logo
The Evolution Of SON With Cloud-Native Architecture

The Evolution Of SON With Cloud-Native Architecture

Forbes10-07-2025
Apeksha Jain is a Global Expert in Architecting Distributed Applications, Engineering Leader in Cloud-Scale Systems.
Wireless networks have long faced the challenges of manually configuring, optimizing and maintaining thousands of base stations. This process is labor-intensive, economically inefficient and prone to errors. The inability to adapt in real time also makes it difficult to respond to issues like network congestion, meaning that base station faults go unresolved until manually identified.
To address these challenges, the self-organizing network (SON) was introduced into 3GPP specifications in Release 8 in 2009.
SON is a tool that provides self-healing and allows the network to detect and recover from failures on its own. This update enhanced operational efficiency through its automated functionalities, which include:
• Self-Configuration: SON automates the setup of key parameters, such as initial neighbors, physical cell identifier (PCI) and tracking area code (TAC) for newly deployed base stations, ensuring compatibility with neighboring stations to prevent network interference.
• Self-Optimization: SON can continuously monitor network performance and automatically adjust base station parameters to optimize resources, improve service quality and reduce interference.
• Self-Healing: With SON, the network can automatically detect and resolve base station faults before they impact the network or users, leading to faster recovery and reducing operational costs.
However, over the years, traditional SON architectures have faced several challenges, some of which can be overcome by using cloud-native SON. Let's explore those challenges, the role that cloud-native SON can play in addressing them and how to successfully implement cloud-native SON.
The Challenges With Traditional SON
Traditional embedded SON applications—also called distributed SON (D-SON)—deploy directly on network controllers. They enhance network management, but they also pose functional limitations in today's dynamic telecom landscape.
When operating in isolation on a network controller, SON only has visibility into the base stations connected to a network controller, lacking a global view of the network. This limits SON's ability to implement network-wide load balancing needed to improve the overall efficiency of the network. D-SON can only load balance the user traffic between the base stations connected to the same network controller, which can also result in conflicting configurations across the base stations.
As explained in an article on Telecoms.com, this type of SON architecture embedded within vendor-specific network controllers relies on proprietary interfaces. In multi-vendor environments, this design can make it difficult for SON functions to interoperate across different vendor equipment, which often leads to misconfiguration of neighboring base stations and inconsistent network behavior.
Additionally, maintaining this solution may be operationally inefficient due to slow feature rollouts and resource constraints.
Together, these limitations can prevent D-SON from leveraging advanced AI technology for predictive network configuration and management.
The Shift Toward Cloud-Native SON
Cloud-native SON is an architecture built on cloud infrastructure, typically delivered as a SaaS solution. It leverages the cloud's compute power and storage to process large volumes of network data in real time, enabling it to maintain a unified view of thousands of base stations across the network.
As Nokia points out, this architecture is intended to enable automation, agility and seamless integration with other cloud-native network functions. The SaaS model can also support rapid deployment, continuous updates and operational efficiency to make network management more flexible and adaptive.
Unlike traditional SON solutions, cloud-native SONs are developed by independent providers and built using standard APIs. A single SON application can, therefore, manage all base stations across the network and address interoperability issues between different vendor systems. With a holistic network view, cloud-native SON can prevent misconfigurations between neighboring base stations and support network-wide capabilities such as load balancing, improving overall performance and user experience.
The cloud infrastructure is intended to provide a foundation for the integration of AI into SON applications. As noted by TeckNexus, AI-enhanced SON capabilities include predictive fault detection, intelligent load balancing and proactive energy optimization.
This shift moves SON toward AI-supported decision-making, as it can offer more flexibility and scalability for emerging network requirements such as 5G.
Adopting Cloud-Native SON
While transitioning to cloud-native SON can offer substantial benefits, wireless operators need to be aware of the key challenges and navigate strategically to ensure a smooth transformation.
Many operators lack in-house expertise in cloud-native tools and frameworks, making it necessary to upskill existing teams or recruit new talent with relevant experience. Beyond technical skills, the adoption of cloud-native SON also requires a cultural shift toward fast-paced Agile- and DevOps-driven practices. This operational mindset is essential for unlocking the full potential of cloud-native systems.
Another major consideration is the integration of existing network controllers with cloud-native SON. Operators using traditional SON embedded in their network equipment often use proprietary interfaces. Moving to a cloud-native SON with a standard API interface requires a middleware layer in their network controllers, which can be a complex and resource-intensive task that requires careful planning and phased execution.
There may also be concerns about data sovereignty, cloud security and compliance when offloading SON operations to the cloud. To address these concerns, organizations can adopt region-specific data hosting, end-to-end encryption and strict access controls. Regulatory compliance can be improved through robust auditing, and hybrid or private cloud models can provide greater control over sensitive data.
By addressing these considerations in a timely and strategic manner, the operators can ensure the successful adoption of cloud-native SON.
Conclusion
As wireless infrastructure expands, there is a continuous push to accelerate SON adoption, streamline deployment and reduce operational costs, which is why cloud-native networks are gaining traction. Adopting cloud-native SON involves addressing key regulatory, technical and process challenges, but it can play a crucial role in the evolution toward AI-native networks.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

