NWDAF: How 5G is AI Native by Essence

The evolution of telecommunications networks has always been characterized by increasing complexity and intelligence. As we’ve moved through successive generations of wireless technology, I’ve observed a consistent trend toward more adaptive, responsive systems. With 5G, this evolution has reached a critical inflection point by introducing the Network Data Analytics Function (NWDAF) a component that fundamentally transforms how networks operate and adapt.

NWDAF, introduced in the 5G Core architecture starting from Release 15 and continuing to evolve toward 6G, represents a pivotal element in the Service-Based Architecture (SBA). More than just another network component, it embodies a philosophical shift toward data-driven, intelligent network operations that anticipate the needs of both users and applications.

At its core, NWDAF serves as a standardized network function that provides analytics services to other network functions, applications, and external consumers. Its functionality spans the entire analytics lifecycle: collecting data from various network functions (including AMF, SMF, PCF, and NEF), processing and analyzing that data, generating actionable insights and predictions, and feeding decisions back into the network for optimization and policy enforcement.

I often describe NWDAF as the “central intelligence of the network”—a system that transforms raw operational data into practical insights that drive network behavior. This transformation is not merely incremental; it represents a fundamental reimagining of how networks function.

The necessity for NWDAF becomes apparent when we consider the demands placed on modern networks. Autonomous networks require closed-loop automation for self-healing and self-optimization—capabilities that depend on the analytical insights NWDAF provides. Quality of Service assurance increasingly relies on the ability to predict congestion, session drops, or mobility issues before they impact user experience. Network slicing, a cornerstone of 5G architecture, depends on real-time monitoring and optimization of slice performance. Security analytics benefit from NWDAF’s ability to detect anomalies or attacks through traffic behavior pattern analysis. Furthermore, NWDAF’s flexible deployment model allows it to operate in either central cloud environments or Multi-access Edge Computing (MEC) nodes, enabling localized decision-making where appropriate.

The integration of NWDAF with other network functions occurs through well-defined interfaces. The Np interface facilitates data collection from various network functions. The Na interface enables NWDAF to provide analytics to consumers. The Nnef interface supports interaction with the Network Exposure Function, while the Naf interface enables communication with Application Functions. This comprehensive integration ensures that NWDAF can both gather the data it needs and distribute its insights effectively throughout the network.

The analytical capabilities of NWDAF span multiple dimensions. Descriptive analytics provide visibility into current network conditions, including load metrics, session statistics, and mobility patterns. Predictive analytics enable the network to anticipate issues before they occur, such as congestion prediction, user experience degradation forecasts, and mobility failure prediction. Looking forward, prescriptive analytics will eventually allow NWDAF to suggest automated actions, such as traffic rerouting or slice reconfiguration, further enhancing network autonomy.

As we look toward 6G, NWDAF is poised to evolve into an even more sophisticated component of network architecture. I anticipate the development of an AI/ML-native architecture where NWDAF evolves into a Distributed Intelligence Function. Federated learning approaches will enable cross-domain learning without requiring central data sharing, addressing privacy and efficiency concerns. Integration with digital twin technology will allow simulated networks to feed NWDAF with predictive insights, enhancing planning and optimization. Perhaps most significantly, NWDAF will increasingly support intent-based networking, where user intentions are translated directly into network behavior without requiring detailed technical specifications.

The journey toward truly intelligent networks is just beginning, and NWDAF represents a crucial step in that evolution. By embedding analytics and intelligence directly into the network architecture, 5G has laid the groundwork for networks that don’t just connect—they understand, anticipate, and adapt. This foundation will prove essential as we continue to build toward the even more demanding requirements of 6G and beyond.

Prepared By: Amr Ashraf | Head of Solution Architect and R&D | Digis Squared

Share:

ACES NH & DIGIS Squared Partnership Milestone

We are proud to announce the successful delivery and deployment of DIGIS Squared’s advanced cloud native testing and assurance solution, INOS, to ACES NH, the leading telecom infrastructure provider and neutral host in the Kingdom of Saudi Arabia.

As part of this strategic partnership, DIGIS Squared has delivered:

  • INOS Lite Kits for 5G Standalone (5GSA) testing and IBS testing.
  • INOS Watcher Kits for field / Service assurance.  
  • Full deployment of the INOS Platform over ACES NH cloud hosted inside the Kingdom, ensuring data localization and privacy compliance.

The ACES NH team is now leveraging INOS across all testing and assurance operations, with:

  • Comprehensive, detailed telecom network field KPIs & Service KPIs.
  • Auto RCA for field detected issues.
  • Full automation of testing and reporting workflows, that enables higher testing volumes in shorter timeframes.
  • AI-powered modules for virtual testing and predictive assurance.
  • A flexible licensing model that enables the support of all technologies.

This partnership highlights both companies’ shared vision of strengthening local capabilities and equipping ACES NH with deeper network performance insights—supporting their mission to provide top-tier services, in line with Saudi Arabia’s Vision 2030.

We look forward to continued collaboration and delivering greater value to the Kingdom’s digital infrastructure.

