Int. J. Communications, Network and System Sciences, 2012, 5, 815-824
http://dx.doi.org/10.4236/ijcns.2012.512086 Published Online December 2012 (http://www.SciRP.org/journal/ijcns)
Modeling Components and Services of LTE Mobile
Communications System
Ishtiaq Ahmed Choudhry1, Nazir Ahmad Zafar2
1Department of Communication and Networking, King Faisal University, Al-Ahsa, KSA
2Department of Computer Science, King Faisal University, Al-Ahsa, KSA
Email: ichoudhry@kfu.edu.sa, nazafar@kfu.edu.sa
Received October 8, 2012; revised November 10, 2012; accepted November 18, 2012
ABSTRACT
The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Gen-
eration Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at
a very high speed along with lots of multimedia services. There are many issues that are yet to be solved due to dynamic
complex nature of wireless systems, multimedia software applications and software requirements. Poor service quality,
service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to
other Radio Access Networks (RAN) are some of the key issues for the current LTE systems that are addressed very
recently in the scientific literature. Formal method is one of the promising software engineering techniques that assure
quality and perfection in software system models. Formal methods use mathematical language to explicitly specify sys-
tem specifications and requirements that serve as initial grounds for further development and implementation. It effi-
ciently handles all component connections and resource management parameters using discrete structures. Z Schema
language is used to model static aspects of LTE communications system. All the schemas are being verified using
Z/Eves toolset. The aim is to provide sound mathematical foundation for system validation and verification that eventu-
ally results in a more reliable, scalable and complete software system.
Keywords: LTE Communications System; Formal Methods; Emerging Software; Mathematical Language; Z Notation
1. Introduction
Long Term Evolution (LTE), a wireless broadband tech-
nology, is designed to support roaming Internet use and
access via mobiles phones and other such handset de-
vices. LTE is also referred as fourth generation (4G)
technology and provides significant improvements over
previous cellular communication networks. LTE is the
latest wireless standard for International Mobile Tele-
communication (IMT) system which has been deployed
in many countries and few others are in pipeline for its
deployment. LTE can operate in different bandwidths
ranging from 1.4 MHz to 20 MHz and will provide a data
rate of 100 Mbps to 1 Gbps depending upon the mobility
of the user equipment. LTE—Advanced Release 10 is set
to provide higher bit rate (DL 3Gbps, UL 1.5 Gbps). The
IMT system is a complex one due to its different Radio
Access Networks (RAN) and protocols. International
Mobile Telecommunication systems allow users to ac-
cess services and information at any time and at any
place. However, these telecommunication systems pro-
vide mobility services with different requirements, re-
sources and constraints. For example, poor quality of
service, service interruptions due to mobility, seamless
handover, interruption time at handovers and downward
compatibility to other Radio Access Networks are some
of the common key issues that are addressed in the scien-
tific literature [1-7]. There are many other issues which
need to be addressed due to complexity and dynamic
nature of wireless systems, new information technology
infrastructure, multimedia applications and software re-
quirements.
LTE offers many real time multimedia applications by
integrating with the existing technologies. Although there
exists a lot of research in this area but still there is an
uncertainty and sufficient improvement are required in it
due to complexity and flexibility of the system. The
telecom industry is still discovering the system, network
approaches and optimization techniques with the support
and cooperation of academics and researches around the
globe. Because LTE will integrate many heterogeneous
networks and services, the seamless implementation for a
complete development of LTE communications system is
an open research problem.
Formal methods are mathematical techniques used to
model software systems. It enables us to write system
specification in such a way that it helps us understanding
C
opyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR
816
states of the system and its properties in a rigorous way.
Formal methods are effective abstraction technique for
managing complexity of large scale, dynamic and dis-
tributed systems. By use of formal methods, systems
requirements, specification and limitations are addressed
at early stages of systems and software development. In
this way, a thorough development processes leads to a
complete, consistent and robust model. The most impor-
tant benefit of using formal methods is that we can move
gradually from informal requirements to a detailed model
maintaining the system properties and constraints.
In the existing work [8], Milner extended the system
from Calculus of Communication System to pie-calculus
developing a dynamic communication model which can
be used to describe the mobility issues. In this work, mo-
bility is assumed as movement of links between the con-
nected components. Acharya et al., [9] have used formal
techniques to overcome the consistency issue at various
phases of development process in wireless mobile com-
munication networks. Formal models are applied in [10],
[11] using Z and object Z, however, few discrepancies
are identified and the systems are not addressed com-
pletely. Duke et al., [12] have presented several case
studies to illustrate application of formal methods. One
of his study regarding mobile phone system which keeps
track of several states of mobiles with limited number of
operations, is an interesting example. The same case
study is extended by Battaz in [13] to address the mobil-
ity issues explicitly using Z specification language. To
further extend the same system, Battaz has described
handover procedure among two objects in more details.
