Etsi Gs ZSM 002: Zero-Touch Network and Service Management (ZSM) Reference Architecture
Etsi Gs ZSM 002: Zero-Touch Network and Service Management (ZSM) Reference Architecture
Etsi Gs ZSM 002: Zero-Touch Network and Service Management (ZSM) Reference Architecture
1 (2019-08)
GROUP SPECIFICATION
Disclaimer
The present document has been produced and approved by the Zero touch network and Service Management (ZSM) ETSI
Industry Specification Group (ISG) and represents the views of those members who participated in this ISG.
It does not necessarily represent the views of the entire ETSI membership.
2 ETSI GS ZSM 002 V1.1.1 (2019-08)
Reference
DGS/ZSM-002ed111_Arch
Keywords
architecture, management, network, service
ETSI
Important notice
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2019.
All rights reserved.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.
3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and
of the oneM2M Partners.
GSM® and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI
3 ETSI GS ZSM 002 V1.1.1 (2019-08)
Contents
Intellectual Property Rights ................................................................................................................................7
Foreword.............................................................................................................................................................7
Modal verbs terminology....................................................................................................................................7
1 Scope ........................................................................................................................................................8
2 References ................................................................................................................................................8
2.1 Normative references ......................................................................................................................................... 8
2.2 Informative references ........................................................................................................................................ 8
3 Definition of terms, symbols, abbreviations and conventions..................................................................9
3.1 Terms.................................................................................................................................................................. 9
3.2 Symbols ............................................................................................................................................................ 10
3.3 Abbreviations ................................................................................................................................................... 10
3.4 Conventions ...................................................................................................................................................... 11
4 Architecture principles ...........................................................................................................................12
4.1 Introduction ...................................................................................................................................................... 12
4.2 The principles ................................................................................................................................................... 12
4.2.1 Principle 01: Modularity ............................................................................................................................. 12
4.2.2 Principle 02: Extensibility .......................................................................................................................... 12
4.2.3 Principle 03: Scalability .............................................................................................................................. 12
4.2.4 Principle 04: Model-driven, open interfaces ............................................................................................... 12
4.2.5 Principle 05: Closed-loop management automation ................................................................................... 13
4.2.6 Principle 06: Support for stateless management functions ......................................................................... 13
4.2.7 Principle 07: Resilience .............................................................................................................................. 13
4.2.8 Principle 08: Separation of concerns in management ................................................................................. 13
4.2.9 Principle 09: Service composability ........................................................................................................... 13
4.2.10 Principle 10: Intent-based interfaces ........................................................................................................... 13
4.2.11 Principle 11: Functional abstraction ........................................................................................................... 13
4.2.12 Principle 12: Simplicity .............................................................................................................................. 13
4.2.13 Principle 13: Designed for automation ....................................................................................................... 14
5 Architecture requirements ......................................................................................................................14
5.1 Introduction ...................................................................................................................................................... 14
5.2 Non-functional requirements ............................................................................................................................ 14
5.2.1 General non-functional requirements.......................................................................................................... 14
5.2.2 Non-functional requirements for cross-domain data services ..................................................................... 14
5.2.3 Non-functional requirements for cross-domain service integration ............................................................ 15
5.3 Functional requirements ................................................................................................................................... 15
5.3.1 General functional requirements ................................................................................................................. 15
5.3.2 Functional requirements for data collection................................................................................................ 16
5.3.3 Functional requirements for cross-domain data services ............................................................................ 16
5.3.4 Functional requirements for cross-domain service integration and access ................................................. 17
5.3.5 Functional requirements for lawful intercept .............................................................................................. 17
5.4 Security requirements ....................................................................................................................................... 17
6 Reference architecture ............................................................................................................................18
6.1 General architecture overview .......................................................................................................................... 18
6.1.1 Introduction................................................................................................................................................. 18
6.1.2 Architectural building blocks ...................................................................................................................... 18
6.1.2.1 Management services ............................................................................................................................ 18
6.1.2.2 Management functions .......................................................................................................................... 19
6.1.2.3 Management domains ........................................................................................................................... 19
6.1.2.4 The end-to-end (E2E) service management domain ............................................................................. 20
6.1.2.5 Integration fabric ................................................................................................................................... 20
6.1.2.6 Data services ......................................................................................................................................... 20
6.2 Architecture diagram ........................................................................................................................................ 21
6.3 Integration fabric .............................................................................................................................................. 22
ETSI
4 ETSI GS ZSM 002 V1.1.1 (2019-08)
ETSI
5 ETSI GS ZSM 002 V1.1.1 (2019-08)
ETSI
6 ETSI GS ZSM 002 V1.1.1 (2019-08)
ETSI
7 ETSI GS ZSM 002 V1.1.1 (2019-08)
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
Foreword
This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Zero touch network and
Service Management (ZSM).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
8 ETSI GS ZSM 002 V1.1.1 (2019-08)
1 Scope
The present document defines and describes the reference architecture for the end-to-end Zero-touch network and
Service Management (ZSM) framework based on a set of user scenarios and requirements documented in ETSI
GS ZSM 001 [i.9].
The reference architecture employs a set of architectural principles, described further in the present document, and a
service-centric architectural model to define at a high level a set of management services for zero-touch network and
service management. It also defines means of management service integration, communication, interoperation, and
organization. Procedures and detailed information models are beyond the scope of the present document.
The reference architecture also defines normative provisions for externally visible management services, defined as part
of the reference architecture, as well as recommendations for their organization. It is assumed that the architectural
patterns introduced in the present document can be used not only for the ZSM framework, but also for architecture and
design of individual management services.
2 References
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
Not applicable.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI GR ZSM 005: "Zero-touch network and Service Management (ZSM); Means of
Automation".
[i.2] Boyd, J.R.: "The Essence of Winning and Losing", June 1995.
[i.3] Kephart, J. and D. Chess: "The Vision of Autonomic Computing", IEEE Computer, vol. 36, no. 1,
pp. 41-50, DOI 10.1109/MC.2003.1160055, January 2003.
[i.4] Miller, D.E.: "A new approach to model reference adaptive control", IEEE Transactions on
Automatic Control, Volume: 48, Issue: 5, May 2003.
ETSI
9 ETSI GS ZSM 002 V1.1.1 (2019-08)
[i.8] ETSI GS ZSM 007: "Zero-touch network and Service Management (ZSM); Terminology for
concepts in ZSM".
[i.9] ETSI GS ZSM 001: "Zero-touch network and Service Management (ZSM); Requirements based
on documented scenarios".
3.1 Terms
For the purposes of the present document, the terms given in ETSI GS ZSM 007 [i.8] and the following apply:
NOTE: If the same term is defined in both ETSI GS ZSM 007 [i.8] and in the present document, the definition in
the present document takes precedence.
cross-domain data services: services that allow to share data with authorized consumers across management domains
external visibility: property of a ZSM service that indicates whether the scope of the service consumption spans
outside the management domain
integration fabric: management function that plays both the roles of service consumer and service producer and which
facilitates the interoperation and communication between management functions
key performance indicator: measurement of a specific aspect of the performance of a service that can be used in a
service level objective
NOTE: Examples of managed entities are infrastructure resources, such as virtual network functions (VNF),
physical network functions (PNF), and services such as cloud services, NFV network services, CFSs,
RFSs.
management domain: scope of management that federates together management services, that enables their exposure
towards external service consumers and that is delineated by a business, administrative, technological or other boundary
management function: logical entity playing the roles of service consumer and/or service producer
NOTE: The implementation details of a management function are not covered in the present document.
NOTE: Examples of service capabilities are defined in the sub-clauses "Provided management services" of
clauses 6.3, 6.4, 6.5 and 6.6 of the present document.
ETSI
10 ETSI GS ZSM 002 V1.1.1 (2019-08)
service end-point: interface through which service capabilities are offered and consumed
service level agreement: part of a business agreement between a service provider and a customer, specifying the
committed service quality and quantity in terms of service level specifications, and the associated consequences in case
the service level objectives are not met
service level objective: element in a service level specification that is defined in terms of parameters, and related
metrics, thresholds and tolerances associated with the parameters
ZSM framework consumer: entity outside the ZSM framework that uses one or several of the management
capabilities offered by the ZSM framework
NOTE 1: ZSM framework consumers may be non-human entities (e.g. digital store fronts, web portals, BSS
components, other ZSM framework instances) or human users.
NOTE 2: ZSM services offer machine-consumable interfaces. They may also allow interfacing with human users
using e.g. a GUI, web portal or application.
NOTE: In the present document, the terms "ZSM service" and "management service" are used interchangeably.
3.2 Symbols
Void.
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI GS ZSM 007 [i.8] and the following apply:
NOTE: If the same abbreviation is defined in both ETSI GS ZSM 007 [i.8] and in the present document, the
definition in the present document takes precedence.
ETSI
11 ETSI GS ZSM 002 V1.1.1 (2019-08)
MD Management Domain
ML Machine Learning
MRACL Model-Reference Adaptive Control Loop
NBI North Bound Interface
NFV Network Functions Virtualization
NIST National Institute of Standards and Technology
OODA Observe, Orient, Decide, Act
PM Performance Management
PNF Physical Network Function
RFS Resource Facing Service
SBI South Bound Interface
SDN Software-Defined Network
SLA Service Level Agreement
SLO Service Level Objective
SLS Service Level Specification
SON Self-Organizing Networks
TS Technical Specification
VIM Virtualized Infrastructure Manager
VLAN Virtualized Local Area Network
VNF Virtualized Network Function
XaaS X-as-a-Service
ZSM Zero-touch network and Service Management
3.4 Conventions
The present document defines ZSM services in a table that provides the name of the service, information about the
visibility of that service outside the management domain where the service producer is located, information on the
capabilities of that service and whether or not the capabilities are mandatory to provide.
The external visibility (or "ExtVis" in short) defines whether the service:
• shall always (i.e. without condition) be visible to consumers that are external to the management domain in
which the producer resides (external visibility set to MANDATORY);
• shall be visible to external consumers if certain conditions are met and may be visible to external consumers
otherwise (external visibility set to CONDITIONAL); or
If the external visibility is defined as CONDITIONAL, a condition is defined either in the "External visibility" row or in
the "NOTE" row. ZSM services that are defined with optional external visibility are not required to be supported in
ZSM.
The external visibility of data services and integration fabric services is documented separately as it depends on the
scope. Hence, the "external visibility" row is not contained in tables that define a data service or an integration fabric
service.
ETSI
12 ETSI GS ZSM 002 V1.1.1 (2019-08)
The capabilities offered by the service are defined under "Service capabilities". A capability can be mandatory (M)
which means it shall be offered if the service is offered, conditional (C) which means it shall be offered under certain
conditions if the service is offered or optional (O) which means it may be offered if the service is offered. For a
conditional capability, the condition is defined in the description of the capability, or in the "NOTE" row. The
description can contain normative statements to provide a finer-granular definition of the level of support for parts of a
capability.
