Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Terminology and Glossary

During our discussions with NRENs and at workshops it became clear that there are OAV terms that are being used in different ways and in some cases with slightly different meaning and understanding. So in order to have a common basis we decided to identify a list of relevant OAV terms and add a short definition with a reference link (source) for each term as well as an acronym table with definitions of abbreviations. We tried to use standard-based definitions whenever we could find them and listed internal definitions in cases where no standard definitions were found.

Internal definitions are based on the consensus of all team members; to come to an agreed definition of all team members a terminology document was created with descriptions of the terms and an internal survey was conducted for final adjustments. Additional comments are welcome!


OAV Common Terms     

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Glossary


OAV TermsDefinition and reference

Anchor

#AIOps

AIOps

#AIOps

AIOps
AIOps

AIOps is (the usage of) Artificial Intelligence for IT Operations. It combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection and causality determination.

AI-powered Virtual Agent (AIVA)An AI-powered Virtual Agent is an animated virtual character, more complex than a chatbot, that makes use of technologies like machine learning and natural language processing (NLP). This allows it to actively participate in a conversation, acting more like a human

Adaptive Machine Learning

 

Adaptive machine learning builds on traditional machine learning to create a more advanced solution to real-time environments with variable data. As its name suggests, adaptive machine learning can adapt to rapidly changing data sets, making it more applicable to real-world situations.

  • Reference(s) or Source:
based on
ringcentral
virtual-agent.html and TM Forum AI Fundamentals course [TMF_AIF] and TM Forum “AI and its pivotal role in transforming operations” report and webinar [TMF_AI]

API (Application Programming Interface)

An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system. Any data can be shared with an application program interface.

Architecture component

An architecture component is a nontrivial, nearly independent, and replaceable part of a system that fulfills a clear function in the context of a well-defined architecture.

  • TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Architecture principles

Architecture principles define the underlying general rules and guidelines for the use and deployment of all IT resources and assets across the organisation. They reflect a level of consensus among the various elements of the enterprise, and form the basis for making future IT decisions.

Artificial intelligence

Artificial intelligence (AI) is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. It is the system’s ability to correctly interpret external data, to learn from such data, and to use that learning to achieve specific goals and tasks through flexible adaptation.

Automated service provisioning

Automated service provisioning is the ability to deploy an information technology or telecommunications service by using pre-defined procedures that are carried out electronically without requiring human intervention.

Automation

Processing tasks in a repeatable manner to yield the same result every time without human intervention.

  • internal definition
  AnchorBigdataBigdataBig data

Big data reflects extremely large or complex datasets that may be analysed computationally, rather than by traditional data-processing application software, to reveal patterns, trends and associations, especially relating to human behaviours and interactions.

Big data-driven networking

A type of future network framework that collects big data from networks and applications, and generates big data intelligence based on that data; it then provides big data intelligence to facilitate smarter and autonomous network management, operation, control, optimisation and security, etc.

Blockchain

A blockchain is an expanding list of cryptographically signed, irrevocable transactional records shared by all participants in a network.

reduced; from

Adversarial AI/ML

A practice concerned with the design of ML algorithms that can resist security challenges, the study of the capabilities of attackers, and the understanding of attack consequences.

AI Accuracy

Closeness of computations or estimates to the exact or true values that the statistics were intended to measure.

AI Agent

An artificial intelligence (AI) agent is a software program that can interact with its environment, collect data, and use the data to perform self-determined tasks to meet predetermined goals. Unlike traditional automation agents, which follow static, predefined rules, AI agents can learn from their environment, adapt their behaviour, and make autonomous decisions based on real-time data, making them more flexible and capable of handling dynamic situations. 

AI as a Service

Artificial Intelligence as a Service (AIaaS) is a cloud-based service offering artificial intelligence (AI) outsourcing. AIaaS enables individuals and businesses to experiment with AI, and even take AI to production for large-scale use cases.

AI Deployment Flexibility

Flexibility to deploy the same system in multiple scenarios without any modifications to the AI models. It goes hand in hand with generalisability.

AI Policy Enforcer

AI functionality to implement a recommended policy.

AI-powered Virtual Agent (AIVA)

An AI-powered Virtual Agent is an animated virtual character, more complex than a chatbot, that makes use of technologies like machine learning and natural language processing (NLP). This allows it to actively participate in a conversation, acting more like a human.

Analytics Logical Function

A logical function in NWDAF, which performs inference, derives analytics information (i.e. derived statistics and/or predictions based on Analytics Consumer Request) and exposes analytics service.

API (Application Programming Interface)

An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system. Any data can be shared with an application program interface.

Architecture component

An architecture component is a nontrivial, nearly independent, and replaceable part of a system that fulfills a clear function in the context of a well-defined architecture.

  • TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Cgroups (control groups)

Cgroups are linux kernel mechanisms to restrict and measure resource allocations to each process group. Using cgroups, you can allocate resources such as CPU time, network, and memory.

Chatbot/Bot

A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices, systems and platforms as if they were communicating with a real person.

Cloud native application

Cloud Native Application (CNA) refers to a type of computer software that natively utilises services and infrastructure provided by cloud computing providers.

  • reduced; from TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Component

A component is a functionally independent part of any system. It performs some function and may require some input or produce some output.

Composite service

A composite service is an assembly of one or more elements into an end to end service. It may be recursive so a composite service may become a component of yet another service.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and TR274 DSRA Guide R17.5 Reference R02

Control plane

The control plane is responsible for processing a number of different control protocols that may affect the forwarding table, depending on the configuration and type of network device. These control protocols are jointly responsible for managing the active topology of the network.

  • Software Defined Networks, A Comprehensive Approach, Paul Göransson, Chuck Black Morgan Kaufmann, 2014

Cross-domain data services

Data services that are delivered across multiple administrative, information or technological domains that allow data sharing among authorized consumers in different domains.

Architecture principles

Architecture principles define the underlying general rules and guidelines for the use and deployment of all IT resources and assets across the organisation. They reflect a level of consensus among the various elements of the enterprise, and form the basis for making future IT decisions.

Artificial General Intelligence

Human-like intelligence, which can be applied widely as opposed to narrow AI, which can only be applied to one particular problem or task. Also called 'strong' AI as opposed to 'weak' AI.

Artificial Intelligence

Artificial intelligence (AI) is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. It is the system’s ability to correctly interpret external data, to learn from such data, and to use that learning to achieve specific goals and tasks through flexible adaptation.

Automated root cause analysis

Automated RCA is the process of using automation to investigate incident root causes in real time using AI/ML.

Automated service provisioning


Automated service provisioning is the ability to deploy an information technology or telecommunications service by using pre-defined procedures that are carried out electronically without requiring human intervention.

Automation

Processing tasks in a repeatable manner to yield the same result every time without human intervention.

  • internal definition

Autonomy (autonomous AI system)

AI-enabled Autonomy is the capability of machines (either platforms or computer software) to operate independent of direct human intervention, but within constraints, to achieve a goal or solve a problem.

Auto-scaling support

Autoscale allows you to automatically scale your applications or resources based on demand.

Anchor
Bias
Bias
Bias

A systematic error that occurs in the machine learning model itself due to incorrect assumptions in the ML process. Technically, bias is the error between average model prediction and the ground truth. Unwanted bias may place privileged groups at systematic advantage and unprivileged groups at systematic disadvantage.

Bidirectional Encoder Representations

Bidirectional Encoder Representations from Transformers (BERT) is a deep learning strategy for natural language processing (NLP) that helps artificial intelligence (AI) programs understand the context of ambiguous words in text.

