Artificial Intelligence Enables a Network Revolution

Similar documents
Oracle Real Application Clusters (RAC) 12c Release 2 What s Next?

A Forest Fire Warning Method Based on Fire Dangerous Rating Dan Wang 1, a, Lei Xu 1, b*, Yuanyuan Zhou 1, c, Zhifu Gao 1, d

The Mode of Urban Renewal Base on the Smart City Theory under the Background of New Urbanization

Because Safety is not found in a Box

Accelerating Industry 4.0 with ifactory SRP (Solution Ready Platform) Chotivate Pheanphobsuk IIOT Sales Manager June 16, 2017

Remote Pump Monitoring

Emerson s Pervasive Sensing strategies enable plants to realize full potential of Industrial IoT

Preserving Soils How can fertile soil be protected?

MATLAB & Simulink for Cyber Physical Systems

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online):

Precision Cooling. DataMate3000 Series Precision Cooling Systems for Small Equipment Room IT Application

Lesson 11 Internet Connected Environment (Weather, Air Pollution and Forest Fire) Monitoring

Itron Water Loss Management Solutions. Advanced Digital Leak Detection Overview Session

MEMS & Sensors for Smart Buildings

FallsFestival, March 24th-25th, Stuttgart

Innovating security where you need it most. Transportation: License Plate Capture.

Design and Development of General Purpose Alarm Generator for Automated System

Intelligent Alarming Leverages Industrial Internet of Things to Reduce Risks and Costs

How the People Counter Works. Enhanced Safety, Security and Building Automation, and Improved Marketing Intelligence. 3D MLI Sensor Technology

From i-waterfront to i-canada. The Role of Intelligent Communities in Canada's Digital Opportunity

Moving to the Cloud: The Potential of Hosted Central Station Services

M2M-Powered Transportation Surveillance

Smart Cities + Sustainable Urbanization. Peter Miscovich Jones Lang LaSalle June 2011

GO BEYOND OTDR LEAVE NO FAULTY NETWORK BEHIND. intelligent Optical Link Mapper

Available online at ScienceDirect. New Framework of Intelligent Evacuation System of Buildings

Frameworx 16.0 Product Conformance Certification Report CENX V6.1

PROJECTS Ph: ,

The improved Thesaurus and Classification tools containing all these changes will be available in January in time for the first update of 2018.

Battery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR DEVICES UNDER BATTERY ADVISORY

Comprehensive solutions for greater safety and security Answers for infrastructure.

Samsung SDS BMS Ver.2.0. Technical Specification

A Low-Cost Intelligent Thermostat Incorporating a Learning Algorithm Based Scheduler and Internet Accessible Control Interfaces

2018 Voluntary Page and Overlength Article Charges Updated 3/14/18

The role of innovative technologies in mitigating risk within global food supply chains. Mark Reader Group Category Director, Rentokil Initial

Smart Fire Prevention

Smart Wireless Sensor

Research on Decision Tree Application in Data of Fire Alarm Receipt and Disposal

Automobile Security System Based on Face Recognition Structure Using GSM Network

Developing a railway station safety control automation system

Intelligent Buildings

An Alarm Correlation Algorithm for Network Management Based on Root Cause Analysis

Railways. Security & Operational Communications.

EA-430 USER MANUAL. Version

Application Guide. IIoT enabled Intelligent Battery Management

WIRELESS CONTROLLABLE DEUS LLC

VOICE BASED PROJECTS

Practical Home Automation

HOME AUTOMATION BASED PROJECTS

TROUBLESHOOTING AT THE SPEED OF LIGHT EMBEDDED OTDR FOR OPERATIONAL EXCELLENCE IN PASSIVE OPTICAL NETWORKS

Field Products. Experion LX. Proven DCS for a wide range of industrial applications

Intrusion Detection: Eliminating False Alarms

Development and Application of the Rail-type Inspection Robot used in Substation Rooms

ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY

Medium-Term Business Plan, and Business Plan for Fiscal 2019, ending March 31, 2019

