Protocol Verification for Cellular Networks Chunyi Peng The Ohio State University.

Slides:



Advertisements
Similar presentations
Fundamental Issues of Future Internet Introduction, Design Goals and Principles Mingwei Xu Qingdao.
Advertisements

Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Control-Plane Protocol Interactions in Cellular Networks
Ch. 7. Architecture Standardization for WoT
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
Arsitektur Jaringan Terkini
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
CS541 Advanced Networking 1 Wireless Mesh Networks Neil Tang 1/26/2009.
Wireless Networks.
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
Wireless Internet Center for Advanced Technology NSF Industry/University Cooperative Research Center Challenges and Impact of User-provided Networking.
11 Automating Cross-Layer Diagnosis of Enterprise Wireless Networks Yu-Chung Cheng Mikhail Afanasyev Patrick Verkaik Jennifer Chiang Alex C. Snoeren.
09/09/ NGN implementation aspects on the developing market in Poland IP/Optical Workshop Chitose, 9-11 July 2002 Telekomunikacja Polska Jacek Olejnik.
Software-Defined Networks Jennifer Rexford Princeton University.
NSF Workshop on Bridging the Gap between Networking and Physical Layer Research Breakout Group #2 Reston, VA Aug 27-28, 2007.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
University of Michigan, T-Mobile US Inc.†1
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Annual meeting of GTTI - June 24-26, Ancona, Italy The STEM-Net Project A network element is called a “STEM-Node” when it is able to autonomously.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
IPv6 transition strategies IPv6 forum OSAKA 12/19/2000 1/29.
CDIX: The Devils in the Details Les Owens – Horizontal Fusion Management Team NDIA Conference – Denver 24 March 2004.
Towards Exascale File I/O Yutaka Ishikawa University of Tokyo, Japan 2009/05/21.
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Software Deployment and Mobility. Introduction Deployment is the placing of software on the hardware where it is supposed to run. Redeployment / migration.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Improving TCP Performance over Wireless Networks
Task-Force 1 Softwarization of Networks ICT COST Action IC1304 Autonomous Control for a Reliable Internet of Services (ACROSS)
Basics of testing mobile apps
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
ProtoRINA over ProtoGENI What is RINA? [1][2] References [1] John Day. “Patterns in Network Architecture: A Return to Fundamentals”. Prentice Hall, 2008.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Networking Components
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: September,
Group #3: Mobility Models and Mobile Testbeds. The Models Motion, Traffic, Network.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
A Brief history of the Internet Name:Ziyun Wang. Introduction Internet history revolves around four distinct aspects. 1. the technological evolution that.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Project ICTanzania 2006 Team 5 Saad Riaz | Zach Isamuyo | Nsubis Genesis | Mikael Corp.
A PRESENTATION ON VOCATIONAL TRAINING IN BSNL. 2 3-Jul-16 GSM (Global System For Mobile Communication) The Global System for Mobile communications (GSM:
MobileInsight: Extracting and Analyzing Cellular Network Information on Smartphones Yuanjie Li, Chunyi Peng, Zengwen Yuan, Jiayao Li, Haotian Deng, Tao.
MOBILE COMMUNICATION SYSTEM
Networking & Communications Prof. Javad Ghaderi
EA C451 Vishal Gupta.
Muhammad Taqi Raza, Fatima Muhammad Anwar and Songwu Lu
Mobile Computing.
Course Project Topics for CSE5469
Course Project Topics for CSE5469
Presentation transcript:

Protocol Verification for Cellular Networks Chunyi Peng The Ohio State University

2 2 Protocol Verification is Gaining Momentum  Protocol verification for the Internet  Since 1990s  Single protocol with implementation  E.g., [Cohrs’89, SIGCOMM], [ Holzmann’91], [Smith’96], TCP [NSDI’04], Routing[SIGCOMM’05], …  Emerging techniques for network verification  E.g., Anteater [SIGCOMM’11], Head Space Analysis[NSDI’12], NICE [NSDI’12], Alloy[SIGCOMM’13], NetCheck[NSDI’14], Software Dataplane [NSDI’14] …  Largely unexplored territory in cellular networks  Few efforts, e.g., 2G handoff [Orava’92], Authentication [Tang’13] 2

Case for PV in Cellular Networks Historically, cellular network protocols did not go through rigorous screening by the research community  Cellular Protocol Characteristics  Technical Challenges  Key Research Aspects 3

Many Protocols for Cellular Networks Radio Resource Control (RRC) Mobility Management (MM) Connectivity Management (CM) 4 Control-plane protocols as an example  Layered protocol stack

Many Protocols for Cellular Networks Radio Resource Control (RRC) Mobility Management (MM) Connectivity Management (CM) 5 Radio Resource Control (RRC) CS Domain MM CM PS Domain MM CM Control-plane protocols as an example  Layered protocol stack  Spanning both CS and PS domains

Many Protocols for Cellular Networks 6 Radio Resource Control (RRC) CS Domain MM CM PS Domain MM CM PS Domain MM CM RRC 4G 3G Control-plane protocols as an example  Layered protocol stack  Spanning both CS and PS domains  Operating in hybrid 3G/4G deployment

Complex Protocol Operations  Protocols work together to offer vital 3G/4G utilities  Rich patterns along three dimensions 7 Radio Resource Control MM CM PS Domain MM CM PS Domain MM CM RRC CS Domain 3G4G cross-layer cross-domaincross-system

Challenge #1: Partial Access to Protocol Operations  Distributed protocol operations at both  Cellular infrastructure (base stations, MME, gateways, etc.)  Mobile devices  Partial access  Pretty “closed” core infrastructure  More efforts needed on the mobile device side 8 8 Closed Core Network

Challenge #2: Design & Operation  Verification problems stem from both  Design specifications  Operations  Implementations  Common-case vs Worst-case  No well-defined common cases Lack of wireless net benchmarks  Norm rather than exceptions Temporal-Spatial dynamics: Mobility, dynamic radio links 99

Challenge #3: Intra- and Inter-PV Protocol Verification  Intra-protocol operations  Inter-protocol interactions 10 Radio Resource Control MM CM PS Domain MM CM PS Domain MM CM RRC CS Domain 3G4G cross-layer cross-domaincross-system

Rich Protocol Interactions  Complex interactions in common scenarios  Inevitable interplay between radio, mobility, data/voice  Concurrent voice and data use  3G/4G switch due to hybrid deployment, mobility, voice  Two causes of problematic interactions  Design defects  Operation/Implementation slips 11 Diagnosis over one layer/domain/system is insufficient Diagnosis over one layer/domain/system is insufficient Single-type test fails to unveil both issues

Research Topics Many Topics remain:  New PV Methodology for Cellular Networks  (in)Validation of Results  Software Tools for Automated Verification  Verification for “Results from Protocol Verification Research”  Needs community testbed and data archive We are still at starting stage of PV research 12