EXAMPLE 1: A capability to manage models could include items such as "create", "read", "update", "delete" and
"list", where "create", "read" and "delete" are mandatory and "list" and "update" are optional. This
can be documented as follows: "Manage models (M) -- Manage (create, read, update, delete, list)
models. Create, read and delete shall be supported whereas update and list may be supported". In
this case, the capability to manage models is mandatory to support, which implies that create, read
and delete are mandatory and update and list are optional.
EXAMPLE 2: This example assumes that the "Manage models" capability is optional: "Manage models (O) --
Manage (create, read, update, delete, list) models. Create, read and delete shall be supported
whereas update and list may be supported". In this case, the normative statements only apply if the
"Manage models" capability is offered. In other words, if the "Manage models" capability is
offered, create, read and delete are mandatory and update and list are optional.
4 Architecture principles
4.1 Introduction
The overarching design goal of ZSM is to enable zero-touch automated network and service management in a multi-
vendor environment.
This clause introduces a number of architecture principles applicable to the ZSM framework reference architecture.
These principles guide the way of designing the ZSM architecture to achieve the design goal stated above in order to
allow fully automated network and service management.
ETSI
13 ETSI GS ZSM 002 V1.1.1 (2019-08)
NOTE: Closed loops (e.g. using the stages Observe, Orient, Decide, Act) allow e.g. self-optimization,
improvement of network and resource utilization, and automated service assurance and fulfilment.
Inside a management domain, resources and services based on these resources are managed. The complexity of domain
resources can be abstracted from service consumers outside of the management domain.
The end-to-end cross-domain service management manages end-to-end services that span multiple management
domains, and coordinates between management domains using orchestration. In this context, end-to-end services may
span multiple management domains provided by different administrative entities (e.g. different network service
providers or external partners).
Decoupling of management domains and end-to-end service management across domains avoids monolithic systems,
allows to reduce the complexity of the overall service, and enables independent evolution of each management domain
and of end-to-end management.
Intent-based interfaces express the consumer request(s) in a declarative form. A declarative form assumes the ability of
e.g. the target system and its service producers to understand the request(s).
ETSI
14 ETSI GS ZSM 002 V1.1.1 (2019-08)
5 Architecture requirements
5.1 Introduction
Clause 5 defines architecture requirements applicable to the ZSM framework reference architecture. Architecture
requirements are derived from the scenarios and requirements described in ETSI GS ZSM 001 [i.9] and define non-
functional as well as functional needs to be satisfied by the architecture.
[NFunc-Gen-02] The ZSM framework reference architecture shall enable management actions to comply with
appropriate regulatory requirements.
[NFunc-Gen-03] The ZSM framework reference architecture shall enable energy efficiency where applicable.
[NFunc-Gen-04] The ZSM framework reference architecture shall be vendor, operator and service provider
agnostic.
NOTE 1: QoS refers to for example the performance of data services in terms of throughput and delay.
[NFunc-CDS-02] The ZSM framework reference architecture shall enable interoperability of data services across
different management domains.
[NFunc-CDS-03] The ZSM framework reference architecture shall enable interoperability of data services
provided by the ZSM framework with data services outside of the ZSM framework.
[NFunc-CDS-04] The ZSM framework reference architecture shall support capabilities to process data within the
pre-defined processing time.
NOTE 2: The term "pre-defined processing time" is strongly related to use cases and their criticality.
[NFunc-CDS-05] The ZSM framework reference architecture shall support capabilities to execute management
tasks within the pre-defined processing time.
NOTE 4: The term "pre-defined processing time" is strongly related to use cases and their criticality.
[NFunc-CDS-06] The ZSM framework reference architecture shall support the capability to achieve high data
availability.
ETSI
15 ETSI GS ZSM 002 V1.1.1 (2019-08)
[NFunc-Int-02] Integration of management services into the ZSM framework should not require changes to the
management functions.
[NFunc-Int-03] The ZSM framework reference architecture shall support on-demand addition or removal of
management services.
[NFunc-Int-04] The ZSM framework reference architecture shall support coexistence of different management
service versions at the same time.
NOTE 1: Resources include programmable networks including multi-layer networks, cloud-native and traditional
virtualized network functions, and physical network functions.
[Func-Gen-02] The ZSM framework reference architecture shall support the cross-domain management of
end-to-end services.
[Func-Gen-03] The ZSM framework reference architecture shall support adaptive closed-loop management.
[Func-Gen-04] The ZSM framework reference architecture shall support bounding the automated decision-
making mechanisms by rules and policies set by the operator.
[Func-Gen-05] The ZSM framework reference architecture shall support hiding the management complexity
of management domains and end-to-end services.
[Func-Gen-06] The ZSM framework reference architecture shall support all technology domains necessary to
realize an E2E service.
NOTE 3: The typical examples of technology domains are but not limited to access network, transport network,
core network and cloud.
[Func-Gen-07] Management services provided by the ZSM management domains shall support automation of
operational lifecycle management functions as applicable to the resources and services
(including RFS/CFS).
[Func-Gen-08] The ZSM framework reference architecture shall define standard interfaces within the
management domains so that their management can be fully automated.
[Func-Gen-09] The ZSM framework reference architecture shall support access control to services exposed by
the management domains.
[Func-Gen-10] The ZSM framework reference architecture shall support open interfaces.
[Func-Gen-11] The ZSM framework reference architecture shall support management of end-to-end services
that cross boundaries between different domains.
ETSI
16 ETSI GS ZSM 002 V1.1.1 (2019-08)
[Func-DColl-02] The ZSM framework reference architecture shall support functionality that enables storing
collected data (or to steer their appropriate storage).
[Func-DColl-03] The ZSM framework reference architecture shall support functionality that enables the
common access to the collected up-to-date data across management domains.
[Func-DColl-04] While providing common access to the collected data, the ZSM framework reference
architecture shall support the capability of enforcing data governance.
[Func-DColl-05] The ZSM framework reference architecture shall support functionality that enables aggregating
the collected data cross-domain, and (pre-) processing/filtering the collected data.
[Func-DColl-06] The ZSM framework reference architecture shall support different degrees of cadence, velocity
and volume of data collection.
[Func-DColl-07] The ZSM framework reference architecture shall support different degrees of cadence, velocity
and volume of data sharing.
EXAMPLE: While data may be consumed locally inside a management domain with a high sampling
frequency, entities in other management domains may just need aggregate data, or a data stream
with a lower sampling frequency.
[Func-DColl-08] The ZSM framework reference architecture shall support the capability to manage the
distribution of collected data and keep distributed data consistent.
[Func-DColl-09] The ZSM framework reference architecture shall support functionality to provide data to the
data consumer according to the data consumer's requirements (e.g. relevant data, relevant time,
relevant form).
[Func-DColl-10] The ZSM framework reference architecture shall support attaching metadata to collected data.
[Func-CDS-02] The ZSM framework reference architecture shall support functionality that enables the
separation of data storage and data processing.
[Func-CDS-03] The ZSM framework reference architecture shall support functionality that enables the sharing
of data within the ZSM framework reference architecture.
[Func-CDS-04] The ZSM framework reference architecture shall support functionality that enables data
recovery in an automated manner.
[Func-CDS-05] The ZSM framework reference architecture shall support functionality that enables to manage
the consistency of redundantly-stored data in an automated manner.
[Func-CDS-07] The ZSM framework reference architecture shall support functionality that enables data service
failover in an automated manner.
ETSI
17 ETSI GS ZSM 002 V1.1.1 (2019-08)
[Func-CDS-08] The ZSM framework reference architecture shall support functionality that enables automated
overload handling of data services.
[Func-CDS-09] The ZSM framework reference architecture shall support capabilities that allow logically
centralized storage and processing of data, as well as the automatic provisioning of these
capabilities.
[Func-CDS-10] The ZSM framework reference architecture shall support functionality that enables automated
policy-based processing of data.
[Func-CDS-11] The ZSM framework reference architecture shall support functionality that enables the
processing of several data services with different data types (e.g. structured and unstructured
data) in an automated manner.
[Func-SrvIA-02] The ZSM framework reference architecture shall support functionality that enables the
discovery of the management services provided.
[Func-SrvIA-03] The ZSM framework reference architecture shall support functionality that provides
information about the means to access a discovered service.
[Func-SrvIA-04] The ZSM framework reference architecture shall support functionality that facilitates
synchronous and asynchronous communication between service producers and service
consumers.
[Func-SrvIA-05] The ZSM framework reference architecture shall support functionality that facilitates the
indirect invocation of the management services.
[Func-SrvIA-06] The ZSM framework reference architecture shall not prevent the direct invocation of
discovered management services by the service consumer.
[Func-LI-02] The ZSM framework reference architecture shall support the capability to prevent a lawful
interception from being disrupted, i.e. lawful intercept needs to continue despite any service or
network adjustments performed by the ZSM framework.
[Sec-01] The ZSM framework reference architecture shall support functionality that enables security of
data at rest, in transit and in use, infrastructure resources, managed services and management
functions.
[Sec-02] The ZSM framework reference architecture shall support confidentiality of management data at
rest, in transit and in use.
[Sec-03] The ZSM framework reference architecture shall support integrity of data at rest, in transit and
in use.
[Sec-04] The ZSM framework reference architecture shall support integrity of managed services and
management functions.
ETSI
18 ETSI GS ZSM 002 V1.1.1 (2019-08)
[Sec-05] The ZSM framework reference architecture shall support the capability to ensure availability of
data, infrastructure resources, managed services and management functions, in so far as
security measures to handle availability threats are concerned.
[Sec-06] The ZSM framework reference architecture shall support functionality that enables privacy of
personal data, including privacy-by-design and privacy-by-default mechanisms.
[Sec-07] The building blocks of the ZSM framework reference architecture shall include the necessary
safeguards and features to ensure security of operation as well as data protection appropriate to
mitigate the risks.
[Sec-08] The ZSM framework reference architecture shall allow authorization of service access by
authenticated service consumers.
[Sec-09] The ZSM framework reference architecture shall support the capabilities to automatically
apply appropriate security policies according to the compliance status of individual
management services concerning the security requirements (expressed as certification by
corresponding authorities).
[Sec-10] The ZSM framework reference architecture shall support capabilities for automated
attack/incident detection, identification, prevention, and mitigation.
[Sec-11] The ZSM framework reference architecture shall support capabilities to audit/supervise AI/ML
decisions against security and privacy criteria to prevent the proliferation of vulnerabilities and
attacks.
6 Reference architecture
The ZSM framework reference architecture defines a set of architectural building blocks that collectively enable
construction of more complex management services and management functions using a consistent set of composition
and interoperation patterns.
Logically, the ZSM framework is composed of distributed management and data services, organized into management
domains and integrated via an integration fabric. The integration fabric is also used to enable management service
consumption, communication, and integration with 3rd party management systems. The cross-domain data service
allows data sharing across domains. All management services provide a set of capabilities for their consumption.
