Page 59 - AI for Good-Innovate for Impact
P. 59

AI for Good-Innovate for Impact



               Use Case – 10: Easing Operations using ML/AI solution for 6G and

               beyond Network Orchestration and Secure Network Operations                                           10 - Tata Elxsi











               Country: India 
               Organization: Tata Elxsi 

               Contact person: Priyadarshini, Priyadarshini@ tataelxsi .co .in

               Ramesh Ramanathan, Ramerama@ tataelxsi .co .in

               Jayaprakash G, Jayaprakash.G@tataelxsi.co.in


               10�1� Use case summary table


                Domain              Telecommunications
                The problem to be   •  The sophisticated orchestration engines require technical know-
                addressed              how and are labour-intensive.
                                    •  Repeatedly modeling standard configurations is time-consuming.
                                    •  Manual calculations for capacity and cost forecasting can lead to
                                       errors and resource overprovisioning.
                                    •  Traditional security measures are inadequate against diverse
                                       attacks.

                Key aspects of the   •  Autonomous network operations simplify deployment and configu-
                solution               ration using NLP and ML/AI.
                                    •  A digital twin projects resource utilization for optimized infrastruc-
                                       ture management.
                                    •  Extended reality (XR) enhances observability and interaction
                                       through responsive visualization.
                                    •  AI-driven security detects and mitigates threats with continuous
                                       monitoring and automated policy enforcement.
                Technology          NLP, ML, AI, Digital Twin, Extended Reality (XR), Network Functions
                keywords            (NFs), Kubernetes, Anomaly Detection, Security Policies

                Data availability   Not publicly available; internal data used for model training and vali-
                                    dation.

                Metadata (Type of   Network configurations, historical deployment data, traffic patterns,
                data)               security incidents, resource utilization stats.

                Model Training and   historical network data and deployment records to train ML models;
                fine-tuning         continuous fine-tuning based on new 

                Testbeds or Pilot   Development of proof of concept and potential for future testbeds or
                deployments         pilot deployments to validate solutions.








                                                                                                     43
   54   55   56   57   58   59   60   61   62   63   64