2026 Subaru Uncharted First Look: Yes, That's the Name
2026 Subaru Uncharted First Look: Yes, That's the Name

Motor Trend

timean hour ago

  • Motor Trend

2026 Subaru Uncharted First Look: Yes, That's the Name

It's a little unusual when you first notice it, but the entirety of the EVs Toyota and Subaru sell are the same vehicles. The Toyota bZ4X compact electric SUV—which for 2026 undergoes a name change to "bZ" along with welcome updates—is a Subaru Solterra with different badges and brand-specific final tuning; ditto the more dirt-road-friendly Subaru Trailseeker and the Toyota bZ Woodland. Now, Toyota's new C-HR EV is being joined by a Subaru-badged counterpart, the Uncharted. The 2026 Subaru Uncharted is a compact electric SUV developed with Toyota, sharing the C-HR's platform. It features fastback styling, offers up to 338 hp, and includes Subaru-specific touches such as X-Mode for off-roading. Standard features include heated seats and Subaru's EyeSight safety tech. This summary was generated by AI using content from this MotorTrend article Read Next As far as strategies go, this sharing of platforms is looking smarter by the day—as EV-related tax incentives fall away, automakers are looking for anything to drive scale up and costs down. The six Toyotas and Subarus listed here all use virtually identical motors, batteries, and vehicle architectures. The Trailseeker and bZ Woodland are larger than the bZ and Solterra, which are themselves slightly bigger than the C-HR and this new 2026 Subaru Uncharted. The latter pair aim for a sportier vibe with a more rakish roofline and an available dual-motor powertrain packing 338 hp. Looks More Subaru Than Toyota Though the Solterra and bZ remain twins, at least visually, and every 2026-model-year Toyota and Subaru EV gets essentially the same dashboard and 14-inch touchscreen and new hoodless digital gauge cluster, the new Uncharted and its C-HR sibling are fairly well differentiated, at least externally. Subaru has given the Uncharted daytime running lamps with six LED elements that look quite different from the C-HR's C-shaped pieces. (On both, the primary headlights are smaller, square-ish units mounted lower in the bumper.) The Subie's entire nose is unique, in fact, with a more plastic-clad bumper that channels the brand's more adventurous vibes, and the (illuminated!) Subaru badge is located on the front fascia's flat, vertical face instead of up on the hood as on the C-HR. The sides of the Uncharted are basically identical to the Toyota's, with chunky black plastic cladding protecting the lower body area; "hidden" rear door handles in the roof pillars; and a coupe-like fastback roof painted a contrasting black color on certain trim levels. Moving to the rear, the Uncharted once again charts new styling ground, with more contoured full-width taillights and its own, more off-road-y bumper and reflector designs. Subaru also outfits the Uncharted with unique 18- and 20-inch wheels; the 20s on the example pictured outside are a much cooler design than any wheel option we've seen for the C-HR. Changes to the Uncharted's cabin are minimal yet effective in giving it at least a passing distinction from the C-HR. The squircle-shaped steering wheel does most of the heavy lifting here, as does the Subaru's unique upholstery and dashboard trim (pictured here with light gray seats and orange trim). Otherwise, the 14-inch touchscreen with its integrated physical climate control and volume knobs, air vent layout, dual front wireless phone chargers, and center console with rotary shift selector are identical to the Toyota's. Mostly Toyobaru Underneath Underneath the Uncharted's chunky body is a by now familiar component set. Just like the 2026 C-HR, the Subaru Uncharted gets a 74.7-kWh battery pack and available dual motors churning out 338 hp on mid- and top-tier Uncharted Sport and GT models. There is an entry-level Uncharted Premium FWD model that, as its name implies, is front-wheel drive with a single electric motor up front delivering 221 hp (another power figure you'll find looking across the mechanically related Toyota and Subaru EVs). The dual-motor Uncharted models are claimed to reach 60 mph in under five seconds. All versions' batteries are replenished via a NACS charging port on the front passenger-side fender, which enables Tesla Supercharger access. Max charging speeds are, as on every Toyota and Subaru EV, a modest 150 kW, which Subaru says is good enough to juice up from 10 percent battery charge to 80 percent in about 30 minutes. The onboard AC charger for Level 2 fill-ups is a quick 11-kW unit, so charging the Subaru at home should be an overnight affair with the right wall charger. Range estimates are quite good, as they are on the updated-for-2026 Toyota bZ and Subaru Solterra that use versions of this same battery and motor setup. As you might expect, the single-motor Uncharted Premium model delivers the most range, at over 300 miles per Subaru's estimates. The dual-motor examples are good for up to 290 miles of claimed range—also good considering the power on tap. Subaru notes some tuning differences between the Uncharted and its Toyota counterpart, namely a suspension set up for fun dynamics on-road and off, along with specific powertrain tuning unique to the Subie. The Uncharted also has an X-Mode (on dual-motor Sport and GT models), which optimizes the powertrain for different off-road scenarios to maximize traction and performance. Drivers can mess with X-Mode—tech also offered on other all-wheel-drive Subarus—using a console-mounted switch (on C-HRs, that space is covered by blank plastic plate). Solid Standard Subaru Specific Stuff Besides X-Mode, the Subaru Uncharted gets Subie-standard features such as heated front seats, heated door mirrors, and a windshield wiper de-icer. Those are standard on every Uncharted, including the base Premium model, as is a power tailgate, ambient interior lighting, and Subaru's EyeSight active safety tech (automated emergency braking, adaptive cruise control, lane-departure warning, blind-spot monitoring, and DriverFocus "distraction mitigation system"). The Subaru Uncharted Sport model adds to that roster a heated steering wheel, StarTex water-resistant seat covers, and a 360-degree parking camera. Opt for the top-dog Uncharted GT, and Subaru throws in a panoramic glass roof with a power shade, 20-inch wheels, a digital rearview mirror, ventilation for the front seats, heated outboard rear seats, and a Harman Kardon audio system. We'll get more details on the Subaru Uncharted, including its specific dimensions, pricing, and EPA-estimated range, closer to its on-sale date in early 2026. Yes, the "new" Uncharted's lineage is definitely well, um, charted (C-HR!), but it breaks decisively in a distinctly Subaru direction. Spreading the Subaru-Toyota EV component set one model further, the Uncharted gets enough differentiation that we're looking forward to sampling the electric SUV for ourselves and seeing just how different it is to drive—and whether it gets some Subaru-appropriate dirt performance, too.

