Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 28.915
Study on management aspect of Network Digital Twin

V19.0.0 (PDF)  2024/12  39 p.
Rapporteur:
Ms. Hu, Yushuang
China Mobile Com. Corporation

full Table of Contents for  TR 28.915  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 7
2References  p. 7
3Definitions of terms, symbols and abbreviations  p. 7
3.1Terms  p. 7
3.2Symbols  p. 8
3.3Abbreviations  p. 8
4Concept and background  p. 8
4.1General description  p. 8
4.1.1Scope of NDTs  p. 8
4.2Introduction and Overview  p. 8
4.2.1Digital Twins and Network Digital Twins  p. 8
4.2.2Relations between digital twins and network automation functions  p. 9
4.2.3Relation between emulation and simulation  p. 9
4.2.3.1Emulation  p. 9
4.2.3.2Simulation  p. 9
4.2.3.3Comparison of emulation and simulation  p. 10
4.3Potential uses of NDTs  p. 10
4.4Illustrate the life-cycle management of an NDT  p. 10
5Use cases  p. 11
5.1Use case 1: Network management RAN ES policy verification using NDT  p. 11
5.1.1Description  p. 11
5.1.2Potential requirements  p. 11
5.1.3Potential solutions  p. 11
5.1.3.1Solution1  p. 12
5.1.3.2Solution 2  p. 13
5.1.4Evaluation of potential solutions  p. 13
5.2Use case 2: Signaling storm analysis  p. 14
5.2.1Description  p. 14
5.2.2Potential requirements  p. 14
5.2.3Potential solutions  p. 14
5.2.3.1Solution 1: NDT for signaling storm simulation and solution validation  p. 15
5.2.3.2Solution 2: NDT for replicating signaling storm scenario  p. 15
5.2.3.3Solution 3  p. 16
5.3Use case 3: Emergency preparedness  p. 18
5.3.1Description  p. 18
5.3.2Potential requirements  p. 18
5.3.3Potential solutions  p. 18
5.3.3.1Solution 1  p. 18
5.3.4Evaluation of potential solutions  p. …
5.4Use case4: Network failure and risk prediction  p. 18
5.4.1Description  p. 19
5.4.2Potential requirements  p. 19
5.4.3Potential solutions  p. 19
5.4.3.1Solution 1  p. 20
5.4.4Evaluation of potential solutions  p. 20
5.5Use case 5: NDT support to network automation  p. 20
5.5.1Description  p. 20
5.5.2Potential Requirements  p. 21
5.5.3Potential Solutions  p. 21
5.5.4Evaluation of solutions  p. 21
5.6Use case 6: Using NDT to generate ML training data  p. 22
5.6.1Description  p. 22
5.6.2Potential requirements  p. 22
5.6.3Potential solutions  p. 23
5.6.3.1Solution 1  p. 23
5.6.3.2Solution 2  p. 24
5.7Use case 7: Nested NDTs  p. 25
5.7.1Description  p. 25
5.7.2Use cases  p. 25
5.7.2.1Traceability of NDT composition  p. 25
5.7.3Potential requirements  p. 26
5.7.4Potential Solutions  p. 26
5.7.5Evaluation of solutions  p. 26
5.8Use case8: Visualization of network topology and traffic  p. 26
5.8.1Description  p. 26
5.8.2Potential requirements  p. 27
5.8.3Potential solutions  p. 27
5.9Use case 9: Configuration verification  p. 29
5.9.1Description  p. 29
5.9.2Potential requirements  p. 30
5.9.3Potential solutions  p. 30
5.9.3.1Potential solution 1  p. 30
5.9.3.2Potential solution 2  p. 31
5.10Use case10: Network issue inducement  p. 31
5.10.1Description  p. 31
5.10.2Potential requirements  p. 31
5.10.3Potential solutions  p. 32
5.10.4Evaluation of potential solutions  p. 32
5.11Use case 11: measuring customer satisfaction with the network services  p. 34
5.11.1Description  p. 34
5.11.2Potential requirements  p. 34
5.11.3Potential solutions  p. 34
6Conclusions  p. 35
$Change history  p. 37

Up   Top