The requirements capturing and analysis of LTE system
is presented in [14]. In our paper, LTE is developed by
the 3G Partnership Group (3GPP) [15] and its specifica-
tions is laid out mainly focusing on model abstraction.
In this paper, formal specification of static structures
of the LTE system is presented using Z notation. First of
all, fundamental definitions used in the model are pre-
sented. Then formal specification of few important ser-
vices, phone book, messages and call record is described.
In the next, formal description of user equipment is given
based on the above definitions. Further, formal descrip-
tion of core components, namely, evolved Node B, Home
Subscriber Server, Serving Gateway and Mobility Man-
agement Entity is described. Finally, LTE system is pre-
sented after composition of the above structures. The
relationships among the components are defined for well-
definedness. An integration of the components is de-
scribed in terms of properties. The description of the
formal specification is provided by Z notation. The speci-
fication of the system is analyzed using Z/Eves toolset.
Rest of the paper is organized as: In Section 2, basic
model of the LTE communications system is introduced.
Formal model using Z notation is provided in Section 3.
Model analysis is presented in Section 4. Finally, conclu-
sions and future work are addressed in Section 5.
2. Long Term Evolution System
The previous cellular systems were unable to provide
connectivity to packet switched networks and hence were
not able to share services. The LTE has been designed to
provide seamless Internet Protocol (IP) connectivity be-
tween user equipment (UE) and the packet data network
(PDN), without any disruption to the applications run by
end user during mobility. While the term “LTE” encom-
passes the evolution of the Universal Mobile Telecom-
munications System (UMTS) radio access through the
Evolved UTRAN (E-UTRAN), it is accompanied by an
evolution of the non-radio aspects under the term “Sys-
tem Architecture Evolution” (SAE), which includes the
Evolved Packet Core (EPC) network. Together LTE and
SAE comprise the Evolved Packet System (EPS) [16].
The LTE architecture is composed of separate compo-
nents that includes UE (User Equipment), eNB (evolved
Node B—more commonly known as base station in
UMTS), SGW (Serving Gateway), MME (Mobility Ma-
nagement Entity), HSS (Home Subscriber Server), and
PDN-GW (Packet Data Network Gateway). We have
dedicated this section to define LTE components. After
defining the system and its functional components formal
description of the system will be provided.
2.1. Evolved Radio Access Network
The evolved RAN for LTE consists of a single node, i.e.,
the eNodeB (eNB) that interfaces with the user equip-
ment (UE). The architecture of all eNBs is called a flat
architecture. The eNB is responsible for all radio-related
functions. It offers Radio Resource Control (RRC) func-
tionality corresponding to the control plane. It performs
many functions including Radio Resource Management
(RRM), Admission Control (AC), radio mobility control,
scheduling and dynamic allocation of resources to UEs in
both uplink and downlink. Another function performed
by eNBs is header compression to ensure efficient use of
radio interface by compressing the IP packet headers that
could otherwise represent a significant overhead, espe-
cially for small packets such as VoIP. When UE and eNB
is connected, then all data sent over the radio interface is
encrypted.
On the network side, all of these functions reside in the
eNBs, each of which can be responsible for managing
multiple cells. Unlike some of the previous second- and
third-generation technologies, LTE integrates the radio
controller function into the eNB. This allows tight inter-
action between the different protocol layers of the radio
access network (RAN), thus reducing latency and im-
proving efficiency. Such distributed control eliminates
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR 817
the need for a high-availability, processing-intensive
controller, which in turn has the potential to reduce costs
and avoid “single points of failure.” Furthermore, as LTE
does not support soft handover there is no need for a
centralized data-combining function in the network [16].
2.2. Serving Gateway
All user data packets (IP packets) are transferred through
Serving Gateway, while also acting as the mobility an-
chor for the user plane during inter-eNB handovers. It
also serves as the mobility anchor for interworking with
other 3GPP technologies such as general packet radio
service (GPRS) and UMTS. For idle state of user equip-
ment, the serving gateway terminates the download link
data path and triggers paging when the data arrives for
the UE. It manages and stores UE contexts, e.g. parame-
ters of the IP bearer service, and network internal routing
information. It performs replication of the user traffic in
case of lawful interception. In addition, SGW performs
some administrative functions in the visited network such
as collecting information for charging (for example, the
volume of data sent to or received from user).
2.3. Mobility Management Entity
The MME is the key control-node for the LTE access-
network. MME is the control node that processes the
signaling between the UE and the Core Network (CN).