About ACES NH:

ACE NH, a Digital infrastructure Neutral Host licensed by CST in Saudi Arabia and DoT in India. ACES NH provide In-Building Solutions, Wi-Fi-DAS, Fiber Optics, Data Centers and Managed Services. We at ACES NH design, build, manage and enables Telecom-Operators, Airports, Metros, Railways, Smart & Safe Cities, MEGA projects. With its operations footprint in countries from ASIA, Europe, APAC, GCC and North-Africa with diverse projects portfolio and with focus on futuristic ICT technologies like Small-cells, ORAN, Cloud-Computing. ACES NH is serving nearly 2 billion worldwide annual users.

Mobile Private Network

Private networks are dedicated communication networks built for a specific organization or use case

Benefits

  • Enhanced security and data privacy
  • Improved network performance and reliability
  • Customized coverage and capacity
  • Integration with existing systems and infrastructure

A private (mobile) network is where network infrastructure is used exclusively by devices authorized by the end-user organization.

Typically, this infrastructure is deployed in one or more specific locations which are owned or occupied by the end-user organization.

Devices that are registered on public mobile networks will not work on the private network except where specifically authorized.

Formally these are known as ‘non-public networks’ however the term private network is more commonly used across vertical industries.

Drivers of having a 5G Private network

Network Performance: with eMBB, URLLC and MMTC, 5G is very capable in terms of network performance

5G Security: The fifth generation of networks is more secure than the 4G LTE network because it has identity management, privacy, and security assurance

New Spectrum in 5G: availability of shared and dedicated 5G spectrum in several bands

Network Coverage: With 5G network, you control where to deploy your gNB

Private Networks Deployment Models

SNPN, Standalone Non-Public Network

NPN is deployed as an independent, standalone network

Private company has exclusive responsibility for operating the NPN and for all service attributes

The only communication path between the NPN and the public network can be done optionally via a firewall

standalone network. Under this deployment model, all network functions are located within the facility where the network operates, including the radio access network (RAN) and control plane elements. Standalone, isolated private networks would typically use dedicated spectrum (licensed or unlicensed) purchased through a mobile network operator (MNO) or, in some cases, directly from government agencies.

PNI-NPN: Public Network Integrated – Non Public Network

  • NPN deployed with MNO support: hosted completely or partially on public network infrastructure
  • e.g. using Network Slicing
  • PNI-NPN has different variants we are going to explain some of them in the coming section

PNI-NPN: Deployment with shared RAN

Shared RAN with dedicated Core

NPN and the public network share part of the radio access network, while other network functions remain separated.

This scenario involves an NPN sharing a radio-access network (RAN) with the service provider. Under this scenario, control plane elements and other network functions physically reside at the NPN site.

This type of deployment enables local routing of network traffic within the NPN’s physical premises, while data bound for outside premises is routed to the service provider’s network. 3GPP has specifications that cover network sharing. (A variation of this deployment scenario involves the NPN sharing both the RAN and control plane functions, but with the NPN traffic remaining on the site where the NPN is located and not flowing out to the public network.)

PNI-NPN: Deployment with shared RAN and Control Plane

Shared RAN and core control Plane.

Both RAN and Core Sharing from control side, with the RAN and Core elements managed by the Public 5G network.

NPN only handles user plane connectivity.

This scenario involves an NPN sharing a radio-access network (RAN) with the service provider. Under this scenario, control plane elements and other network functions physically reside at the NPN site”

PNI-NPN: NPN Deployment in public network

5G Public-Private Network Slice

NPN hosted by the public network

Complete outsourcing of the network, where devices on the private network utilize the Public 5G network RAN.

This scenario can be implemented by means of network slicing

The third primary type of NPN deployment is where the NPN is hosted directly on a public network. In this type of deployment, both the public network and private network traffic are located off-site.”

Through virtualization of network functions and in a technique known as network slicing, the public-network operator of the private network partitions between the public network and the NPN, keeping them completely separate.

Challenges of Private Network

Spectrum and Regulations

Limited Spectrum Options: Securing suitable spectrum can be challenging, especially in densely populated or highly regulated regions where spectrum allocation is scarce.

Regulatory Hurdles: Navigating complex regulatory environments to acquire spectrum licenses can be time-consuming and costly, often requiring compliance with specific national or regional regulations.

High Initial Cost

Infrastructure Investment: Setting up a private network requires substantial upfront investment in infrastructure such as base stations, antennas, and network equipment.

Operational Expenses: Beyond initial setup, ongoing operational costs include maintenance, upgrades, and personnel training, contributing to the overall cost burden.

Knowledge acquisition or outsourcing

Technical Expertise: Establishing and maintaining a private network demands specialized knowledge in network design, integration, security, and optimization.

Outsourcing Challenges: Depending on internal resources versus outsourcing, finding capable vendors or partners with expertise in private network implementation can be challenging, affecting project timelines and quality.

Availability and Scope

Geographical Coverage: Ensuring adequate coverage across the desired operational area without compromising signal strength or reliability can be complex, particularly in challenging terrains or remote locations.

