Detecting problematic control-plane protocol interactions in mobile networks

Guan Hua Tu, Yuanjie Li, Chunyi Peng, Chi-Yu Li, Songwu Lu

Research output: Contribution to journalArticle

2 Scopus citations

Abstract

The control-plane protocols in 3G/4G mobile networks communicate with each other, and provide a rich set of control functions, such as radio resource control, mobility support, connectivity management, to name a few. Despite their significance, the problem of verifying protocol correctness remains largely unaddressed. In this paper, we examine control-plane protocol interactions in mobile networks. We propose CNetVerifier, a two-phase signaling diagnosis tool to detect problematic interactions in both design and practice. CNetVerifier first performs protocol screening based on 3GPP standards via domain-specific model checking, and then conducts phone-based empirical validation in operational 3G/4G networks. With CNetVerifier, we have uncovered seven types of troublesome interactions, along three dimensions of cross (protocol) layers, cross (circuit-switched and packet-switched) domains, and cross (3G and 4G) systems. Some are caused by necessary yet problematic cooperation (i.e., protocol interactions are needed but they misbehave), whereas others are due to independent yet unnecessary coupled operations (i.e., protocols interactions are not required but actually coupled). These instances span both design defects in 3GPP standards and operational slips by carriers and vendors. They all result in performance penalties or functional incorrectness. We deduce root causes, present empirical results, propose solutions, and summarize learned lessons.

Original languageEnglish
Article number7060732
Pages (from-to)1209-1222
Number of pages14
JournalIEEE/ACM Transactions on Networking
Volume24
Issue number2
DOIs
StatePublished - 1 Apr 2016

Keywords

  • Control-plane
  • mobile networks
  • protocol verification

Fingerprint Dive into the research topics of 'Detecting problematic control-plane protocol interactions in mobile networks'. Together they form a unique fingerprint.

Cite this