 Big data

Big data reflects extremely large or complex datasets that may be analysed computationally, rather than by traditional data-processing application software, to reveal patterns, trends and associations, especially relating to human behaviours and interactions.

Big data-driven networking

A type of future network framework that collects big data from networks and applications, and generates big data intelligence based on that data; it then provides big data intelligence to facilitate smarter and autonomous network management, operation, control, optimisation and security, etc.

Blockchain

A blockchain is an expanding list of cryptographically signed, irrevocable transactional records shared by all participants in a network.

  • reduced; from TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Anchor
Cgroups
Cgroups
Cgroups
(control groups)

Cgroups are linux kernel mechanisms to restrict and measure resource allocations to each process group. Using cgroups, you can allocate resources such as CPU time, network, and memory.

Chatbot/Bot

A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices, systems and platforms as if they were communicating with a real person.

ChatGPT

A software that allows a user to ask it questions using conversational, or natural, language. It is a language model developed by OpenAI, and is based on the GPT (Generative Pre-training Transformer) architecture, which is a type of neural network designed for natural language processing tasks.

Classification, classifier

A classifier is the algorithm itself—the rules used by machines to classify data. A classification model, on the other hand, is the end result of your classifier's machine learning. The model is trained using the classifier, so that the model, ultimately, classifies your data.

Closed-loop processes

An automatic control system in which an operation, process, or mechanism is regulated by feedback.

Cloud native application

Cloud Native Application (CNA) refers to a type of computer software that natively utilises services and infrastructure provided by cloud computing providers.

  • reduced; from TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Component

A component is a functionally independent part of any system. It performs some function and may require some input or produce some output.

Composite service

A composite service is an assembly of one or more elements into an end to end service. It may be recursive so a composite service may become a component of yet another service.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and TR274 DSRA Guide R17.5 Reference R02

Container

A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another.

Control plane

The control plane is responsible for processing a number of different control protocols that may affect the forwarding table, depending on the configuration and type of network device. These control protocols are jointly responsible for managing the active topology of the network.

  • Software Defined Networks, A Comprehensive Approach, Paul Göransson, Chuck Black Morgan Kaufmann, 2014

Conversational agents/conversational AI (chatbots)

A conversational agent is any dialogue system that conducts natural language processing (NLP) and responds automatically using human language. Conversational agents represent the practical implementation of computational linguistics, and are usually deployed as chatbots and virtual or AI assistants.

Conversational AI

Conversational AI (or conversational artificial intelligence), refers to technologies that enable machines to understand, process, and respond to human language naturally. These include chatbots and virtual assistants which can perform tasks or provide information based on voice or text inputs.

Convolutional neural network (CNN)

A convolutional neural network (CNN) is a type of artificial neural network used primarily for image recognition and processing. Due to its ability to recognize patterns in images, a CNN is a powerful tool but requires millions of labelled data points for training.

Cortex XSOAR

A platform for security orchestration, automation, and response (SOAR), enhanced with ChatGPT for user-friendly incident analysis and response.

Cortex XSOAR Playbook

A set of automated workflows in Cortex XSOAR, designed to handle security incidents efficiently.

Cross-domain data services


Data services that are delivered across multiple administrative, information or technological domains that allow data sharing among authorized consumers in different domains.

Customer Facing Services (CFS)

A logical capability that is packaged as part of a product offering by service providers to their customers, which is directly purchased, leased, visible to and/or otherwise directly usable by those customers. The logical functionality can be derived from underlying network or information technology (i.e., a dedicated contact number or tailored web-based access to operational support for a specific customer) or may be delivered or supplied by staff or contractors employed by the service provider (i.e., dedicated service team or help desk for a specific customer).

Anchor
Datacenterinterconnect
Datacenterinterconnect
Data center interconnect (DCI)

Data center interconnect (DCI) is a segment of the networking market that focuses on the technology used to link two or more data centers so the facilities can share resources.

Data Governance

Data governance is the process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. It ensures that data is consistent, trustworthy, and doesn't get misused, facilitating effective decision-making. It also means setting internal standards – data policies – that apply to how data is gathered, stored, processed, and disposed of. It governs who can access what kinds of data and what kinds of data are under governance.

Data ingestion

Data ingestion is the process of transporting data from one or more sources to a target site, system or platform for further processing and analysis. This data can originate from a range of sources, including data lakes, IoT devices, on-premises databases, and SaaS apps, and end up in different target environments, such as cloud data warehouses or data marts.

Data lakeA storage repository that holds a vast amount of raw data in its native format, primarily in files or objects storage without hierarchical dimensions, until it is needed for analytics applications.
Data modelA data model (or datamodel) is an abstract model that organises elements of data and standardises how they relate to one another.
 

Data plane

The data plane (sometimes known as the user plane, forwarding plane, carrier plane or bearer plane) is the part of a network that carries user traffic from one interface to another.

Data Poisoning

Data Poisoning is an adversarial attack that tries to manipulate the training dataset in order to control the prediction behaviour of a trained model such that the model will label malicious examples into desired classes (e.g., labelling spam e-mails as safe).

Data Quality

Data quality measures how well a dataset meets criteria for accuracy, completeness, validity, consistency, uniqueness, timeliness, and fitness for purpose, and it is critical to all data governance initiatives within an organization.

Decision management engine

A decision management engine is a customisable solution that represents the logic, often in the form of a rules flow or decision tree, that can be operationalised to automate a decision. […] A decision management engine articulates how smaller decisions branch off to bigger and more complex decisions and ultimately end with a final outcome. This logic can be codified, documented, and often executed in an automated fashion.

Decoupling

Building approach (in electronics, software, etc.) where the constituent components of a system can be produced, sourced and interchanged independently of the other.

  • based on TOGAF 9.2 Reference R16
Deep learning

Deep learning is an iterative approach to artificial intelligence (AI) that stacks machine learning algorithms in a hierarchy of increasing complexity and abstraction. Each deep learning level is created with knowledge gained from the preceding layer of the hierarchy.

Domain

A collection of network infrastructure under the administrative control of the same organisation.

Dynamic Function Placement (DPS)

The act of dynamically placing network functions. This is done by deploying intelligent algorithms to optimally orchestrate differentiated services across multiple sites and clouds based on diverse intents and dynamic environments' policy constraints.

Anchor
EdgeComputing
EdgeComputing

Edge Computing

Edge computing refers to a distributed computing paradigm that brings computation and data storage closer to the location where it is needed to improve response times and save bandwidth. Instead of relying on a centralised cloud data centre, edge computing performs these processes at or near the physical location of the user or data source.

Evasion attacks

Evasion attacks (a.k.a. adversarial examples) consist of carefully perturbing the input samples at test time to have them misclassified.

Expert system

An expert system uses artificial intelligence (AI) technologies to simulate the judgement and behaviour of a human expert based on “knowledge” programmed into it by humans, and only following predetermined rules.

Extract, Transform, Load (ETL)

The data processing technique that engineers use to extract data from different sources, transform the data into a usable and trusted resource, and load that data into the systems end users can access and use downstream to solve business problems.

Anchor
federatedLearning
federatedLearning

Federated Learning

A learning model that addresses the problem of data governance and privacy by training algorithms collaboratively without transferring the data to another location.

Federated orchestration

Service orchestration performed by multiple autonomous management domains, to effectively allow services to span across several providers.

Foundation model

An AI model that is trained on broad data at scale, is designed for generality of output, and can be adapted to a wide range of distinctive tasks.

