Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • As anomaly conditions are encountered as part of the self-check process or during normal operation (e.g., cannot send message to another module/xApp via RMR), the RIC and/or the specific platform module/xAPP needs to determine the severity and whether they are mappable to an alarm type.  If mappable to an alarm type, the RIC needs to declare the alarm condition.  
  • The alarm type definitions for platform modules and xAPPs should be consistent with 3GPP TS 28.545 Fault Supervision technical specification.  
  • New alarms declared in either case (self-check or normal operation) require notifications to be sent immediately via the O1 VES interface, after verifying against the current RIC alarm list that the alarm is indeed new.
  • New alarms are to be stored and captured as part of the alarm list of the RIC.  To support queries from NB clients for outstanding alarms via O1 Netconf interface, the RIC needs to make the alarm list available in the yang operational tree.  The yang model may need to be updated to support the alarm queries.  
    • Since alarms are sent as VES events over O1 VES, a mapping or translation function between VES alarms and Netconf/Yang model might needed. 
  • Similarly, the RIC needs to identify alarms that are not longer present by comparing self-check results against the current alarm list.  Any cleared alarms need to be removed from the RIC alarm list and clearing notifications sent over O1 VES. 

Health-Check Function

To support this flowthese flows, a new Health-Check functional block within the RIC is being proposed, which .  This Health-Check functional block can be implemented as a separate software module, as a distributed function across one or more existing modules, and/or as existing capabilities already available from the underlying container infrastructure such as Kubernetes' container/pod lifecycle management.  The Health-Check functional block has to perform the following:

  • Perform Trigger health-checks on the common RIC platform functions/modules and on xAPP instances hosted on the RIC (self-checks at configured intervals and on-demand requests)
  • Map failures and anomalies to alarms and alertsalarms 
  • Send out notifications for alarms and alertsnew alarms 
  • Determine the state of the RIC based on alarms and alertsalarms 
  • Store Log health-check results and update alarm list for queries
  • Clear alarms and alerts when conditions clear


Figure 1 The sequence diagram below shows the flow of RIC Self-Checks – regular heartbeats over O1 and A1, the Health-Check Module initiating health:

  • Alarm or alarm clear notification over O1VES as platform modules and xAPPs encounter anomalies or failure in their operation (apart from self-checks).
  • Health-Check function initiating self-check requests within the RIC to assess its overall health, and issuing alarms

...

  • , as appropriate based on health results.


Note 1: Figure 1 above shows the flows assuming Salmon colored notes represent functions corresponding to Bronze release EPICs.  Yellow colored notes represent comments/notes or implicit functions.   

Note 2: The flows above assume that SMO is the northbound client that triggers the near-RT RIC.  The SMO consists of the O1 OAM adapter (supporting both O1VES and O1NetConf related messages/data) and the non-RT RIC (containing the A1 adapter).  The O-RAN SC implementation of the flows associated with this Health-check use case should create a simulated SMO for invoking requests and processing responses.  The simulated SMO should also provide a Test Driver (shown in Figures 2-4) for initiating requests to SMO and receive response from SMO.  Alternatively, a Dashboard can also be the NB client to trigger these requests.

...

For health of external interfaces, the RIC is responsible to check its interface module health and the reachability/connectivity by external systems.  For RIC interface modules - O1 Termination, A1 Mediator, and E2 Termination modules - the requirement is already described above as part of the RIC Self-Check.  For connectivity, the RIC needs to support heartbeats or keep-alive signals to ensure northbound (SMO-RIC including other NB clients) and southbound connectivity (RIC-RAN Resources).  

  • O1 interface - SMO-RIC connectivity over O1 Netconf and O1 VES is described in O1 RIC Health-Check (Flow #2)
  • A1 interface - SMO-RIC connectivity over A1 is not defined at this time as connectivity checks are done by NB clients (OTF or Test Driver) when making policy queries and policy creation/deletion
  • E2 interface - RIC-RAN Resources over E2

RIC connectivity resources 

The RIC also checks heartbeat message come from RAN resources over the E2 interface.

...

  • Managed Functions (O-CU, O-DU) over E2 is depicted in the diagram above.  For the initial implementation, the RIC's E2 Termination module checks keep-alive messages coming from RAN Managed Functions at regular intervals.  If the E2 Termination fails to receive keep-alive messages for a defined time period, it will declare an alarm on that E2 connection to the corresponding Managed Function.  

Latency

Since the role of RIC is to enable near realtime control loop actions, latency is an important set of telemetry to be collected and reported - E2 latency and RIC processing latency.  E2 latency includes telemetry that measures incoming messages/data to the RIC as well as outgoing messages from the RIC to Managed Functions.  RIC processing latency is telemetry that measures the RIC/xAPPs control loop processing time to receive messages, apply analytics, determine control loop actions and generate outgoing messages to RAN Managed Function over E2.  As the RIC matures release over release, latency telemetry should must be defined and implemented.

...