Towards automated verification of autonomous networks: a case study in self-configuration
Towards automated verification of autonomous networks: a case study in self-configuration
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the correctness of self-configuration. As a case study, we describe the configuration of physical cell identifiers (PCIs), a radio configuration parameter in cellular base stations. We provide formal models of PCI assignment algorithms and their desired properties. We then demonstrate how the potential for conflicting PCI assignments can be detected using model checking and resolved in the design stage. Through this case study, we argue that both simulation and verification should be adopted and highlight the potential of runtime verification approaches in this space
978-1-4244-6605-4
582-587
Song, J.
e82ff981-9c67-4ff5-8971-cb518bd1b3db
Ma, Tiejun
1f591849-f17c-4209-9f42-e6587b499bae
Piezuch, P.
d56c9962-8d38-48dd-aa22-35123a550b1d
April 2010
Song, J.
e82ff981-9c67-4ff5-8971-cb518bd1b3db
Ma, Tiejun
1f591849-f17c-4209-9f42-e6587b499bae
Piezuch, P.
d56c9962-8d38-48dd-aa22-35123a550b1d
Song, J., Ma, Tiejun and Piezuch, P.
(2010)
Towards automated verification of autonomous networks: a case study in self-configuration.
8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany.
29 Mar - 02 Apr 2010.
.
(doi:10.1109/PERCOMW.2010.5470504).
Record type:
Conference or Workshop Item
(Paper)
Abstract
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the correctness of self-configuration. As a case study, we describe the configuration of physical cell identifiers (PCIs), a radio configuration parameter in cellular base stations. We provide formal models of PCI assignment algorithms and their desired properties. We then demonstrate how the potential for conflicting PCI assignments can be detected using model checking and resolved in the design stage. Through this case study, we argue that both simulation and verification should be adopted and highlight the potential of runtime verification approaches in this space
This record has no associated files available for download.
More information
Published date: April 2010
Venue - Dates:
8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany, 2010-03-29 - 2010-04-02
Organisations:
Southampton Business School
Identifiers
Local EPrints ID: 204609
URI: http://eprints.soton.ac.uk/id/eprint/204609
ISBN: 978-1-4244-6605-4
PURE UUID: 038eb375-114c-4bf7-ad47-acbcee909ea5
Catalogue record
Date deposited: 01 Dec 2011 11:01
Last modified: 14 Mar 2024 04:31
Export record
Altmetrics
Contributors
Author:
J. Song
Author:
P. Piezuch
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics