Protocol log analysis with constraint programming. Kenneth Balck Mats Carlsson Olga Grinchtein Justin Pearson



Similar documents
A constraint optimization model for analysis of telecommunication protocol logs

Long Term Evolution - LTE. A short overview

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

LTE Performance and Analysis using Atoll Simulation

Architecture Overview NCHU CSE LTE - 1

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

LTE CDMA Interworking

Protocol Signaling Procedures in LTE

LTE Aware LTE Overview Alcatel-Lucent Long Term Evolution Solution Overview Consulting Informed LTE Solution Overview Alcatel-Lucent LTE Evolved

LTE X2 Handover Messaging

End to End Delay Performance Evaluation for VoIP in the LTE Network

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement

LTE Attach and Default Bearer Setup Messaging

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Throughput for TDD and FDD 4 G LTE Systems

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

ETSI TS V8.1.0 ( ) Technical Specification

Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.

Get the best performance from your LTE Network with MOBIPASS

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

RBS 6000 Training Programs. Catalog of Course Descriptions

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

Evolution in Mobile Radio Networks

Security in cellular-radio access networks

LTE - Can SDN paradigm be applied?

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

LTE Control Plane on Intel Architecture

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

ehrpd Mike Keeley Market Segment Director

Towards Software Defined Cellular Networks

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Technical vulnerability of the E-UTRAN paging mechanism

Diameter in the Evolved Packet Core

3GPP TS V9.0.0 ( )

3GPP LTE Channels and MAC Layer

ETSI TS V ( )

Portable LTE Air Analyzer System (Model : MDN-F6)

Security in the Evolved Packet System

Vad betyder 4G-utvecklingen för Stadsnäten?

Priority, Pre-Emption, and Quality of Service

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS version 11.1.

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network.

LTE Security How Good Is It?

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Nationwide Interoperability Framework

BriskWave. Consulting. LTE Network Sharing. Some Operational & Management Aspects. BriskWave. Consulting

A Layer-2 Approach for Mobility and Transport in the Mobile Backhaul

4G Mobile Networks At Risk

Abstraction of Mobile Network Topology Albert Codes Morales Supervised by: Dr. Toktam Mahmoodi King s College London March 2015

SERVICE CONTINUITY. Ensuring voice service

Implementing LTE International Data Roaming

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

LTE Mobility Enhancements

Delivering Network Performance and Capacity. The most important thing we build is trust

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

EETS 8316 Wireless Networks Fall 2013

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

WiFi Direct and LTE D2D in Action

Triton Multi-purpose LTE wireless core networking testing tool

Long Term Evolution - LTE L10 Training Programs. Catalog of Course Descriptions

LTE Multimedia Broadcast Multicast Services (MBMS)

Migration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009

Optimal load balancing algorithm for multi-cell LTE networks

Inter Technology Load Balancing Algorithm for Evolved Packet System

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Temporal Load Balancing of Time-driven Machine Type Communications in Mobile Core Networks

Mobility Management for All-IP Core Network

Network Virtualization Mist to MUST

Wireless & Mobile. Working Group

Inter-Cell Interference Coordination (ICIC) Technology

How Voice Calls Affect Data in Operational LTE Networks

Description This course will give the student thorough knowledge required to administrate the OSS-RC system.

LTE Perspective. Ericsson Inc. Sridhar vadlamudi LTE HEAD, India

LTE and IMSI catcher myths

Comparison of LTE and WiMAX on the Basis of Qualities

The future of mobile networking. David Kessens

c 2013 IFIP

Mobility Management. Sara Modarres Razavi

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

HRPD/1XRTT and 3GPP E-UTRAN (LTE) Interworking and Inter-Technology Handoff

Security Analysis of LTE Access Network

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

ETSI TS V8.5.0 ( ) Technical Specification

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

Wireless Device Management: OSS for Leading-Edge Wireless

Transcription:

Protocol log analysis with constraint programming Kenneth Balck Mats Carlsson Olga Grinchtein Justin Pearson

Outline Overview Long Term Evolution (LTE) Radio Access Network A case study Public Warning System Testing Procedure Protocol log generation Protocol log analysis Future work 2

Overview The LTE Radio Base Station (RBS) is SUT at our department at Ericsson. The LTE RBS communicates with the User Equipment (UE). The LTE RBS has different functions. Our case study is Public Warning System. 3

Overview Test harness should analyze UE protocol logs Protocol logs are sequences of messages with timestamps Number of logs with errors should be generated for testing telecommunication test harness We use constraint solver for modeling and generation of protocol logs ([DATE 14]) Constraint solver can also be used for protocol log analysis 4

