<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2023" month="May" day="10"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when network management problems may require to couple with AI solutions. On the one hand, there are many difficult problems in Network Management that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network <bcp14>SHOULD</bcp14> be operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of network management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of ML but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of AI that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of service function chaining or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to optimality) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t>AI: Artificial Intelligence
FL: Federated Learning
GAN: Generative Adversarial Network
GNN: Graph Neural Network
IBN: Intent-Based Networking
LSTM: Long Short-Term Memory
ML: Machine Learning
MLP: Multilayer Perceptron
NM: Network Management
RL: Reinforcement Learning</t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinzatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3).  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF placement and SFC design: Virtual Network Functions need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problem-type-and-mapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="sub-challenge-tailoring-the-ai-approach-to-the-given-problem"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>

<t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads so the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of Alpha Go.  Instead of using AI to merely solve classification problems, Alpha Go has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability-of-network-ai-products"><name>Explainability of Network-AI products</name>

<t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