Don't Surrender China's AI Market
Don't Surrender China's AI Market

Wall Street Journal

time2 hours ago

  • Wall Street Journal

Don't Surrender China's AI Market

Why did Jensen Huang go to China? The Nvidia CEO wants to make American tech platforms the global artificial-intelligence standard by gaining market share and engaging other countries with U.S.-developed computing infrastructure. That means doing business in the largest AI market outside the U.S. Some in Washington seem confused by this. Sens. Elizabeth Warren (D., Mass.) and Jim Banks (R., Ind.) sent a letter in May asking Mr. Huang to explain why his company would 'choose to enrich an authoritarian country's innovation ecosystem.' They're at it again, chiding him in another letter last week for meeting with Chinese business executives. It's the second time these senators have questioned the patriotism of one of America's most important CEOs. The objections reveal a deep misunderstanding of how America wins: not through fear and withdrawal, but through strength and engagement. Mr. Huang's strategy aligns with President Trump's: Engage with all, compete everywhere, and avoid abandoning markets out of ideological fear. Mr. Trump hasn't isolated. He has negotiated more with foreign countries than any modern president and built leverage for U.S. manufacturing. President Biden, in contrast, presided over a shrinking American share of the AI and semiconductor markets in China, offering moral lectures with little follow-through. If Nvidia were violating export controls or handing over sensitive intellectual property, that would be a problem. But that isn't happening. The company established a compliance center in China to ensure that its operations follow U.S. regulations, even shutting down chip sales after a recent ruling by the Bureau of Industry and Security. Nvidia could face billions of dollars in losses as it navigates a shifting legal landscape.

Your Data Appeared in a Leak. Now What?
Your Data Appeared in a Leak. Now What?

New York Times

time2 hours ago

  • New York Times

Your Data Appeared in a Leak. Now What?