The protocols running between the UE and the CN are
known as the Non Access Stratum (NAS) protocols. It is
also responsible for idle mode UE tracking and paging
procedure including retransmissions. It is involved in the
carrier activation/deactivation process and is also respon-
sible for choosing the SGW for a UE at the initial attach
and at time of intra-LTE handover involving CN node
relocation. It is responsible for authenticating the user
(by interacting with the HSS). The Non-Access Stratum
(NAS) signaling terminates at the MME and it is also
responsible for generation and allocation of temporary
identities to UEs. It checks the authorization of the UE to
camp on the service termination point in the network for
ciphering/integrity protection for NAS signaling and
handles the security key management. Lawful intercep-
tion of signaling is also supported by the MME. The
MME also provides the control plane function for mobil-
ity between LTE and 2G/3G access networks with the S3
interface terminating at the MME from the SGSN. The
MME also terminates the S6a interface towards the home
HSS for roaming UEs.
2.4. Home Subscriber Server
The Home Subscribe Server is the main Internet Multi-
media Server IMS database which also acts as database
in evolved packet core EPC networks. The HSS is a su-
per HLR that combined legacy HLR and AUC (Authen-
tication Center) functions together for circuit switched
(CS) and packet switched (PS) domains. The AUC gen-
erates the vectors for authentication and security keys. In
the IMS architecture, the HSS connects to application
servers as well as the Call Session Control Function
(CSCF) using the DIAMETER protocol. HSS is the
master repository for subscriber profiles, device profiles,
and state information. As a mandatory control plane func-
tion in the LTE Evolved Packet Core (EPC), the HSS
manages subscriber identities, service profiles, authen-
tication, authorization, and quality of service (QoS) for
LTE and IP Multimedia Subsystem (IMS) networks. An
architecture of the LTE System, its components and rela-
tionship among the components is presented in the Fig-
ure 1 (reproduced from www.lte.org).
2.5. Packet Data Network Gateway
Another very important component is the PDN gateway.
The PDN Gateway is responsible for IP address alloca-
tion for the UE, as well as QoS enforcement and flow-
based charging according to rules from the PCRF (Policy
Control and Charging Rules Function). It is responsible
for the filtering of downlink user IP packets into the
different QoS-based carriers. This is performed based on
Traffic Flow Templates (TFTs). The P-GW performs
QoS enforcement for guaranteed bit rate (GBR) carriers.
It also serves as the mobility anchor for interworking
with non-3GPP technologies such as CDMA2000 and
WiMAX® networks. This component is partially model-
ed in this paper, however, a more completed function
will be modeled later.
From the above model it is clear that this system is
very much complex in terms of hardware equipment,
communication protocols, and multimedia applications.
3. Formal Specification
Formal specification of the LTE system is provided in
this section. Z is used for the formal specification and
Z/Eves tool is used for the model analysis. Schema is a
powerful structure in Z used for variables definitions,
components encapsulation and defining properties in
terms of invariants. In the formal model, first of all, fun-
damental definitions used in the LTE system are pre-
sented. In these definitions, phone book, messages and
call record facilities are considered for services descrip-
tion. Then major components namely user equipment,
eNB, HSS and SGW are defined. In the next section,
formal definition of an important component, MME is
described. Finally, LTE communications system is pre-
sented based on composition of the above structures.
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR
Copyright © 2012 SciRes. IJCNS
818
Figure 1. An architecture of LTE system.
3.1. Services main of function mobiles and person in range of mobiles,
it holds that type of mobile is MOBILE; 2) For each
equipment identifier in domain of function officials and
person in range of officials, the type of mobile is OFFI-
CIAL; 3) For each equipment identifier in domain of
function personals and person in range of the personals,
the type of mobile is described as PERSONAL.
Formal definition of phone book is described below by
using schema PhoneBook which consists of four compo-
nents, namely, mobiles, officials, personal and type. The
first three variables are defined as functions of type
equipment identifier to Person. The schema person con-
tains two variables, that is, name and address. The last
one variable in definition of PhoneBook is used to repre-
sent type of the phone number, i.e., home, official or
mobile. The schema consists of two parts in addition to
the name of the schema written in the first horizontal line.
Definitions of variables used are given in first part of the
schema and invariants are defined in the second part.
[String, EquipmentId]; PType ::=MOBILE | OFFICE | HOME
»_Person ________________________
Æname: seq String
Æaddress: seq String
–_____________________________
Formal definition of messages s described below by
using the schema Messages. The schema consists of four
components, inbox, sent, outbox and type. The variables
inbox, sent and outbox are defined as functions of type
equipment identifier to Message. The schema Message
consists of three variables, namely, equipment identifier,
data stored and sending or receiving time. The data sent
or received is defined as a sequence of strings. The
sending or receiving times are denoted by Time.
