Study Paper AI and Big Data For Telecom
Study Paper AI and Big Data For Telecom
On
FN Division, TEC
K.L. Bhawan, Janpath, New Delhi-01
March 2019
Table of Contents
Page No.
1. Introduction …………………………………………………………………...…… 4
2. Trends in Communication Network and Services ………………………. …..……. 4
2.1 Characterized requirements …………………………………………………………...…... 4
2.2 Multimedia services ….......................................................................................................... 5
2.3 Precision management ………………………………………………………………....….. 5
2.4 Predictable future ……………………………………………………………………….….. 5
2.5 Intellectualization ……………………………………………………………………….….. 5
2.6 More attention to security and safety ………………………………………….……...……. 6
2.7 Trends of mobile network ……………………………………………………………...…... 6
2.8 Big data for development and ICT monitoring ………………………………….….….…… 6
3. Advantages on AI ….................................................................................................... 7
3.1 Abilities of learning ……………………………………………………….…………….….. 7
3.2 Abilities of understanding and reasoning ………………………………….…………...…... 7
3.3 Ability of collaborating …………………………………………………………….…….… 7
2
Abstract
Artificial Intelligence (AI) is the ability of machines and systems to acquire and apply
knowledge and carry out intelligent behavior. AI with learning abilities is a revolutionary
technology, which the communication industry is exploring, with the aim of introducing it into
communication networks to provide new services/ applications and to improve network
efficiency and user experience. The telecom industry has been a fertile field of application for
AI. The development opportunities created by AI technologies will certainly benefit the entire
industry as well as users.
The paper discusses various aspects of AI, its progress and its application to the telecom
sector including possible use cases. Explains briefly role of AI in Network monitoring, security
and reliability. Also examines the work at ITU on AI such as Focus Group on Machine
Learning 5G etc. Finally, identifies possible challenges in AI implementation and need of
following certain ethics/ ethical values in doing so.
Disclaimer: The outcomes/conclusions drawn and recommendations made thereof in this study paper
are of academic interest only and view of the writers only and should in no case be
considered as an official stand or formal view of TEC.
3
1. Introduction
Artificial Intelligence (AI) is the ability of machines and systems to acquire and apply
knowledge and carry out intelligent behavior. AI can be viewed as a set of associated
technologies and techniques that can be used to complement traditional approaches, human
intelligence and analytics and/or other techniques. In recent years, with the development and
enrichment of technologies such as cloud computing, big data and deep learning, the
industrialization of artificial intelligence is being developed accordingly. With new
developments and worldwide excitement, AI has attracted more and more attention for
introducing it into a number of areas.
4
2.2 Multimedia services
Internet users, now have also become information producers, as well as information consumers,
and are producing more and more information in multimedia. User-generated content increases
Internet traffic exponentially. Under these circumstances, both storage and transmission of
data/ information are a great challenge. The inclusion of AI can bolsters the abilities to handle
these challenges.
2.5 Intellectualization
Networks are becoming more heterogeneous as users often uses a variety of equipment with
different wireless access technologies such as 2G, 3G, 4G, and Wi-Fi. Adoption of 5G will
further reshape telecommunication networks in the near future. The network management
becoming more difficult to maintain with an acceptable quality of service (QoS) due to the
increase in network equipment and user terminals, the expansion of network size, the increase
in the number of users, and the increasing complexity of the network. As well as expanding
capacity by introducing more equipment, the operators are expected to raise their network
performance with smart tools and intelligence technologies. This includes introducing more
intelligence into networks and management to meet customer needs, make more profits, reduce
operating costs, and improve network performance.
5
2.6 More attention to security and safety
As AI develops, security and security will be significant factors for everyone involved in these
technologies. Security incidents are growing and becoming more severe. These events have
resulted in significant commercial consequences, including broken networks, economic losses,
etc. AI can be used to establish strong security protection and behavioral analysis based on
machine learning, will significantly improve the ability of network detection attacks, automatic
analysis of data, and the identification of relationships between isolated behaviors.
