SlideShare a Scribd company logo
1 of 15
TelcoAI Summit Europe, November 2020.
Dr.Kim K Larsen, CTIOT-Mobile Netherlands.
NETWORKAUTOMATION& AUTONOMY
– AT PACE &SCALE
NG FULFILLMENT & ASSURANCE.
Anomaly Detection.
Incident “awareness”
Self-restoration/healing.
Change-management.
Network
Management
RT Resource
Management.
Self-optimization.
Intent based configs.
Congestion
management.
Network
Optimization
Anomaly Detection.
Pro-active (“RT”) UE
Management.
Closed-loop Customer
UE Management &
Operations.
User Experience
(UE)
milliseconds - minutes milliseconds - month milliseconds - hour
 zero-human-touch  zero-human-touch  zero-human-touch
BIG NETWORK DATA.
4
Timing
Action & Reaction
High Velocity
(events/sec)
Large Variety
(e.g., 10k+ event cats)
Very High
Volume
Event Process
approx. <1+>
Alarm per sec
approx. <30+>
Events per
millisecond
Daily (mobile) IP User Plane
Data 750+ Tera Byte
approx. 20 Mega Byte
per millisecond
Lots of Unstructured
data (e.g., ASCI, HEX,
BIN, HTML, …)
Illustration from a big telco network in Europe
milli-seconds to minutes
to hours to days in
response requirements.
BIGTELCO DATA IS NOT ALL GOLD
OR NEW OIL!
Automation vs Autonomy
Artificial Intelligence
Humansremain essential & involved
(machinesassisthumans)
Machine autonomy
(humansassistmachines)
C
Tool
Assistance
Level 1
Partial
Automation
Level 2
Model-based
Automation
Level 3
High
Autonomy
Level 4
Full
Autonomy
Level 5
Machine-assisted Automation
(Humans necessary although with decreasing
involvement)
Autonomous Operations
(Humans are no longer
involved)
Evolving towards Telco-cloud native
including cognitive (AI/ML) solutions (“salt &
pepper”)
Beyond Automation towards
Level 5 Network Operations
We are here today
CENTRALIZED
CONTROL?
(THINKINGPAGE)
1 Brain & 1 Heart
A (peripheral) nervous system with
limited autonomous intelligence.
Not designed for a lot of
redundancy.
Anomaly detection un-
sophisticated.
High degree of
Centralized Orchestration
& Control.
VSDE-CENTRALIZED
CONTROL?
(THINKINGPAGE)
9 Brains & 3 Hearts.
High degree of autonomy between
parts.
Highly redundant system design.
Anomaly detection un-sophisticated
(but also less critical).
High degree of De-
centralized
Orchestration & Control.
THE NETWORK VIEW
Machine Learning Apps
Big Data Process
North
South
Closed loop
optimization
Illustration
CHALLENGESWITHINDUSTRIAL ML.
NON-EXHAUSTIVE.
Machine Learning Agent / Model.
Entanglement
Machine Learning
Systems
mix signals together,
entangling them &
makes isolation of
improvements
largely impossible.
Correction Cascades Undeclared Consumers
  
