blob: 01d45b42f60edd35f767c5c93762e089e2e8b6d6 [file] [log] [blame]
Harald Welte6fff3642017-07-22 21:36:13 +02001module NS_Emulation {
2 import from NS_Types all;
3 import from BSSGP_Types all;
Harald Weltee0abc472018-02-05 09:13:31 +01004 import from Osmocom_Gb_Types all;
Harald Welte6fff3642017-07-22 21:36:13 +02005 import from NS_CodecPort all;
6 import from NS_CodecPort_CtrlFunct all;
Harald Welte6fff3642017-07-22 21:36:13 +02007 import from IPL4asp_Types all;
8
9 type record NsUnitdataRequest {
10 BssgpBvci bvci,
11 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020012 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010013 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020014 }
15
16 template NsUnitdataRequest t_NsUdReq(template Nsei nsei, template BssgpBvci bvci, template octetstring sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010017 template PDU_BSSGP bssgp) := {
Harald Welte6e594f22017-07-23 16:19:35 +020018 bvci := bvci,
19 nsei := nsei,
20 sdu := sdu,
21 bssgp := bssgp
Harald Welte6fff3642017-07-22 21:36:13 +020022 }
23
24 type record NsUnitdataIndication {
25 BssgpBvci bvci,
26 Nsei nsei,
Harald Welte6e594f22017-07-23 16:19:35 +020027 octetstring sdu optional,
Harald Weltee0abc472018-02-05 09:13:31 +010028 PDU_BSSGP bssgp optional
Harald Welte6e594f22017-07-23 16:19:35 +020029 }
30
31 template NsUnitdataIndication t_NsUdInd(Nsei nsei, BssgpBvci bvci, octetstring sdu) := {
32 bvci := bvci,
33 nsei := nsei,
34 sdu := sdu,
Harald Weltee0abc472018-02-05 09:13:31 +010035 bssgp := dec_PDU_BSSGP(sdu)
Harald Welte6e594f22017-07-23 16:19:35 +020036 }
37
38 type record NsStatusIndication {
39 Nsei nsei,
40 Nsvci nsvci,
41 NseState old_state,
42 NseState new_state
43 }
44
45 template NsStatusIndication t_NsStsInd(Nsei nsei, Nsvci nsvci, NseState old_state, NseState state) := {
46 nsei := nsei,
47 nsvci := nsvci,
48 old_state := old_state,
49 new_state := state
Harald Welte6fff3642017-07-22 21:36:13 +020050 }
51
52 type enumerated NseState {
Harald Welte6e594f22017-07-23 16:19:35 +020053 NSE_S_DEAD_BLOCKED,
54 NSE_S_WAIT_RESET,
55 NSE_S_ALIVE_BLOCKED,
56 NSE_S_ALIVE_UNBLOCKED
57 }
Harald Welte6fff3642017-07-22 21:36:13 +020058
59 /* port from our (internal) point of view */
60 type port NS_SP_PT message {
61 in NsUnitdataRequest;
62 out NsUnitdataIndication,
Harald Welte6e594f22017-07-23 16:19:35 +020063 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020064 ASP_Event;
65 } with { extension "internal" };
66
67 /* port from the user point of view */
68 type port NS_PT message {
69 in ASP_Event,
Harald Welte6e594f22017-07-23 16:19:35 +020070 NsStatusIndication,
Harald Welte6fff3642017-07-22 21:36:13 +020071 NsUnitdataIndication;
72 out NsUnitdataRequest;
73 } with { extension "internal" };
74
75 function NSStart() runs on NS_CT {
76 f_init();
77 f_ScanEvents();
78 }
79
80 private function f_init() runs on NS_CT {
Harald Welte6e594f22017-07-23 16:19:35 +020081 var Result res;