The ZSM framework reference architecture provides means to build and compose loosely-coupled management
functions that offer management services and collectively deliver end-to-end and domain-specific capabilities for zero-
touch management of network services and infrastructure. To offer their services, management functions provide
management service end-points used for management service invocation and communication.
Management services offer capabilities for consumption by service consumers via standardized management service
end-points.
ETSI
19 ETSI GS ZSM 002 V1.1.1 (2019-08)
Capabilities of a given management service collectively define its function with respect to entities being managed by it.
Service capabilities may be offered for consumption by multiple service consumers. One or more service capabilities
can be mapped to one or more service end-points.
All management services offer a consistent set of capabilities for invocation and communication purposes. This enables
a high degree of automation and continuity, when it comes to interactions between management domains.
Offered management services can be combined into new management services. In the composition hierarchy, each
higher layer supports management services with a higher abstraction and a broader scope.
In order to provide their capabilities, management service producers may be required to interact with infrastructure
resources: directly, via their management interfaces, or indirectly, by consuming other management services via their
service end-points.
A given management function can either be a management "service producer", a management "service consumer", or
both at the same time.
Management domains federate together management services with capabilities needed to manage resource-facing
services or resources within a given domain. A management domain may be further split into multiple "subordinate"
management domains, if additional separation of concern is needed. Optionally, management domains may also provide
means of lifecycle management for management services they contain.
Some management services can be restricted to be consumed by authorized consumers inside the management domain
only (internal services, i.e. their external visibility is optional which implies their support in the domain is also
optional), whereas others are required to always be available for consumption by authorized consumers inside and
outside the management domain (exposed services, i.e. external visibility is mandatory). External visibility can also be
mandatory only under certain conditions, and optional otherwise (conditional services).
Each management domain manages one or more entities, such as infrastructure resources and/or resource-facing
services associated with the management domain. Infrastructure resources can be physical (e.g. physical network
functions (PNFs)), virtual (e.g. virtualized network functions (VNFs) or software-based services) and/or cloud based
(e.g. "X-as-a-service" (XaaS) resources).
Each management domain provides one or more service capabilities, by exposing or consuming service end-points.
A resource-facing or customer-facing service managed by a management domain can consume further resource-facing
or customer-facing services managed by other management domains, as needed (managed services). In that case, the
management domain which manages the consuming service also consumes management services from the management
domains that manage the consumed resource-facing or customer-facing services. Management services are in the scope
of the present document, whereas managed services are not.
Clause 6.5 specifies the management domain and the related management services in detail.
ETSI
20 ETSI GS ZSM 002 V1.1.1 (2019-08)
The E2E service management domain is a special management domain that provides end-to-end management of
customer-facing services, composed from the customer-facing or resource-facing services provided by one or more
management domains. The E2E service management domain does not directly manage infrastructure resources.
Clause 6.6 specifies the end-to-end service management domain and the related management services in detail.
Clause 6.3 specifies the integration fabric in detail. The service consumption patterns illustrated in annex B are
supported by the integration fabric.
ETSI
21 ETSI GS ZSM 002 V1.1.1 (2019-08)
Figure 6.2-1 depicts the ZSM framework reference architecture. Every management domain, as well as the E2E service
management domain, provides a set of ZSM service capabilities by management functions that expose and/or consume
a set of service end-points. The cross-domain integration fabric facilitates providing capabilities and accessing end-
points cross-domain. Some services are only provided and consumed locally inside the management domain. Each of
the logical groups of management services contains services with related functionality. The grouping does not imply a
particular implementation.
Whereas ETSI ZSM normatively defines the set of ZSM services visible outside a management domain, it only
provides options for the management domain's internal composition. More details are defined in clauses 6.5.1 and 6.6.1.
ETSI
22 ETSI GS ZSM 002 V1.1.1 (2019-08)
The domain integration fabric is a logical entity which represents one or more management functions responsible for
controlling exposure of services beyond domain boundaries and for controlling access to the management services
exposed by the domain. The domain integration fabric may also provide further integration services to the management
functions inside the management domain.
NOTE: "Logical entity" means that the ZSM specification defines the optional and mandatory services provided
by a management domain, however, it does not prescribe how these services are structured into
management functions.
In addition to providing access to ZSM services, a management domain and the E2E service management domain can
also consume ZSM services provided by other management domains. ZSM framework consumers (such as digital store
fronts that provide automation of consumer and business management, BSS applications, web portals, another ZSM
framework instance, or even human users via additional user interfaces) can consume ZSM services provided by the
E2E service management domain and the management domains.
Data services may be provided and consumed inside a management domain including the E2E service management
domain. In addition, the ZSM framework reference architecture shall provide cross-domain data services that can be
consumed by the management domains, the E2E service management domain and the ZSM framework consumers.
Also, the cross-domain data services can consume services provided by the management domains and the E2E service
management domain.
When managing infrastructure resources, a management domain interfaces with these resources by management
interfaces provided by the resources. Those interfaces are out of scope of the ZSM framework reference architecture.
• discovery of the registered management services and the means to access them;
The integration fabric can be realized as one or more management functions that collectively provide the services and
capabilities as described below.
Providing and consuming services use particular patterns. In the scope of the present document, the request-response
pattern and the publish/subscribe pattern are supported. See annex B for an illustration.
ETSI
23 ETSI GS ZSM 002 V1.1.1 (2019-08)
Service producers can select one of the existing channels or create new channels for communication. When creating
new channels, the service producer can specify channel properties such as QoS, content type, restrictions, access
control, policies, acknowledgement, and available communication styles. Service consumers can subscribe to one or
more communication channels. A channel facilitates the transfer of content from all producers that publish content in
the channel to all consumers that have subscribed to that channel. As part of the subscription, service consumers can
specify what communication content they are interested in (filtering criteria) and how it is delivered to them (e.g.
synchronous (pull) or asynchronous (push)).
The management communication service provides a set of capabilities (subscription management, channel management
and delivery of management data) to a service consumer.
Service producers offer the capability to provide content which is consumed by the integration fabric as part of
providing the communication service. The integration fabric basically re-exposes that consumed capability towards the
consuming management function, using one of the defined communication channels. Based on this service model, the
actual communication pattern (such as push, pull) of how the data are consumed from the producers and delivered via
the communication channels are subject to later, more detailed stages of specification.
A channel shall exist before content can be published and subscriptions can be made to the channel.
ETSI
24 ETSI GS ZSM 002 V1.1.1 (2019-08)
"create" and "update" allow to manage parameters associated with the channel,
such as QoS, content type, event category, communication pattern (such as
push, pull), acknowledgements, restrictions, access control, delivery guarantees
and subscription policies.
Manage subscriptions (M) Manage (create, read, update, delete, list) the consumer's subscriptions. Filters
may be specified.
Provide data (M) Forwards received data (such as event notifications, streams) to subscribers via
a communication channel.
Receive data (M) Accept data for forwarding to subscribers via a communication channel.
Based on the entitlements configured by this service, the domain integration fabric of the respective management
domain or the E2E service management domain provides access to service consumer specific sets of management
services exposed by the domain.
ETSI
25 ETSI GS ZSM 002 V1.1.1 (2019-08)
The entitlements to exposed ZSM services, capabilities, end-points and data provided by management function can
change from time to time. The exposure service may also have a capability to allow consumers external to the domain
to request changes in the entitlements.
Table 6.3.4-1: Support and external visibility of services offered by the domain integration fabric
ETSI
26 ETSI GS ZSM 002 V1.1.1 (2019-08)
The data services support different types of storage mechanisms and database technologies for different purposes and
allow the explicit or automatic selection of a suitable storage mechanism/database type for each data store.
Automation needs seamless and timely access to consistent and current management data, within a domain as well as
across domains. Collected data should be handled within the domain where it was produced or by a designated entity.
Data should be made available to authorized consumers, within the originating domain and to services in other domains,
subject to access control and information security policies. A service that offers data to multiple consumers is
responsible for providing the level of data consistency needed by each consumer. The architecture does not mandate
how or where data is stored.
Management data types stored in the data services may include, but are not limited to:
ETSI
27 ETSI GS ZSM 002 V1.1.1 (2019-08)
EXAMPLE: Possible use case: analysis of very large data sets such as "Big Data".
ETSI
28 ETSI GS ZSM 002 V1.1.1 (2019-08)
The cross-domain data services receive management data from the management domains including the E2E service
management domain in the ZSM framework. The data is stored in a logically centralized place (actual data placement is
implementation-specific). Various authorized consumers can request data from the cross-domain data services e.g. to
access data originating from another management domain as well as to achieve E2E global optimization. Also, data
processing tasks can be run directly on the stored data, requested by service consumers e.g. those in domain
intelligence. That means, the cross-domain data services support the separation of data storage and data processing and
allow sharing of data within the ZSM framework reference architecture. Data in the cross-domain data services is
generally used to achieve different aspects of automated E2E optimization (e.g. routing optimization in the managed
domains, different levels of resource optimization for each managed network service, etc.) as well as automation of
management and operation of the whole ZSM framework.
Any ZSM deployment shall contain management functions that provide in a cross-domain fashion management services
as defined in table 6.4.3-1, indicating for each service whether its support by the cross-domain integration fabric is
OPTIONAL or MANDATORY.
Table 6.4.4-1: Support and external visibility of services offered by the domain data services
ETSI
29 ETSI GS ZSM 002 V1.1.1 (2019-08)
Some management services can be restricted to be consumed by authorized consumers inside the management domain
only (internal services), whereas others are available for consumption by authorized consumers inside and outside the
management domain (exposed services). See clause 6.1.2.3 for a more detailed description.
6.5.2.1 Description
The domain data collection services monitor the managed entities and consumed managed services and provide e.g. live
performance and fault data to support closed-loop automation, which needs to be able to verify how the network reacts
to changes (such as optimization).
As part of the closed loops at management domain level, domain data collection services interact with domain analytics
and domain intelligence services, but also with domain orchestration services and domain control services as needed to
trigger actions or changes to the managed entities of the management domain.
If a service managed by the current management domain contains (by way of composition) services managed by
another management domain, service producers in the current management domain that provide domain data collection
services can also consume domain data collection services from the other management domain that manages the
contained service. If the current management domain manages services that are consumed by services managed by
another management domain including the E2E service management domain, the domain data collection services
provided by the current management domain can be consumed by that other management domain.
Domain data collection services include services that process incoming events, data objects and other inputs related to
faults, performance and security from the underlying managed entities and consumed managed services and provide
related data and notifications. They can also aggregate the information and derive e.g. key performance indicators.
The standard capabilities of such event notification services are further defined in table 6.5.2.2.1-1 as a generic event
notification service.
Actual specific event notification services have the same set of capabilities as the generic event notification service but
differ in the type of event notifications they generate and the actual configuration. Table 6.5.2.2.1-2 lists specific event
notification services defined by the ZSM framework. This set of services is extensible.
