<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
]>


<rfc ipr="trust200902" docName="draft-francois-nmrg-ai-challenges-02" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2023" month="March" day="13"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when network management problems may require to couple with AI solutions. On the one hand, there are many difficult problems in Network Management that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network <bcp14>SHOULD</bcp14> be operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of network management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of ML but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of AI that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of service function chaining or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to optimality) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t>AI: Artificial Intelligence
FL: Federated Learning
GAN: Generative Adversarial Network
GNN: Graph Neural Network
IBN: Intent-Based Networking
LSTM: Long Short-Term Memory
ML: Machine Learning
MLP: Multilayer Perceptron
NM: Network Management
RL: Reinforcement Learning</t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinzatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3).  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF placement and SFC design: Virtual Network Functions need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problem-type-and-mapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="sub-challenge-tailoring-the-ai-approach-to-the-given-problem"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>

<t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads so the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of Alpha Go.  Instead of using AI to merely solve classification problems, Alpha Go has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability-of-network-ai-products"><name>Explainability of Network-AI products</name>

<t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