m1 m’1 m’’1 m’’’’’’1
Once in place, a correction
cascade can create an
improvement deadlock, as
improving the accuracy of any
individual component actually
leads to system-level
detriments.
correction cascade
See also: D, Sculley et al (2015), “Hidden Technical Debts in Machine Learning”.
Official System
with Model M1 &
Output OM1
OM1
Undeclared
system w. M1
dependency
Undeclared consumers are
expensive at best and dangerous at
worst, because they create a
hidden tight coupling of a given
model to other parts of the
stack/system.
“WE HAVE LITTLE EXPERIENCEWITH
INTEGRATING ADVANCED
MACHINE LEARNING
IN INDUSTRIAL SCALE
COMPLEX SYSTEMS,
SUCH AS TELCONETWORKS”
Autonomous
Network
Project
ZSM ISG
ENI ISG
PoCs &
Use Cases
(e.g., China)
Grading
Standards
Autonomous
Network
Levels
Access
Data Center = Cloud
Experience n = n + 1
AI Controllers
Learning Agents
Environment
Observations:
Customer interactions.
Actions
Reward
e.g., to achieve
desired outcomes
Many experience iterations
per relevant time unit.
Towards
Intelligent
Automation
Services
Customers
 Re-enforcement learning (ML/DL)
 Closing the loop.
 Dynamic machine learning.
 Anomaly detection on infrastructure
as well as Learning Agents / RPAAs.
“Closing the Loop”
ZERO
TOUCH
Robotic
Proces Automation
No regret if managed … good ROI
Industrial-scaled AI
High complexity…longer term ROI
Chat bot*(s)
No regret … keep simple
Anomaly detection**
Essential & easy ROI
Specialistic (narrow) AI
Simpler tasks…shorter term ROI
Intelligent Automation
(beyond RPA or RPA meets AI)
Higher complexity…uncertain ROI
Check out (*) for advancing your bots https://www.convercx.com/ & (**) imo one of the most inspiring companies on anomaly detection https://www.anodot.com/
THANK YOU!
Acknowledgement
Manythanks tomany industry &corporate colleagues whohave contributed with valuable
insights, discussions &comments throughout this work. I wouldin particularlike tothank
Anodot* forinspiring my thinking on the importance ofanomaly detection in the widest
possible sense ofautonomous network operation Last but notleast, thanks tomy wife Eva
Varadifor her patience during this work.
Contact:
Email: kim.larsen@t-mobile.nl
Linkedin:www.linkedin.com/in/kimklarsen
Blogs:www.aistrategyblog.com & www.techneconomyblog.com
Twitter:@KimKLarsen
(*) https://www.anodot.com/

More Related Content

What's hot

Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...
Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...
Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...Ike Alisson
 
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Amazon Web Services
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016Eclipse IoT
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies3G4G
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksQualcomm Research
 
Analyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessAnalyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessDr. Kim (Kyllesbech Larsen)
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseToshal Dudhwala
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud ComputingAhmed Banafa
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetationKaveh Khosravi
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergenceAhmed Banafa
 
5G and V2X Automotive Slicing
5G and V2X Automotive Slicing5G and V2X Automotive Slicing
5G and V2X Automotive SlicingMarie-Paule Odini
 
3GPP Release 17: Completing the first phase of 5G evolution
3GPP Release 17: Completing the first phase of 5G evolution3GPP Release 17: Completing the first phase of 5G evolution
3GPP Release 17: Completing the first phase of 5G evolutionQualcomm Research
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...BIPUL KUMAR GUPTA
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSAnchises Moraes
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G3G4G
 
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...Mojtaba HOUSHMAND
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Grazio Panico
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing3G4G
 

What's hot (20)

Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...
Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...
Ike A 5G Private Networks PNI-NPN/SNPN LF Edge Akraino Technical Meeting Spri...
 
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies6G: Potential Use Cases and Enabling Technologies
6G: Potential Use Cases and Enabling Technologies
 
Transforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networksTransforming enterprise and industry with 5G private networks
Transforming enterprise and industry with 5G private networks
 
Analyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing SuccessAnalyzing Business Models For Network Sharing Success
Analyzing Business Models For Network Sharing Success
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
 
Fog Computing and Cloud Computing
Fog Computing and Cloud ComputingFog Computing and Cloud Computing
Fog Computing and Cloud Computing
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
5G and V2X Automotive Slicing
5G and V2X Automotive Slicing5G and V2X Automotive Slicing
5G and V2X Automotive Slicing
 
3GPP Release 17: Completing the first phase of 5G evolution
3GPP Release 17: Completing the first phase of 5G evolution3GPP Release 17: Completing the first phase of 5G evolution
3GPP Release 17: Completing the first phase of 5G evolution
 
5G Network Overview
 5G Network Overview 5G Network Overview
5G Network Overview
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
An Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5GAn Introduction to 5G and ‘Real’ 5G
An Introduction to 5G and ‘Real’ 5G
 
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
Authentication & Authorization and Accounting (AAA) in Telecommunications Ind...
 
Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution Ngen oss bss - architecture evolution
Ngen oss bss - architecture evolution
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 

Similar to Network Automation & Autonomy - At Pace & Scale.

Artificial intelligence - A Teaser to the Topic.
Artificial intelligence - A Teaser to the Topic.Artificial intelligence - A Teaser to the Topic.
Artificial intelligence - A Teaser to the Topic.Dr. Kim (Kyllesbech Larsen)
 
Applying Drools in Assistive Technology
Applying Drools in Assistive TechnologyApplying Drools in Assistive Technology
Applying Drools in Assistive Technologytsurdilovic
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesBiren Gandhi
 
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...02/2017 Santa Clara, California: Networks of autonomous devices and their imp...
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...Frank Alexander Reusch
 
Smart appliances EupP interoperability
Smart appliances EupP interoperabilitySmart appliances EupP interoperability
Smart appliances EupP interoperabilityRogelio Segovia
 
Get Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog ComputingGet Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog ComputingBiren Gandhi
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)Moises Navarro
 
A New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingA New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingAshley Lovato
 
Redefining "Clean IT": Rejecting Incremental Improvement
Redefining "Clean IT": Rejecting Incremental ImprovementRedefining "Clean IT": Rejecting Incremental Improvement
Redefining "Clean IT": Rejecting Incremental ImprovementPeter Coffee
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...James Crawshaw
 
Big Data @ NT - A Network Technology Perspective
Big Data @ NT - A Network Technology PerspectiveBig Data @ NT - A Network Technology Perspective
Big Data @ NT - A Network Technology PerspectiveDr. Kim (Kyllesbech Larsen)
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things MicroservicesCapgemini
 
Sensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsSensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsJeffrey Funk
 
Going eXtreme for Healthcare
Going eXtreme for HealthcareGoing eXtreme for Healthcare
Going eXtreme for HealthcareKoen Vanderkimpen
 
RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011Gerardo Pardo-Castellote
 
IDC Multicloud 2019 - Conference Milano , Oracle speech
IDC Multicloud 2019 - Conference Milano , Oracle speechIDC Multicloud 2019 - Conference Milano , Oracle speech
IDC Multicloud 2019 - Conference Milano , Oracle speechRiccardo Romani
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 

Similar to Network Automation & Autonomy - At Pace & Scale. (20)

Artificial intelligence - A Teaser to the Topic.
Artificial intelligence - A Teaser to the Topic.Artificial intelligence - A Teaser to the Topic.
Artificial intelligence - A Teaser to the Topic.
 
Applying Drools in Assistive Technology
Applying Drools in Assistive TechnologyApplying Drools in Assistive Technology
Applying Drools in Assistive Technology
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...02/2017 Santa Clara, California: Networks of autonomous devices and their imp...
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...
 
Smart appliances EupP interoperability
Smart appliances EupP interoperabilitySmart appliances EupP interoperability
Smart appliances EupP interoperability
 
Get Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog ComputingGet Cloud Resources to the IoT Edge with Fog Computing
Get Cloud Resources to the IoT Edge with Fog Computing
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
 
A New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud ComputingA New Way Of Distributed Or Cloud Computing
A New Way Of Distributed Or Cloud Computing
 
Redefining "Clean IT": Rejecting Incremental Improvement
Redefining "Clean IT": Rejecting Incremental ImprovementRedefining "Clean IT": Rejecting Incremental Improvement
Redefining "Clean IT": Rejecting Incremental Improvement
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
 
Big Data @ NT - A Network Technology Perspective
Big Data @ NT - A Network Technology PerspectiveBig Data @ NT - A Network Technology Perspective
Big Data @ NT - A Network Technology Perspective
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things Microservices
 
Sensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsSensors, MEMS, Internet of Things
Sensors, MEMS, Internet of Things
 
Going eXtreme for Healthcare
Going eXtreme for HealthcareGoing eXtreme for Healthcare
Going eXtreme for Healthcare
 
RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011RTI Data-Distribution Service (DDS) Master Class 2011
RTI Data-Distribution Service (DDS) Master Class 2011
 
IDC Multicloud 2019 - Conference Milano , Oracle speech
IDC Multicloud 2019 - Conference Milano , Oracle speechIDC Multicloud 2019 - Conference Milano , Oracle speech
IDC Multicloud 2019 - Conference Milano , Oracle speech
 
Chapter - One.ppt
Chapter - One.pptChapter - One.ppt
Chapter - One.ppt
 
DTN
DTNDTN
DTN
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 

More from Dr. Kim (Kyllesbech Larsen)

The best Spectrum, the best network, and smart investment strategies … lesson...
The best Spectrum, the best network, and smart investment strategies … lesson...The best Spectrum, the best network, and smart investment strategies … lesson...
The best Spectrum, the best network, and smart investment strategies … lesson...Dr. Kim (Kyllesbech Larsen)
 
What makes telco tick and what to expect from real 5G
What makes telco tick and what to expect from real 5GWhat makes telco tick and what to expect from real 5G
What makes telco tick and what to expect from real 5GDr. Kim (Kyllesbech Larsen)
 
A Tutorial to AI Ethics - Fairness, Bias & Perception
A Tutorial to AI Ethics - Fairness, Bias & Perception A Tutorial to AI Ethics - Fairness, Bias & Perception
A Tutorial to AI Ethics - Fairness, Bias & Perception Dr. Kim (Kyllesbech Larsen)
 
The Bot Generation ... Are Millennials excited or threatened by AI?
The Bot Generation ... Are Millennials excited or threatened by AI?The Bot Generation ... Are Millennials excited or threatened by AI?
The Bot Generation ... Are Millennials excited or threatened by AI?Dr. Kim (Kyllesbech Larsen)
 
Towards 5G - super-agility, hyper-connectivity & networked intelligence
Towards 5G - super-agility, hyper-connectivity & networked intelligenceTowards 5G - super-agility, hyper-connectivity & networked intelligence
Towards 5G - super-agility, hyper-connectivity & networked intelligenceDr. Kim (Kyllesbech Larsen)
 
Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Dr. Kim (Kyllesbech Larsen)
 
Growth Pains: How mobile networks will supply data capacity for 2020
Growth Pains: How mobile networks will supply data capacity for 2020Growth Pains: How mobile networks will supply data capacity for 2020
Growth Pains: How mobile networks will supply data capacity for 2020Dr. Kim (Kyllesbech Larsen)
 

More from Dr. Kim (Kyllesbech Larsen) (20)

The best Spectrum, the best network, and smart investment strategies … lesson...
The best Spectrum, the best network, and smart investment strategies … lesson...The best Spectrum, the best network, and smart investment strategies … lesson...
The best Spectrum, the best network, and smart investment strategies … lesson...
 
What makes telco tick and what to expect from real 5G
What makes telco tick and what to expect from real 5GWhat makes telco tick and what to expect from real 5G
What makes telco tick and what to expect from real 5G
 
5G Standalone Will Deliver! - But What?
5G Standalone Will Deliver! - But What?5G Standalone Will Deliver! - But What?
5G Standalone Will Deliver! - But What?
 
AI for Finance
AI for FinanceAI for Finance
AI for Finance
 
Ethical Dilemmas in AI/ML-based systems
Ethical Dilemmas in AI/ML-based systemsEthical Dilemmas in AI/ML-based systems
Ethical Dilemmas in AI/ML-based systems
 
A Tutorial to AI Ethics - Fairness, Bias & Perception
A Tutorial to AI Ethics - Fairness, Bias & Perception A Tutorial to AI Ethics - Fairness, Bias & Perception
A Tutorial to AI Ethics - Fairness, Bias & Perception
 
AI for Telcos
AI for TelcosAI for Telcos
AI for Telcos
 
The Bot Generation ... Are Millennials excited or threatened by AI?
The Bot Generation ... Are Millennials excited or threatened by AI?The Bot Generation ... Are Millennials excited or threatened by AI?
The Bot Generation ... Are Millennials excited or threatened by AI?
 