7
the multi-agent collaboration of distributed AI into the network management, we can expect
the ability to collaborate between network managers distributed in every layer.
8
from the data plane and moves the network management to a central point, called the controller
that can be programmed and used as the brain of the network, which greatly promote the
capabilities of network-automated management and control. A typical SDN framework is
composed of three layers: infrastructure layer, control layer and application layer. The
infrastructure layer includes some network elements which can provide network traffic, acting
as the object controlled by the SDN controller, as well as a data source of the network resource.
The control layer has the SDN controller, which is the core component of the SDN network
carrying out important tasks of controlling network traffic. The application layer includes
various applications. The southbound interface D-CPI (Data-Controller Plane Interface) is
responsible for exchanging data between the SDN controller and the network element. The
northbound interface A-CPI (Application-Controller Plane Interface) is responsible for
providing the upper-level application with the channel exchange to obtain the underlying
network resource information and send data to the lower-level network. SDN provides a good
interface with its programmability to introduce AI into the communication networks. This is
SDN's biggest advantage. SDN uses the application-programming interface to send powerful
programming instructions to the network device.
With AI, network managers can not only schedule an automated intelligent business
orchestrator, but also program the AI-optimized network strategy and automatically compile
them into the task script, then assign them into the network allocation tasks with the
application-programming interface (API). Network managers can also automatically collect
network statistics information to lay a solid foundation for continuous network optimization.
If necessary, some new functionalities can also be added intelligently through the SDN
application for the network environment.
4.2 AI in NFV
With virtualization technology, Network Functions Virtualization (NFV) can divide network-
level functions and applications, such as routing, customer premises equipment (CPE), mobile
core, IP Multimedia Subsystems (IMS), content delivery networks (CDN), switching elements,
mobile network nodes, home routing operations, set-top box business, tunnel gateway
elements, traffic analysis, service assurance, service level agreement (SLA) monitoring, testing
and diagnosis, next generation network (NGN) signal, aggregation and network range
functions, application optimization, security policy, etc., into several functional blocks, and run
them in software mode respectively. This means that they are no longer limited to the hardware
architecture.
9
The typical NFV reference architecture includes three layers of the complete
infrastructure layer, the resource management layer, and the business flow orchestrator layer.
NFV helps ISV and telecommunication operators to achieve virtual network functions by
deploying hypervisor at the infrastructure layer to virtualize infrastructure resources such as
commercial general computing, storage and network resources and others. The resource
management layer is in charge of the NFV infrastructure’s management, configuration and
collaboration. The business flow orchestrator layer is a key part of the NFV network function
for network operating; it is used to organize and orchestrate the functions of the NFV network.
It is also in charge of managing and monitoring the global resources across the data center or
the resource pool.
With the virtualization of network functions NFV can realize an on-demand dynamic
network configuration separated from the underlying architecture. As key issues have been
solved, AI can play its full role in critical network management.
10
used to accurately locate accidental or malicious rogue devices and provide location-based
access to resources.
(Source: Huawei)
Figure 2 Security architecture for AI with business decision making
i) Isolation:
To ensure stable operation, an AI system analyzes and identifies the optimal solution and sends
it to the control system for verification and implementation. Generally, the security architecture
must isolate functional modules and setup access control mechanisms between modules. The
isolation of AI models can reduce the attack surface for AI inference, while the isolation of the
integrated decision module can reduce attacks on the decision module. The output of AI
inference can be imported into the integrated decision module as an auxiliary decision-making
suggestion, and only authorized suggestions can enter the decision module.
ii) Detection:
Adopting continuous monitoring and with an attack-detection model in the main system
architecture, it is possible to comprehensively analyze the network security status and estimate
the current risk level. When the risk is high, the integrated decision system can reject the
suggestion coming from the automatic system and hand over control to a person to ensure
security under attacks.
iii) Failsafe:
When a system needs to conduct critical operations such as AI-assisted autonomous driving or
medical surgery, a multi-level security architecture is required to ensure the entire system
11
security. The certainty of the inference results provided by the AI system must be analyzed.