ETSI
30 ETSI GS ZSM 002 V1.1.1 (2019-08)
Table 6.5.2.2.1-2: Specific event notification services defined by the ZSM framework
NOTE: Besides specific event notification services that can be derived from the generic event notification service
as they have the same set of capabilities, additional event notification services that have different
capabilities than the generic service can be defined separately.
ETSI
31 ETSI GS ZSM 002 V1.1.1 (2019-08)
The log collection service provides logs originating from the managed entities in a streaming fashion (i.e. once one or
more log lines have been produced, the log lines are provided), using the management communication service of the
integration fabric. The information provided includes at least information about the managed entity producing the log,
the timestamp of producing the log and the content of the log.
6.5.3.1 Description
The domain analytics services provide domain-specific insights and generate domain-specific predictions based on data
collected by domain data collection services and other data (e.g. data collected by other domains or stored in data
services).
ETSI
32 ETSI GS ZSM 002 V1.1.1 (2019-08)
The standard capabilities of analytics services are further defined in table 6.5.3.2.1-1 as a generic analytics service.
Actual specific analytics services have the same set of capabilities as the generic analytics service but differ in the type
of analysis result they generate, the analysis they perform and the actual configuration. Table 6.5.3.2.1-2 lists specific
analytics services that are defined by the ZSM framework. This set of services is extensible.
ETSI
33 ETSI GS ZSM 002 V1.1.1 (2019-08)
NOTE: Besides specific analytics services that can be derived from the generic analytics service as they have the
same set of capabilities, additional analytics services that have different capabilities than the generic
service can be defined separately.
Different data optimization services are foreseen as the optimization algorithms typically require data set specific
knowledge.
The standard capabilities of data optimization services are further defined in table 6.5.3.2.3-1 as a generic data
optimization service.
Actual specific data optimization services have the same set of capabilities as the generic data optimization service but
differ in the optimization they perform, the data sets for which they are suitable and the applicable data optimization
configuration. Table 6.5.3.2.3-2 lists specific data optimization services that are defined by the ZSM framework. This
set of services is extensible.
ETSI
34 ETSI GS ZSM 002 V1.1.1 (2019-08)
Table 6.5.3.2.3-2: Specific data optimization services defined by the ZSM framework
NOTE: Besides specific data optimization services that can be derived from the generic data optimization service
as they have the same set of capabilities, additional data optimization services that have different
capabilities than the generic service can be defined separately.
6.5.4.1 Description
Domain intelligence services are responsible for driving intelligent closed-loop automation in a domain by supporting
variable degrees of automated decision-making and human oversight with fully autonomous management being the
final stage.
1) Decision support.
2) Decision making.
3) Action planning.
Decision support services enable decision making via technologies such as artificial intelligence, machine learning and
knowledge management and are defined in clause 6.5.4.2.
Service and network management decision making is based on information provided by ZSM services defined as part of
domain data collection (see clause 6.5.2), domain analytics (see clause 6.5.3), domain data services (see clause 6.4.4)
and applicable other sources. Subsequent action planning defines orchestration/control actions to be executed by ZSM
services defined as part of domain orchestration (see clause 6.5.5) and domain control (see clause 6.5.6). Services
pertaining to decision making and action planning are left for future specification.
ETSI
35 ETSI GS ZSM 002 V1.1.1 (2019-08)
The assessment derived from the deployed AI model assessment service is used to decide on the most appropriate
actions to perform on the deployed AI model such as retrain, reconfigure, upgrade, replace, pause, terminate.
The knowledge base shall contain problem causes derived from historical, operational (e.g. FM, PM) and
configurational data, as well as conclusions drawn from analysis of combinations of problem causes.
ETSI
36 ETSI GS ZSM 002 V1.1.1 (2019-08)
The health issue reporting service provides information about abnormal service health states (e.g. due to faults, security
issues, etc.). It also allows to track and update the status of the health issues and their severity and to configure what
information is provided.
6.5.5.1 Description
Domain orchestration provides management services that allow automating workflows and processes inside a
management domain to handle lifecycle management of the managed customer and/or resource-facing services. Domain
orchestration services maintain the inventory of network services and virtualized resources managed by the
management domain and an up-to-date view of the related topology, by using discovery, inventory and topology
management services. Domain orchestration is controlled by policies and other additional relevant information sources,
e.g. SLSs.
NOTE 1: The inventory of hardware resources is not managed by domain orchestration, as hardware resources
installation/de-installation is not part of orchestration.
Domain orchestration services in the current management domain can be consumed by service requests from another
management domain which manages services that consume services managed by the current management domain. They
can also be consumed by service consumers that provide E2E service orchestration, or by the ZSM framework
consumers.
ETSI
37 ETSI GS ZSM 002 V1.1.1 (2019-08)
NOTE 2: In some cases, the services provided by a management domain can be directly consumed by the ZSM
framework consumers, e.g. if it is only a single managed service that is provided to the customers. The
standard way however is that the ZSM framework consumers consume services from the E2E service
management domain.
As part of the closed loops at management domain level, domain orchestration services can also be consumed by
management functions that provide domain intelligence services, which can e.g. lead to the execution of a
pre-configured workflow.
The management functions providing domain orchestration services consume domain control services to control the
state of the managed entities of the management domain. If the current management domain manages services that
contain (by way of composition) resource-facing services managed by another management domain, the management
functions providing domain orchestration services can also consume services, including domain orchestration or domain
control services, provided by that other management domain.
ETSI
38 ETSI GS ZSM 002 V1.1.1 (2019-08)
"Update" allows to modify properties of the service model, including its state (lifecycle
stage).
Filtering mechanisms may be used to select the information returned when listing the
content of the catalogue.
Manage service Manage (create, read, update, delete, list) the service categories used in the catalogue.
categories (O)
Provide catalogue Provides notifications about catalogue changes.
change notifications (O)
Tests are executed based on a test specification (which is designed outside and lifecycle-managed). Tests can be
triggered as needed e.g. by the E2E service management domain or as part of automated procedures. The service also
allows to query previous and ongoing tests, their status and results.
ETSI
39 ETSI GS ZSM 002 V1.1.1 (2019-08)
Each change to the inventory is triggered as a side effect of a control or orchestration service invocation on the managed
entities of the domain.
ETSI
40 ETSI GS ZSM 002 V1.1.1 (2019-08)
6.5.6.1 Description
Domain control services allow to individually steer the state of each managed entity. The service producers which
provide domain control services consume for example the configuration management interfaces provided by the
managed entities and abstract from their service consumers the details of configuration changes. As an example, the
domain control services can be consumed by management functions that offer services in the domain orchestration
group to change the state or configuration of a managed entity and consumed service. The domain control group may
also contain services that are needed to control virtualized resources.
As part of the closed loops at domain level, domain control services are consumed by management functions in the
domain orchestration and domain intelligence groups to control the state (including configuration, lifecycle) of managed
entities and consumed services.
The set of operations for managing the lifecycle of resources in the domain depends on the type of resources. A VNF is
an example of a resource type that needs lifecycle management.
The lifecycle management can include operations such as instantiation, update, scaling, healing and termination.
This service can be consumed by management functions providing the domain orchestration service (see clause 6.5.5.2).
The standard capabilities of resource lifecycle management services are further defined in table 6.5.6.2.2-1 as a generic
resource lifecycle management service.
ETSI
41 ETSI GS ZSM 002 V1.1.1 (2019-08)
Actual specific resource lifecycle management services have the same set of capabilities as the generic resource
lifecycle management service but differ in the type of resource they manage and in the set of lifecycle operations they
support. Table 6.5.6.2.2-2 lists specific resource lifecycle management services that are defined by the ZSM framework.
This set of services is extensible.
Table 6.5.6.2.2-2: Specific resource lifecycle management services defined by the ZSM framework
NOTE: Besides specific resource lifecycle management services that can be derived from the generic resource
lifecycle management service as they have the same set of capabilities, additional resource lifecycle
management services that have different capabilities than the generic service can be defined separately.
6.5.7.1 Description
The following services provide support functionalities for the management domain.
ETSI
42 ETSI GS ZSM 002 V1.1.1 (2019-08)
• An event triggers multiple policy-actions that cannot occur together or contradict each other.
• Different events trigger one policy-action each, while these actions contradict each other.
• E2E service orchestration - responsible for the coordination of the provisioning, configuration and lifecycle
management of the various services across management domains in the end-to-end network that make up a
customer facing E2E service.
• E2E service intelligence - responsible for driving intelligent closed-loop automation in the E2E service
management domain, supporting variable degrees of automated decision-making and human oversight. This
enables various tasks such as troubleshooting and fixing of issues across management domains in the end-to-
end network that cause E2E service disruption.
• E2E service analytics - responsible for deriving end-to-end service insights, and for managing the end-to-end
service-related KPIs.
• E2E service data collection - responsible for the collection of end-to-end service-related data, e.g. fault or
performance data.
As in the individual management domains, each E2E management service capability is offered via one or more end-
points.
Some management services can be restricted to be consumed by authorized consumers inside the E2E service
management domain only (internal services), whereas others are available for consumption by authorized consumers
inside and outside the E2E service management domain (exposed services). See clause 6.1.2.3 for a more detailed
description.
ETSI
43 ETSI GS ZSM 002 V1.1.1 (2019-08)
Message exchange between the management functions may be accomplished via the domain integration fabric, using
the service end-points. Depending on the nature of the service capabilities offered, the service interfaces may be based
on, e.g. publish/subscribe or request-response models.
Communication between the management domains and the E2E service management domain as well as between the
E2E service management domain and the ZSM framework consumers is handled via the cross-domain integration
fabric.
6.6.2.1 Description
The E2E service data collection services are responsible for monitoring the quality and availability of customer-facing
services. This necessitates monitoring the actual E2E service quality and verifying the end user experience, based on
up-to-date data which are typically provided by data collection services of the management domains that manage the
services of which the E2E service is composed.
6.6.3.1 Description
The E2E service analytics services are responsible for handling E2E service impact analysis and root cause analysis and
generate service-specific predictions. Also, the verification of Service Level Specifications (SLSs) and monitoring of
KPIs is included in E2E service analytics.
The standard capabilities of analytics services are further defined in table 6.6.3.2.1-1 as a generic analytics service.
ETSI
44 ETSI GS ZSM 002 V1.1.1 (2019-08)
Actual specific analytics services have the same set of capabilities as the generic analytics service but differ in the type
of analysis result they generate, the analysis they perform and the actual configuration. Table 6.6.3.2.1-2 lists specific
analytics services defined by the ZSM framework. This set of services is extensible.
ETSI
45 ETSI GS ZSM 002 V1.1.1 (2019-08)
NOTE: Besides specific analytics services that can be derived from the generic analytics service as they have the
same set of capabilities, additional analytics services that have different capabilities than the generic
service can be defined separately.
SLSs and SLOs are related to service level agreements (SLAs). SLSs are composed of SLOs and provide the technical
parameters that define the service quality that is committed in the SLA to be delivered. An SLA is a legally binding
contract between a service provider and a customer, which includes for example the consequences in case of not
meeting the required service quality, and further business-related aspects. The definition and management of SLAs is
outside the scope of the present document as these are business agreements.
