname="Kumar"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document describes the framework for Interface to Network Security Functions (I2NSF) and defines a reference model (including major functional components) for I2NSF. Network Security Functions (NSFs) are packet-processing engines that inspect and optionally modify packets traversing networks, either directly or in the context of sessions to which the packet is associated.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8329"/>
        <seriesInfo name="DOI" value="10.17487/RFC8329"/>
      </reference>
      <reference anchor="RFC8811">
        <front>
          <title>DDoS Open Threat Signaling (DOTS) Architecture</title>
          <author fullname="A. Mortensen" initials="A." role="editor" surname="Mortensen"/>
          <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
          <author fullname="F. Andreasen" initials="F." surname="Andreasen"/>
          <author fullname="N. Teague" initials="N." surname="Teague"/>
          <author fullname="R. Compton" initials="R." surname="Compton"/>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document describes an architecture for establishing and maintaining Distributed Denial-of-Service (DDoS) Open Threat Signaling (DOTS) within and between domains. The document does not specify protocols or protocol extensions, instead focusing on defining architectural relationships, components, and concepts used in a DOTS deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8811"/>
        <seriesInfo name="DOI" value="10.17487/RFC8811"/>
      </reference>
      <reference anchor="RFC8453">
        <front>
          <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
          <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
          <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
            <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
            <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8453"/>
        <seriesInfo name="DOI" value="10.17487/RFC8453"/>
      </reference>
      <reference anchor="RFC4655">
        <front>
          <title>A Path Computation Element (PCE)-Based Architecture</title>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
          <author fullname="J. Ash" initials="J." surname="Ash"/>
          <date month="August" year="2006"/>
          <abstract>
            <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
            <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4655"/>
        <seriesInfo name="DOI" value="10.17487/RFC4655"/>
      </reference>
      <reference anchor="RFC8051">
        <front>
          <title>Applicability of a Stateful Path Computation Element (PCE)</title>
          <author fullname="X. Zhang" initials="X." role="editor" surname="Zhang"/>
          <author fullname="I. Minei" initials="I." role="editor" surname="Minei"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>A stateful Path Computation Element (PCE) maintains information about Label Switched Path (LSP) characteristics and resource usage within a network in order to provide traffic-engineering calculations for its associated Path Computation Clients (PCCs). This document describes general considerations for a stateful PCE deployment and examines its applicability and benefits, as well as its challenges and limitations, through a number of use cases. PCE Communication Protocol (PCEP) extensions required for stateful PCE usage are covered in separate documents.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8051"/>
        <seriesInfo name="DOI" value="10.17487/RFC8051"/>
      </reference>
      <reference anchor="RFC8231">
        <front>
          <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
          <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
          <author fullname="I. Minei" initials="I." surname="Minei"/>
          <author fullname="J. Medved" initials="J." surname="Medved"/>
          <author fullname="R. Varga" initials="R." surname="Varga"/>
          <date month="September" year="2017"/>
          <abstract>
            <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
            <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8231"/>
        <seriesInfo name="DOI" value="10.17487/RFC8231"/>
      </reference>
      <reference anchor="RFC6805">
        <front>
          <title>The Application of the Path Computation Element Architecture to the Determination of a Sequence of Domains in MPLS and GMPLS</title>
          <author fullname="D. King" initials="D." role="editor" surname="King"/>
          <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
          <date month="November" year="2012"/>
          <abstract>
            <t>Computing optimum routes for Label Switched Paths (LSPs) across multiple domains in MPLS Traffic Engineering (MPLS-TE) and GMPLS networks presents a problem because no single point of path computation is aware of all of the links and resources in each domain. A solution may be achieved using the Path Computation Element (PCE) architecture.</t>
            <t>Where the sequence of domains is known a priori, various techniques can be employed to derive an optimum path. If the domains are simply connected, or if the preferred points of interconnection are also known, the Per-Domain Path Computation technique can be used. Where there are multiple connections between domains and there is no preference for the choice of points of interconnection, the Backward-Recursive PCE-based Computation (BRPC) procedure can be used to derive an optimal path.</t>
            <t>This document examines techniques to establish the optimum path when the sequence of domains is not known in advance. The document shows how the PCE architecture can be extended to allow the optimum sequence of domains to be selected, and the optimum end-to-end path to be derived through the use of a hierarchical relationship between domains. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6805"/>
        <seriesInfo name="DOI" value="10.17487/RFC6805"/>
      </reference>
    </references>
    <?line 2345?>

<section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work has benefited from several discussions at the IETF and the 
AI4NETWORK Side Meetings.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Daniele Ceccarelli">
        <organization>Cisco</organization>
        <address>
          <email>dceccare@cisco.com</email>
        </address>
      </contact>
      <contact fullname="Arashmid Aakhavain">
        <organization>Huawei</organization>
        <address>
          <email>arashmid.akhavain@huawei.com</email>
        </address>
      </contact>
      <contact fullname="Oscar González de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
      <contact fullname="Ignacio Dominguez Martinez-Casanueva">
        <organization>Telefonica</organization>
        <address>
          <email>ignacio.dominguezmartinez@telefonica.com</email>
        </address>
      </contact>
      <contact fullname="Vincenzo Riccobene">
        <organization>Huawei</organization>
        <address>
          <email>vincenzo.riccobene@huawei-partners.com</email>
        </address>
      </contact>
      <contact fullname="Nathalie Romo-moreno">
        <organization>Telekom</organization>
        <address>
          <email>nathalie.romo-moreno@telekom.de</email>
        </address>
      </contact>
      <contact fullname="Ali Tizghadam">
        <organization>Telus</organization>
        <address>
          <email>ali.tizghadam@telus.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
