Skip to main content
Log in

Risk assessment methodology for network integrity

  • Published:
BT Technology Journal

Abstract

Modern, high functionality networks support an ever-increasing range of sophisticated services; but this strength is also a weakness due to the fragility of the complex distributed-processing capability. Unexpected perturbations can cause widespread network outages, i.e. ‘brownout‘. The risks to network integrity are exacerbated by regulatory policies that demand open network interconnection between competing network operators and service providers; and the increasing complexity where single experts cannot comprehend the whole problem space. This paper proposes a design methodology for a formal and systematic framework to assess the risk to network integrity and hence minimise network and service failure probability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Manterfield R J: ‘Common-channel signalling’, London, UK, Peter Peregrinus Ltd (1991).

    Google Scholar 

  2. ITU Recommendation Q.1211: ‘Introduction to intelligent network capability set 1’, Geneva (revised version approved in May 1995). (March 1992).

  3. ITU Draft Recommendation Q.1221: ‘Introduction to intelligent network capability set 2’, Berlin (November 1995).

  4. Cameron E J, Griffeth N, Lin Y J, Nilson M E, Schnure W K and Velthuijsen H: ‘A feature interaction benchmark for IN and beyond’, IEEE Communications Mag, 31,No 3, pp 64–69 (1993).

    Google Scholar 

  5. Brothers L R, Cameron E J, Lin Y J, Wilson M E and Silverstein E: ‘Feature interaction detection’, IEEE International Conference in Communications, 3, pp 1553–1557 (1993).

    Google Scholar 

  6. Cameron E J and Velthuijsen H: ‘Feature interactions in telecommunications systems’, IEEE Communications Mag, pp 18–23 (August 1993).

  7. McConnell V K, Nilson M E and Silverstein E E: ‘Feature interaction analysis in the advanced intelligent network: a telephone company perspective’, IEEE International Conference in Communications, 3, pp 1548–1552 (1993).

    Google Scholar 

  8. Kelly B, Crowther M and King J: ‘Feature interaction detection using SDL models’, IEEE Global Telecommunications Conference, 3, pp 1857–1861 (1994).

    Google Scholar 

  9. Mierop J, Tax S and Janmaat R: ‘Service interaction in an object-oriented environment’, IEEE Communications Mag, pp 46–51 (August 1993).

  10. Ward K et al: ‘Final report of a study entitled network integrity in an Open Network Provision (ONP) environment for the commission of the European Union’, University College London (November 1994).

  11. Ward K: ‘Impact of network interconnection on network integirty’, British Telecommunications Eng J, 13, pp 296–303 (January 1995).

  12. ‘TOMQAT: total management of service quality for multimedia applications on IBC infrastructure’, RAC Project 2116 (1995).

  13. ‘MISA: Management of integrated SDH and ATM networks’, Deliverable 3, ACTS Project AC080 (October 1996).

  14. ITU-T Recommendation Z.100: ‘CCITT specification and description language SDL’, (June 1994).

  15. ITU-T Recommendation Z.120: ‘Message sequence chart (MSC)’ (September 1994).

  16. Probert R L and Monkewich O: ‘TTCN: the international notation for specifying tests of communication systems’, Computer Networks and ISDN Systems, 23, pp 417–438 (February 1992).

    Google Scholar 

  17. Woollard K: ‘Verification and testing’, BT Technol J, 11,No 1, pp 158–167 (January 1993).

    Google Scholar 

  18. Woollard K: ‘What's IN a model? Modelling IN services using formal methods’, BT Technol J, 13,No 2, pp 43–50 (April 1995).

    Google Scholar 

  19. Mónton V: ‘An approach to tackling network integrity’, Third Communication Networks Symposium, Manchester Metropolitan University (July 1996).

  20. Diefenbruch M, Heck E, Hintelmann J and Muller-Clostermann B: ‘Performance evaluation of SDL systems adjunct by queuing models’, SDL '95 with MSC in CASE, Proceedings of the Seventh SDL Forum, Elsevier Science Publishers BV (1995).

Download references

Author information

Authors and Affiliations

Authors

About this article

Cite this article

Mónton, V. Risk assessment methodology for network integrity. BT Technology Journal 15, 223–234 (1997). https://doi.org/10.1023/A:1018664103282

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1018664103282

Keywords

Navigation