ETSI
46 ETSI GS ZSM 002 V1.1.1 (2019-08)
6.6.4.1 Description
E2E service intelligence services are responsible for driving intelligent closed-loop automation in the E2E service
management domain by supporting variable degrees of automated decision-making and human oversight with fully
autonomous management being the final stage.
1) Decision support.
2) Decision making.
3) Action planning.
Decision support services enable decision making via technologies such as artificial intelligence, machine learning and
knowledge management and are defined in clause 6.6.4.2.
E2E service management decision making is based on information provided by ZSM services defined as part of E2E
service data collection (see clause 6.6.2), E2E service analytics (see clause 6.6.3), domain data services in the E2E
service management domain (see clause 6.4.4), cross-domain data services (see clause 6.4.3) and applicable other
sources. Subsequent action planning defines orchestration/control actions to be executed by ZSM services defined as
part of E2E service orchestration (see clause 6.6.5). Services pertaining to decision making and action planning are left
for future specification.
ETSI
47 ETSI GS ZSM 002 V1.1.1 (2019-08)
The assessment derived from the deployed AI model assessment service is used to decide on the most appropriate
actions to perform on the deployed AI model such as retrain, reconfigure, upgrade, replace, pause, terminate.
The E2E service health issue reporting service provides information about abnormal service health states (e.g. due to
faults, security issues, etc.) and allows to correlate them with issues in the underlying management domain if that
information is available. It also allows to track and update the status of the health issues and their severity and to
configure what information is provided.
ETSI
48 ETSI GS ZSM 002 V1.1.1 (2019-08)
6.6.5.1 Description
The services in E2E service orchestration are responsible for the catalogue-driven E2E orchestration of multiple
management domains to create/modify/delete cross-domain customer-facing services. A service model defines how the
various pieces of a service are linked together and map to management domains.
ETSI
49 ETSI GS ZSM 002 V1.1.1 (2019-08)
Different kinds of checks can provide different trade-offs of resource requirements vs. accuracy. Examples of checks
are:
• simple checks of selected sets of fundamental domain capabilities to determine if a managed service is offered
(e.g. in a particular location) that have low effort but also low accuracy;
• the collection of complete and current information about idle (i.e. available) resources that needs more effort
but is more accurate; and
• the full assignment of all aspects of a service and the reservation of the resources to provide the service that is
most accurate but needs the highest effort.
In certain scenarios, when low effort of the check is prioritized over accuracy, resource availability might be uncertain
for selected management domains, which implies that the check results include a confidence indicator in case of
uncertainty in resource availability.
ETSI
50 ETSI GS ZSM 002 V1.1.1 (2019-08)
"Update" allows to modify properties of the service model, including its state (lifecycle
stage).
Filtering mechanisms may be used to select the information returned when listing the
content of the catalogue.
Manage service Manage (create, read, update, delete, list) the service categories used in the catalogue.
categories (O)
Provide catalogue Provides notifications about catalogue changes.
change notifications (O)
Tests are executed based on a test specification (which is designed outside and lifecycle-managed). Tests can be
triggered as needed e.g. by a ZSM framework consumer or as part of automated procedures. The service also allows to
query previous and ongoing tests, their status and results.
ETSI
51 ETSI GS ZSM 002 V1.1.1 (2019-08)
Each change to the inventory is triggered as a side effect of an orchestration service invocation on the managed services
of the E2E service management domain, or by changes to the RFSs/CFSs of which the E2E service is composed.
6.6.6.1 Description
The following services provide support functionalities for the E2E service management domain.
ETSI
52 ETSI GS ZSM 002 V1.1.1 (2019-08)
• An event triggers multiple policy-actions that cannot occur together or contradict each other.
• Different events trigger one policy-action each, while these actions contradict each other.
Closed loops are composed of the building blocks defined in clause 6.1.2. The management functions contribute with
their respective management services capabilities to achieve the different steps of the closed loops. Closed-loop
operation can happen at the management domain level, at the end-to-end service management domain level and can
span across multiple management domains (including or not the end-to-end service management domain). Multiple
closed loops can run simultaneously and use various subsets of the management services and management functions to
realize their purpose.
Closed-loop operation can happen in the managed resources. The ZSM management framework interacts with managed
resources via the producers of management services defined in "Control" and "Data collection". The specification of
managed resources closed loops is out of scope of the present version of the present document.
Closed-loop operation is bounded by operational policies. The operational policies allow determining operation
conditions under which autonomous operation is allowed i.e. levels of human oversight, of reporting, and conditions for
escalation, delegation and coordination.
NOTE: How closed loops coordinate with each other is out of scope of the present version of the present
document.
An example of closed-loop operations is described in Annex E.4. Illustrations of closed loop support are provided in
Annex C.
ETSI
53 ETSI GS ZSM 002 V1.1.1 (2019-08)
8 Security considerations
8.1 General
Security has an end-to-end scope. It encompasses two main aspects: one is the security and privacy of data being
transmitted/processed/stored within the ZSM framework and the other is the security of the ZSM framework
components themselves, the so called "system security" aspect.
Providing security as a service is not within the scope of the present document.
Security features need to be built into management functions that handle data, for data at rest, data in transit and data in
use. Protection of data in transit would preferably be handled by the integration fabric, protection of data at rest is
appropriately placed in the data services. Management domains, including the end-to-end service management domain,
are responsible for the protection of data in use and the end-to-end protection of data.
• Protection of confidentiality and integrity of data at rest, data in transit, data in use and meta data from
unauthorized access and modification.
- NIST and industry standard cryptographic algorithms and standard modes of operations are used for
cryptography, as far as possible. Using other cryptography algorithms as needed.
- Ability to migrate to newer versions of cryptographic algorithms and protocols, with minimal impact and
without disruption on running services.
If, within a ZSM framework instance, a domain or set of domains can be trusted by default due to organizational
assumptions, the aforementioned security checks can be omitted (concept of a trust boundary or "trusted domain").
ETSI
54 ETSI GS ZSM 002 V1.1.1 (2019-08)
Functionality needed:
• Monitor/Audit function.
• Allow/disallow function based on the outcome of security compliance verification, monitoring or auditing.
ETSI
55 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex A (informative):
Architecture options
A.1.1 Overview
To support the end-to-end communication service, the ZSM framework potentially needs to coordinate with legacy
management systems to host the legacy parts of the service. The ZSM framework should support the following options
to interact with legacy management domains:
Figure A.1.2-1 depicts the first option of the high-level architecture of legacy management system integration at
management domain level. In this option, the integration is inside the management domain by interacting with the
domain control services of the ZSM management domain using the ZSM interfaces provided by the legacy management
domain.
ETSI
56 ETSI GS ZSM 002 V1.1.1 (2019-08)
Figure A.1.3-1 depicts the second option of legacy management systems integration with the cross-domain integration
fabric. In this option, the legacy management domain is considered as one of the ZSM management domains assuming
that the legacy management system is able to interact via an interface adapter (i.e. legacy domain services) with the
ZSM cross-domain integration fabric. The E2E service management domain manages the E2E management of the parts
of service used by legacy management domains via the cross-domain integration fabric.
A.2.1 Overview
The following clauses illustrate examples of valid deployments of the ZSM architecture.
NOTE: In the present version of the present document, only a single example is defined.
Rationale: A management domain may be recursively composed of other management domains that still interact in
accordance with the ZSM framework. Such a deployment option is enabled.
ETSI
57 ETSI GS ZSM 002 V1.1.1 (2019-08)
Figure A.2-1: The ZSM framework doesn't prevent management domains to be recursively stacked
As shown in figure A.2-1 the management domains in the ZSM architecture can be recursively stacked. This is also true
for the E2E management domain.
ETSI
58 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex B (informative):
Service consumption patterns
B.1 General
Providing and consuming services use particular patterns. In the scope of the present document, patterns for service
registration/discovery, synchronous (request-response) interaction and asynchronous (publish-subscribe)
communication are depicted in this clause.
A service consumer queries the integration fabric to discover the potential set of service producers available for
consumption. The pattern is shown in figure B.2-1.
ETSI
59 ETSI GS ZSM 002 V1.1.1 (2019-08)
As an alternative to direct service invocation by accessing the service end-points exposed by the service producer, the
integration fabric has the capability to automatically route management service invocations and related results between
service consumers and service producers while potentially taking into account load balancing, failover, security
(e.g. access control), and routing rules. The management service invocation routing service is used to manage the
routing rules and to invoke the service. Such indirect invocation can, in addition to routing, also include delegation of
the discovery of the service itself. The pattern is shown in figure B.3-2.
The service producer first creates one or more channels using the "manage channels" capability of the management
service communication service produced by the integration fabric. Service consumers can subscribe to these channels
by means of the "manage subscriptions" capability of the same service. When the service producer emits asynchronous
data (such as event notifications, streams, etc.), these are consumed by the integration fabric and further provided to the
subscribers which have previously registered with the management service communication service. There are two
possibilities to map the capability to "provide data" to end points/message exchanges: "push" and "pull".
Figure B.4-1: Publish/subscribe example via the integration fabric based on "push"
ETSI
60 ETSI GS ZSM 002 V1.1.1 (2019-08)
Figure B.4-2: Publish/subscribe example via the integration fabric based on "pull"
It is also possible to mix these flows, e.g. using "push" between the service producer and the integration fabric and
"pull" between the service consumer and the integration fabric.
In these cases, either the service consumer subscribes directly to the service producer after having discovered the
service via the integration fabric (see figure B.5-1), or the integration fabric acts as mediation layer (see figure B.5-2).
The figures only illustrate "push" flows, however, "pull" flows or flows that mix both are also possible.
ETSI
61 ETSI GS ZSM 002 V1.1.1 (2019-08)
Figure B.5-2: Publish/subscribe example with subscriptions mediated by the integration fabric
ETSI
62 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex C (informative):
Support for closed-loop operation
The end-to-end automation and zero-touch management of network services and infrastructures rely on the ability to
close the management loop.
Closing the management loop implies the transfer of information, knowledge, functions and operations, such as domain
knowledge, analysis, learning, reasoning, planning, or decision-making capabilities, typically owned or realized by
humans to the management framework.
To achieve closed-loop operation, a management framework needs to provide means for the ordered invocation of the
steps or phases of the closed loop (e.g. the Observe, Orient, Decide, Act steps of the OODA loop [i.2]), the composition
of the necessary functionalities (i.e. composition of management services and functions) at each steps of the closed
loop, and the transfer of/access to necessary information or commands between/by, the steps of the closed loop.
NOTE: Different closed-loop models than the OODA model exist and can be considered in support of closed-
loop operation, such as e.g. MAPE-K (Monitor-Analyse -Plan-Execute plus Knowledge [i.3]) and
MRACL (Model-Reference Adaptive Control Loop [i.4]).