Smart life 3.0
Smart life 3.0Smart life 3.0
Smart life 3.0
 
How do we Humans feel about AI?
How do we Humans feel about AI?How do we Humans feel about AI?
How do we Humans feel about AI?
 
Towards 5G - super-agility, hyper-connectivity & networked intelligence
Towards 5G - super-agility, hyper-connectivity & networked intelligenceTowards 5G - super-agility, hyper-connectivity & networked intelligence
Towards 5G - super-agility, hyper-connectivity & networked intelligence
 
The Economics of 5G
The Economics of 5GThe Economics of 5G
The Economics of 5G
 
Artificial intelligence - Digital Readiness.
Artificial intelligence - Digital Readiness.Artificial intelligence - Digital Readiness.
Artificial intelligence - Digital Readiness.
 
Modern Telecommunication ... The Very Basic.
Modern Telecommunication ... The Very Basic.Modern Telecommunication ... The Very Basic.
Modern Telecommunication ... The Very Basic.
 
Beyond LTE Launch
Beyond LTE LaunchBeyond LTE Launch
Beyond LTE Launch
 
Small cell networks why & when to care!
Small cell networks   why & when to care!Small cell networks   why & when to care!
Small cell networks why & when to care!
 
Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society Digitized! Get Ready for the Next Wave of the Digital Society
Digitized! Get Ready for the Next Wave of the Digital Society
 
Small Cell Economics
Small Cell EconomicsSmall Cell Economics
Small Cell Economics
 
A Stranger in a Strange Land
A Stranger in a Strange LandA Stranger in a Strange Land
A Stranger in a Strange Land
 
Growth Pains: How mobile networks will supply data capacity for 2020
Growth Pains: How mobile networks will supply data capacity for 2020Growth Pains: How mobile networks will supply data capacity for 2020
Growth Pains: How mobile networks will supply data capacity for 2020
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Network Automation & Autonomy - At Pace & Scale.