Scalability: Designing networks that can scale effectively as operational needs grow, without sacrificing performance or security, requires careful planning and sometimes iterative adjustments.

Integration with Existing IT/OT Systems

Legacy Systems: Many enterprises operate legacy operational technology (OT) systems that aren’t designed to interface with IP-based private networks.

Interoperability Issues: Ensuring seamless integration between IT/OT systems, existing network infrastructure, and the new private network requires careful system design and often bespoke solutions.

Data Flow & Security Consistency: Synchronizing real-time data and maintaining consistent security policies across heterogeneous systems can be complex.

Return on Investment (ROI) and Business Justification

Unclear Business Models: Enterprises often struggle to quantify the ROI of private networks, especially when benefits like reliability and security are intangible.

Cost vs. Benefit Uncertainty: Without clear use cases (e.g., predictive maintenance, robotics, digital twin), the business case can remain weak, delaying decision-making.

Our Private Networks SI Capabilities

Digis Squared provides Vendor Management & control, operator mindset, helicopter view, program governance, wide experience, class-efficient network solutions & design

We at Digis Squared provide E2E Private Network SI and managed Services journey that could be described as following  

This blog post was written by Obeidallah AliR&D Director at Digis Squared.

Revolutionizing Indoor Network Testing with INOS: A Deep Dive into the Enhanced Indoor Kit

Introduction

As mobile networks continue to evolve with 5G, ensuring optimal indoor connectivity is more critical than ever. INOS (Indoor Network Optimization Solution) is redefining how operators and engineers approach indoor testing with its advanced tools, robust features, and a newly upgraded Indoor Kit. Designed to tackle the unique challenges of indoor environments, the INOS Indoor Kit offers significant improvements in software, hardware, and overall functionality to deliver superior usability, reliability, and results.


The Importance of Indoor Testing

Indoor spaces like malls, airports, and office buildings pose unique challenges for network optimization due to:

  • Architectural complexity: Thick walls and multiple floors impede signal propagation.
  • User density: Crowded environments generate high network demand.
  • Interference: Co-channel interference can degrade signal quality.

These challenges make precise and efficient indoor network testing crucial for delivering seamless connectivity.


Enhancements in the INOS Indoor Kit

Software Improvements (Icons)

  1. Revamped User Interface (UI):
    The new UI offers an intuitive design for enhanced accessibility, streamlining control, and monitoring processes for users.
  2. Enhanced Connectivity Options:
    Supporting Internet, WLAN, and Bluetooth connections, the kit provides robust and flexible inter-device connectivity.
  3. Comprehensive Control Capabilities:
    The tablet serves as a central hub, allowing users to control every connected device and monitor KPIs directly.
  4. Centralized Alarm Notifications:
    Alarm notifications from all connected devices are displayed on the tablet in real-time, enabling prompt troubleshooting.

Hardware Upgrades

  1. Ergonomic and Lightweight Design:
    A portable, lighter design ensures ease of use in various indoor scenarios.
  2. Extended Battery Life:
    Powering up to 12 devices for 8 hours of continuous operation, the kit supports long-duration tasks without frequent recharging.
  3. Smart Cooling System:
    An intelligent cooling mechanism activates based on system temperature, ensuring consistent performance without overheating.

Key Features and Differentiators

The INOS Indoor Kit offers several standout features that set it apart from competitors:

  1. 5G Support Across All Devices:
    Fully optimized for 5G testing, supporting all devices within the kit to handle the latest network demands.
  2. Tablet as a Centralized Display:
    Displays real-time radio KPIs, with intuitive visualizations and insights for quick decision-making.
  3. Advanced Device Management via Tablet:
    • Control multiple phones directly.
    • Color-coded indicators highlight synced devices, poor KPIs, and ongoing logfile recordings, allowing users to focus on critical areas.
  4. Support for Large Layout Images:
    Unlike competitors, INOS excels at handling and displaying large indoor layouts, ensuring no testing area is overlooked.
  5. Automated Processes:
    • Logfile Uploading and Collection: Eliminates manual intervention, saving time and effort.
    • Post-Processing Automation: Simplifies report generation and routine tasks that traditionally require manual copy-paste workflows.
  6. Comprehensive Support Model:
    INOS provides end-to-end support for all product aspects, ensuring users have the help they need at every stage.
  7. Expandable Kit Design:
    Offers the flexibility to add more devices, making it adaptable to different indoor testing scales.
  8. Enhanced Connectivity:
    INOS leverages Internet, WLAN, and Bluetooth for device control, overcoming the limitations of competitors who rely solely on Bluetooth (limited to 8 devices and prone to connectivity issues).

Why INOS Stands Out in Indoor Testing

INOS combines cutting-edge technology with user-centric design to deliver a superior indoor testing experience. With its latest enhancements, it ensures that telecom operators and network engineers have the tools they need to achieve:

  •  Unmatched Accuracy: Collect and analyze data with precision.
  • Greater Efficiency: Streamlined workflows and automation save time and effort.
  • Enhanced Portability: Lightweight design and extended battery life make it perfect for demanding indoor environments.