Functional block

Self contained unit in an overall system that performs a specific function or task.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and ETSI Network Functions Virtualization (NFV); Infrastructure; Methodology to describe Interfaces and Abstractions Reference R08

Anchor
GAN
GAN

Generative Adversarial Network (GAN)

An approach to training AI models useful for applications like data synthesis, augmentation, and compression where two neural networks are trained in tandem: one is designed to be a generative network (the forger) and the other a discriminative network (the forgery detector). The objective is for each network to train and better itself off the other, reducing the need for big, labeled training data.

Generative AI

Foundation models used in AI systems specifically intended to generate, with varying levels of autonomy, content such as complex text, images, audio, or video.

Generative Pre-trained Transformer

GPT, or Generative Pre-trained Transformer, is a state-of-the-art language model developed by OpenAI. It uses deep learning techniques to generate natural language text, such as articles, stories, or even conversations, that closely resemble human-written text.

Anchor
hierarchical
hierarchical

Hierarchical orchestration

Orchestration decomposed into one or more hierarchical interactions where parts of the service are delegated to a subordinate orchestrator.

Holistic Anomaly Detection (e.g., via multi-vector AI/ML-based behavioural analytics)

Anomaly detection, or outlier detection, is the identification of observations, events or data points that deviate from what is usual, standard or expected, making them inconsistent with the rest of a data set. Holistic anomaly detection takes an overall approach to anomaly detection using a variety of methods.

Holistic anomaly detection is a comprehensive approach to identifying unusual patterns or behaviors within data. Rather than relying on a single method, it combines multiple techniques—such as statistical analysis, machine learning models, and rule-based algorithms—to capture a wider range of anomalies. This approach is valuable because it considers the data from multiple perspectives, enhancing the ability to detect different types of anomalies, including subtle or complex ones that might be missed by a single-method approach.

Horizontal Scaling

Horizontal scaling (or scaling out) means that you scale by adding more machines into your pool of resources.

Human-centric AI

Human-Centered AI (HCAI) is an emerging discipline intent on creating AI systems that amplify and augment rather than displace human abilities. HCAI seeks to preserve human control in a way that ensures artificial intelligence meets our needs while also operating transparently, delivering equitable outcomes, and respecting privacy.

Anchor
intent
intent

Intent-based policy / network

Technology incorporating artificial intelligence (AI) and machine learning to automate administrative tasks across a network.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019
Intelligent network

An architectural concept for the support, maintenance, operation and provision of new services which is characterised by: information processing, efficient management, control and use of network resources and standardised communication between physical resources, network functions and services.

Intent-based Networking

A software-enabled automation process that uses high levels of intelligence, analytics, and orchestration to improve network operations and uptime.

Intent-based policy / network

Technology incorporating artificial intelligence (AI) and machine learning to automate administrative tasks across a network.

  • Reference(s) or Source: based on TM Forum Reference Document, “TMF071 ODA Terminology”, Release 19.0.1, October 2019 [TMF071]
Internet of Things (IoT)

The Internet of Things, or IoT, is a system of interrelated networking computing devices, mechanical and digital machines aimed  at objects, animals or people and provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

Anchor
kubernetes
kubernetes

Kubernetes

Kubernetes is an open-source platform used to automate the deployment, scaling, and management of containerized applications. It orchestrates computing, networking, and storage infrastructure on behalf of user workloads, providing a resilient environment for running distributed systems. Kubernetes allows for self-healing, scaling, and service discovery, making it a vital tool for managing containerized applications at scale.

Anchor
language
language

Language Model

A machine-learning model designed to represent the language domain.

Large Language Model

A class of language models that use deep-learning algorithms and are trained on extremely large textual datasets that can be multiple terabytes in size. LLMs can be classed into two types: generative or discriminatory. Generative LLMs are models that output text, such as the answer to a question or even writing an essay on a specific topic. They are typically unsupervised or semi-supervised learning models that predict what the response is for a given task. Discriminatory LLMs are supervised learning models that usually focus on classifying text, such as determining whether a text was made by a human or AI.

Anchor
ML
ML

Machine learning (ML)

Processes that enable computational systems to “understand” data and gain “knowledge” from it without necessarily being explicitly programmed. (Supervised machine learning and unsupervised machine learning are two examples of machine learning.)

Management

The processes aiming at fulfilment, assurance, and billing of services, network functions, and resources in both physical and virtual infrastructure including compute, storage, and network resources.

Management API

A Management API allows a service requestor to perform all management operations before, during and after the use of a service.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

Management domain

A collection of physical or functional elements under the control of an entity, aiming at fulfilment, assurance, and billing of services, network functions, and resources in both physical and virtual infrastructure.

Maturity level

A maturity level is a defined evolutionary plateau for organisational process improvement. Each maturity level matures an important subset of the organisation’s processes, preparing it to move to the next maturity level. The maturity levels are measured by the achievement of the specific and generic goals associated with each predefined set of process areas.

Maturity model

A maturity model is an instrument that evaluates the current position of certain capabilities of an organisation and provides indications of how it can transform to improve.

Microservices

Microservices is an approach to software architecture that builds a large, complex application from multiple small components that each perform a single function, such as authentication, notification, or payment processing. Each microservice is a distinct unit within the software development project, with its own code base, infrastructure, and database. The microservices work together, communicating through web APIs or messaging queues to respond to incoming events.

Modelling Abstractions

Model abstraction is a way of simplifying an underlying conceptual model on which a simulation is based while maintaining the validity of the simulation results with respect to the question being addressed by the simulation.

Anchor
Natural
Natural

Natural Language Generation

Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set.

Natural language processing (NLP)

Natural language processing (NLP) refers to the branch of AI concerned with giving computers the ability to understand text and spoken words in much the same way human beings can.

Network automation

Network automation is the process of automating the configuration, management, testing, deployment, and operations of physical and virtual devices within a network.

Network controller

Functional block that centralizes some or all of the control and management functionality of a network domain and may provide an abstract view of its domain to other functional blocks via well-defined interfaces.

  • ETSI GS NFV 003 V1.4.1 (2018-08), Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV

Data center interconnect (DCI)

Data center interconnect (DCI) is a segment of the networking market that focuses on the technology used to link two or more data centers so the facilities can share resources.

Data ingestion

Data ingestion is the process of transporting data from one or more sources to a target site, system or platform for further processing and analysis. This data can originate from a range of sources, including data lakes, IoT devices, on-premises databases, and SaaS apps, and end up in different target environments, such as cloud data warehouses or data marts.

Data lakeA storage repository that holds a vast amount of raw data in its native format, primarily in files or objects storage without hierarchical dimensions, until it is needed for analytics applications.
Data modelA data model (or datamodel) is an abstract model that organises elements of data and standardises how they relate to one another.
 

Data plane

The data plane (sometimes known as the user plane, forwarding plane, carrier plane or bearer plane) is the part of a network that carries user traffic from one interface to another.

Decision management engine

A decision management engine is a customisable solution that represents the logic, often in the form of a rules flow or decision tree, that can be operationalised to automate a decision. […] A decision management engine articulates how smaller decisions branch off to bigger and more complex decisions and ultimately end with a final outcome. This logic can be codified, documented, and often executed in an automated fashion.

Decoupling

Building approach (in electronics, software, etc.) where the constituent components of a system can be produced, sourced and interchanged independently of the other.

  • based on TOGAF 9.2 Reference R16
Deep learning

Deep learning is an iterative approach to artificial intelligence (AI) that stacks machine learning algorithms in a hierarchy of increasing complexity and abstraction. Each deep learning level is created with knowledge gained from the preceding layer of the hierarchy.

Domain

A collection of network infrastructure under the administrative control of the same organisation.

Extract, Transform, Load (ETL)

The data processing technique that engineers use to extract data from different sources, transform the data into a usable and trusted resource, and load that data into the systems end users can access and use downstream to solve business problems.

