Recommendation ITU-T Y.3680 (02/2022) Framework of human-like networking
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of human-like networking
7 Framework for human-like networking
     7.1 General framework for human-like networking
     7.2 General architecture for network layer
          7.2.1 Overview of network layer
          7.2.2 Operation and data capability for network layer
          7.2.3 Awareness capability for network layer
               7.2.3.1 Independent mode
               7.2.3.2 Overlapping mode
               7.2.3.3 Slicing mode
     7.3 General architecture for control layer
          7.3.1 Overview of control layer
          7.3.2 Network simulator entity
          7.3.3 Self-learning entity
          7.3.4 Self-training entity
          7.3.5 Self- deciding entity
          7.3.6 Decision-evaluating entity
     7.4 General architecture for user layer
          7.4.1 Overview of user layer
          7.4.2 User requirements collecting
          7.4.3 User service defining
     7.5 General architecture for application layer
          7.5.1 Overview of application layer
          7.5.2 Data and information collecting from application layer
          7.5.3 Service providing to application layer
8 Generic architecture model for human-like networking based on function and capability
     8.1 Generic model based on functional planes for human-like networking
     8.2 Functional planes of human-like networking
          8.2.1 Awareness plane
          8.2.2 Thinking plane
          8.2.3 Action plane
          8.2.4 Knowledge plane
          8.2.5 Mechanism plane
9 Relationship between layers, sub-network and networks for human-like networking
     9.1 Relationship between networks
     9.2 Relationship between layers
     9.3 Relationship between sub-networks
     9.4 Specification for reference points
10 Interface aspects for human-like networking
     10.1 Inter-layer interfaces
     10.2 Intra-layer interfaces
     10.3 Inter-network interface
11 Security considerations
Appendix I  Example application scenarios of human-like networking
     I.1 Autonomically blocking malicious traffic
     I.2 Autonomically optimizing routes
Bibliography
<\pre>