»_PhoneBook______________________
Æmobiles, officials, personals: EquipmentId f Person
Ætype: PType
«_______________
ÆAeid: EquipmentI d; person: Person|eid e dom mobiles
Æperson e ran mobiles
Æ • (eid, person) e mobiles type = MOBILE
ÆAeid: EquipmentId; person: Person
Æ | eid e dom officials person e ran officials
Æ • (eid, person) e officials type = OFFICE
ÆAeid: EquipmentId; person: Person
Æ | eid e dom personals person e ran personals
Æ • (eid, person) e personals type = HOME
–_____________________________
[Time]
»_Message________________________
Æueid: EquipmentId
Ædata: seq String
Ætime: Time
–_____________________________
MType ::=RECEIVED|DELIVERED|FAILED|DEFFERED
Invariants: 1) For each equipment identifier in do-
I. A. CHOUDHRY, N. A. ZAFAR 819
»_Messages _______________________
Æinbox, sent, outbox: EquipmentId f Message; type: MType
«_______________
ÆAeid: EquipmentId; message: Message | eid e dom inbox
Æmessage e ran inbox
Æ • (eid, message) e inbox type = RECEIVED
ÆAeid: EquipmentId; message: Message | eid e dom sent
Æmessage e ran sent
Æ • (eid, message) e sent type = DELIVERED
ÆAeid: EquipmentId; message: Message | eid e dom outbox
Æmessage e ran outbox
Æ • (eid, message) e outbox type = FAILED v type =
ÆDEFFERED
–_____________________________
Invariants: 1) For each equipment identifier in
domain of function inbox and message in range of the
inbox, it holds that status of message is RECEIVED; 2)
For each equipment identifier in domain of function sent
and message in range of the sent, the status of message is
DELIVERED; 3) For each equipment identifier in do-
main of function outbox and message in range of outbox
the status of the message is represented as DEFFERED.
Formal specification of calls record is described by the
schema CallsRecord which consists of outgoing, incom-
ing, missed and type. The first three variables are de-
scribed by the functions of type equipment identifier to
Call. The schema Call consists of two variables, that is,
equipment identifier and sending or receiving time.
»_CallsRecord______________________
Æoutgoing: EquipmentId f Call
Æincoming: EquipmentId f Call
Æmissed: EquipmentId f Call
Ætype: CType
«_______________
ÆAeid: EquipmentId; call: Call | eid e dom outgoing call e
Æran outgoing
Æ • (eid, call) e outgoing type = OUTGOING
ÆAeid: EquipmentId; call: Call | eid e dom incoming call e
Æran incoming
Æ • (eid, call) e incoming type = INCOMING
ÆAeid: EquipmentId; call: Call | eid e dom missed call e
Æran missed • (eid, call) e missed type = MISSED
–_____________________________
»_Call _________________________
Æueid: EquipmentId
Ætime: Time
–_____________________________
CType ::= INCOMING | OUTGOING | MISSED
Invariants: 1) For each equipment identifier in do-
main and call in range of the outgoing function, it is sat-
isfied that status of the call is OUTGOING; 2) For each
equipment identifier in domain and call in range of the
incoming, it is satisfied that status of the call is IN-
COMING; 3) For each equipment identifier in domain
and call in range of the missed function, the property
holds that status of the call is MISSED.
3.2. LTE Components
The formal description of User equipment, eNB, HSS
and SGW are presented here. User equipment is a device
used directly by an end-user to communicate with other
connected users. It can be a telephone, laptop or any
other such device connected to the base station. The user
equipment is defined by the schema UserEquipment
given below. The equipment identifier is denoted by the
EquipmentId. The equipment has three states that is ac-
tive, idle or detached. The Phone Book, Messages and
Call Record schemas are called to define the user equip-
ment. The equipment has information about its position
which is defined in terms of latitude and longitude. Each
variable has two parts that is an integral and fractional.
The user equipment contains information about its state,
i.e., active, idle or detached. Further, it contains sim
identifier and key. The equipment has other two variables
called control and voice frequencies. The value of fre-
quency will be either allocated or null. In predicate part
of the schema, it is described that control frequency has
allocated status if and only if the equipment status is ac-
tive or idle. The control frequency is null if and only if
the equipment is detached.
 Limit: N
»_Position ________________________
Ænorth, nfrac: N; west, wfrac: N
«_______________
Æ0 ¯ north north ¯ 180 0 ¯ west west ¯ 360
Æ0 ¯ nfrac nfrac ¯ Limit 0 ¯ wfrac wfrac ¯ Limit
–_____________________________
[SimKey, SimId, Frequency]
UEState ::= ACTIVE | IDLE | DETACHED
FStatus ::= NULL | ALLOCATED
»_UserEquipment____________________
Æueid: EquipmentId; PhoneBook
Æmessages: Messages; calls: CallsRecord
Æposition: Position; uestate: UEState
Æsimid: SimId; simkey: SimKey
Æcfstatus, vfstatus: FStatus; cfreq, vfreq: Frequency
«_______________
Æcfstatus = ALLOCATED ¤ uestate e {IDLE, ACTIVE}
Æcfstatus = NULL ¤ uestate = DETACHED
–_____________________________
An evolved Node B is the radio access part of LTE
which contains at least one radio transmitter, receiver and
control section. The receiver contain resource manage-
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR
820
ment and logic control functions. The evolved Node B is
denoted by the schema eNB given below. The schema
consists of seven components. The first one node is iden-
tifier denoted by NodeId. The next three components are
frequencies, namely, total set of frequencies, control and
voice frequencies. The next component is a set of
equipment connected to the evolved Node B. Finally,
two functions for control frequencies and voice frequen-
cies are described from a set of frequency to equipment
identifier. The node identifier is of type Node.