LightSweep. Lighting Control System

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

Overview. Executive Summary. Solution Description CHAPTER

GMS GRAPHICAL MANAGEMENT SYSTEM

MultiSite Monitor. Get the full performance picture from all your sites

Practical Distributed Control Systems (DCS) for Engineers & Technicians. Contents

BX650 Professional Version User Guide. Anti Collision Warning System BX650. User Guide

Flash einfach schnell ohne Kompromisse

Research Needs for the Fire Safety Engineering Profession

2019 Price List. Company Overview. Gateways. Super Gateways. paragonrobotics.com GW3 GW10

Complete FINAL YEAR PROJECT solution + Technical Training 1. ULTRASONIC BASED SAFETY OBSTACLE DETECTION STICK FOR THE BLIND.

Smart Wireless Sensor

Intelligent alarm management

Benefits of Enhanced Event Analysis in. Mark Miller

Security designed for your lifestyle

Evolving into the Networked Society

Traffic control Technologies and incident management

Section d'informatique Section de Systèmes de Communication

Application of OPC in the Intelligent Building System Integration

EMBEDDED BASED PROJECTS

The Physical Security Business 2015 to 2020:

Wireless M2M Solutions

Press Presse Press Presse

NEW CD WARP CONTROL SYSTEM FOR THE CORRUGATING INDUSTRY

Copyright 2017 by Eddy Home Inc. All Rights Reserved.

Organize your security with PSIM + software

TECHNOLOGY TECHNOLOGY

Battery Performance Alert

Organize your security with PSIM + software

Product catalogue. White label products for the entire IoT industry. Smart home Energy management Home security Assisted living

Sustain.Ability. Alarm Management: Be Pro-active, not Re-active Honeywell Users Group Europe, Middle East and Africa. Tyron Vardy, Honeywell

ZIPAMINI. Smart Home Controller. make your home smart. Control your home from anywhere in the world. find out more at

«Smart Home Technology» by Quadrobit: security energy comfort

GSM POWER ALARM SYSTEM

Bringing Smarts to Methane Emissions Detection

Bang, Jang Won Head of Korea National Fire Research Institute

Session VI Smart safety systems

Marine Solutions. Honeywell s Solution for LNG Vessels

Building Automation solutions

Sustainable Smart City Development Strategies and Practices Based on Regional Characteristics.

Perfect Grounding system. SmartEco M2M. Maximum 67% high-efficiency power saving function. (Machine to Machine, Machine to Mobile)

A Comprehensive Approach to Leak Detection

ARTIFICIAL PASSENGER PRESENTED BY ARJUN.K.R S7 CS ROLL NO:08 DATE OF PRESENTATION : Page 1

Sensor Network Design Technique for Monitoring Railroad Structures

The design of automatic remote monitoring system for the temperature and humidity based on GPRS Hui ZHANG 1, a, Honghua WANG 2,a

BMS Specification. Lonix Ltd.

Transcription:

*ITU FL-ML5G Artificial Intelligence Enables a Network Revolution April 25, 2018 Network Technology Research Institute, China Unicom

Artificial Intelligence Enables a Network Revolution A Part 1 AI application in operators 1

Several Viewpoints on Artificial Intelligence The third wave of AI Deep learning proposed Big data era coming Computing power increased Weak AI, Strong AI and Super AI Weak AI, NOW Strong AI, 2040 Super AI, 2060 AI enables the fourth industrial revolution Goal: Intelligentization of Industrial Production, Intelli gent Control, Intelligent Machines Representative Technology: Artificial Intelligence AI+ all walks of life Important direction for digital transformation in all walks of life Deeply affect retail, finance, transportation, manufacturing, medical, security, education, and telecom industries 2