Expert system

An expert system uses artificial intelligence (AI) technologies to simulate the judgement and behaviour of a human expert based on “knowledge” programmed into it by humans, and only following predetermined rules.

Federated orchestration

Service orchestration performed by multiple autonomous management domains, to effectively allow services to span across several providers.

internal definition based on https://e-archivo.uc3m.es/bitstream/handle/10016/27125/service_WCNCW_2018_ps.pdf?sequence=1, ETSI GS ZSM 007 V1.1.1 (2019-08): Zero-touch network and Service Management (ZSM); Terminology for concepts in ZSM
ZSM
007
01
ZSM007v010101p
and https://www.researchgate.net/publication/318473608_Orchestration_of_Network_Services_across_multiple_operators_The_5G_Exchange_prototype

Functional block

Self contained unit in an overall system that performs a specific function or task.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and ETSI Network Functions Virtualization (NFV); Infrastructure; Methodology to describe Interfaces and Abstractions Reference R08

Hierarchical orchestration

Orchestration decomposed into one or more hierarchical interactions where parts of the service are delegated to a subordinate orchestrator

Network function (NF)

Network Function (NF) – a functional building block within a network infrastructure, which has well-defined external interfaces and a well-defined functional behaviour.

Intent-based policy / network

Technology incorporating artificial intelligence (AI) and machine learning to automate administrative tasks across a network.

  • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019
Intelligent network

Network function disaggregation (NFD)

Defines the evolution of switching and routing appliances from proprietary, closed hardware and software sourced from a single vendor, towards totally decoupled, open components which are combined to form a complete switching and routing device.

Network intelligence level

A three-level application of automation capabilities (i.e., full automated infrastructure management, data centre infrastructure management and traceable/intelligent patch cords), including those enabled by integrating artificial intelligence techniques in the network.

  • Telecommunication Standardisation Sector of ITU (ITU-T) Recommendation Y.3173 (02/2020) Series Y: Global Information Infrastructure, Internet Protocol Aspects, Next-Generation Networks, Internet of Things and Smart Cities – Future networks: Framework for evaluating intelligence levels of fufure networks including IMT-2020 network

An architectural concept for the support, maintenance, operation and provision of new services which is characterised by: information processing, efficient management, control and use of network resources and standardised communication between physical resources, network functions and services.

based on International Telegraph and Telephone Consultative Committee (CCITT) Recommendation I.312 / Q.1201 (10/92) Principles of Intelligent Network Architecture
I
312
199210
 

Network namespaces

Network namespaces is a virtualization mechanism (a virtualised networking stack) which provides abstraction and virtualisation of network protocol services and interfaces. Each network namespace has its own network device instances that can be configured with individual network addresses.

  • internal definition
Internet of Things (IoT)

The Internet of Things, or IoT, is a system of interrelated networking computing devices, mechanical and digital machines aimed  at objects, animals or people and provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

en
wikipedia
org
wiki
Internet_of_things and https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT Machine learning (ML)

Processes that enable computational systems to “understand” data and gain “knowledge” from it without necessarily being explicitly programmed. (Supervised machine learning and unsupervised machine learning are two examples of machine learning.)

based on ETSI GR ENI 004 V2.1.1 (2019-10), Experiential Networked Intelligence (ENI); Terminology for Main Concepts in ENI (

Network orchestration

Network orchestration is the execution of the operational and functional processes involved in designing, creating, and delivering an end-to-end service. For example, it uses network automation to provide services through the use of applications that drive the network. An orchestrator functions to arrange and organise the various components involved in delivering a network service.

  • internal definition based on: Ciena,
etsi
org
deliver/etsi_gr/ENI/001_099/004/02.01.01_60/gr_eni004v020101p.pdf) and Telecommunication Standardisation Sector of ITU (ITU-T) Recommendation Y.3177 (02/2021) Architectural framework for artificial intelligence-based network automation for resource and fault management in future networks including IMT-2020

Network resource

Physical or logical network component of hardware, software or data in the data, control or management planes within an organization's infrastructure.

  • internal definition

Network service

A collection of network functions with a well specified behavior (i.e. content delivery networks (CDNs) and IP multimedia subsystem (IMS)).

  • internal definition based on ITU-T - REC-Y.3515-201707: SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES, Cloud Computing – Functional architecture of Network as a Service;  (https://www.itu.int/rec/dologin_pub.asp?lang=
s
3177
202102

Management

The processes aiming at fulfilment, assurance, and billing of services, network functions, and resources in both physical and virtual infrastructure including compute, storage, and network resources.

Management API

A Management API allows a service requestor to perform all management operations before, during and after the use of a service.

Network Service Meshes

A network service mesh is intended to support application-to-application and function-to-function communications in networks and scenarios through dynamic and automated virtual network services – to be allocated on-demand, based on application requirements. Additionally, a service mesh is a software layer that handles all communication between services in applications. This layer is composed of containerized microservices.

Network slice instance

A network slice instance is a set of network function instances and the required resources (e.g., compute, storage and networking resources) which form a deployed network slice.

  • Reference(s) or Source: based on TM Forum Reference Document, “TMF071 ODA Terminology”
based on TM Forum Reference, TMF071 ODA Terminology, TMF071
  • , Release 19.0.1, October 2019

Management domain

A collection of physical or functional elements under the control of an entity, aiming at fulfilment, assurance, and billing of services, network functions, and resources in both physical and virtual infrastructure.

internal definition based on ITU-T Y.3100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2017); SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES; Future networks: Terms and definitions for IMT-2020 network (

Network slicing

Network slicing is a specific form of virtualisation that allows multiple logical networks to run on top of a shared physical network infrastructure. (..) The intent of network slicing is to be able to partition the physical network at an end-to-end level to allow optimum grouping of traffic, isolation from other tenants, and configuring of resources at a macro level.

itu
int
rec/dologin_pub.asp?lang=e&id=T-REC-Y.3100-201709-I!!PDF-E&type=items) and ITU-T Y.110 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (06/98); SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE; General Global Information Infrastructure principles and framework architecture (
itu
int
rec/dologin_pub.asp?lang=e&id=T-REC-Y.110-199806-I!!PDF-E&type=items)

Maturity level

A maturity level is a defined evolutionary plateau for organisational process improvement. Each maturity level matures an important subset of the organisation’s processes, preparing it to move to the next maturity level. The maturity levels are measured by the achievement of the specific and generic goals associated with each predefined set of process areas.

Maturity model

A maturity model is an instrument that evaluates the current position of certain capabilities of an organisation and provides indications of how it can transform to improve.

Microservices

Microservices is an approach to software architecture that builds a large, complex application from multiple small components that each perform a single function, such as authentication, notification, or payment processing. Each microservice is a distinct unit within the software development project, with its own code base, infrastructure, and database. The microservices work together, communicating through web APIs or messaging queues to respond to incoming events.

Natural language processing (NLP)Natural language processing (NLP) refers to the branch of AI concerned with giving computers the ability to understand text and spoken words in much the same way human beings can

Neural Network

Neural networks, also known as artificial neural networks (ANNs) or simulated neural networks (SNNs), are a subset of machine learning and are at the heart of deep learning algorithms. Their name and structure are inspired by the human brain, mimicking the way that biological neurons signal to one another. Artificial neural networks (ANNs) consist of multiple layers: an input layer, one or more hidden layers, and an output layer, all organized within a node structure. Each node, or artificial neuron, connects to another and has an associated weight and threshold. If the output of any individual node is above the specified threshold value, that node is activated, sending data to the next layer of the network. Otherwise, no data is passed along to the next layer of the network.