When the certainty of the result is lower than a certain threshold, the system falls back to
conventional rule-based technologies or manual processing.
iv)Redundancy:
Many business decisions and data are associated with each other. A feasible method to ensure
the security of AI models is to analyze whether the association has been ruined. A multi-model
architecture can be set up for critical applications, so that a mistake in one model does not keep
the system from reaching a valid decision. In addition, the multi-model architecture can largely
reduce the possibility of the system being fully compromised by a single attack, thereby
improving the robustness of the entire system.
12
To establish liaisons and relationships with other organizations which could contribute to
the standardization activities for ML.
(i) Provability:
Organizations involved in AI cannot demonstrate clearly, why it does and what it does. No
wonder AI is a “black box” as of now. People are skeptical about it, as they fail to understand
how it makes decisions. Provability – the level of mathematical certainty behind AI predictions
– remains a grey area for organizations. There is no way they can prove or guarantee that the
reasoning behind the AI system’s decision-making is clear. The solution lies in making AI
explainable, provable, and transparent. Organizations must embrace Explainable AI as a best
practice.
13
goes unrecognized, it could lead to unethical and unfair consequences. For instance, Google
Photos service uses AI to identify people, objects and scenes. However, there is a risk of it
displaying wrong results, such as when a camera missed the mark on racial sensitivity, or when
a software used to predict future criminals showed bias against black people.
In the future, such biases will probably be more accentuated, as many AI systems will
continue to be trained using bad data. Hence, the need of the hour is to train these systems with
unbiased data and develop algorithms that can be easily explained.
6. Ethical use of AI
Artificial Intelligence is seen as a great transformative tech and the possibilities seem almost
limitless to what it can eventually do. With these disruptive developments, questions arises
about the functional capabilities to the ethics behind creating such powerful and potentially
life-consequential technologies. As such, it makes sense to spend time considering what we
want these systems to do and make sure we address ethical questions now so that we build
these systems with the common good of humanity in mind. Following 9 ethical issues have
been identified at World Economic Forum–ASEAN Summit 2018 titled “Top 9 ethical issues
in artificial intelligence: -
(i) Unemployment- what happens after the end of jobs
(ii) Inequality -how do we distribute the wealth created by machines
(iii) Humanity –how do machines affect our behavior and interaction
(iv) Artificial stupidity – how can we guard against mistakes
(v) Racist robots-how do we eliminate AI bias
14
(vi) Security –how do we keep AI safe from adversaries
(vii) Evil genies-how do we protect against unintended consequences
(viii) Singularity –how do we stay in control of a complex intelligent system
(ix) Robot rights - how do we define the humane treatment of AI
7. Conclusion:
AI and Big Data are two of the emerging technologies that are used in Telecommunications
sector extensively, helping CSPs manage, optimize and maintain not only their infrastructure,
but their customer support operations as well. This paper has highlighted an AI-based network
framework to introducing AI in communication networks and services, with SDN/ NFV
collaboratively deployment. Technology is already a core part of the telecommunications
industry, and as Big Data tools and applications become more available and sophisticated, AI
can be expected to continue to grow in this space.
15
Abbreviations:
16
References:
[1] http://www.oecd.org
[2] https://www.itu.int/en/journal/001/Documents/ITU2017-4.pdf
[3] https://www.itu.int/en/journal/001/Documents/itu2017-7.pdf
[4] https://www.weforum.org/agenda/2016/10/top-10-ethical-issues-in-artificial-intelligence/
[5] http://www.forbesindia.com/blog/business-strategy/artificial-intelligence-key-challenges-and-
opportunities/
[6] https://www-file.huawei.com/-/media/corporate/pdf/cyber-security/ai-security-white-paper-
en.pdf?la=en&source=corp_comm
[7] https://www.itu.int/en/ITU-T/focusgroups/ml5g/Pages/default.aspx
*********
17