82 /* Connect the UDP socket */
83 res := f_IPL4_connect(NSCP, mp_remote_ip, mp_remote_udp_port, mp_local_ip, mp_local_udp_port, 0, { udp := {}});
Harald Welte9220f632018-05-23 20:27:02 +020084 if (not ispresent(res.connId)) {
85 setverdict(fail, "Could not connect NS UDP socket, check your configuration");
Daniel Willmanne4ff5372018-07-05 17:35:03 +020086 mtc.stop;
Harald Welte9220f632018-05-23 20:27:02 +020087 }
Harald Welte6e594f22017-07-23 16:19:35 +020088 g_conn_id := res.connId;
89 f_change_state(NSE_S_DEAD_BLOCKED);
90 /* Send the first NS-ALIVE to test the connection */
91 f_sendReset();
Harald Welte6fff3642017-07-22 21:36:13 +020092 }
93
94 type component NS_CT {
95 /* UDP port towards the bottom (IUT) */
96 port NS_CODEC_PT NSCP;
97 /* NS-User SAP towards the user */
98 port NS_SP_PT NS_SP;
99
Harald Welte6e594f22017-07-23 16:19:35 +0200100 var NseState g_state := NSE_S_DEAD_BLOCKED;
101 var ConnectionId g_conn_id := -1;
102
103 timer Tns_alive := 3.0;
104 timer Tns_test := 10.0;
105 timer Tns_block := 10.0;
Harald Welte6fff3642017-07-22 21:36:13 +0200106 }
107
108 modulepar {
Harald Welte244cd8a2017-08-26 09:25:20 +0200109 PortNumber mp_local_udp_port := 23000;
Harald Welte6e594f22017-07-23 16:19:35 +0200110 charstring mp_local_ip := "127.0.0.1";
Harald Welte244cd8a2017-08-26 09:25:20 +0200111 PortNumber mp_remote_udp_port := 21000;
Harald Welte6e594f22017-07-23 16:19:35 +0200112 charstring mp_remote_ip := "127.0.0.1";
113 Nsvci mp_nsvci := 0;
114 Nsvci mp_nsei := 2342;
Harald Welte6fff3642017-07-22 21:36:13 +0200115 };
116
Harald Welte6e594f22017-07-23 16:19:35 +0200117 private function f_change_state(NseState new_state) runs on NS_CT {
118 var NseState old_state := g_state;
119 g_state := new_state;
120 log("NS State Transition: ", old_state, " -> ", new_state);
121 NS_SP.send(t_NsStsInd(mp_nsei, mp_nsvci, old_state, new_state));
Harald Welte6fff3642017-07-22 21:36:13 +0200122 }
123
Harald Welte6e594f22017-07-23 16:19:35 +0200124 private function f_sendReset() runs on NS_CT {
125 NSCP.send(t_NS_Send(g_conn_id, t_NS_RESET(NS_CAUSE_OM_INTERVENTION, mp_nsvci, mp_nsei)));
126 g_state := NSE_S_WAIT_RESET;
Harald Welte6fff3642017-07-22 21:36:13 +0200127 }
128
Harald Welte6e594f22017-07-23 16:19:35 +0200129 private function f_sendAlive() runs on NS_CT {
130 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE));
131 Tns_alive.start;
132 }
133
134 private function f_sendUnblock() runs on NS_CT {
135 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK));
136 Tns_block.start;
137 }
138
139 private function f_sendBlock(NsCause cause) runs on NS_CT {
140 NSCP.send(t_NS_Send(g_conn_id, t_NS_BLOCK(cause, mp_nsvci)));
141 Tns_block.start;
142 }
143
144 altstep as_allstate() runs on NS_CT {
145 var NS_RecvFrom rf;
146 var ASP_Event evt;
147
148 /* transition to DEAD if t_alive times out */
Harald Weltec27f6842018-03-02 21:40:03 +0100149 [Tns_alive.running] Tns_alive.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200150 log("Tns-alive expired: changing to DEAD_BLOCKED + starting Tns-test");