[Node]
»_eNB_________________________
Æenb: Node; uequipments: F UserEquipment
Æfrequencies; cfrequencies ;vfrequencies: F Frequency
Æcalloc; valloc: Frequency f EquipmentId
«_______________
Æcfrequencies Î 0 vfrequencies Î 0
Æcfrequencies I vfrequencies = 0
Æfrequencies = cfrequencies U vfrequencies
ÆAue: UserEquipment | uequipments Î 0
Æ ue e uequipments ue . cfreq e cfrequencies ue .
Ævfreq e vfrequencies
ÆAf1, f2: Frequency; ei: EquipmentId | (f1, ei) e calloc (f2,
Æei) e calloc f1 = f2
ÆAf1, f2: Frequency; ei: EquipmentId | (f1, ei) e valloc (f2,
Æei) e valloc f1 = f2
ÆAfr: Frequency | fr e dom calloc fr e cfrequencies
ÆAfr: Frequency | fr e dom valloc fr e vfrequencies
ÆAue1: EquipmentId | ue1 e ran calloc
Æ • Eue2: UserEquipment | ue2 e uequipments ue1 = ue2
Æ. ueid
ÆAue1: EquipmentId | ue1 e ran calloc
Æ • Eue2: UserEquipment | ue2 e uequipments ue1 = ue2
Æ. ueid
–____________________________
Invariants: 1) Control and voice frequencies are non-
empty; 2) Intersection of control and voice frequencies is
an empty set; 3) The union of control and voice frequen-
cies is equal to set of total frequencies; 4) The control
and voice frequencies of each equipment connected to
evolved node are in the set of total frequencies in the
node; 5) The control frequency is a one to one function; 6)
The voice frequency is a one to one function that is a
voice frequency can be assigned to only one equipment;
7) The control frequency in the domain of frequency al-
location function to each user equipment, is in the set of
control frequencies of evolved node; 8) The voice fre-
quency in the domain of frequency allocation function to
each user equipment, is in the set of voice frequencies of
evolved node; 9) The range of control frequency is subset
of set of equipments of evolved node; 10) The range of
voice frequency function is sub-set of set of equipments
of evolved node.
The HSS manages subscription related information
and supports the network control layer. It consists of
various components some of the important information is
given below in schema HSS. The first one component is
its identifier. The second one is access having value
granted or not denied. The next three components are for
storing record about sim identifiers, sim keys and equip-
ment identifiers. The relationship between sim identifiers
with keys and equipment are also defined. Home location
and visitor location registers are represented by hlrs and
vlrs respectively which are power set of location register
(LR). Three types of networks, GERAN, UTRAN and
2G/3G, are considered in the schema. The sim is de-
scribed by the schema sim which consists of sim key,
sim’s owner, balance to call, render and other informa-
tion. The last one component is added because this sche-
ma can be extended in our future work to have more in-
formation needed for the definition of sim.
[Render]
»_Sim__________________________
Æsimkey: SimKey; owner: seq String
Æbalance: N; render: Render; otherinfo: seq String
–_____________________________
[LR, HId]; Access ::= GRANTED | DENIED
RAN ::= GERAN | UTRAN | G23 ; BalLimit: N
»_HSS__________________________
Æhid: Hid ; access: Access; sims: SimId f Sim
Æsrecord: SimId f EquipmentId; simkeys: F SimKey
Æhlrs, vlrs: F LR ; networktype: RAN
«_______________
ÆAsid: SimId; sim: Sim | sid e dom sims sim e ran sims
Æ(sid, sim) e sims
Æ sim . balance ˘ BalLimit access = GRANTED
ÆAsid: SimId; sim: Sim | sid e dom sims sim e ran sims
Æ(sid, sim) e sims sim . balance < BalLimit access =
ÆDENIED
ÆAsid: SimId | sid e dom sims sid e dom srecord
ÆAsid: SimId | sid e dom srecord sid e dom sims
ÆAsid: SimId; sim: Sim | sid e dom sims sim e ran sims
Æ(sid, sim) e sims sim . simkey e simkeys
ÆAlr: LR lr e hlrs lr vlrs lr e vlrs lr hlrs
–_____________________________
Invariants: 1) Each sim identifier in the HSS is in the
domain of sims function. If the sim balance is more than
the minimum limit than permission for call is guaranteed;
2) If the sim balance is less than the minimum required
limit then permission for call is not guaranteed; 3) Each
sim in the domain of sim function is in the domain of
sim-equipment function; 4) Each sim in the domain of
sim-equipment function is in the domain of sims function;
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR 821
5) Each sim key in the sim record function is in the HSS;
6) The intersection of sets, home location and visitors
location registers, is empty.
