A constraint optimization model for analysis of telecommunication protocol logs



Similar documents
Protocol log analysis with constraint programming. Kenneth Balck Mats Carlsson Olga Grinchtein Justin Pearson

Long Term Evolution - LTE. A short overview

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Architecture Overview NCHU CSE LTE - 1

LTE Performance and Analysis using Atoll Simulation

LTE Attach and Default Bearer Setup Messaging

LTE Aware LTE Overview Alcatel-Lucent Long Term Evolution Solution Overview Consulting Informed LTE Solution Overview Alcatel-Lucent LTE Evolved

LTE CDMA Interworking

End to End Delay Performance Evaluation for VoIP in the LTE Network

Protocol Signaling Procedures in LTE

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

LTE - Can SDN paradigm be applied?

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Throughput for TDD and FDD 4 G LTE Systems

LTE X2 Handover Messaging

Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement

Towards Software Defined Cellular Networks

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

ETSI TS V8.1.0 ( ) Technical Specification

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Energy Management System CANBUS Interface Specification

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS version 11.1.

ETSI TS V ( )

Evolution in Mobile Radio Networks

Security in cellular-radio access networks

RBS 6000 Training Programs. Catalog of Course Descriptions

How Voice Calls Affect Data in Operational LTE Networks

Get the best performance from your LTE Network with MOBIPASS

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Mobility Management. Sara Modarres Razavi

ehrpd Mike Keeley Market Segment Director

4G Mobile Networks At Risk

Nationwide Interoperability Framework

3GPP LTE Channels and MAC Layer

Diameter in the Evolved Packet Core

c 2013 IFIP

3GPP TS V9.0.0 ( )

Security in the Evolved Packet System

SERVICE CONTINUITY. Ensuring voice service

Vad betyder 4G-utvecklingen för Stadsnäten?

LTE Control Plane on Intel Architecture

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul

How to deal with a thousand nodes: M2M communication over cellular networks. A. Maeder NEC Laboratories Europe andreas.maeder@neclab.

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

LTE Security How Good Is It?

Technical vulnerability of the E-UTRAN paging mechanism

EETS 8316 Wireless Networks Fall 2013

A Layer-2 Approach for Mobility and Transport in the Mobile Backhaul

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

Migration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009

Priority, Pre-Emption, and Quality of Service

Network Virtualization Mist to MUST

LTE Mobility Enhancements

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

TCP performance optimization for handover Management for LTE satellite/terrestrial hybrid. network.

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Inter-Cell Interference Coordination (ICIC) Technology

Delivery of Voice and Text Messages over LTE

Abstraction of Mobile Network Topology Albert Codes Morales Supervised by: Dr. Toktam Mahmoodi King s College London March 2015

BriskWave. Consulting. LTE Network Sharing. Some Operational & Management Aspects. BriskWave. Consulting

Triton Multi-purpose LTE wireless core networking testing tool

The future of mobile networking. David Kessens

Comparison of LTE and WiMAX on the Basis of Qualities

LTE Solution and Requirements for Smart Grids

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Implementing LTE International Data Roaming

LTE Multimedia Broadcast Multicast Services (MBMS)

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Network functions virtualization and software management

Nokia Siemens Networks Flexi Network Server

Wireless & Mobile. Working Group

Chapter 8 Monitoring and Logging

LTE Evolution for Cellular IoT Ericsson & NSN

Wireless Technologies for the 450 MHz band

THE Evolution of Mobile network and THE role of Network transport. Rodolfo Di Muro, PhD, MBA Programs marketing

The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: With an Evaluation of DAS & Cloud

LTE and IMSI catcher myths

WiFi Direct and LTE D2D in Action

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Chapter 9 Monitoring System Performance

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

3GPP LTE Packet Data Convergence Protocol (PDCP) Sub Layer

LTE Perspective. Ericsson Inc. Sridhar vadlamudi LTE HEAD, India

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

LTE Overview October 6, 2011

Transcription:

A constraint optimization model for analysis of telecommunication protocol logs Olga Grinchtein Mats Carlsson Justin Pearson Ericsson AB SICS Uppsala University

Outline Overview of the approach Long Term Evolution (LTE) Radio Access Network A case study Public Warning System Constraint model Optimization Experimental results Conclusion 2

Overview The LTE Radio Base Station (enodeb) is SUT at our department at Ericsson. The enodeb communicates with the User Equipment (UE). The enodeb has different functions. Our case study is Public Warning System. 3