  • 1. TelcoAI Summit Europe, November 2020. Dr.Kim K Larsen, CTIOT-Mobile Netherlands. NETWORKAUTOMATION& AUTONOMY – AT PACE &SCALE
  • 2.
  • 3. NG FULFILLMENT & ASSURANCE. Anomaly Detection. Incident “awareness” Self-restoration/healing. Change-management. Network Management RT Resource Management. Self-optimization. Intent based configs. Congestion management. Network Optimization Anomaly Detection. Pro-active (“RT”) UE Management. Closed-loop Customer UE Management & Operations. User Experience (UE) milliseconds - minutes milliseconds - month milliseconds - hour  zero-human-touch  zero-human-touch  zero-human-touch
  • 4. BIG NETWORK DATA. 4 Timing Action & Reaction High Velocity (events/sec) Large Variety (e.g., 10k+ event cats) Very High Volume Event Process approx. <1+> Alarm per sec approx. <30+> Events per millisecond Daily (mobile) IP User Plane Data 750+ Tera Byte approx. 20 Mega Byte per millisecond Lots of Unstructured data (e.g., ASCI, HEX, BIN, HTML, …) Illustration from a big telco network in Europe milli-seconds to minutes to hours to days in response requirements.
  • 5. BIGTELCO DATA IS NOT ALL GOLD OR NEW OIL!
  • 6. Automation vs Autonomy Artificial Intelligence Humansremain essential & involved (machinesassisthumans) Machine autonomy (humansassistmachines)
  • 7. C Tool Assistance Level 1 Partial Automation Level 2 Model-based Automation Level 3 High Autonomy Level 4 Full Autonomy Level 5 Machine-assisted Automation (Humans necessary although with decreasing involvement) Autonomous Operations (Humans are no longer involved) Evolving towards Telco-cloud native including cognitive (AI/ML) solutions (“salt & pepper”) Beyond Automation towards Level 5 Network Operations We are here today
  • 8. CENTRALIZED CONTROL? (THINKINGPAGE) 1 Brain & 1 Heart A (peripheral) nervous system with limited autonomous intelligence. Not designed for a lot of redundancy. Anomaly detection un- sophisticated. High degree of Centralized Orchestration & Control.
  • 9. VSDE-CENTRALIZED CONTROL? (THINKINGPAGE) 9 Brains & 3 Hearts. High degree of autonomy between parts. Highly redundant system design. Anomaly detection un-sophisticated (but also less critical). High degree of De- centralized Orchestration & Control.
  • 10. THE NETWORK VIEW Machine Learning Apps Big Data Process North South Closed loop optimization Illustration
  • 11. CHALLENGESWITHINDUSTRIAL ML. NON-EXHAUSTIVE. Machine Learning Agent / Model. Entanglement Machine Learning Systems mix signals together, entangling them & makes isolation of improvements largely impossible. Correction Cascades Undeclared Consumers    m1 m’1 m’’1 m’’’’’’1 Once in place, a correction cascade can create an improvement deadlock, as improving the accuracy of any individual component actually leads to system-level detriments. correction cascade See also: D, Sculley et al (2015), “Hidden Technical Debts in Machine Learning”. Official System with Model M1 & Output OM1 OM1 Undeclared system w. M1 dependency Undeclared consumers are expensive at best and dangerous at worst, because they create a hidden tight coupling of a given model to other parts of the stack/system.
  • 12. “WE HAVE LITTLE EXPERIENCEWITH INTEGRATING ADVANCED MACHINE LEARNING IN INDUSTRIAL SCALE COMPLEX SYSTEMS, SUCH AS TELCONETWORKS” Autonomous Network Project ZSM ISG ENI ISG PoCs & Use Cases (e.g., China) Grading Standards Autonomous Network Levels
  • 13. Access Data Center = Cloud Experience n = n + 1 AI Controllers Learning Agents Environment Observations: Customer interactions. Actions Reward e.g., to achieve desired outcomes Many experience iterations per relevant time unit. Towards Intelligent Automation Services Customers  Re-enforcement learning (ML/DL)  Closing the loop.  Dynamic machine learning.  Anomaly detection on infrastructure as well as Learning Agents / RPAAs. “Closing the Loop” ZERO TOUCH
  • 14. Robotic Proces Automation No regret if managed … good ROI Industrial-scaled AI High complexity…longer term ROI Chat bot*(s) No regret … keep simple Anomaly detection** Essential & easy ROI Specialistic (narrow) AI Simpler tasks…shorter term ROI Intelligent Automation (beyond RPA or RPA meets AI) Higher complexity…uncertain ROI Check out (*) for advancing your bots https://www.convercx.com/ & (**) imo one of the most inspiring companies on anomaly detection https://www.anodot.com/
  • 15. THANK YOU! Acknowledgement Manythanks tomany industry &corporate colleagues whohave contributed with valuable insights, discussions &comments throughout this work. I wouldin particularlike tothank Anodot* forinspiring my thinking on the importance ofanomaly detection in the widest possible sense ofautonomous network operation Last but notleast, thanks tomy wife Eva Varadifor her patience during this work. Contact: Email: kim.larsen@t-mobile.nl Linkedin:www.linkedin.com/in/kimklarsen Blogs:www.aistrategyblog.com & www.techneconomyblog.com Twitter:@KimKLarsen (*) https://www.anodot.com/

Editor's Notes

  1. Inspired by the 5 levels of autonomous driving; Level 1: Driver assistance, Level 2: Partial automation, Level 3: Conditional automation, Level 4: High Automation, Level 5: Full Automation.
  2. PNS (peripheral nervous system) includes motor neurons (autonomous nervous system), parasympathetic nervous system and enteric nervous system.
  3. Giant Pacific Octopus have 3 hearts, 9 brains and blue blood (which is architecturally irrelevant for this story).
  4. Good to keep in mind that not all fruits are low hanging!