Conclusion

The INOS Indoor Kit, with its latest software and hardware upgrades, is a game-changer for indoor network optimization. By focusing on usability, functionality, and reliability, it empowers operators to tackle even the most challenging scenarios with confidence.

Ready to elevate your indoor testing? Discover how the enhanced INOS Indoor Kit can revolutionize your network optimization strategy.

This blog post was written by Amr AshrafProduct Architect and Support Director at Digis Squared. With extensive experience in telecom solutions and AI-driven technologies, Amr plays a key role in developing and optimizing our innovative products to enhance network performance and operational efficiency.

Is the Customer Always Right?

Understanding the Dynamics Between System Integrators, Vendors, and Customers

The age-old adage, “The customer is always right,” has been a guiding principle in the world of business for decades. However, when it comes to the complex realm of system integration and vendor interactions, this notion may not always hold true. In this article, we delve into the delicate balance of power and decision-making between system integrators, vendors, and customers, and explore when it may be necessary to say no to a customer’s requests.

The Customer’s Perspective

Customers play a vital role in the success of any business endeavor. Their needs, requirements, and feedback shape the products and services offered by vendors and system integrators. Customers often come with specific expectations and demands, driven by their unique goals and priorities. The customer-centric approach emphasizes the importance of listening to the customer, understanding their requirements, and delivering solutions that meet or exceed their expectations.

The Role of System Integrators and Vendors

System integrators and vendors serve as the bridge between customers and technology solutions. They possess specialized knowledge, expertise, and resources to design, implement, and support complex systems and solutions. While their primary goal is to satisfy customer needs, system integrators and vendors also have a responsibility to deliver high-quality, reliable products and services that align with industry standards and best practices.

Saying No: When Should System Integrators and Vendors Push Back?

Despite the emphasis on customer satisfaction, there are instances where it may be necessary for system integrators and vendors to say no to a customer’s requests. Some common scenarios include:

  • 1. Technical Feasibility: If a customer requests a solution that is technically infeasible or goes against industry standards, system integrators and vendors may need to push back and propose alternative approaches.
  • 2. Scope Creep: Customers may often expand the scope of a project without considering the potential impact on timelines, resources, and budgets. In such cases, system integrators and vendors may need to set clear boundaries and manage customer expectations.
  • 3. Security and Compliance: In today’s digital landscape, cybersecurity and data privacy are top priorities. If a customer’s request poses security risks or non-compliance with regulations, system integrators, and vendors must prioritize safeguarding sensitive information.
  • 4. Resource Constraints: Customers may demand quick turnaround times or customized solutions that strain resources and impact the quality of deliverables. System integrators and vendors may need to communicate effectively with customers to manage expectations and maintain service standards.

Resolving the Dilemma: Strategies for Effective Communication and Collaboration

To navigate the challenges of balancing customer demands with technical limitations and industry standards, system integrators and vendors can adopt the following strategies:

  • 1. Open Communication: Establishing clear channels of communication with customers is crucial. System integrators and vendors should actively listen to customer requirements, provide transparent feedback, and collaborate on finding mutually beneficial solutions.
  • 2. Educating Customers: System integrators and vendors can educate customers on best practices, emerging technologies, and industry trends. By sharing expertise and insights, customers can make informed decisions that align with their long-term goals.
  • 3. Setting Expectations: From the inception of a project, setting clear expectations regarding timelines, deliverables, and potential challenges is essential. System integrators and vendors should communicate proactively to avoid misunderstandings and scope creep.
  • 4. Collaborative Problem-Solving: When faced with conflicting priorities or technical constraints, system integrators, vendors, and customers can engage in collaborative problem-solving. By brainstorming alternatives and exploring different approaches, a consensus can be reached that satisfies all stakeholders.

In Conclusion

While the customer’s needs and preferences are paramount in the world of system integration and vendor relationships, there are situations where saying no is necessary to uphold standards, ensure security, and deliver value. By fostering open communication, educating customers, setting clear expectations, and engaging in collaborative problem-solving, system integrators and vendors can navigate this delicate balance effectively. Ultimately, the key lies in fostering a relationship built on trust, respect, and a shared commitment to success.

The Case for Open RAN and Open Networks

Advocates of Open RAN (Radio Access Networks) and open networks champion their potential to revolutionize the telecommunications industry by promoting flexibility, innovation, and cost-effectiveness.

Open RAN refers to a disaggregated approach to building wireless networks, using open and interoperable interfaces. This model allows operators to mix and match components from different vendors rather than being locked into a single supplier, fostering a competitive ecosystem.

Proponents argue that this could lead to significant cost reductions, especially in deploying 5G networks, as it drives down hardware costs and encourages innovation through increased competition. Additionally, open networks enable greater adaptability, allowing network operators to quickly implement new technologies and services, which is crucial in a rapidly evolving digital landscape.