The primary functionality of Serving Gateway (SGW)
is to manage user mobility and act as a segregation point
between the radio access network and the other core
networks. The SGW maintains data movement between
evolved nodes and the PDN Gateway. In a functional
point of view, SGW is a termination point of the packet
data network interface. Considering functionality of SGW,
formal specification of SGW is given below by using the
schema SGW. The schema consists of four components,
namely, identifier, internet protocol, data and networks.
The data is defined as a basic set type. The radio access
network types are same as defined above in the definition
of HSS schema. In the predicate part of the schema, it is
stated that the data packet is sent towards a network
based on the request of sender.
[Data]; IP ::= IP 1 | IP2 | IP3
»_SGW_________________________
Æsgw: seq N; iprotocol: IP; data: Data; network : RAN
«_______________
Æiprotocol = IP1 network = GERAN
Æiprotocol = IP2 network = UTRAN
Æiprotocol = IP3 network = G23
–_____________________________
The Mobility Management Entity (MME) is the key
control node for the Long Term Evolution network. The
primary functionality of MME is monitoring tracking and
paging procedure for idle mode user equipment. It is in-
volved in activation and deactivation processes and is
responsible for choosing the SGW for user equipment at
the initial process. It is responsible for security issues
including authentication of the user by interacting with
the HSS. It verifies authorization of user equipment to
site on the service provider and enforces the equipment
roaming restrictions. Furthermore, the MME provides the
control function for mobility between Long Term Evolu-
tion and other access networks.
Formal specification of Mobility Management Entity
is given below using the schema MME. The schema con-
sists of five components, namely, evolved nodes, home
subscriber servers, serving gateways, verification and
request. The formal definitions of the components are
already given in terms of schemas. In MME schema,
evolved nodes, home subscriber servers and serving gate-
ways are assumed as power sets. Similar to above, all
sets are assumed as finite collections of the components.
Request has two values either success or failure. Simi-
larly verification is either done or rejected.
Request ::= SUCCESS | FAILURE
Verification ::= VERIFIED | REJECTED
»_MME_________________________
Æenbs: F eNB; hsss: F HSS; sgws: F SGW
Æverification: Verification; request: Request
«_______________
ÆAenb: eNB | enb e enbs
Æ • Aue: UserEquipment | ue e enb . uequipments
Æ • Ehss: HSS | hss e hsss
Æ • Esid: SimId; uei: EquipmentId | (sid, uei) e hss . srecord
Æ ue . ueid = uei ue . simid = sid
ÆAenb: eNB | enb e enbs
Æ • Aue: UserEquipment | ue e enb . uequipments
Æ • Ehss: HSS | hss e hsss
Æ • Esk: SimKey | sk e hss . simkeys ue . simkey = sk
ÆAenb: eNB | enb e enbs
Æ • Aue: UserEquipment | ue e enb . uequipments
Æ verification = VERIFIED request = SUCCESS
ÆAenb: eNB | enb e enbs
Æ • Aue: UserEquipment | ue e enb . uequipments
Æ verification = REJECTED request = FAILURE
–_____________________________
Invariants: 1) For each evolved node and for each
user equipment in the node there exists home subscriber
server which contains the sim identifier of the equipment;
2) For an evolved node and for each equipment in the
node there exists home subscriber server containing sim
identifier of the equipment; 3) For each user equipment,
if identity is verified, it is successful; 4) For an equip-
ment, if the identity is not verified then it is a failure.
Finally, formal specification of LTE is given below
using LTE schema which consists of five components,
namely, set of evolved nodes, set of home subscriber
servers, set of serving gateways, set of mobile manage-
ment entities and network. The components definitions
are given in first part and invariants are defined in the
second part of the schema.