The closed loops are composed of the building blocks defined in clause 6.1.2. The management functions contribute
with their respective management services capabilities to achieve the functionality of the different steps of the closed
loops as illustrated in figure C-1.
Figure C-1: Indicative mapping between architectural building blocks and closed-loop steps
ETSI
63 ETSI GS ZSM 002 V1.1.1 (2019-08)
Legend:
NOTE: Number of end-points, services and their re-direction in figure C-1 are only illustrative.
Closed-loop operation enables the management functions which are part of the loop to adapt the behaviour of the
managed entities to respond to changes in user needs, business goals, internal or external conditions. Closed loops
continuously observe and collect data on the managed entities, and their operating context. This enables the
management functions in the loop to analyse those changes, to understand behaviour evolutions, to produce plans and
decisions, and then to invoke actions to adapt the current observed state of the managed entities towards the target
desired state or goal.
• Observe and collect data from the managed entities, and other relevant data sources.
• Orient the processing of these data, so that their meaning and significance can be understood in the proper
context.
• Analyse the collected data through filtering, correlation, and other mechanisms to define a model of past,
current, and future states.
• Run machine learning algorithms to learn, recognizes patterns and make predictions on observed data.
• Plan different actions based on inferring trends, determining root causes and sequences, and similar processes.
Closed-loop operation can happen at different granularities and scope: some closed-loop operations can happen in the
managed resources such as in PNFs, VNFs or SON functions.
Managed resources closed-loop operations are acknowledged to exist; however, their specification is out of scope of the
present version of the present document. The ZSM management framework interacts with managed resources via the
producers of management services defined in "Control" and "Data collection".
Closed-loop operation can happen at the management domain level, at the end-to-end service management domain level
and can span across multiple management domains (including or not the end-to-end service management domain level).
Multiple closed loops can run simultaneously and use various subsets of the management services and management
functions to realize their purpose.
Closed loops interact with managed resources through resource control services via "south bound interfaces" (SBI),
with peer closed loops through "east-west" or "peer" interfaces, and with upper level closed loops through "North
Bound Interfaces" (NBI). The structure of the interactions between closed loops can follow various distributivity and
hierarchy models.
ETSI
64 ETSI GS ZSM 002 V1.1.1 (2019-08)
Closed-loop operation is defined and bounded by operational policies. Based on the capabilities exposed by the
architectural building blocks, the operational policies allow determining operation conditions under which autonomous
operation is allowed i.e. levels of human oversight, of reporting, and conditions for escalation and delegation.
Operational conditions include specification of operational objectives, and other governance information, needed for
proper service operation.
Under normal conditions, the closed loops operate within the boundaries defined by the operational policies.
Under exceptional conditions, the closed loops try to remediate to the exceptions with all possible means under their
control, and within the boundaries of the operational policies. If despite having tried all possible and relevant
remediation actions, the closed loop fails in solving the problem(s), it then generates an "escalation" as defined per the
operational policies (target, relevant information, etc.). Beyond triggering an "upper" function or closed loop, the
"escalation" action also allows conveying reporting information on remediation actions tried, augmenting the identified
situation (exception) with contextual and historical information to further help the analysis by the receiving entity.
ETSI
65 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex D (informative):
Automated discovery and consumption of management
capabilities exposed from a management domain
Figure D-1 explains how the management capability exposure configuration service can be used for automated
discovery and consumption of exposed management capabilities from a management domain. The logical entity in the
management domains that provides this service is the domain integration fabric. The service is used to configure the
entitlements of external consumers to exposed management services. It can receive this configuration from any (pre)-
authorized consumer of this service (e.g. the E2E management domain or a ZSM framework consumer such as a digital
store front), see figure D-1.
In an example deployment scenario when a new management domain is added to the network, its management
capabilities (exposed ZSM services) are registered with the cross-domain integration fabric to enable cross-domain
consumption. This happens as follows:
1) The set of exposed ZSM services/capabilities from the management domain are registered with the cross-
domain integration fabric using the registration service therein.
2) Assume that a new E2E service is deployed with a part belonging to the respective management domain. For
the part of the E2E service belonging to the management domains the E2E management domain can configure
the entitlement rights to the management services, capabilities, end-points and management data.
3) A consumer can discover the exposed list of management services/capabilities offered by the management
domain using the discovery service in the cross-domain integration fabric and can request the service from the
management domain using the end-point information obtained during discovery.
4) Alternatively, the consumer can request access to a specific ZSM service/capability via the cross-domain
integration fabric which redirects the request to the management domain.
5) The management domain's specific implementation of a gateway function (mapping to the logical component
"domain integration fabric") allows the service consumer to consume the particular service capability as
configured in step 2.
The entitlements of the consumer may be changed from time to time as in step 2.
ETSI
66 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex E (informative):
Realization of selected scenarios in the ZSM framework
reference architecture
E.1 Introduction
This annex illustrates how some of the use cases defined in ETSI GS ZSM 001 [i.9] can be realized in the ZSM
framework reference architecture.
E.2.1 Objective
This clause examines how the scenario of adding a new management domain can be realized by an operator using the
ZSM framework services. This scenario is related to the ZSM Scenario: "Automated detection of services offered by
management domains" defined in ETSI GS ZSM 001 [i.9].
1) that the management services of the new management domain are accessible over the cross-domain integration
fabric to management functions in other management domains and to ZSM service consumers;
2) the management services from the other management domains are accessible to management functions in the
new management domain.
E.2.2 Steps
In this scenario, the operator wants to add a new management domain (MD) to the deployed ZSM architecture instance.
The following steps show an example of how the MD and its management and network services are automatically
integrated into the ZSM framework:
1) The operator installs the MD with the configured address of the end-point for the management services
registration service and the management services discovery service. This is the end of the manual steps for this
scenario.
2) The MD uses the management services registration service to register its exposed services with the
cross-domain integration fabric.
3) The MD uses the management services discovery service to query the available list of management services
available.
4) The management service consumers in other management domains that have subscribed to changes in the set
of registered management services are notified by the management services discovery service of the newly
registered management services from the new MD.
5) The other management service consumers that have not are not subscribed to change notifications of the
management services discovery service may eventually query the management services discovery service to
get the updated management services list.
ETSI
67 ETSI GS ZSM 002 V1.1.1 (2019-08)
E.3.1 Objective
This clause demonstrates how a new customer-facing service can be deployed using the ZSM framework services. It is
assumed that a digital store front is used as a ZSM framework consumer that interfaces with external customers. In
addition, this scenario also demonstrates how SLS is decomposed into KPIs to be monitored in the resource level.
This is an example only (informative), and the purpose of this example is to illustrate the use of some of the ZSM
management services in the present document to accomplish a customer-facing service deployment.
E.3.2 Steps
The steps of operation to deploy a customer-facing service are:
1) The operator on-boards a new E2E service in the managed services catalogue management service. The
workflow definitions for the lifecycle of this service have been configured by the operator as part of the E2E
service model creation.
2) The policies that concern this service are configured in the policy management service in the E2E domain.
3) Using the managed services catalogue management service, the new E2E service is automatically picked up
by the digital store front where a product offering is created and is advertised to external customers.
4) The customer selects the product offering that will deploy the E2E service, provides the needed parameters,
e.g. number of users to be supported, coverage area and so on. The manual steps regarding this scenario end
here. Customer interactions in this step are out of scope of ZSM.
5) The deployment request is received by the digital store front which may choose to first perform a feasibility
check whether the service can be deployed, using the feasibility check service in the E2E domain which may in
turn delegate to feasibility check service in individual management domains to verify the availability and
sufficient capacity of the managed resources to support the CFS.
6) If feasible, the E2E service orchestration service is used by the digital store front to request the deployment of
the service. The E2E service orchestration service then delegates the deployment to the individual
management domains' domain orchestration service. The resource configuration management service of the
domain control may be used during the deployment process. The service is then deployed.
7) Decompose the SLSs to KPIs to be monitored using the E2E service condition detection service
8) The E2E performance data reporting service collects performance data from all the related management
domains, creates an aggregated report with service-level performance information and provides it to authorized
consumers (e.g. digital store front that has requested the service creation).
9) Performance events service and performance measurements streaming service from the management domain
can be used by E2E service management domain to subscribe for performance measurement changes
(e.g. performance degradation) in the individual resources based on the thresholds assigned for the resources.
10) The E2E service condition detection service sets KPI thresholds at the E2E level, and it may use the domain
level performance events service to set performance events conditions (e.g. thresholds) to monitor.
11) Optionally, the digital store front may execute the E2E testing service to verify that the CFS deployment was
successful.
ETSI
68 ETSI GS ZSM 002 V1.1.1 (2019-08)
E.4.1 Objective
This clause examines how a closed loop can be realized in an operator's management domain using the ZSM framework
services. This is an example only (informative), and the purpose of this example is to illustrate the use of some of the
ZSM management services in the present document to accomplish closed-loop automation to maintain SLS assurance.
This example is modelled using some of the requirements listed in clause 4.2 in ETSI GS ZSM 001 [i.9]. The related
requirements are summarized below:
• Capability to collect the performance and fault data of the network instance.
In addition to the summarized requirements listed above, the "Closed-loop automation" scenario documented in ETSI
GS ZSM 001 [i.9] (clause 5.2.3.9) applies.
Closed loops (observe, orient, decide, and act) allow e.g. self-optimization, improvement of network and resource
utilization, and automated service assurance and fulfilment.
The goal of this example is to illustrate that the management services listed in the present document can function
together to accomplish closed-loop operation:
3) Evaluate how to mitigate the issue and produce (re-)action plans (decide).
The closed loop continues to try to fix the issue (i.e. network fault) while the anomaly persists. The closed loop may
escalate to other management entities (e.g. operator intervention), in case no local solution can be found at the level of
the current closed loop.
NOTE: Refer to ETSI GR ZSM 005 [i.1] for additional information regarding the principles of closed-loop
automation.
ETSI
69 ETSI GS ZSM 002 V1.1.1 (2019-08)
E.4.2 Steps
Preconditions:
NOTE 1: The technology by which the intent is conveyed and the method by which the intent is decomposed into
an instruction set are not defined in the present document and not described in this example.
• The setup of the "SLS assurance" closed loop consists in making sure that:
The initial setup is realized by several management service subscriptions. When triggered by events, the management
services will operate together according to the operational policies.
- Fault events service - to consume information about abnormal system states originating from the
infrastructure resources.
- Performance event service - to consume information about events related to monitored performance
conditions (e.g. if a threshold was crossed).
- Anomaly detection service - to consume information about anomaly events from the management
domain, to create a E2E closed-loop automation.
NOTE 2: This example illustrates a closed loop in the management domain level, and the E2E closed loop is not in
scope of this example.
- Log collection service - to store the log info in the data services store.
ETSI
70 ETSI GS ZSM 002 V1.1.1 (2019-08)
• Domain intelligence management functions consume the domain orchestration service ("Execute workflow"
capability):
- A domain intelligence management function makes the decision and instructs a domain orchestration
management function that offers the "Execute workflow" capability to remediate the anomaly.