Global Operators Applying AI Technology UAV tracking and control technology Fingerprint map, intelligent obstacle avoidance, traffic and business forecast, network parameter optimization AI engine developed with Honda 50% of network operators optimized, 2019 1000 days The fourth platform named "Cognitive Power" Voice recognition customer service system "Aura" Open source AI platform named Acumos cooperate with Tech Mahindra Automatically switch APP AI assistant AI platform named Corevo Intelligent driving and IIOT 3

Artificial Intelligence Enables a Network Revolution B Part 2 AI enables network revolution 4

Challenges on the Telecom Industry(1/2) Mass growth of devices Mass growth of data Smart hospital 3000GB self-driving cars 4000GB Future network Internet users 1.5GB Networking factory Networked aircraft 40000GB 1,000,000GB In 2020, global IOT devices will grew to 50 billion,6 times more than the devices in 2011. *Source:CompTIA and CISCO In 2020, global mobile data traffic generated 35 EB per month. In 2020, global data amount to 40ZB, 50 times more than the data in 2011 5

Challenges on the Telecom Industry(2/2) Mass growth of network complexity The Trend of Internet Connection Evolution Internet Mobile Internet Internet of Tings 2G/3G xdsl/lan Traditional connection Ubiquitous connection Satellite 4G/5G Internet of Intelligence Balloon FTTx The Trend of Network Architecture Evolution 移动互联网 Traditional network architecture Separation of control and data planes(sdn) Virtualization(NFV) Cloudification SDN/NFV Automatically Orchestrated and Managed Openness and programmability Service diversity, diverse traffic requirements (eg.mano) Full end to end automation of network and service management(eg. Zero-Touch Operations) 6

Network Intelligentization is Imperative AI could analyze massive data by heterogeneous computing and edge computing. AI could adaptively adjust and optimize network connections by combining optimal strategy learning algorithms such as reinforcement learning with SDN technology. AI could realize fully end to end automated network architecture by semantic understanding and auto-optimized technology. The challenges mentioned above are also the advantages of realizing network intelligentization. Network Intelligentization Ubiquitous network connections Strong computing power Massive data Introduce effective AI algorithm 7

Artificial Intelligence Enables a Network Revolution C Part 3 The road of China Unicom network intelligentization 8

China Unicom Intelligent Network Logical Framework Basic applications incubation applications AI Innovation and incubation Intelligent Planning Intelligent Construction Intelligent O&M Intelligent optimization Intelligent design Survey application Supervision application Maintenance tool Network assessment Automatic troubleshooting optimization application SaaS AI Enablement Platform Image Identification Natural language processing AI Data fusion capabilities And Interface open service AI Framework Software infrastructure Third-party capability access Speech Recognition Data Fusion External data collection capabilities M-domain data collection capabilities B-domain data collection capabilities O-domain data collection capabilities AIaaS PaaS Basic computing and network environment Heterogeneous Computing Cluster IDC(CPU/GPU/FPGA) SDN/NFV Network Edge Cloud Edge Compute IaaS 9

China Unicom Vision of AI Application in Network AI +network planning AI+ network design AI+ network construction AI+ network security 2020:30% utilization 2020:30% utilization 2020:40% utilization 2020:70% utilization AI+SDN/NFV AI+ network optimization AI+ network maintanence AI&5G network 2020:50% utilization 2020:40% utilization 2020:60% utilization 2020:AI-enabled Mobile Edge Computing AI-enabled network: overall utilization ratio will reach 45% in 2020 10

China Unicom Network Intelligent Application (1/2) Business intelligent recommendation capability MR Intelligent positioning and analysis NPS derogate prediction model Content based charging correlation model Spam SMS intelligent diagnosis Customer churn prediction model Realized network intelligent application IPTV user behavior and defect analysis Automated debug scenario self-learning Intelligent network optimization virtual testing Video stalling automated problem locating Customer resident location model Alarm Association Rule Machine Learning Model 11

China Unicom Network Intelligent Application (2/2) Devices management based on image identification or NLP Multi-technology network fault tracing analysis based on network topology Roots-tracing of network alarm in UTN SOC situation awareness Ongoing Research work Real-time big data analysis system in smart city RF self-optimization technology SDN/NFV network congestion prediction and traffic optimization Network routing optimization 12