Overview Test harness should analyze User Equipment protocol logs. Protocol logs are sequences of messages with timestamps. Protocol log analysis includes checks that protocol log contains correct messages with correct timing and content. We use MiniZinc constraint solving system to directly model the protocol and to implement a test harness to analyze protocol log. The approach requires a script that reads the protocol log, creates arrays of MiniZinc variables, and assigns values to the variables according to the information provided in the log. 4

Minizinc Constraint specification language Solver independent Separation data from model Model consists of variable declarations and constraint definitions Scalar types (Booleans, integers, floats) and compound types (sets, arrays) Comparisons, arithmetic operations(+,,sum), logical operations (\/,/\, forall, exists), set operations, array operations 5

Protocol log 10 : 00 : 00.000 M1{} 10 : 00 : 00.080 M2{y = 80} 10 : 00 : 00.400 M3{z1 = 1; z2 = aaba} 10 : 00 : 00.720 M3{z1 = 2; z2 = abab} 10 : 00 : 01.040 M3{z1 = 4; z2 = aaaa} 10 : 00 : 01.450 M1{} 10 : 00 : 01.580 M2{y = 320} 10 : 00 : 01:600 M3{z1 = 1; z2 = aaba} 10 : 00 : 01:920 M3{z1 = 2; z2 = abab} 10 : 00 : 02:900 M1{} 10 : 00 : 03:120 M3{z1 = 1; z2 = aaba} 10 : 00 : 03:440 M3{z1 = 2; z2 = abab} Parameter of message M2 Parameters of message M3 M1Time = [0; 1450; 2900; 4350] M2Time = [80; 1580] M3Time = [400; 720; 1040; 1600; 1920; 3120; 3440] M2y = [1; 2] M3z1 = [1; 2; 4; 1; 2; 1; 2] M3z2 = [1; 2; 4; 1; 2; 1; 2] 10 : 00 : 04:350 M1{} 6

Example of constraint 10 : 00 : 00.000 M1{} 10 : 00 : 00.080 M2{y = 80} 10 : 00 : 00.400 M3{z1 = 1; z2 = aaba} 10 : 00 : 00.720 M3{z1 = 2; z2 = abab} 10 : 00 : 01.040 M3{z1 = 4; z2 = aaaa} 10 : 00 : 01.450 M1{} 10 : 00 : 01.580 M2{y = 320} 10 : 00 : 01:600 M3{z1 = 1; z2 = aaba} 10 : 00 : 01:920 M3{z1 = 2; z2 = abab} 10 : 00 : 02:900 M1{} 10 : 00 : 03:120 M3{z1 = 1; z2 = aaba} 10 : 00 : 03:440 M3{z1 = 2; z2 = abab} 10 : 00 : 04:350 M1{} The first message M1 the mobile phone reads with some delay, and we introduce decision variable delay, which is between 0 and 100 milliseconds. After a M1 message, which is transmitted within 1500 milliseconds, the M3 messages follow with z1 equal to 1,2, 3 and 4. After messages M1, which are transmitted after 1500 milliseconds, the messages M3 follow with z1 equal to 1 and 2. Boolean decision variable M3contentinc equal to 1 indicates an error in the log 7

Example of constraint 10 : 00 : 00.000 M1{} 10 : 00 : 00.080 M2{y = 80} 10 : 00 : 00.400 M3{z1 = 1; z2 = aaba} 10 : 00 : 00.720 M3{z1 = 2; z2 = abab} 10 : 00 : 01.040 M3{z1 = 4; z2 = aaaa} 10 : 00 : 01.450 M1{} 10 : 00 : 01.580 M2{y = 320} 10 : 00 : 01:600 M3{z1 = 1; z2 = aaba} 10 : 00 : 01:920 M3{z1 = 2; z2 = abab} 10 : 00 : 02:900 M1{} 10 : 00 : 03:120 M3{z1 = 1; z2 = aaba} 10 : 00 : 03:440 M3{z1 = 2; z2 = abab} 10 : 00 : 04:350 M1{} M3contentinc1 =1, since there is no message M3 with the parameter z1 = 3 between first and second messages M1. If delay = 20, then M1Time2 = 1450 < 1500-delay and M3contentinc2 = 1, since there are no messages M3 with z1 equal to 3 and 4 between second and third messages M1. 8