- As part of the analysis, other services may be invoked by the logic that performs the analysis, for
example:
• The reactive incident analysis service then publishes the available data and insights.
• Domain intelligence management functions receive the derived insights published by the reactive incident
analysis service and make a decision and a plan of the next actions e.g. based on policy. In this example, the
decision is to remediate the issue.
• A management function in domain intelligence consumes the domain orchestration service (Execute workflow
capability). Based on the operational policy configured in the policy management service, the domain
orchestration service (Execute workflow) executes a resolution workflow:
ETSI
71 ETSI GS ZSM 002 V1.1.1 (2019-08)
Annex F (informative):
Change history
Date Version Information about changes
26 Feb 2018 0.0.1 Skeleton (ZSM(18)000087r1_ZSM002_GS_Skeleton_proposal)
Incorporated contributions
- ZSM(18)000119r2_ZSM002_Addressing_EN_on_security_in_Architectural_Pri
nciples
- ZSM(18)000120r1_ZSM002_Proposing_Architectural_Principles
12 Apr 2018 0.1.0
Editorials
- Added draft disclaimer
- Fixed case of headings
Incorporated contributions
- ZSM(18)000145r1_ZSM002_Arch_Principle__7_stateless_functional_compone
nts
14 May 2018 0.2.0 - ZSM(18)000127r3_ZSM002_Proposing_Architectural_Requirements
Editorials
- Fixed version indicator of 0.1.0 in history box
Incorporated contributions
- ZSM(18)000134r3_ZSM002_Proposal_for_general_architecture_requirements
- ZSM(18)000146r4_ZSM002_Arch_Principles_Design_for_Failure
- ZSM(18)000147r4_ZSM002_Arch_Principle__6_Separation_of_concerns_in_
managemen
08 June 2018 0.3.0 - ZSM(18)000170r5_ZSM002_Architecture_requirements_related_to_telemetry
- ZSM(18)000236r2_ZSM002_Proposal_on_the_overview_and_architecture_of_
ZSM_fram
Editorials
- Removed empty annex A
Incorporated contributions
- ZSM(18)000253r2_ZSM002_principles_vs_requirements_removing_redundanc
y
- ZSM(18)000254_ZSM002_add_reference_to_terminology_WI
- ZSM(18)000259r1_ZSM002_domain_assurance_split_off_from_250
- ZSM(18)000276r2_ZSM002_Domain_Concept
16 July 2018 0.4.0 - ZSM(18)000301r4_ZSM002_Architectural_abstraction recursion
- ZSM(18)000310r1_ZSM002_Additional_architectural_principle_about_intend-
base
- ZSM(18)000325r2_ZSM002 Proposed ZSM Architecture Diagram Changes v6
Editorials
- Consistent terminology: changed "functional block" to "functional component".
Incorporated contributions
- ZSM(18)000333r2_ZSM002_Architecture_clause_restructuring
ETSI
72 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials
- Clause numbering fixes
- Missing "the"
- Added table references where missing.
- Replaced leftovers of "EXTERNAL" by "EXPOSED"
Incorporated contributions
- ZSM(18)000354r1_ZSM002_E2E_Service_Mgmt_Domain_Overview
- ZSM(18)000382r1_ZSM002_5_4_3_Functional_requirements_for_Common_D
02 Oct 2018 0.6.1
ata_Service
- ZSM(18)000383r1_ZSM_002_5_4_3_Functional_requirements_for_Common_
Data_Servic
Incorporated contributions
08 Oct 2018 0.6.2 - ZSM(18)000251r4_ZSM002_service_groups_in_E2E_service_domain
- ZSM(18)000252r4_ZSM002_data_services
Incorporated contributions
- ZSM(18)000374r4_ZSM002_Conflict_resolution_service_provided_by_Domain
_Intell
- ZSM(18)000385r2_ZSM002_5_4_3_Functional_requirements_for_Common_D
ata_Service
- ZSM(18)000386r1_ZSM002_5_4_3_Functional_requirements_for_Common_D
ata_Service
- ZSM(18)000391r3_ZSM002_-_Considerations_on_an_abstraction_principle
- ZSM(18)000399r1_ZSM002_PM_and_measurements_services_split_off_from
_267r2
- ZSM(18)000402r2_ZSM002_Harmonization_of_managed_entities__resources
_and_cons
- ZSM(18)000410r1_ZSM002_Design_for_resilience_principle
- ZSM(18)000418r1_ZSM002_data_processing_in_data_services_split_from_25
2r1
- ZSM(18)000423r1_ZSM002_Adapting_the_scope
- ZSM(18)000429r3_ZSM002_Integration_Fabric_Pub_Sub_Services
- ZSM(18)000432r3_ZSM002_Network_Capability_Inventory_Service
30 Oct 2018 0.7.0 - ZSM(18)000434r2_ZSM002_details_of_Configuration_data_generation_servic
e
- ZSM(18)000435r2_ZSM002_Testing_service
- ZSM(18)000436r3_ZSM002_E2E_testing_service
- ZSM(18)000437r6_ZSM002_Some_services_provided_by_E2E_service_intelli
gence
- ZSM(18)000442r3_ZSM002_clarify_capability_of_domain_orchestration_and_s
ome_c
- ZSM(18)000445r2_ZSM002_Management_service_related_to_network_servic
e_orchest
- ZSM(18)000446r2_ZSM002_Management_service_related_to_service_perfor
mance_ass
- ZSM(18)000452r2_ZSM002_Add_Feasibility_check
- ZSM(18)000453r1_ZSM002_Catalog_Managment_Service
- ZSM(18)000458r4_ZSM002_Data_abstraction_service_provided_by_Domain_
Assurance
- ZSM(18)000459_ZSM002_Add_the_abbreviations_of_AI_and_ML
- ZSM(18)000465r2_ZSM002_5_3_1_Non-
functional_requirements_for_Common_Data_Ser
ETSI
73 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials
Incorporated contributions
- ZSM(18)000464r1_ZSM002_5_4_3_Functional_requirements_for_Common_D
ata_Service
- ZSM(18)000469r1_ZSM002_5_3_1_General_non-functional_requirements
- ZSM(18)000470r1_ZSM002_5_3_1_General_non-functional_requirements
7 Nov 2018 0.7.1
Fixing the allocation of the content from ZSM(18)000437r6 to the wrong clause (moved
to 6.6.5.2.x from 6.5.5.2.x)
Editorials
- Corrected hanging paragraphs introduced by document 543r5.
- Clause 6.2: Replaced one simple sentence introduced by document 541r1
("Related end-points are logically grouped.") by its more detailed variant
expressed in 543r5 ("Each of the logical groups of management service end-
points contains end-points with related functionality.") to avoid redundancy.
- Document 559: Replaced "this document" by "the present document".
- Added missing captions
- Added missing abbreviations: MD, CDS, CRUD, SLA, EP
- Fixed references to ZSM001
ETSI
74 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials
- Added "void" to Symbols clause
- Cleaned up empty table rows
Incorporated contributions
11 Feb 2019 0.9.1 - ZSM(19)000051_ZSM002_Rapporteur_s_clean-up_after_v_0_9_0
- ZSM(19)000042r1_ZSM002_adding_a_conventions_clause
Incorporated contributions
- ZSM(19)000059_ZSM002_applying_external_visibility_convention_to_all_servi
c
- ZSM(18)000564r1_ZSM002_Changes_to_event_category_configuration_servi
ce
25 Feb 2019 0.9.2 - ZSM(19)000022r2_ZSM002_Add_and_update_condition_managment_service
On top of implementing the CR, rapporteur has aligned the use of external
visibility in clause 6.5.5.2.3 with the convention, has aligned the description of
the "Manage condition" operation in 6.6.5.2.4 with that in 6.5.5.2.3 and has
aligned the description of the CRUD pattern with the other occurrences in the
document.
Incorporated contributions
- ZSM(18)000511r2_ZSM002_E2E_Assurance_-_Anomaly_detection
- ZSM(18)000587r7_ZSM002_Clean_up_Discuss_and_accept_options_for_con
sistently_
- ZSM(18)000589r2_ZSM002_Lifecycle_change_report_provided_by_orchestrati
on_ser
- ZSM(18)000610r7_ZSM002_Further_architecture_building_block_refinement_
and_al (this contribution was already implemented in V 0.9.0, but Change 0 has
been missed. This change is implemented in V 0.10.0)
- ZSM(19)000039r3_ZSM002_Proposed_changes
- ZSM(19)000068r1_ZSM002_Rapporteur_s_clean-up_of_V092
- ZSM(19)000069r2_ZSM002_Changes_to_support_ML
- ZSM(19)000070r1_ZSM002_Rapporteur_resolving_ENs_part_1
- ZSM(19)000071r2_ZSM002_align_catalogue_management_services
- ZSM(19)000072r1_ZSM002_Proposal_to_restructure_the_Misc_group
20 Mar 2019 0.10.0 - ZSM(19)000075r1_ZSM002_Streamlining_the_Data_Services_clause
- ZSM(19)000078r1_ZSM002_Removing_EN_about_E2E_service_catalog_in_C
DS
- ZSM(19)000079r2_ZSM002_Streamlining_the_Integration_fabric_clause
- ZSM(19)000080r3_ZSM002_Ingest_service_model
- ZSM(19)000084r2_ZSM002_Changes_to_architeture_diagram (also, replaced
all occurrences of "common data services" with "cross-domain data services"
as an editorial action)
- ZSM(19)000085r1_ZSM002_Changes_to_clause_3
- ZSM(19)000086r1_ZSM002_Changes_to_clause_4_and_5
- ZSM(19)000087r1_ZSM002_Adding_available_network_topology_service
- ZSM(19)000090r1_ZSM002_common_data_services_definition
- ZSM(19)000094r1_ZSM002_Clarification_and_Modifications_on_data_service
s_in
- ZSM(19)000096r1_ZSM002_Func-Gen-07_small_modification
- ZSM(19)000100_ZSM002_Changes_in_domain_orchestration_services
ETSI
75 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials
- Typos and wrong capitalizations
- Consistently "notification about" not "notification of".
- Put CRUDL always in the same sequence.
- Align table captions.
Incorporated contributions
- ZSM(19)000088r3_ZSM002_Changes_to_domain_analytics_services
- ZSM(19)000097r2_ZSM002_E2E_service_topology_management_service
- ZSM(19)000166_ZSM002_Fixing_the_issue_with_contribution_126r1
- ZSM(19)000150r1_ZSM002_alternative_resolution_for__managed_domain__fr
om_cont
26 Mar 2019 0.10.1
- ZSM(19)000155r1_ZSM002_Executing_the_removal_of_Category
- ZSM(19)000164r1_ZSM002_rapporteur_s_clean-up_after_v_0_10_0
- ZSM(19)000165_ZSM002_consistent_terminology
Editorials
- Added authors missed when creating V 0.10.0
Incorporated contributions
- ZSM(19)000045r5_ZSM002_architecture_mods_to_align_with_requirements
- ZSM(19)000116r2_ZSM002_Analytics_service_capabilities_update
- ZSM(19)000134r2_ZSM002_scope_update
- ZSM(19)000135r2_ZSM002_6_1_2_4_service_composition_update
- ZSM(19)000136r2_ZSM002_SLA_management_update
- ZSM(19)000138r1_ZSM002_E2E_testing_service_fixes
- ZSM(19)000156_ZSM002_changes_to_exposure_function_pulled_out_from_0
070
- ZSM(19)000163r1_ZSM002_data_services_condition_fix
01 Apr 2019 0.10.2
Editorials
- Added authors missed when creating V 0.10.1
- Fixed typos etc.