Moreover, open networks are seen as a critical step toward enhancing network security and resilience. By diversifying the supplier base, operators can reduce dependency on any single vendor, mitigating risks associated with vendor-specific vulnerabilities and supply chain disruptions. The interoperability inherent in open RAN can also facilitate more robust security practices, as operators can integrate best-of-breed security solutions from various vendors.

This flexibility is particularly important given the rising concerns over cyber threats and the geopolitical complexities affecting the telecom supply chain. Consequently, many industry experts and regulators view open RAN and open networks as a pathway to not only technological advancement but also national security and economic resilience.

**The Legacy of Proprietary Telecom Networks**

On the other hand, supporters of legacy proprietary telecom networks argue that these systems offer unmatched reliability, performance, and security that have been refined over decades. Traditional telecom networks, built on established partnerships with trusted vendors, provide end-to-end solutions with tightly integrated hardware and software, ensuring optimal performance and stability. This integration is particularly vital for critical communications infrastructure, where any downtime or performance issues can have significant repercussions. Legacy systems also benefit from rigorous testing and certification processes, which help to maintain high standards of quality and reliability that are crucial for maintaining consumer trust and ensuring uninterrupted service.

Furthermore, critics of open RAN and open networks caution against the potential downsides of moving away from established proprietary systems. The complexity of managing and integrating multiple vendors’ components could lead to interoperability challenges and increased operational overhead. There is also the risk that the rapid pace of innovation in an open ecosystem could outstrip the ability of operators to thoroughly vet and secure new technologies, potentially introducing vulnerabilities. Additionally, the transition to open RAN may require substantial upfront investments in new infrastructure and training, posing significant barriers for smaller operators and developing regions. As such, proponents of legacy networks argue that the proven track record of proprietary systems offers a safer and more reliable path forward, particularly in contexts where stability and security are paramount.

Staff Augmentation for Effective Project Delivery & Operations

Staff augmentation has become a popular strategy for delivering projects effectively while positively impacting project financials. This approach offers businesses the flexibility to scale their workforce up or down based on project needs, bring in specialized skills for short-term requirements, and optimize costs. 

Using Staff Augmentation for Effective Project Delivery & Operations 

1. Flexibility in Scaling:

Staff augmentation allows companies to quickly scale their team size according to project requirements. This flexibility ensures that projects can be handled efficiently without the need to hire full-time employees for short-term needs.

2. Access to Specialized Skills:

By leveraging staff augmentation services, organizations can access specialized skills and expertise that may not be available in-house. This is especially beneficial for projects that require niche capabilities or temporary support in specific areas.

3. Cost-Effectiveness:

One of the key benefits of staff augmentation is its cost-effectiveness. Rather than bearing the overhead costs associated with full-time employees, businesses can utilize external resources on a project-basis, reducing overall expenses.

4. Faster Project Delivery:

With the ability to quickly onboard additional resources through staff augmentation, projects can be completed faster and more efficiently. This accelerated turnaround time can lead to increased client satisfaction and competitive advantage.

Positive Impact on Project Financials

1. Reduced Overhead Costs:

Staff augmentation allows companies to avoid the costs associated with hiring and retaining full-time employees, such as salaries, benefits, training, and infrastructure. This cost-saving element directly impacts project financials positively.

2. Improved Budget Control:

By only paying for the resources utilized during the project duration, organizations can better control their project budgets. This results in more accurate cost estimation and allocation, reducing the risk of budget overruns.

3. Enhanced ROI:

With staff augmentation, businesses can allocate resources where they are most needed, optimizing project efficiency and ROI. The ability to access specialized skills and scale teams as required contributes to a higher return on investment for projects.

4. Mitigation of Employee-related Risks:

Engaging external resources through staff augmentation helps mitigate risks associated with full-time employees, such as turnover, training costs, and legal responsibilities. This risk mitigation positively impacts project financial stability.

The Future of Staff Augmentation Business

1. Continued Growth:

As businesses seek flexible workforce solutions and specialized expertise, the demand for staff augmentation services is expected to grow. This trend is fueled by the need for agility, cost-efficiency, and access to diverse talent pools.

2. Emphasis on Technology Integration:

The future of staff augmentation will involve a greater emphasis on technology integration, automation, and AI-driven solutions. This shift aims to enhance service quality, streamline processes, and deliver better value to clients.

3. Global Talent Pool Access:

Staff augmentation providers will increasingly tap into global talent pools, offering organizations access to a broader range of skills and capabilities. This globalized approach enables businesses to leverage diverse expertise regardless of geographic limitations.

4. Focus on Compliance and Security:

With data privacy regulations and cybersecurity concerns on the rise, the future of staff augmentation will prioritize compliance and security measures. Providers will invest in robust safeguards to protect client data and ensure regulatory adherence.

In conclusion, staff augmentation is a strategic approach that enables organizations to deliver projects effectively, optimize project financials, and adapt to evolving business demands. As the workforce landscape evolves, the future of staff augmentation businesses will be shaped by technology integration, global talent sourcing, and a steadfast commitment to compliance and security.