My personal information has been leaked in a data breach not once or twice or even thrice. By now I've lost count. I've learned about the breaches in letters offering me free credit monitoring, in apologetic emails from affected companies, and in news reports. You've probably been there, too. The urge to shrug and do nothing is strong, but that approach is almost certain to cause you some future pain. Learn from my mistakes — someone once took over my Facebook account using stolen data because I recycled my passwords. (Tip: Don't do this.) Data breaches are now an unfortunate fact of modern life, and there's not much you can do about preventing them. But that doesn't mean you can't protect yourself in the aftermath. Here's what to do. Leaks and data breaches can take many forms — a hacker releases stolen records online, a company accidentally leaves a server available, the list goes on — but the result is that your personal information ends up somewhere it shouldn't. Don't panic, but don't ignore it. The sad truth is, decades of data breaches and a thriving market for data brokers mean that an uncomfortable amount of your personal information is likely already out in the open. 'It doesn't worry me too much anymore, just simply because there's so much of that data out there anyway, and a new data breach doesn't particularly change that,' says Troy Hunt, the founder of HaveIBeenPwned, a site that lets you search data breaches to see if you've been affected. But some breaches, particularly those involving sensitive data such as passwords or other personal information, demand attention. Here's what to do immediately after a data breach to protect yourself in the future: Set up a password manager and enable two-factor authentication. Because attackers know that many people use the same password across multiple accounts, they'll attempt to use a password exposed on one website across others. Hunt says that due to password recycling, 'one data breach of a fairly benign service is suddenly a digital key to everything else.' Even if your password wasn't exposed, take the breach as an opportunity to level up your online security. First, choose a password manager (our picks are 1Password and Bitwarden) and use it to create a new, unique password for the site that was breached. Then, take a minute to activate 2FA, if it's available, to keep attackers out even if they have your password. Two-factor authentication adds another layer of protection on top of your password, often in the form of a PIN, security key, or face scan (if you've ever been prompted to enter a texted code after entering your password, that's 2FA). Once you've done that, change the password on another site or two every day (or whenever you log in), and add it to your password manager. Eventually, you'll have unique and complex passwords protected with 2FA for all of your accounts, which will help protect you after future data breaches. I Tried, and Failed, to Disappear From the Internet Go directly to the source to find more information about the breach. If you hear about a data breach from a letter, email, or news report, go to the affected company's website to get more information. Be sure to avoid links in emails or text messages, as these can sometimes be from opportunistic scammers. Look for explanations of what information was exposed and what, if any, additional steps the company is taking to protect those affected. If you can't find any information on the website, try contacting the company by phone using a verified phone number. Many companies list their contact numbers on their official websites, so use that number instead of whatever pops up on Google. Once you know what information was exposed, you can decide what to do about it. Assessing your risk is deeply personal, and how you react might depend on how much and what kind of information the company had on you, though some personal information is obviously sensitive. If your account password, address, or Social Security number has been exposed, you need to take action. Another important piece of information that is often overlooked is your date of birth: 'You can never change it,' Hunt says. 