Artificial Intelligence Enables a Network Revolution D Part 4 Case study 13

Case Analysis: AI applied in Roots-tracing of Network Alarm Research Background Amounts of device alarms of UTN: UTN is the local integrated carrier transmission network of China Unicom. UTN is mainly used for 3G/4G mobile service, and VIP customer service, and UTN uses IP/MPLS dynamic protocol. Compared with the traditional network, the protocol used by UTN is relatively complex, and the logical connection of the network is complicated. Compared with the traditional network management system, the UTN network system receives a large number of device alarms, many of which are caused by the root alarm. The current processing method: For the alarms, the current method is to solve the alarms depending on the expert experience, which means transforming the expert experiences into rules, and filter out the non-critical alarm through the rules. The downside of this approach is that in order to avoid filtering out the important alarms, the filter rules are relatively relaxed, which means the rules have limited filtering ability. It is hoped that applying AI to trace the root alarm can form a more efficient solution. Research Objective Look for the rules with higher filtering capabilities Compress alarms to get the valuable ones Get the alarms collection that contains the root alarm 14

Technical Scheme and Process Network alarm correlation analysis and alarm recognition Alarm Data Topology Data Alarm Managem ent Northinterface Rules Mining Analysis data PrefixSpan Rules Template Alarm Recognition Rule Base Correlation rules Blacklist DAta Storage Step One: Data preparation Identifying frequent alarms Step Two: Correlation rules mining Improving PreFixSpan algorithm Business Data Correlation analysis Frequent Alarms MySQL Step Three: Alarm correlation rules confirming and storing Correlation rules Blacklist Step Four: Root alarm identification Results Feedback Labelling alarms Fig.1 Framework of technology scheme 15

Data Preparation Frequent Alarms Alarm filtering condition Problems and Analysis Many alarms being discovered are frequently reported continuously at the same time or in a continuous period of time, such as alarm of link down. When the data is analyzed, it will only lead to the rule of Link down->link down. Such a rule is not a reflection of the derivative relationship. Solution Compressing the same alarm on the same port for a period of time to be only one alarm. Others are marked as filterable alarms. Fig.2 Interface data preparation process 16

Correlation Rule Mining Parameters Improved PreFixspan Algorithm Correlation rules Problems and Analysis It was found that the rules obtained by the classic PreFixSpan algorithm do not have the corresponding trigger conditions in the early stage of the study, leading experts unable to determine the validity of the rules. For example, there are two frequent item sets candidate objects:[a->b, constraints H1] (a), and [A->B,constraints H2] (b) When the probability of (a+b) occurrence exceeds the confidence interval, it will be recognized as one rule [A->B] Fig.3 Interface of data mining process Solution Improving the PreFixSpan algorithm, the same alarms with different trigger conditions do not appear to be considered as one rule, but two. 17

Current Results Amount of Data 1135817 Time of Data 30 days Total number of nodes 2681 Total number of links 3881 Numbers of rules before modification 78 Effective rules Unable to Judge Numbers of rules after modification 179 Effective rules 148 Total rules of Industry standard and manufacturer 61 Derivative alarm /Amount alarm (rules of data mining) 19% Derivative alarm /Amount alarm (rules of standard and manufacturer) 2% Total percentage of filtered by rules and frequent alarm recognition 40% 18

Further Optimization Methods and Work Analyzing the time parameter in the frequent alarm model; Modifying alarm identification to simulate online mode; Analyzing the similarities and differences between the alarm rules of different equipment manufacturers in different regions; Improving the algorithm according to the rules; Adding VM network topology to display the related information of alarms,including the parameter of alarms, the performance parameter of network element,the correlation of other alarms Researching the method to deploy this system into existing network. 19

THANK YOU! Network Technology Research Institute, China Unicom kfb@dimpt.com Bing Ming Huang huangbm7@chinaunicom.cn 20