NFV

Network Function Virtualisation (NFV) is a network architecture concept that uses virtualization to classify entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. More specifically, it is the deployment of software implementations of traditional network functions (e.g. load balancers, firewalls, office switches/routers) on virtualized infrastructure rather than on function-specific specialized hardware devices.

NFV-MANO

(Network Functions Virtualisation Management and Orchestration)

Management and orchestration (MANO) is a key element of the ETSI network functions virtualization (NFV) architecture. MANO is an architectural framework that coordinates network resources for cloud-based applications and the lifecycle management of virtual network functions (VNFs) and network services. As such, it is crucial for ensuring rapid, reliable NFV deployments at scale. MANO includes the following components: the NFV orchestrator (NFVO), the VNF manager (VNFM), and the virtual infrastructure manager (VIM).

ibm
cloud
learn/natural-language-processing

Network automation

Network automation is the process of automating the configuration, management, testing, deployment, and operations of physical and virtual devices within a network.

  • https://www.juniper.net/us/en/products-services/whatis/network-automation/
  • https://www.cisco.com/c/en/us/solutions/automation/networkautomation.html
  • NFV-MANO Architectural Framework

    (Network Functions Virtualisation Management and Orchestration Architectural Framework)

    Collection of all functional blocks (including those in NFV-MANO category as well as others that interwork with NFV-MANO), data repositories used by these functional blocks, and reference points and interfaces through which these functional blocks exchange information for the purpose of managing and orchestrating NFV.

    • ETSI GS NFV 003 V1.4.1 (2018-08), Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV (
    netsync.com/practices/service-provider/networkautomation/Network controller

    NFVO

    (Network Functions Virtualisation Orchestrator)

    Functional block that

    centralizes some or all of the control and management functionality of a network domain and may provide an abstract view of its domain to other functional blocks via well-defined interfaces

    manages the Network Service (NS) lifecycle and coordinates the management of NS lifecycle, VNF lifecycle (supported by the VNFM) and NFVI resources (supported by the VIM) to ensure an optimized allocation of the necessary resources and connectivity.

    • ETSI GS NFV 003 V1.4.1 (2018-08), Network Functions Virtualisation (NFV); Terminology for Main Concepts in
    NFV (

    Anchor
    Omni
    Omni

    Omni-channel Capabilities

    Omnichannel capabilities is a term used in e-commerce and retail to describe if a business has the capabilities to implement a strategy that aims to provide a seamless shopping experience across all channels, including in-store, mobile, and online.

    etsi
    org
    deliver
    etsi_gs/NFV/001_099/003/01.04.01_60/gs_nfv003v010401p.pdf)

    Network function

    Network Function (NF) – a functional building block within a network infrastructure, which has well-defined external interfaces and a well-defined functional behaviour.

    ETSI GS ZSM 007 V1.1.1 (2019-08): Zero-touch network and Service Management (ZSM); Terminology for concepts in ZSM (

    OpenFlow protocol

    OpenFlow protocol is a protocol defined by the OpenFlow Switch Specification that allows separation of the network control plane by providing access to the forwarding plane.

    • internal definition based on: OpenFlow Switch Specification - Open Networking Foundation
    etsi
    deliver/etsi_gs/ZSM/001_099/007/01.01.01_60/gs_ZSM007v010101p.pdf)

    Network function disaggregation (NFD)

    Defines the evolution of switching and routing appliances from proprietary, closed hardware and software sourced from a single vendor, towards totally decoupled, open components which are combined to form a complete switching and routing device

    OpenFlow (standard)

    OpenFlow is an open standard that enables you to control traffic and run experimental protocols in an existing network by using a remote controller. The OpenFlow components consist of a controller, an OpenFlow or OpenFlow-enabled switch, and the OpenFlow protocol.

    metaswitch.com/knowledge-center/reference/what-is-network-function-disaggregation-nfdNetwork intelligence level

    A three-level application of automation capabilities (i.e., full automated infrastructure management, data centre infrastructure management and traceable/intelligent patch cords), including those enabled by integrating artificial intelligence techniques in the network.

    Network namespaces

    Network namespaces is a virtualization mechanism (a virtualised networking stack) which provides abstraction and virtualisation of network protocol services and interfaces. Each network namespace has its own network device instances that can be configured with individual network addresses.

    Network orchestration

    Network orchestration is the execution of the operational and functional processes involved in designing, creating, and delivering an end-to-end service. For example, it uses network automation to provide services through the use of applications that drive the network. An orchestrator functions to arrange and organise the various components involved in delivering a network service.

    Network resource

    Physical or logical network component of hardware, software or data in the data, control or management planes within an organization's infrastructure.

    • internal definition

    Network service

    A collection of network functions with a well specified behavior (i.e. content delivery networks (CDNs) and IP multimedia subsystem (IMS)).

    Network slicing

    Network slicing is a specific form of virtualisation that allows multiple logical networks to run on top of a shared physical network infrastructure. (..) The intent of network slicing is to be able to partition the physical network at an end-to-end level to allow optimum grouping of traffic, isolation from other tenants, and configuring of resources at a macro level.

    Network slice instance

    A Network slice instance is a set of Network Function instances and the required resources (e.g. compute, storage and networking resources) which form a deployed Network Slice.

    • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and 3GPP TS 23.501.

    NFV

    Network Function Virtualisation (NFV) is a network architecture concept that uses virtualization to classify entire classes of network node functions into building blocks that may connect, or chain together, to create communication services. More specifically, it is the deployment of software implementations of traditional network functions (e.g. load balancers, firewalls, office switches/routers) on virtualized infrastructure rather than on function-specific specialized hardware devices.

    NFV-MANO

    (Network Functions Virtualisation Management and Orchestration)

    Management and orchestration (MANO) is a key element of the ETSI network functions virtualization (NFV) architecture. MANO is an architectural framework that coordinates network resources for cloud-based applications and the lifecycle management of virtual network functions (VNFs) and network services. As such, it is crucial for ensuring rapid, reliable NFV deployments at scale. MANO includes the following components: the NFV orchestrator (NFVO), the VNF manager (VNFM), and the virtual infrastructure manager (VIM).

    NFV-MANO Architectural Framework

    (Network Functions Virtualisation Management and Orchestration Architectural Framework)

    Collection of all functional blocks (including those in NFV-MANO category as well as others that interwork with NFV-MANO), data repositories used by these functional blocks, and reference points and interfaces through which these functional blocks exchange information for the purpose of managing and orchestrating NFV.

    NFVO

    (Network Functions Virtualisation Orchestrator)

    Functional block that manages the Network Service (NS) lifecycle and coordinates the management of NS lifecycle, VNF lifecycle (supported by the VNFM) and NFVI resources (supported by the VIM) to ensure an optimized allocation of the necessary resources and connectivity.

    OpenFlow protocol

    OpenFlow protocol is a protocol defined by the OpenFlow Switch Specification that allows separation of the network control plane by providing access to the forwarding plane.

    OpenFlow (standard)

    OpenFlow is an open standard that enables you to control traffic and run experimental protocols in an existing network by using a remote controller. The OpenFlow components consist of a controller, an OpenFlow or OpenFlow-enabled switch, and the OpenFlow protocol.

    OpenStack

    Open source software for creating private and public clouds. OpenStack software controls large pools of compute, storage, and networking resources throughout a data center, managed through a dashboard or via the OpenStack API.

    Open virtual network (OVN)

    Open Virtual Network (OVN) is an Open vSwitch-based software-defined networking (SDN) solution for supplying network services to instances.

    Open vSwitch (OVS)

    Open source multilayer virtual switch that supports standard interfaces and protocols.