NFV deployment validation using INOS

Network Function Virtualization (NFV), is becoming increasingly important as mobile networks are being asked to handle an ever-growing number of connected devices and new use cases. In this article, Amr Ashraf, RAN and Software Solution Architect and Trainer, describes the benefits of NFV, capabilities and deployment considerations. Plus, we take a quick look at how Digis Squared’s powerful AI-tool, INOS, can help in the deployment validation of NFV.

Network Function Virtualization

Mobile virtualization – also known as network function virtualization (NFV) – is a powerful technology that has the capability to transform the way mobile networks are designed, deployed, and operated.

  • NFV enables the creation of virtualized mobile networks, and the isolation of different types of traffic on the same physical network infrastructure.
  • The creation of different virtual networks for different types of services or different user groups.
  • Multiple independent network operators to share a common infrastructure,
  • And improves the security of the network.

In this article, Amr Ashraf describes the benefits of NFV, capabilities and deployment considerations. Plus, we take a quick look at how Digis Squared’s powerful AI-tool, INOS, can help in the deployment validation of NFV.

The future of mobile network functions is virtual

Mobile virtualization is becoming increasingly important as mobile networks are being asked to handle an ever-growing number of connected devices and new use cases.

NFV & Infrastructure Sharing. One of the main benefits of mobile virtualization is that it allows for multiple independent network operators to share a common infrastructure. This can help to reduce the costs and complexity of building and maintaining mobile networks, and can also help to improve coverage and capacity in areas where it would otherwise be difficult or expensive to deploy new infrastructure.

NFV & Security. Mobile virtualization also helps to improve the security of the network by isolating different functions and providing a secure environment for each virtual network. This makes it an ideal solution for enterprise customers who need to maintain high levels of security for their sensitive data.

Deployment flexibility. Mobile virtualization is supported by software-based virtualized network functions (VNFs), which can be run on standard servers and storage systems, rather than specialized hardware. This makes it easy to scale and adapt the network to changing requirements. Additionally, it also makes it possible to deploy mobile virtualization solutions in a variety of different environments, including on-premises, in the cloud, or at the edge of the network.

NFV & 5G customisations. It’s worth noting that mobile virtualization is a key technology in building the 5G network. 5G network standards are designed to support network slicing, which can create multiple isolated virtual networks on top of a common physical infrastructure. This makes it possible to create customized solutions for different types of users and use cases, such as providing high-bandwidth services for multimedia applications, or low-latency services for industrial automation and control.

NFV is the future, and the future is now. Mobile virtualization is a rapidly evolving technology with considerable potential to transform the way mobile networks are designed, deployed, and operated. In the coming years, we expect to see more and more operators turning to mobile virtualization to meet the growing demands on their networks and stay competitive in the fast-changing mobile landscape.

Orchestration

Implementing mobile virtualization can present a number of technical challenges, including the management and orchestration of virtualized network functions (VNFs) and ensuring network security. Managing and orchestration of VNFs is a complex task, which involves provisioning and configuring VNFs, as well as ensuring their availability and performance. This is complicated by the fact that VNFs are software-based and can be deployed on a variety of hardware and virtualization platforms.

Security

As VNFs are software-based, they can be targeted by cyber-attacks just like any other type of software. Therefore, ensuring network security is vital when implementing mobile virtualization.

Additionally, virtualized networks may be vulnerable to new types of attacks that exploit the virtualization itself.

NFVO. One of the key solutions to these challenges is the use of network function management and orchestration (NFVO) systems. NFVOs automate the provisioning, configuration, and management of VNFs, and they help to ensure that the VNFs are highly available and perform well. They also play an important role in the orchestration of VNFs, which involves coordinating the actions of multiple VNFs to achieve a desired outcome.

Strong defences. Another key solution is the use of security solutions such as firewall, intrusion detection and prevention systems, secure VPN, and secure containers to protect the virtualized network, secure communication between virtualized functions, and protect virtualized infrastructure from unauthorized access.

Anomaly detection. Solutions based on artificial intelligence and machine learning can also be used to monitor and detect anomalies in the network, identify potential security threats, and take appropriate action to mitigate them.

Digis Squared recommend involving INOS Probe to undertake anomaly detection 24/7, and send these alerts to the CSP. Read more – Anomaly detection: using AI to identify, prioritise and resolve network issues.

Security strategy. In addition to these technical solutions, it’s also important to have a comprehensive security strategy in place to address any potential vulnerabilities and threats that may arise when implementing mobile virtualization. This can include implementing best practices for network design, conducting regular security assessments, and keeping systems and software up to date with the latest security patches and updates.

Skills & expertise. An often overlooked, yet important security consideration, is the need for skilled personnel who are well-versed in the technologies and best practices associated with mobile virtualization. As mobile virtualization is a complex technology that requires a deep understanding of network functions, security, and software development, it’s crucial to have a team of experts who can design, deploy, and maintain secure mobile virtualization solutions.