LTE Radio Base Station (enodeb) A LTE Radio Access Network consists of LTE Radio Base Stations (RBS), which support the LTE air interface and performs radio resource management. An enb connects to UE via the air interface. LTE RBSes are interconnected with each other by means of the X2 interfaces. LTE RBSes are also connected by means of the S1 interface to the Evolved Packet Core MME / S-GW MME / S-GW Mobility Management Entity (MME) S1 S1 Serving Gateway (S-GW) S1 S1 User Equipment (UE) enb X2 X2 X2 enb E-UTRAN 3GPP TS 36.300 enb UE 5

Public Warning System CBE CBC MME enodeb UE 3GPP TS 23.041 0. Registration procedures 1. Emergency Broadcast Request 2. Write-Replace Warning Request 3. Write-Replace Warning Confirm 4. Emergency Broadcast Response 5. Write-Replace Warning Request Cell Broadcast Entity (CBE) Cell Broadcast Center (CBC) Mobility Management Entity (MME) User Equipment (UE) 6. Cell Broadcast delivery 6. Write-Replace Warning Response 8. Record success/failure of message delivery in trace record 7. User Alerting 6

Public Warning System enodeb UE paging system information system information system information paging system information The enodeb sends different types of system information messages SIB1 (schedulinginfolist) SIB10 (primary notification) SIB11 (secondary notification) Secondary notification can come in one or several segments 7

Testing Procedure 1. Test harness initializes some parameters in enb. 2. Test harness initiates logging in the UE simulator 3. Test harness initiates transmission of messages between the MME simulator and enb 4. Test harness captures and analyses UE protocol log. 2 4 1 3 8

UE protocol log generation Modelling in Sicstus Prolog Model describes how UE acquires primary and secondary notifications sending by enb after receiving one warning message from the MME The model is a set of constraints on parameters, which represent timestamps, content of messages or indicates if a message should appear in log. Parameters are grouped into lists, that is a Prolog datastructure Inject faults into the model Based on solutions provided by Sicstus Prolog we generate UE protocol logs 9

Paging messages PagPN is an array of timestamps of paging messages of primary notification PagSN is an array of timestamps of paging messages of secondary notification paging PagPN timeline paging PagSN timeline 10

SIB1 SIB1PNtime is an array of timestamps of SIB1 messages after paging messages of primary notification SIB1PNtype is an array of values from 0 to 3 that indicates whether SIB1 contain schedulinginfolist for SIB10 and/or SIB11 SIB1PNTime timeline SIB1PNTimendPC SIB1PNTypendPC=1 SIB1PNTime4 SIB1PNType4=2 SIB1PNType1=2 SIB1PNTime1 PagPN timeline 11

SIB11 SIB11Time is an array of timestamps of SIB11 messages SIB11Segment is an array of segment numbers SIB11Time timeline PagSN timeline 12

Protocol log analysis Our approach is to implement test harness using constraint solver Arrays of variables of timestamps of paging messages Arrays contain timestamps and content of messages from the log. The first timestamp can be a variable. Analysis can be done in several stages Check correctness of paging messages Check correctness of SIB1, SIB10 and SIB11 messages Boolean parameters indicate errors in the logs Minimize sum of Boolean parameters 13

Minizinc Constraint specification language Solver independent Separation data from model Model consists of variable declarations and constraint definitions Scalar types (Booleans, integers, floats) and compound types (sets, arrays) Comparisons, arithmetic operations(+,,sum), logical operations (\/,/\, forall, exists), set operations, array operations 14

Model in Minizinc Boolean variables SIB11afterpagind and SIB11periodicityind SIB11 message after last paging message of secondary notification 1 i numbersib11log SIB11TimeLog i > PagSN numberofbroadcasts SIB11afterpagind = 1 Periodicity of SIB11 messages ( 2 i numbersib11log ) (( SIB11Timelog i SIB11Timelog i 1 mod sipersib11 = 0) SIB11periodicityind i = 0) 15

Replacement of warning messages Modelling in Minizinc acquiring by UE primary and secondary notifications sending by enb after receiving several warning messages from MME Message 1 SIB10,SIB11 delay Message 2 SIB10 Message 3 SIB11 Message 4 SIB11 Message 5 SIB10, SIB11 SIB10 SIB11 SIB10 SIB10 SIB11 SIB11 SIB11 16

Future work Automation of fault injection Experiments Real logs Generated logs MathSat 17

Thank you! 18