    Operational domain

    Scope of management delineated by an administrative and technological boundary.

    • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 

    Orchestration (ONAP)

    The arrangement, sequencing and automated implementation of tasks, rules and policies to coordinate logical and physical resources in order to meet a customer or on-demand request to create, modify or remove network or service resources.

    • from: TM Forum Technical Specification, Terminology for Zero-touch Orchestration, Operations and Management, TMF071, Release 17.0.1, November 2017, version 0.4.1, IPR Mode RAND 
    • (synonyms for the system performing the function: manager, coordinator)
    Process automation

    Process automation refers to the usage of technology to automate complex processes. It typically has three functions: automating processes, centralising information, and reducing the requirement for input from people. It is designed to remove bottlenecks and reduce errors and data loss, all while increasing transparency, communication across departments, and processing speed.

    Reinforcement learning

    Reinforcement learning, in the context of machine learning and artificial intelligence (AI), is a type of dynamic programming that trains algorithms using a system of reward and punishment.

    Resource slice

    A grouping of physical or virtual (network, compute, storage) resources. A resource slice could be one of the components of Network Slice, however on its own does not represent fully a Network Slice.

    Robotic Process Automation (RPA)

    Robotic Process Automation (RPA) is a type of AI; it is a software technology that allows people to configure robots to perform rules-based tasks. It can be particularly useful for processes with predictable and frequent interactions with multiple applications.

    • based on TM Forum AI Fundamentals course [TMF_AIF] and TM Forum “AI and its pivotal role in transforming operations” report and webinar [TMF_AI] 

    Software-defined networking (SDN)

    A programmable network approach that supports the separation of control and forwarding planes via standardized interfaces. 

    Self-configuration

    A process by which computer systems or networks automatically adapt their own configuration of components without human direct intervention.

    Self-organising network (SON)

    The term self-organising network comes from the mobile radio network industry and refers to automated planning, configuration, management, optimisation and healing of a network.

    Service access point

    A Service Access Point is a kind of Resource Function (RF) that handles access into and out of another RF, such as an application RF or virtualized appliance RF.

    • TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

    Service chaining (NFV)

    Network service chaining, also known as service function chaining (SFC) is a capability that uses software-defined networking (SDN) capabilities to create a service chain of connected network services (such as L4-7 like firewalls, network address translation [NAT], intrusion protection) and connects them in a virtual chain.  This capability can be used by network operators to set up suites or catalogs of connected services that enable the use of a single network connection for many services, with different characteristics.

    Software (Engineering) Governance

    Software Engineering Governance or Software Governance is the set of structures, processes and policies by which the software development and deployment function within an organisation is directed and controlled to yield business values and to mitigate risk.

    Software defined exchanges (SDX)

    Software Defined IXP (SDX) is an internet exchange that utilizes SDN to do interdomain routing. In addition, SDX design incorporates high levels of programmability, open APIs, shared resources across multiple domains, dynamic provisioning, resource discovery, quick resource integration and configuration, and granulated control of resources.

    • internal definition based on https://sdx.cs.princeton.edu/ and J. Mambretti, J. Chen, F. Yeh, Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies, 2014 26th International Teletraffic Congress (ITC), DOI: 10.1109/ITC.2014.6932970.
    Supervised learning / Supervised machine learning

    Supervised learning, also known as supervised machine learning, is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labelled for a particular output. The model is trained until it can detect the underlying patterns and relationships between the input and output labels, enabling it to yield accurate labelling results when presented with never-before-seen data.

    Also: “Note 2 – Supervised machine learning and unsupervised machine learning are two examples of machine learning types.” From ITU Recommendation Y.3172 (06/19).

    Switch abstraction interface (SAI)

    Definition of the API to provide a vendor-independent way of controlling forwarding elements, such as a switching ASIC, an NPU or a software switch in a uniform manner.

    Technical Reference Model (TRM)

    Architecture of generic services and functions that provides a foundation on which more specific architectures and architectural components can be built.

    Unsupervised learning / Unsupervised machine learning

    Unsupervised learning, also known as unsupervised machine learning, uses machine learning algorithms to analyse and cluster unlabelled datasets. These algorithms discover hidden patterns or data groupings without human intervention. Its ability to discover similarities and differences in information makes it the ideal solution for exploratory data analysis, cross-selling strategies for offering different products to customers, customer segmentation, and image recognition.

    User interface orchestration

    User Interface Orchestration defines, formats and structures the sequence of user interfaces (UIs) needed for a process. For example, the orchestration of UI during a service request from customers.

    OpenStack

    Open source software for creating private and public clouds. OpenStack software controls large pools of compute, storage, and networking resources throughout a data center, managed through a dashboard or via the OpenStack API.

    Open virtual network (OVN)

    Open Virtual Network (OVN) is an Open vSwitch-based software-defined networking (SDN) solution for supplying network services to instances.

    Open vSwitch (OVS)

    Open source multilayer virtual switch that supports standard interfaces and protocols.

    Operational domain

    Scope of management delineated by an administrative and technological boundary.

    • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 

    Orchestration (ONAP)

    The arrangement, sequencing and automated implementation of tasks, rules and policies to coordinate logical and physical resources in order to meet a customer or on-demand request to create, modify or remove network or service resources.

    • from: TM Forum Technical Specification, Terminology for Zero-touch Orchestration, Operations and Management, TMF071, Release 17.0.1, November 2017, version 0.4.1, IPR Mode RAND 
    • (synonyms for the system performing the function: manager, coordinator)

    Anchor
    process
    process

    Process automation

    Process automation refers to the usage of technology to automate complex processes. It typically has three functions: automating processes, centralising information, and reducing the requirement for input from people. It is designed to remove bottlenecks and reduce errors and data loss, all while increasing transparency, communication across departments, and processing speed.

    Anchor
    raw
    raw

    Raw Model

    In the context of machine learning, a 'raw model' typically refers to a model that has been trained on data without much preprocessing or feature engineering. It is a basic model without any fine-tuning or optimisation.

    Rectification Activation Function

    Rectification is the process of using a rectifier activation function (also referred to as a Rectified Linear Unit or ReLU): Rectified linear units, allow for faster and effective training of deep neural architectures on large and complex datasets compared to sigmoid function or similar activation functions.

    Recurrent Neural Network

    RNN stands for Recurrent Neural Network. This is a type of artificial neural network that can process sequential data, recognise patterns, and predict the final output. This type of neural network is called recurrent because it can repeatedly perform the same task or operation on a sequence of inputs.

    Reinforcement learning

    Reinforcement learning, in the context of machine learning and artificial intelligence (AI), is a type of dynamic programming that trains algorithms using a system of reward and punishment.

    Resource Facing Services (RFS)

    A logical capability that is packaged as part of a product offering by service providers to their customers, but which is not directly visible to and/or usable by those customers. The logical functionality can be derived from underlying network or information technology (i.e., MPLS capabilities provided as part of a router), or may be delivered or supplied by staff or contractors employed by the service provider.

    Resource slice

    A grouping of physical or virtual (network, compute, storage) resources. A resource slice could be one of the components of Network Slice, however on its own does not represent fully a Network Slice.

    Robotic Process Automation (RPA)

    Robotic Process Automation (RPA) is a type of AI; it is a software technology that allows people to configure robots to perform rules-based tasks. It can be particularly useful for processes with predictable and frequent interactions with multiple applications.

    • based on TM Forum AI Fundamentals course [TMF_AIF] and TM Forum “AI and its pivotal role in transforming operations” report and webinar [TMF_AI] 

    Anchor
    secops
    secops

    SecOps

    Security operations, also known as SecOps, refers to a business combining internal information security and IT operations practices to improve collaboration and reduce risks.