INOS & NFV

Drive testing can be used to validate the performance of virtualized network functions and ensure that they are providing the desired level of service. This can help to identify and troubleshoot any issues that may arise, such as poor performance or dropped connections. Drive testing can also be used to compare the performance of virtualized network functions with that of traditional, hardware-based network functions, in order to ensure that the virtualized functions are providing an equivalent or better level of service.

Digis Squared’s AI-solution INOS is an essential tool in the implementation and ongoing optimization of NFV. It helps to validate and troubleshoot virtualized network functions and ensure that they are providing an equivalent or better level of service compared to traditional, hardware-based network functions. Additionally, drive testing provides key information about the environment in which the network is deployed that can be used to optimize the deployment of virtualized network functions.

Conclusion

Mobile virtualization is a powerful technology that has the capability to transform the way mobile networks are designed, deployed, and operated. Key benefits it enables include,

  • The creation of virtualized mobile networks, and the isolation of different types of traffic on the same physical network infrastructure.
  • The creation of different virtual networks for different types of services or different user groups.
  • Multiple independent network operators to share a common infrastructure,
  • And improves the security of the network.

However, implementing mobile virtualization can present a number of technical challenges, including the management and orchestration of virtualized network functions (VNFs) and ensuring network security.

The use of network function management and orchestration (NFVO) systems, security solutions, AI/ML-based monitoring and anomaly-detection systems, and a comprehensive security strategy can help to mitigate these challenges.

Finally, NFV is a powerful, yet complex technology – it’s essential to work with an experienced team with deep expertise who can design, deploy, and maintain mobile virtualization solutions.

In conversation with Amr Ashraf, Digis Squared’s RAN and Software Solution Architect and Trainer.

If you or your team would like to discover more about our capabilities, please get in touch: use this link or email hello@DigisSquared.com

Find out more about INOS

INOS can be implemented as a public or private cloud, or on-premise solution, and is also available as a “Radio Testing as-a-service” model. Its extensive AI analysis and remote OTA capabilities ensure speedy and accurate assessment of all aspects of network testing: SSV, in-building and drive testing, network optimization and competitor benchmarking, across all vendors, network capabilities and technologies, including 5G, private networks and OpenRAN.

INOS is built with compute resources powered by Intel® Xeon® Scalable Processors. Digis Squared is a Partner within the Intel Network Builders ecosystem program, and a member of the Intel Partner Alliance.

See INOS in action at LEAP, Riyadh & MWC Barcelona

Digis Squared will be at LEAP in Riyadh at the start of February, as part of the UK Pavilion H4.G30, undertaking cloud-based INOS demos. Plus the team will be at MWC Barcelona at the end of February, with a full suite of all the INOS solutions and form factors on a dedicated exhibition stand Hall 7 B13.

Get in touch to arrange a dedicated time to meet: hello@DigisSquared.com

Discover more

Digis Squared ◦ Enabling smarter networks.

Business Insider: “Discover Five of the Most Innovative UK Telecoms and Technology Firms”

“Connecting the world. As the UK expands its investment in STEM sectors, these firms are developing cutting-edge technology and building new ways to stay connected.”

This text is taken from a post by Business Insider / Insider Studios, which lists Digis Squared, what3words, CommAgility, pureLiFi and Speechmatics as five of the most innovative UK telecoms and technology firms. Read their full article here.

 

 

The telecoms and technology industries are likely to keep up their rapid rate of expansion over the next decade. This presents an opportunity for investment and development in the companies that are driving progress forward.

These 5 UK-based firms are highly innovative in their fields, from using light to enable wireless internet, to deploying artificial intelligence (AI), to removing bias in speech recognition. These are the companies whose pioneering technology will capitalize on an increasingly connected world.

 

Digis Squared

Digis Squared enables telecom operators and communications service providers to optimize, upgrade, manage, and enhance their networks. Its clients include the likes of Vodafone, Telefónica, and Telecom Egypt, and it has offices in the UK, Egypt, and Dubai — as well as a new site in Luanda, Angola, which opened in October.

“Our new office in Luanda will on-board a team of over 40 engineers providing managed services for the entire Africell Angola network,” Mohamed Hamdy, the company’s chief commercial officer, said. The new office will also support “the commercial launch of [Africell Angola’s] new network to the public in 2022.”

Africa is a huge market for the firm, which also plans to open a new facility in Saudi Arabia in 2022. Key priorities for the year include expanding its footprint in its target markets and doubling its revenue. The rollout of 5G — and planning for 6G deployment — means the need for communication technology is likely to dramatically increase in both scale and complexity. This will lead to increased demand for Digis Squared’s services over the next five to 10 years, according to CEO Ziad Khalil.

“The ability for our business to work internationally is vital — communication is both constrained and unlimited by boundaries,” Hamdy added. “Digis Squared was set up as a multi-country operation and international trade has been at the heart of our approach right from the start. Working with DIT has been a key pillar of this.”

 

As new technology and demand for innovation leap forward, new ways to communicate will also need to accelerate. An international approach for telecoms and tech companies is crucial, and with support from the public sector to build relationships and provide investment, there is a bright future ahead.

 

 

Digis Squared, independent telecoms expertise.