- Deleted empty Bibliography annex
- Terminology: producer service -> service producer; consumer service ->
service consumer
- Consistently using "provide notifications" (plural)
- Consistently using "Manage subscriptions" pattern "Manage (create, read,
update, delete, list) subscriptions to xyz"
Incorporated contributions
- ZSM(18)000309r4_ZSM002_Additional_architectural_principle_about__design
ed_fo
- ZSM(19)000015r5_ZSM002_Integration_Fabric_Patterns
- ZSM(19)000032r3_ZSM002_Management_communication_service_to_solve_
pub-sub_deb
- ZSM(19)000048r3_ZSM002_Annex_E2E_Closed_Loop_Example
- ZSM(19)000049r2_ZSM002_Annex_Deploy_a_new_CFS_Example
- ZSM(19)000074r3_ZSM002_removing_note_about_external___internal_servic
02 May 2019 0.11.0 es
- ZSM(19)000082r7_ZSM002_Changes_to_AI_model_service
- ZSM(19)000089r3_ZSM002_data_store_types_discovery_and_data_store_cre
ation_in
- ZSM(19)000115r7_ZSM002_Adding_introductory_text_on_data_services
(added to 6.4.1)
- ZSM(19)000119r6_ZSM002_Adding_Analytics_and_Intelligence_services
- ZSM(19)000124r5_ZSM002_Update_to_exposure_service
- ZSM(19)000128r3_ZSM002_Additional_architecture_principle__section_4_2
- ZSM(19)000152r3_ZSM002_Modifications_related_to_discussion_in_141
ETSI
76 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials
- Fixed hanging paragraphs in Annex A
- Added missing informative reference ZSM005
- Corrected typos
- Fixed history box that was not recording all previously implemented
contributions
Status: Proposed Stable draft.
Incorporated contributions
- ZSM(19)00191r4 ZSM002 Annex - Example of how management capability
exposure service works
- ZSM(19)000221r1_ZSM002_add_analytics_services_from_discussion_part_of
_176
07 May 2019 0.12.0 - ZSM(19)000227r4 Functional requirements Lawful Intercept
- ZSM(19)000232r1_ZSM002_ENs_removal_for_stable_draft
- ZSM(19)000237r2_ZSM002_rapporteur_s_clean-up_of_V0110
- ZSM(19)000240r2_ZSM002_Delete_Annex_D
Editorials
- Consistent use of "closed loop" vs. "closed-loop"
- Fixed the colouring of the closed loops figure
Status: Stable Draft
Editorials:
- Cleaned up by editHelp!
04 June 2019 0.12.1
- Editorial changes by rapporteur
- Removed "Authors and contributors" annex F as per ISG decision documented
in ZSM(19)000252
- Included editorial changes in ZSM(19)000284
ETSI
77 ETSI GS ZSM 002 V1.1.1 (2019-08)
Incorporated contributions
- ZSM(18)000583r8_ZSM002_Virtualized_resources_lifecycle_management_ser
vice_in
- ZSM(19)000147r3_ZSM002_Architectural_requirements_around_service_integ
ration
- ZSM(19)000220r3_ZSM002_update_security_requirements_pulled_out_from_
196
- ZSM(19)000226r3 Replace SLA with SLS
- ZSM(19)000270r1_ZSM002_Fixing_condition_detection_service
- ZSM(19)000271r2_ZSM002_Rewriting_description_of_intelligence_clause
- ZSM(19)000272r1_ZSM002_Fixes_to_architecture_principles
- ZSM(19)000273r1_ZSM002_Fixes_to_non-functional_requirements
- ZSM(19)000274r1_ZSM002_Fixes_to_6_1_2_2_Management_services
- ZSM(19)000276r1_ZSM002_Fixes_to_5_3_3_Functional_requirements_for_C
DS
- ZSM(19)000277_ZSM002_Fixes_to_6_ZSM002_Fixes_to_6_1_2_5_Integratio
n_fabric
- ZSM(19)000278r1_ZSM002_Generalizing_DSF_to_ZSM_framework_consume
r
- ZSM(19)000281r3_ZSM002_Fixes_to_5_4_Security_requirements
- ZSM(19)000283r1_ZSM002_Fixes_to_8_Security_considerations
- ZSM(19)000285r2_ZSM002_Review_part_1
- ZSM(19)000288_ZSM002_Fixes_to_3_1_Definitions
- ZSM(19)000291r1_ZSM002_Fixes_to_6_1_2_4_Management_domains
- ZSM(19)000292r1_ZSM002_Fixes_to_6_3_Integration_fabric
- ZSM(19)000293r1_ZSM002_Fixes_to_6_4_Data_services
- ZSM(19)000294r2_ZSM002_Fixes_to_6_5_4_Domain_data_collection
- ZSM(19)000295_ZSM002_Fixes_to_6_5_5_Domain_analytics
- ZSM(19)000296_ZSM002_Fixes_to_Manages_services_catalog_management
_service
- ZSM(19)000297r1_ZSM002_Harmonizing_AI_and_ML_related_services
28 June 2019 0.13.0 - ZSM(19)000298r1_ZSM002_Small_fixes_to_testing_service
- ZSM(19)000299_ZSM002_Fixes_to_6_5_8_Domain_control
- ZSM(19)000301r1_ZSM002_Fixes_to_6_6_1_Overview_of_E2E_domain
- ZSM(19)000302_ZSM002_Fixes_to_6_6_5_2_1_E2E_Analytics_services
- ZSM(19)000303_ZSM002_Removing_separate_workflow_management_from_
E_3_2
- ZSM(19)000304_ZSM002_Replacing_Legacy_domain_EPs_with_capabilities
- ZSM(19)000305r1_ZSM002_Removing_the_word__required
- ZSM(19)000306r1_ZSM002_Review_part_2__definition
- ZSM(19)000307r1_ZSM002_Review_part_3_change_proposals_after_drafting
- ZSM(19)000309r2_ZSM002_Review_part_5_remaining_changes_after_draftin
g
- ZSM(19)000310r1_ZSM002_Review_part_6_remaining_comments
- ZSM(19)000311r1_ZSM002_Fixes_to_5_3_5_LI_requirements
- ZSM(19)000312r1_ZSM002_Fixing_4_2_9_Principle_09
- ZSM(19)000313_ZSM002_Fixes_to_6_1_2_7_E2E_domain
- ZSM(19)000315r2_ZSM002_Fixes_to_6_4_2_3_Data_processing_service
- ZSM(19)000316r1_ZSM002_Removing_redundancy_related_to_domain_data_
services_a
- ZSM(19)000317r1_ZSM002_Fixes_to_6_5_5_2_3_Data_optimization_service
- ZSM(19)000318_ZSM002_Fixes_to_6_5_6_2_4_and_6_6_6_2_3_Health_issu
e_reporti
- ZSM(19)000319r1_ZSM002_Fixes_to_6_5_7_Domain_orchestration
- ZSM(19)000320r2_ZSM002_Fixes_to_inventory_and_topology_services
- ZSM(19)000322r1_ZSM002_Fixes_to_6_5_8_2_1_Configuration_managemen
t_service
- ZSM(19)000323_ZSM002_Fixes_to_6_6_4_1_Description_of_E2E_service_da
ta_coll
- ZSM(19)000324r1_ZSM002_Resolve_EN_in_6_6_5_2_1
- ZSM(19)000326r2_ZSM002_Missing_IF_Service_for_Routing_Service_Reque
sts
- ZSM(19)000327_ZSM002_Fixes_to_6_5_7_2_2_Feasibility_check_service
- ZSM(19)000328_ZSM002_Fixes_to_6_5_9_2_1_and_6_6_8_2_1_Policy_man
agement_se
ETSI
78 ETSI GS ZSM 002 V1.1.1 (2019-08)
Editorials:
- Editorial changes by rapporteur (traced with username r0-rapp)
- Fixes to history box
Incorporated contributions:
- ZSM(19)000404r1_ZSM002_rapporteur_s_cleanup_after_Santa_Clara_meetin
g
- ZSM(19)000275_ZSM002_Fixes_to_5_3_1_General_functional_requirements
- ZSM(19)000392r5_ZSM002_Clause_6_4_1_change_suggestions
- ZSM(19)000405_ZSM002_AI_model_performance_evaluation_service_consist
ency
- ZSM(19)000406r2_ZSM002_conflict_resolution_336r2_and_387r2
- ZSM(19)000407_ZSM002_IF_and_DS_services_re-structuring_as_follow-
03 July 2019 0.13.5
up_of_398
- ZSM(19)000411r1_ZSM002_Fixing_the_use_of_the_term__implementation
- ZSM(19)000412r1_ZSM002_ENs_removal_for_final_draft
- ZSM(19)000413_ZSM002_Resolving_ENs_in_management_communication_s
ervice
Editorials (r0-rapp)
- Typos and formatting
- Renumbering
- Implementation status of ZSM(18)000325r2 and ZSM(19)000103r1 corrected in
history box
ETSI
79 ETSI GS ZSM 002 V1.1.1 (2019-08)
Incorporated contributions:
- ZSM(18)000384_ZSM002_5_4_3_Functional_requirements_for_Common_Dat
a_Service
- ZSM(19)000410_ZSM002_align_Annex_E_with_services_terminology
- ZSM(19)000416r4_ZSM002_missing_definitions
- ZSM(19)000424_ZSM002_data_services_fix
- ZSM(19)000425r1_ZSM002_security_fixes
09 July 2019 0.14.0 - ZSM(19)000427r1_ZSM002_necessary_modifications_of_content_introduced_
by_ZSM
- ZSM(19)000435_ZSM002_Fallback_solution_for_service_invocation_routing_s
erv
- ZSM(19)000439r1_ZSM002_apply_the_boilerplate_for_reference_to_ZSM007
- ZSM(19)000440r1_ZSM002_Editorial_changes_in_clauses_3_4__6_5_2_2_1_
_6_5_2_2
Editorials (r0-rapp)
Incorporated contributions:
15 Jul 2019 0.14.1
- ZSM(19)000446_ZSM002_making_reference_to_ZSM001_informative
Editorials (r0-rapp)
ETSI
80 ETSI GS ZSM 002 V1.1.1 (2019-08)
History
Document history
V1.1.1 August 2019 Publication
ETSI