    Self-learning AI

    Self-learning models are AI models that, once deployed, can be optimised by training them on data that becomes more available over time. This process prevents engineers from having to begin building new AI models from scratch every single time they collect more data.

    Software-defined networking (SDN)


    A programmable network approach that supports the separation of control and forwarding planes via standardized interfaces. 

    Self-configuration

    A process by which computer systems or networks automatically adapt their own configuration of components without human direct intervention.

    Self-organising network (SON)

    The term self-organising network comes from the mobile radio network industry and refers to automated planning, configuration, management, optimisation and healing of a network.

    Service access point

    A Service Access Point is a kind of Resource Function (RF) that handles access into and out of another RF, such as an application RF or virtualized appliance RF.

    • TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019

    Serverless Architecture

    Serverless architecture is a cloud-computing execution model where the cloud provider dynamically manages the allocation of machine resources. Pricing is based on the actual amount of resources consumed by an application, rather than pre-purchased units of capacity. This architecture allows developers to build and run applications without managing the underlying infrastructure.

    Service chaining (NFV)

    Network service chaining, also known as service function chaining (SFC) is a capability that uses software-defined networking (SDN) capabilities to create a service chain of connected network services (such as L4-7 like firewalls, network address translation [NAT], intrusion protection) and connects them in a virtual chain.  This capability can be used by network operators to set up suites or catalogs of connected services that enable the use of a single network connection for many services, with different characteristics.

    Single Source of Truth

    A single source of truth can be defined as a centralized and authoritative data repository that serves as the definitive reference for all relevant information within an organization.

    Software (Engineering) Governance

    Software Engineering Governance or Software Governance is the set of structures, processes and policies by which the software development and deployment function within an organisation is directed and controlled to yield business values and to mitigate risk.

    Software defined exchanges (SDX)

    Software Defined IXP (SDX) is an internet exchange that utilizes SDN to do interdomain routing. In addition, SDX design incorporates high levels of programmability, open APIs, shared resources across multiple domains, dynamic provisioning, resource discovery, quick resource integration and configuration, and granulated control of resources.

    • internal definition based on https://sdx.cs.princeton.edu/ and J. Mambretti, J. Chen, F. Yeh, Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies, 2014 26th International Teletraffic Congress (ITC), DOI: 10.1109/ITC.2014.6932970.
    Supervised learning / Supervised machine learning

    Supervised learning, also known as supervised machine learning, is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labelled for a particular output. The model is trained until it can detect the underlying patterns and relationships between the input and output labels, enabling it to yield accurate labelling results when presented with never-before-seen data.

    Also: “Note 2 – Supervised machine learning and unsupervised machine learning are two examples of machine learning types.” From ITU Recommendation Y.3172 (06/19).

    Switch abstraction interface (SAI)

    Definition of the API to provide a vendor-independent way of controlling forwarding elements, such as a switching ASIC, an NPU or a software switch in a uniform manner.

    Anchor
    technical
    technical

    Technical Reference Model (TRM)

    Architecture of generic services and functions that provides a foundation on which more specific architectures and architectural components can be built.

    The Network Data Analytics Function (NWDAF)

    A network function that collects data from various network functions, application functions, as well as operations, administration, and management (OAM) systems, and operational support systems.

    Note: This term is frequently used in 5G architecture.

    Training Data

    The data that are used to try to fit the best combination of weights and biases to a machine learning algorithm to minimize a loss function over the prediction range.

    Training model

    A machine learning training model is a process in which a machine learning (ML) algorithm is fed with sufficient training data to learn from. ML models can be trained to benefit manufacturing processes in several ways. The result of the process is a trained model.

    Transfer Learning

    A technique in machine learning in which an algorithm learns to perform one task, such as recognising cars, and then is used as the starting point for a second, different task such as recognising cats. By using the knowledge from the first task the model can learn more quickly and effectively on the second task.

    Transformers

    A procedure that modifies a dataset.

    Anchor
    unsupervised
    unsupervised

    Unsupervised learning / Unsupervised machine learning

    Unsupervised learning, also known as unsupervised machine learning, uses machine learning algorithms to analyse and cluster unlabelled datasets. These algorithms discover hidden patterns or data groupings without human intervention. Its ability to discover similarities and differences in information makes it the ideal solution for exploratory data analysis, cross-selling strategies for offering different products to customers, customer segmentation, and image recognition.

    User interface orchestration

    User Interface Orchestration defines, formats and structures the sequence of user interfaces (UIs) needed for a process. For example, the orchestration of UI during a service request from customers.

    • based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and IG1167 R18.0 "ODA Functional Architecture" Reference R21

    Anchor
    validation
    validation

    Validation Data

    ‘Validation data’ means data used for providing an evaluation of the trained AI system and for tuning its non-learnable parameters and its learning process, among other things, in order to prevent underfitting or overfitting; whereas the validation dataset is a separate dataset or part of the training dataset, either as a fixed or variable split.

    Vertical scaling

    Vertical scaling (or scaling up) means that you scale by adding more power (CPU, RAM) to an existing machine.

    based on TM Forum Reference, TMF071 ODA Terminology, TMF071, Release 19.0.1, October 2019 and IG1167 R18.0 "ODA Functional Architecture" Reference R21

    Virtual content delivery network

    A content delivery network using virtualisation technology that enables the allocation of virtual storage, virtual machines, and network resources according to providers' requirements in a dynamic and scalable manner.

    Virtual eXtensible Local Area Network (VXLAN)

    Virtual eXtensible Local Area Network (VXLAN) enables the encapsulation of Ethernet frames inside UDP packets with a designated UDP destination port (4789). VXLAN allows users to overlay L2 networks on top of existing L3 networks. In the data center, it is commonly used to stretch an L2 network across multiple racks.

    Virtual routing and forwarding (VRF)

    Virtual Routing and Forwarding is a layer 3 abstraction, which provides a separate routing table for each instance, usually this is done by adding some sort of VRFID to the routing table lookup.

    Virtualisation

    Abstraction of network or service objects to make them appear generic, i.e. disassociated from the underlying hardware implementation specifics.

    • internal definition

    Virtualised network function (VNF) - virtual network function

    Virtual Network Function (VNF) is a network task written as software that can be provided in a virtualised manner (i.e. firewall, router, switch).

    Anchor
    workflow
    workflow

    Workflow

    The sequence of steps through which a piece of work passes

    from initiation to completion.

    from initiation to completion.

    Workflow management

    Workflow management (WFM) is a technology supporting the re-engineering of business and information processes. It involves: Defining workflows, (...) and providing for fast (re)design and (re)implementation of the processes as business needs and information systems change.

    • D. Georgakopoulos, M. Hornick, A. Sheth, An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure, Distributed and Parallel Databases, 3, 119-153 (1995), http
    based on https
    merriam-webster
    dictionary/workflow

    Workflow management

    Anchor
    zero
    zero

    Zero-touch provisioning (ZTP) or Zero-touch enrolment

    Zero-touch provisioning (ZTP), or zero-touch enrolment, is the process of remotely provisioning large numbers of network devices such as switches, routers and mobile devices without having to manually program each one individually.

    Workflow management (WFM) is a technology supporting the re-engineering of business and information processes. It involves: Defining workflows, (...) and providing for fast (re)design and (re)implementation of the processes as business needs and information systems change.

    D. Georgakopoulos, M. Hornick, A. Sheth, An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure, Distributed and Parallel Databases, 3, 119-153 (1995), http://www.workflowpatterns.com/documentation/documents/workflow95.pdf.