»_LTE__________________________
ÆeNBS: F eNB; hSSS: F HSS
ÆsGWS: F SGW ; mMES: F MME ; networks: RAN
«_______________
ÆAmm: MME | mm e mMES • Aenb: eNB | enb e mm . enbs
Æ• enb e eNBS
ÆAmm: MME | mm e mMES • Ahs: HSS | hs e mm . hsss
Æ• hs e hSSS
ÆAmm: MME | mm e mMES • Asg: SGW | sg e mm . sgws
Æ• sg e sGWS
–_____________________________
Invariants: 1) For each mobile management entity
and for every evolved node, the node is in the LTE sys-
tem; 2) For each mobile management entity and for every
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR
Copyright © 2012 SciRes. IJCNS
822
There exist various tools for analyzing Z specification,
Z/Eves is one of the powerful tools used in this research
for analyzing the formal specification of long term evo-
lution communications system. A snapshot of the part of
the specification analysis is provided in Figure 2. First
column on the left of the figure shows status of the syn-
tax checking and the second column represents the proof
correctness of the specification. The symbol “Y” stands
that specification is correct syntactically and proof is also
correct. The symbol “N” is used that errors exist which
needs to be fixed by further analysis. Formal specifica-
tion of our systems is fully analyzed to be correct and
hence “N” does not appear in the figure. All the schemas
are checked to be correct in syntax and has a correct
proof.
home subscriber server, the server is in the LTE system;
3) For each mobile management entity and for every
serving gateway, the gateway is in the LTE system.
4. Model Analysis
Formal analysis of the specification is provided here in
this section. Since there does not exist any computer tool
which may assure about complete correctness of a formal
model, therefore, even the specification is well-written, it
may contain potential errors. Hence, an art of writing
specification does not provide guarantee about correct-
ness of a system. However, if the specification is analyz-
ed and validated with the rigorous computer tools, it
certainly improves confidence by identifying errors if
exists. Summary of the results is presented in Table 1 given
Figure 2. Model analysis using Z/Eves tool.
Table 1. Results of model analysis.
Schema Name Syntax Type Check Domain Check Reduction Proof
Person Y Y NA Y
PhoneBook Y Y NA Y
Message Y Y NA Y
Messages Y Y NA Y
Call Y Y NA Y
CallsRecord Y Y NA Y
Position Y Y NA Y
UserEquipment Y Y NA Y
eNB Y Y NA Y
Sim Y Y NA Y
HSS Y Y NA Y
SGW Y Y NA Y
MME Y Y NA Y
LTE Y Y NA Y
I. A. CHOUDHRY, N. A. ZAFAR 823
below. Name of the schema is given in first column of
the table. The symbol “Y” in second column indicates
that all schemas are proved automatically. Similarly,
domain checking, reduction and proof by reduction are
represented in columns 3, 4 & 5 respectively. The “NA”
in column four is used that reduction was not required on
the predicates and, hence, the formal specification is well-
written and meaningful.
5. Conclusions and Future Work
Modeling of complex systems has become a challenging
task due to specifications and integration of their com-
ponents. The Long Term Evolution (LTE) is a complex
mobile communications system providing real time mul-
timedia applications. Literature review reveals that some
research work on addressing various issues of this system
has been considered, however, LTE needs much more
research contributions for its modeling, specifications,
optimization and maintenance due to its complexity and
distributed nature [17,18]. The telecom industry with the
support of academia is discovering networks modeling
and integration techniques for the systems and their im-
plementation. Since LTE will integrate many heteroge-
neous networks and services, the seamless implementa-
tion for a complete development of LTE communications
system is an open research problem [19-22]. In this paper,
formal methods [23] in terms of Z notation are applied
for modeling, specification and analysis of the LTE sys-
tem. It is observed that the use of Z notation was effect-
tive to model and verify properties of the system because
of its abstraction and expressive power. Further, the Z
notation has a rigorous computer tool support addressing
complexity of the system. At first, formal specification of
services including messages and call record was provided.
Then description of LTE components was presented. In
the next section, formal description of the LTE system
was described after composition of the schemas describ-
ing services and LTE components. Formal specification
is analyzed using Z/Eves toolset. Based on our experi-
ence, it is observed that Z notation was useful at re-
quirements analysis for further modeling and develop-
ment of the system. The Z/Eves toolset facilitated and
boosted our confidence for a complete and consistent des-
cription of the LTE model.
The preliminary results of this research were presented
in [24] where LTE system was described at higher level
of abstraction. In this paper, a detailed model is presented
for addressing various issues including services, compo-
nents and interaction protocols at software level of the
LTE system. The other challenges, for example, quality
of service, security issues and optimization techniques in
this heterogeneous environment will be addressed in our
future work.
REFERENCES
[1] D. Singhal, M. Kunapareddy, V. Chetlapalli, V. B. James
and N. Akhtar, “LTE-Advanced: Handover Interruption
Time Analysis for IMT-A Evaluation,” Proceedings of
International Conference on Signal Processing, Commu-
nication, Computing and Networking Technologies, Thuc-
kafay, 21-22 July 2011, pp. 81-85.
doi:10.1109/ICSCCN.2011.6024519
[2] Z. Bai, C. Spiegel, G. H. Bruck, P. Jung, M. Horvat, J.
Berkmann, C. Drewes and B. Gunzelmann, “System Per-
formance of UTRA LTE and LTE-Advanced,” Inter-
national Conference on Communications, Computing and
Control Applications (CCCA), Hammamet, 3-5 March
2011, pp. 1-5.