LTE Radio Base Station (enodeb) A LTE Radio Access Network consists of LTE Radio Base Stations (RBS), which support the LTE air interface and performs radio resource management. An enb connects to UE via the air interface. LTE RBSes are interconnected with each other by means of the X2 interfaces. LTE RBSes are also connected by means of the S1 interface to the Evolved Packet Core MME / S-GW MME / S-GW Mobility Management Entity (MME) S1 S1 Serving Gateway (S-GW) S1 S1 User Equipment (UE) enb X2 X2 X2 enb E-UTRAN 3GPP TS 36.300 enb UE 9

Public Warning System CBE CBC MME enodeb 0. Registration procedures 1. Emergency Broadcast Request 2. Write-Replace Warning Request 3. Write-Replace Warning Confirm 4. Emergency Broadcast Response 5. Write-Replace Warning Request UE 3GPP TS 23.041 Cell Broadcast Entity (CBE) Cell Broadcast Center (CBC) Mobility Management Entity (MME) User Equipment (UE) 6. Cell Broadcast delivery 6. Write-Replace Warning Response 8. Record success/failure of message delivery in trace record 7. User Alerting The enodeb sends different types of system information messages to UE SIB1 (schedulinginfolist) SIB10 (primary notification) SIB11 (secondary notification) Secondary notification can come in one or several segments 10

Public Warning System enodeb UE paging system information system information system information paging system information The enodeb sends different types of system information messages SIB1 (schedulinginfolist) SIB10 (primary notification) SIB11 (secondary notification) Secondary notification can come in one or several segments 11

Replacement of Warning messages MME->eNodeB enodeb->ue 12

Constraint model Model consists of constraints on timestamps and the content of paging, SIB1, SIB10 and SIB11 messages. We divided the Model into three submodels PagingModel checks that the log contains all required paging messages, and that the number and timestamps of paging messages are correct. SIB1Model checks that the log contains all required SIB1 messages, and that the scheduling information is correct. PrimSecModel checks that the log contains SIB10 messages with correct timestamps, content and identity numbers. It also checks that SIB11 messages have correct timestamps, content, segments and identity numbers. 13

Constraint model The model consists of constraints on arrays of timestamps and message content Decision variable that represents delay of first paging message. Array of decision variables of extra possible delay of warning requests Arrays of decision variables of correct timestamps of paging messages. Arrays of parameters which contain timestamps and content of messages from the log. Boolean decision variables indicate errors in the log Protocol log analysis is an optimization problem. We minimize sum of Boolean decision variables. 14

Parameters and decision variables Paging Paging SIB1 SIB10 SIB11 15

Delays of Warning Messages Variable delay can occur in acquiring of Warning Messages by enodeb We introduce arrays of decision variables delaypn50 and delaysn50 which represent extra delay of Warning Messages. We assume that delays are less than 50 milliseconds. We set values to extra delay delaypn50i by calculating distances between timestamps of SIB1, SIB10 and SIB11 messages and timestamp of ith Warning Message. 16

Constraint in the model We check that content of SIB1 message is correct. nsib1log, number of SIB1 messages nprim, number of primary notifications SIB1TimeLog, timestamp of SIB1 message in the log delaypn, delay of warning request SIB1TypeLog, content of SIB1 message in the log PagPN, decision variable, correct timestamp of paging message of primary notification delaypn50, decision variable, extra possible delay of warning request SIB1PrimeTypeinc, boolean decision variable 17

Partitioning of timestamps (Ɐ 1 i nwr)(ⱻ 1 j nsib10).φ nwr is number of Warning messages nsib10 is number of SIB10 messages in log timestamp SIB10TimeLog j occurs in φ F i min =min {1 j nsib10} {j WRTime i -1000<=SIB10TimeLog j <=WRTime i +1000} WRTime i is timestamp of ith Warning message (Ɐ 1 i nwr)(ⱻ F i min j F i max ).φ 18

Analysis of real logs We used model to analyze small real logs, found in internal archive. The size of logs is between 138KB and 578KB. The running time for the Model was a few seconds for each log. The objective was between 0 and 70. 19

Analysis of correct generated logs 20

Analysis of generated logs with injected errors 21

Conclusion The real log analysis took a few seconds. Analysis of large logs depended on number and type of errors. Constraint solver was able to handle big domains of parameters. Constraint solver can easily handle complex requirements on timestamps. Constraint programming can be used to analyze small logs if some parameter is unknown. Protocol log analysis with constraint programming can be a part of test automation and can be useful for functional testing as well as in regression testing. 22