    GLOSSARY

    Table Filter
    inversefalse
    sparkNameSparkline
    columnAbbreviation/ Acronym
    hidePaneTable header
    isNewfalse
    separatorPoint (.)
    labelsAbbreviation/ Acronym
    cell-width150
    datepatternyy-mm-dd
    id1730984404616
    isORAND
    formatVersion2
    order0


    Abbreviation/ Acronym

    Description/Definition

    ABEAggregate Business Entity
    ACMMAnalysis Capability Maturity Model
    AIArtificial Intelligence
    AIOpsArtificial Intelligence for IT Operations
    AMCAutonomic Management and Control
    APTAdvanced Persistent Threat
    AMMAutomation Maturity Model
    AnLFAnalytics Function
    ARCMMArchitecture Capability Maturity Model
    AWSAmazon Web Services
    BPMMBusiness Process Maturity Model
    BPMNBusiness Process Model and Notation

    BSS

    Business Support System

    CBP

    Ciena Blue Planet

    CCITT

    International Telegraph and Telephone Consultative Committee

    CDEComponent DEscription
    CDNContent Delivery Network
    CFSCustomer Facing Services
    CLICommand Line Interface
    CMM(Service) Capability Maturity Model
    CMMICapability Maturity Model Integrated
    CNACloud Native Application

    CNI

    Container Network Interface

    CNF 

    Containerised Network Function

    CSP

    Communications Service Provider

    D&IDecoupling & Integration

    DC

    Data Centre

    DCN

    Data Communication Network

    DEDecision Element
    DevOps Development and Operations
    DPMMDocument Process Maturity Model
    DPRADigital Platform Reference Architecture
    DTNData Transfer Node
    EACMEnterprise Architecture Content Metamodel
    EGMEngagement Management
    eLMMe-Learning Maturity Model

    ETSI

    European Telecommunications Standards Institute

    EVPN

    Ethernet VPN

    FOSSFree and Open Source Software

    FRR

    Free Range Routing

    GANAGeneric Autonomic Networking Architecture

    Geneve

    Generic Network Virtualisation Encapsulation

    GRE

    Generic Routing Encapsulation

    GSGroup Specification
    GNA-GGlobal Network Advancement Group

    GVM

    Generalised Virtualisation Model

    IaaSInfrastructure as a Service

    IaC

    Infrastructure as Code

    IDEIntegrated Development Environment
    IDS Intrusion Detection System
    IDSPIntegrated Digital Service Provider

    IG 

    Information Governance

    IEEE

    Institute of Electrical and Electronics Engineers 

    IETF

    Internet Engineering Task Force

    IMIntelligence Management
    IMSIP Multimedia Subsystem

    IOA

    Indicators of Attack

    IOC

    Indicators of Compromise

    IPS

    Intrusion Prevention System

    IRTF

    Internet Research Task Force
    IS/ICT CMFInformation Systems and Information Communication Technology Management Capability Maturity Framework
    ISOInternational Organisation for Standardisation
    ISO 15504 – SPICESoftware Process Improvement and Capability Determination
    IT-BSC Maturity ModelIT governance tool Balanced Scorecard Maturity Model
    ITPM3IT Performance Measurement Maturity Model

    ITU

    International Telecommunication Union

    ITU-T

    Telecommunication Standardisation Sector of ITU

    IXP

    Internet Exchange Point

    K8s

    Kubernetes

    KPI

    Key Performance Indicator

    LAN

    Local Area Network

    LSOLifecycle Service Orchestration
    M2MMachine-to-Machine

    MANO

    Management and Orchestration

    MCCManagement-Control Continuum

    MDSO

    Multi-Domain Service Orchestration

    MDVPNMulti-Domain Virtual Private Networks
    MEManaged Entity

    MEF

    Metro Ethernet Forum

    NaaS/naas

    Network as a Service

    NaC

    Network as Code

    NAT

    Network Address Translation

    NAO

    Network Automation and Orchestration

    NCO

    Network Controls and Orchestration

    NENetwork Element

    NEP

    Network Equipment Providers

    NETCONF

    Network Configuration Protocol

    NFNetwork Function
    NFDNetwork Function Disaggregation

    NFV

    Network Function Virtualisation

    NFVI

    Network Function Virtualisation Infrastructure

    NFV-O

    Network Function Virtualisation Orchestrator

    NGN

    Next Generation Network

    NMMNetwork Maturity Model
    NOCNetwork Operations Centre

    NREN

    National Research and Education Network

    NWDAF

    Network Data Analytics Function

    NRO

    Network Resource Optimisation

    NSNetwork Service

    NSA

    Network Service Agent

    NSI

    Network Service Interface

    NSSAINetwork Slice Selection Assistance Information
    NVGRE

    Network Virtualisation over GRE (Generic Routing Encapsulation)

    OAMPOperations, Administration, Maintenance and Provisioning
    OASISOrganisation for the Advancement of Structured Information Standards

    OAV

    Orchestration, Automation and Virtualisation

    OCPOpen Compute Project
    ODAOpen Digital Architecture

    ODL

    OpenDaylight

    ODMOperational Domain Management/Manager
    OESSOpen Exchange Software Suite

    OGF

    Open Grid Forum

    ONAP

    Open Networking Automation Platform

    ONOS

    Open Network Operating System

    OPNFV

    Open Platform for NFV Project

    OSM

    Open Source MANO

    OSS

    Operations Support System

    OVN

    Open Virtual Network

    OVSOpen vSwitch

    PaaS

    Platform as a Service

    R&D

    Research and Development

    R&E

    Research & Education

    RESTRepresentational State Transfer
    RFResource Function
    RFSResource Facing Services
    SaaSSoftware as a Service

    SAI

    Switch Abstraction Interface

    SDDC

    Software-Defined Data Center

    SDN

    Software Defined Network

    SDOStandards Developing Organization

    SD-WAN

    Software-Defined networking in a Wide Area Network (WAN)

    SDX

    Software-Defined Exchange

    SFC

    Service Function Chaining (also known as Network Service Chaining)

    SIEM

    Security Information and Event Management

    S-NSSAISingle Network Slice Selection Assistance Information
    SOAService Oriented Architecture
    SOAPSimple Object Access Protocol
    SOARSecurity Orchestration, Automation, and Response
    SOCSecurity Operations Centre

    SPA

    Service Provider Architecture

    STF

    Service and Technology Forum

    STPService Termination Point

    STT

    Stateless Transport Tunneling

    TMF

    TM Forum

    TOGAFThe Open Group Architecture Framework
    TOSCATopology and Orchestration Specification for Cloud Applications
    TEVVTest and Evaluation, Verification and Validation
    TTPsTactics, Techniques, and Procedures

    VCDN

    Virtual Content Delivery Network

    VIM

    Virtual Infrastructure Management

    VM

    Virtual Machine

    VNF

    Virtual Network Function

    VNFMVirtualised Network Function Manager
    VNOVirtual Network Operator

    VPN

    Virtual Private Network 

    VPP

    Vector Packet Processing 

    VRF

    Virtual Routing Function

    VSI

    Virtual Switch Instance

    VTEP

    Virtual Tunnel End Point

    VXLAN

    Virtual Extensible LAN

    WAN

    Wide Area Network

    WFMWorkflow Management

    XaaS

    Anything as a Service

    XDP

    eXpress Data Path

    XML

    eXtensible Markup Language

    XSOAR

    Extended Security Orchestration, Automation, and Response

    YANG

    Yet Another Next Generation

    ZOOMZero-touch Orchestration, Operations and Management
    ZSMZero-touch network and Service Management

    ZTP

    Zero Touch Provisioning











    ...