[3] Y. Wang, K. I. Pedersen, P. E. Mogensen and T. B. Søren-
sen, “Resource Allocation Considerations for Multi-Carrier
LTE-Advanced Systems Operating in Backward Com-
patible Mode,” IEEE 20th International Symposium on
Personal, Indoor, and Mobile Radio Communications,
Tokyo, 13-16 September 2009, pp. 370-374.
[4] N. A. Zafar, U. Tajammul and N. Sabir, “Formal Speci-
fication of Call Setup Procedure of UMTS
Communications System,” Proceedings of International
Conference on Communication Software and Networks
(ICCSN09), Macau, 27-28 February 2009.
[5] N. A. Zafar and U. Tajammul, “Handover Based Formal
Dynamic Model of UMTS Communication System,” Pro-
ceedings of 4th International Computer Engineering
Conference, Cairo, 29-30 December 2008, pp. 1-6.
[6] S. Tariq and N. A. Zafar, “Modeling of Wireless Mobile
Communication System Using Z Notation,” Proceedings
of the 1st International Conference on Computer, Control
and Communication (IC4), Karachi, 12-13 November
2007.
[7] S. Ahmed, A. K. Ramani and N. A. Zafar, “Formal Ana-
lysis of Mobility Management for Ad Hoc Networks,”
Proceedings of the International Conference on Wireless
Networks (ICWN’11), Las Vegas, 18-21 July 2011, pp.
173-179.
[8] R. Milner, “Communicating and Mobile Systems: The π-
Calculus,” Cambridge University Press, Cambridge, 1999.
[9] S. Acharya, C. George and H. Mohanty, “Domain Con-
sistency in Requirements Specification,” Proceedings of
the 5th International Conference on Quality Software,
Melbourne, 19-20 September 2005, pp. 231-238.
doi:10.1109/QSIC.2005.24
[10] K. Taguchi and J. S. Dong, “An Overview of Mobile
Object-Z,” Springer-Verlag, New York, 2002, pp. 144-
155.
[11] M. Bettaz and M. Maouche, “Towards Mobile Z Sche-
mas,” International Journal of Computer Science and
Application, Vol. 11, No. 11, 2005, pp. 101-117.
[12] R. Duke, P. King, G. Rose and G. Smith, “The Object-Z
Specification Language,” University of Queensland, Bris-
bane, 1991.
[13] M. Bettaz and M. Maouche, “Mobile Z Notation,” Re-
search Report, Philadelphia University, Philadelphia,
2002.
Copyright © 2012 SciRes. IJCNS
I. A. CHOUDHRY, N. A. ZAFAR
824
[14] 3GPP TR 25.913, “Requirements for Evolved UTRA and
Evolved UTRAN,” V7.3.0 2006.
[15] 3GPP TS 23.401, “GPRS Enhancements on EUTRAN
Access,” 2007. http://www.3gpp.org
[16] Alcatel Lucent, “The LTE Network Architecture—A Com-
prehensive Tutorial,” 2009. www.alcatel-lucent.com
[17] M. M. A. Airchinnigh and M. Butler, “Service Speci-
fication Using Z,” Technical Report, University of South-
ampton, Southampton, 1993.
http://eprints.soton.ac.uk/253693
[18] R. Cam and S. Vuong, “A Formal Specification in LOTOS,
of a Simplified Cellular Mobile Communication System,”
Formal Description Techniques-II (FORTE’89), North-
Holland Publishing Co., Amsterdam, 1990, pp. 485-499.
[19] L. Chen, et al., “System Level Simulation Methodology
and Platform for Mobile Cellular Systems,” IEEE Com-
munication Magazine, Vol. 49, No. 7, pp. 148-155.
2011.
[20] K. Doppler, “Device-To-Device Communication as an
Underlay to LTE Advanced Networks,” IEEE Commu-
nication Magazine, Vol. 47, No. 12, pp. 42-49.
[21] Y. Sun, “Editorial Advanced Signal Processing for Wire-
less and Mobile Communications,” IET Signal
Processing, Vol. 3, No. 6, 2009, pp. 431-432.
109.
[22] J. M. Wing, “A Specifier’s Introduction to Formal Me-
thods,” IEEE Computer, Vol. 23, No. 9, 1990, pp. 8-24.
[23] H. Luo, et al., “Quality Driven Cross Layer Optimized
Video Delivery over LTE,” IEEE Communication
Magazine, Vol. 48, No. 2, 2010, pp. 102-
[24] I. A. Choudhry, N. A. Zafar and M. Zahrani, “Validating
Statistics of Long Term Evolution Mobile Communi-
cations System,” Proceedings of the 2012 International
Conference on Modeling, Simulation and Visualization
Methods, Las Vegas, 16-19 July 2012, pp. 201-206.
Copyright © 2012 SciRes. IJCNS