151 f_change_state(NSE_S_DEAD_BLOCKED);
152 Tns_test.start;
Harald Welte6fff3642017-07-22 21:36:13 +0200153 }
Harald Welte6fff3642017-07-22 21:36:13 +0200154
Harald Weltec27f6842018-03-02 21:40:03 +0100155 [Tns_test.running] Tns_test.timeout {
Harald Welte6e594f22017-07-23 16:19:35 +0200156 log("Tns-test expired: sending NS-ALIVE");
157 f_sendAlive();
Harald Welte6fff3642017-07-22 21:36:13 +0200158 }
Harald Welte6fff3642017-07-22 21:36:13 +0200159
Harald Welte6e594f22017-07-23 16:19:35 +0200160 /* Stop t_alive when receiving ALIVE-ACK */
161 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE_ACK)) {
162 log("NS-ALIVE-ACK received: stopping Tns-alive; starting Tns-test");
163 Tns_alive.stop;
164 Tns_test.start;
165 }
Harald Welte6fff3642017-07-22 21:36:13 +0200166
Harald Welte6e594f22017-07-23 16:19:35 +0200167 /* respond to NS-ALIVE with NS-ALIVE-ACK */
168 [] NSCP.receive(t_NS_RecvFrom(t_NS_ALIVE)) {
169 NSCP.send(t_NS_Send(g_conn_id, t_NS_ALIVE_ACK));
170 }
171
172 /* Respond to BLOCK for wrong NSVCI */
173 [] NSCP.receive(t_NS_RecvFrom(t_NS_BLOCK(?, ?))) -> value rf {
174 log("Rx NS-BLOCK for unknown NSVCI");
175 /* FIXME */
176 }
177
178 /* Respond to RESET with correct NSEI/NSVCI */
179 [] NSCP.receive(t_NS_RecvFrom(t_NS_RESET(?, mp_nsvci, mp_nsei))) -> value rf {
180 f_change_state(NSE_S_ALIVE_BLOCKED);
181 NSCP.send(t_NS_Send(g_conn_id, t_NS_RESET_ACK(mp_nsvci, mp_nsei)));
182 }
183
184 /* Respond to RESET with wrong NSEI/NSVCI */
185 [] NSCP.receive(t_NS_RecvFrom(t_NS_RESET(?, ?, ?))) -> value rf {
186 log("Rx NS-RESET for unknown NSEI/NSVCI");
187 /* FIXME */
188 }
189
190 /* default case of handling unknown PDUs */
191 [] NSCP.receive(t_NS_RecvFrom(?)) -> value rf {
192 log("Rx Unexpected NS PDU ", rf.msg," in state ", g_state);
Harald Weltee0abc472018-02-05 09:13:31 +0100193 NSCP.send(t_NS_Send(g_conn_id, ts_NS_STATUS(NS_CAUSE_PDU_NOT_COMPATIBLE_WITH_PROTOCOL_STATE, rf.msg)));
Harald Welte6e594f22017-07-23 16:19:35 +0200194 }
195 /* Forwarding of ASP_Evet to user */
196 [] NSCP.receive(ASP_Event:?) -> value evt { NS_SP.send(evt); }
Harald Welte6fff3642017-07-22 21:36:13 +0200197 }
198
199 private function f_ScanEvents() runs on NS_CT {
200 var NsUnitdataRequest ud_req;
201 var NS_RecvFrom rf;
Harald Welte6e594f22017-07-23 16:19:35 +0200202 var default d;
203
204 d := activate(as_allstate());
Harald Welte6fff3642017-07-22 21:36:13 +0200205
206 while (true) {
Harald Welte6e594f22017-07-23 16:19:35 +0200207 if (g_state == NSE_S_DEAD_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200208 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200209 [false] any timer.timeout {}
Harald Welte6fff3642017-07-22 21:36:13 +0200210 }
Harald Welte6e594f22017-07-23 16:19:35 +0200211 } else if (g_state == NSE_S_WAIT_RESET) {
Harald Welte6fff3642017-07-22 21:36:13 +0200212 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200213 [] NSCP.receive(t_NS_RecvFrom(t_NS_RESET_ACK(mp_nsvci, mp_nsei))) -> value rf {
214 f_change_state(NSE_S_ALIVE_BLOCKED);
215 f_sendAlive();
216 f_sendUnblock();
Harald Welte6fff3642017-07-22 21:36:13 +0200217 }
Harald Welte6fff3642017-07-22 21:36:13 +0200218 }
Harald Welte6e594f22017-07-23 16:19:35 +0200219 } else if (g_state == NSE_S_ALIVE_BLOCKED) {
Harald Welte6fff3642017-07-22 21:36:13 +0200220 alt {
Harald Welte6e594f22017-07-23 16:19:35 +0200221 /* bogus block, just respond with ACK */
222 [] NSCP.receive(t_NS_RecvFrom(t_NS_BLOCK(?, mp_nsvci))) -> value rf {
223 NSCP.send(t_NS_Send(g_conn_id, t_NS_BLOCK_ACK(mp_nsvci)));
224 }
225 /* Respond to UNBLOCK with UNBLOCK-ACK + change state */
226 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
227 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
228 Tns_block.stop;
229 f_change_state(NSE_S_ALIVE_UNBLOCKED);
230 }
231 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK_ACK)) -> value rf {
232 Tns_block.stop;
233 f_change_state(NSE_S_ALIVE_UNBLOCKED);
234 }
235 [] Tns_block.timeout {
236 /* repeat unblock transmission */
237 f_sendUnblock();
238 }
239 }
240 } else if (g_state == NSE_S_ALIVE_UNBLOCKED) {
241 alt {
242 /* bogus unblock, just respond with ACK */
243 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNBLOCK)) -> value rf {
244 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNBLOCK_ACK));
245 }
246 /* Respond to BLOCK with BLOCK-ACK + change state */
247 [] NSCP.receive(t_NS_RecvFrom(t_NS_BLOCK(?, mp_nsvci))) -> value rf {
248 NSCP.send(t_NS_Send(g_conn_id, t_NS_BLOCK_ACK(mp_nsvci)));
249 Tns_block.stop;
250 f_change_state(NSE_S_ALIVE_BLOCKED);
251 }
252 [] NSCP.receive(t_NS_RecvFrom(t_NS_BLOCK_ACK(mp_nsvci))) -> value rf {
253 Tns_block.stop;
254 }
255 /* NS-UNITDATA PDU from network to NS-UNITDATA.ind to user */
256 [] NSCP.receive(t_NS_RecvFrom(t_NS_UNITDATA(?, ?, ?))) -> value rf {
Harald Weltee0abc472018-02-05 09:13:31 +0100257 NS_SP.send(t_NsUdInd(mp_nsei,
258 oct2int(rf.msg.pDU_NS_Unitdata.bVCI),
259 rf.msg.pDU_NS_Unitdata.nS_SDU));
Harald Welte6e594f22017-07-23 16:19:35 +0200260 }
261 /* NS-UNITDATA.req from user to NS-UNITDATA PDU on network */
262 [] NS_SP.receive(t_NsUdReq(mp_nsei, ?, ?, omit)) -> value ud_req {
263 /* using raw octetstring PDU */
264 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, ud_req.sdu)));
265 }
266 [] NS_SP.receive(t_NsUdReq(mp_nsei, ?, omit, ?)) -> value ud_req {
267 /* using decoded BSSGP PDU that we need to encode first */
Harald Weltee0abc472018-02-05 09:13:31 +0100268 var octetstring enc := enc_PDU_BSSGP(ud_req.bssgp);
Harald Welte6e594f22017-07-23 16:19:35 +0200269 NSCP.send(t_NS_Send(g_conn_id, t_NS_UNITDATA(t_SduCtrlB, ud_req.bvci, enc)));
270 }
Harald Welte6fff3642017-07-22 21:36:13 +0200271 }
272 }
273
Harald Welte6e594f22017-07-23 16:19:35 +0200274 } /* while */
275 //deactivate(d);
Harald Welte6fff3642017-07-22 21:36:13 +0200276 }
277}