'And unfortunately, we've got everything from [telecommunication companies] to banks regularly using that as an identity proof.' Change your passwords. Companies sometimes require a password reset after a data breach, so you'll have to create a new password before you can log in. If the company doesn't require a reset, you can do it yourself in your account settings. If you can't log in to change your password, though, an attacker may have already taken control of your account; use the site's password-recovery tool and replace your old password with a strong new one. Store that new password in your password manager and then turn on 2FA. If that doesn't work, contact the company through a verified phone number listed on its site or another trusted source to regain control of your account. Also change the password on any other site where you reused it. As we mentioned earlier, attackers know people's bad password habits and sometimes try confirmed passwords on multiple sites, hoping to get lucky. Share this article with a friend. Monitor your bank and credit card accounts. Log in to your financial accounts and look for fraudulent charges. Most bank accounts in the US are insured by the Federal Deposit Insurance Corporation for up to $250,000, so if you see incorrect charges, contact your bank to file a claim and get your money back. In the US, customers are not responsible for fraudulent credit card charges, either, so report any of those as well to get them removed from your account. When contacting your bank, credit card company, or brokerage, be sure to do so through a verified phone number. Most banks and credit card issuers list a fraud-support phone number on the back of your debit or credit card. Check and freeze your credit. Sometimes, scammers try to use your personal information to open new bank accounts or take out loans. You can check for this kind of fraudulent activity by examining your credit reports from the three major credit bureaus: Equifax, Experian, and TransUnion. The Federal Trade Commission recommends against contacting the credit bureaus individually and instead directs people to use to request one free report from each credit bureau per year. You can also request a credit freeze, which helps prevent new accounts or loans from being opened in your name. If you have children, the FTC recommends freezing their credit, as well; because youngsters are unlikely to be checking their own credit reports, fraud using the information of minors can go unnoticed for years. A credit freeze lasts until you choose to lift it, but keep in mind that it can't protect against all kinds of fraud. The Federal Trade Commission offers resources for reporting identity theft and recovering your accounts if you're concerned that someone is using your Social Security number. If the affected companies offer free credit monitoring or identity-theft support, use it. Many companies offer credit-monitoring services in the wake of a data breach. You should take advantage. However, all of them require you to activate such services, and you have to watch for notifications if these services find anything suspicious. Typically, you have a limited time during which you can activate the services, and they run for only a year or so. File your taxes early. Tax scammers sometimes try to claim your US income tax refund by using stolen information to file a return before you do. If you were involved in a recent data breach, or if sensitive information such as your Social Security number was leaked, consider filing your taxes early to beat scammers to the punch. You can also set up a PIN with the IRS to add an extra layer of protection to your taxes. This is a smart thing to do, even if your data hasn't been exposed. Be on alert for scams purporting to help after a breach. Scammers sometimes send legitimate-looking emails or texts about data breaches that are actually links to phishing sites, which look like reputable sites but are actually designed to convince you to divulge your passwords or sensitive information. It's a cruel manipulation: exploiting your very anxiety about a security leak to steal your information. To protect yourself, be skeptical of messages with links or demands for immediate, dramatic action. Before you follow any instructions from an email, a text message, or even a phone call, confirm that information by going to an official website or contacting support through a verified phone number. Phishing sites have a short lifespan, and most browsers are good at blocking malicious sites. If your browser warns you to stay away, pay attention. Most password managers store a related URL along with your password and notify you when you visit a site with a saved password. If you're on a familiar-looking site but your password manager doesn't recognize it, double-check the URL to confirm that it isn't a cleverly designed look-alike. Your Phone Is Stolen. Your Laptop Gets Lost. Here's What to Do.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store