AI enhancement of capacity management in mobile networks

The optimisation of capacity management in mobile networks is vital: too little capacity constraints revenue opportunities and impacts customer experience, but idle capacity risks high opex and under-performing investment in assets. Capacity management has always used mathematical modelling techniques to attempt to find the sweet spot, and optimise opportunities and costs. In the past, such predictions were based on historical data, but now AI enhancement of capacity management changes that. The deployment of network virtualization, 5G and network slicing requires the use of cognitive planning; it is vital that capacity planning models are able to assess a step-change in the volume of data points in real-time or near-real-time.

RAN Automation Architect and Data Scientist at Digis Squared, Obeid Allah Ali, describes how AI, automation and advanced analytics are being deployed to gain even greater network capacity planning efficiencies.

What exactly is machine learning, and why is it important?

Machine Learning (ML) is an application of artificial intelligence (AI) that enables computer programs to learn and improve over time because of their interactions with data.

It automates analytics by making predictions using algorithms that learn repeatedly.

Its easy self-learning technique, rather than rule-based programming, has found widespread use in a variety of contexts.

So, whether it’s making life easier with navigation advice based on predicted traffic behaviour, assessing large amounts of medical data to identify new patterns and links, or warning you about market volatility so you can adjust financial decisions, AI and ML technology has permeated many aspects of our daily lives.

The power of prediction machines

In simplified terms, prediction is the process of filling in the missing information. It takes the information you have, often called ‘data,’ and uses it to generate information you don’t have. Most machine learning algorithms are mathematical models that predict outcomes.

How will machine learning impact businesses?

There are two major ways that forecasts will alter the way businesses operate.

  1. At low levels, a prediction machine can relieve humans of predictive activities, resulting in cost savings, and for example removing emotional bias.
  2. A prediction machine could become so accurate and dependable that it alters how a company operates.

How big is the growth in mobile connectivity?

Above: from GSMA “The State of Mobile Internet Connectivity Report 2021” [3], their most recent report

Some further statistics on the growth in mobile data, from the same GSMA report [3],

  • global data per user reaching more than 6 GB per month – double the data usage for 2018
  • 94% of the world’s population covered by mobile broadband network
  • By the end of 2020, 51% of the world’s population – just over 4 billion people – were using mobile internet, an increase of 225 million since the end of 2019

And from [4] GSMA Mobile Economy 2021 report,

  • By the end of 2025, 5G will account for just over a fifth of total mobile connections.

Capacity and performance of mobile networks

The rapid growth of mobile traffic places enormous strain on mobile networks’ ability to provide the necessary capacity and performance.

To meet demand, communications services providers (CSPs), mobile network operators and their suppliers need a range of options, including more spectrum, new technology, small cells, and traffic offloading to alternate access networks.

To meet commercial business objectives, mobile network operators are under pressure to maximize the utilization of existing resources while avoiding capacity bottlenecks that reduce revenues and negatively influence end-user experience.

Additionally, network operators have to assess risk, contractual SLAs (especially in the context of MVNOS who utilise their network, and corporate contracts), the total cost of ownership, and the impact on customer experience, perception and brand.

Radio Access Network costs are estimated to be 20% of the opex cost of running a network [1]. And the impact of opex on network quality correlates strongly with increased ARPU and reduced churn; when network quality is highest, service providers benefit from a higher average ARPU (+31 %) and lower average churn (-27%) [2].

Finding the perfect balance of capacity, quality, efficiency and cost – not too much, not too little – is complex and dynamic.

Capacity forecasting for mobile networks

The Digis Squared team have developed machine learning algorithms and decoders that can, based on network activity, decode how User Traffic Profiles are changing. With the deployment of 5G and network slicing techniques, modelling network usage patterns and customer behaviour and predicting future demand becomes immediately far more complex – the only way to successfully model this will be with AI.

Detecting a problem

We detect anomalies in cells in the existing network, plus highly utilized cells, using machine learning and a design approach algorithm based on several reported KPIs. We use this information to distinguish what requires immediate attention from what should be monitored for proactive action. Using multivariable modeling techniques, that is, assessing multiple KPIs across each cell, enables us to have a highly nuanced model, optimising all available capacity.

Forecasting

Operators must be able to estimate the required traffic capacity for their mobile networks in this competitive climate to invest in extensions when they are truly needed, and deploy the most cost-effective solution, while maximizing investment and maintaining good network quality.
In this phase of the development of the model, we will discover future troublesome cells to guide our approach and actions using predictive models.

AI enhancement of capacity management: what’s next?

Today, we use an open-loop control system to apply our AI methods. However, as predictive model accuracy improves, we anticipate transitioning to a fully automated Self-Organized Network (SON) – enabling closed-loop network management with self-planning, self-configuration, self-optimization, and self-healing – system in the near future.

In conversation with Obeid Allah Ali, RAN Automation Architect and Data Scientist at Digis Squared.

If you or your team would like to discover more about our capabilities, please get in touch: use this link or email sales@DigisSquared.com .

Discover more

Digis Squared, independent telecoms expertise.

References