Calabasas, CA, United States
Calabasas, CA, United States
Time filter
Source Type

Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs). The method also includes configuring the first NFT to analyze or ignore traffic matching filtering information, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs. The method further includes inserting, at the first insertion point, the first NFT into the service chain.

Methods, systems, and computer readable media for providing fuzz testing functionality are disclosed. According to one method, the method includes at a fuzz testing module (FTM), generating a plurality of test messages, including a test message including fuzzed data, generating fuzzed message identification information, and transmitting the test message and the fuzzed message identification information to a device under test (DUT). The method also includes at a packet analyzer located between the FTM and the DUT, receiving the plurality of test messages and the fuzzed message identification information, and identifying the test message including the fuzzed data using the fuzzed message identification information.

The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting physical link intrusions includes monitoring a link delay signature associated with a physical link based on one-way link delay measurements obtained using at least one network tap. The method also includes determining whether a change in the link delay signature has met or exceeded a threshold value. The method further includes in response to determining that the change in the link delay signature has met or exceeded the threshold value, determining that a physical link intrusion has occurred.

Methods and systems to reduce filter engine rules for network packet forwarding systems are disclosed. In part, the disclosed embodiments process packet filters to identify certain properties which, if present, allow for techniques to be applied to avoid generating rules that do not contribute to the real-time operation of the packet forwarding system. For example, generation of filter engine rules for user-defined filters involving overlapping and mutually exclusive filter conditions are streamlined within a packet forwarding system by removing filter expressions that are not useful, such as unnecessary expressions and redundant expressions. By identifying and removing such not useful expressions, the disclosed embodiments reduce the time required to generate filter engine forwarding rules, reduce the resulting space required to store the these rules, and potentially allow increases in the numbers and complexities of packet filters applied to network packets to be forwarded by a packet forwarding system.

The subject matter described herein relates to vendor-neutral testing and scoring of a system under test. One method for vendor-neutral scoring of a system under test includes generating a pre-testing snapshot of a system under test. The method further includes executing vendor-neutral testing of plural different subsystems of the system under test. The method further includes generating a vendor-neutral score based on the testing. The method further includes generating a post-testing snapshot of the system under test.

A method for transmitting and coherently detecting data transmitted over electrical lanes that experience different amounts of skew includes, at a traffic generation or forwarding device, self calibrating transmit and receive-side components of the traffic generation or forwarding device to account for skew between electrical lanes and setting per-electrical lane delays based on the calibration. Data to be transmitted to a network device is generated. The data to be transmitted is spread, using one of the transmit-side components, over a first number of electrical lanes. The data is multiplexed from the electrical lanes onto a second number of optical lanes, the second number being different from the first number. Data is transmitted to and received from the network device over the optical lanes. Transmitted data is reconstructed from the received data using the receive-side components.

Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications. The tool packet monitor applications can also aggregate de-encapsulated packets having the same packet classification prior to forwarding the aggregated packets to one or more network destinations.

A network equipment test device provides a user interface for user specification of a test traffic source, a test traffic destination, SUT and waypoint topology and one or more test cases. In response to receiving the specified input from the user via the interface, the test traffic source is automatically configured to send the test traffic to the destination via the SUT. The waypoint is automatically configured to measure the test traffic. When the test is initiated, test traffic is sent from the test traffic source to the test traffic destination via the SUT and the at least one waypoint. Test traffic is measured at the waypoint, and traffic measurement results are displayed on a visual map of SUT topology.

Systems and methods are disclosed herein to provide communication test systems for the mobility testing of multi-user multiple-input multiple-output (MU-MIMO) radio frequency wireless data communication devices, systems and networks. In accordance with one or more embodiments, a test system containing an MU-MIMO traffic generator and analyzer is disclosed that includes a mobility effects scheduler operative in conjunction with a channel impairment simulator to perform tests related to mobile MU-MIMO devices such as wireless clients and terminals. Such a test system may offer improved capabilities, such as flexible measurements of mobility performance, more accurate assessments of MU-MIMO wireless channel utilization and data throughput, measurements on MU-MIMO devices under mobility stress, and automated measurements of MU-MIMO mobility testing.

In one embodiment, packet forwarding apparatus includes a data packet receiving interface, a data packet forwarding interface, and a configuration interface. The apparatus also includes circuitry that defines a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface. The circuitry defines at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfigures at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus.

Loading IXIA collaborators
Loading IXIA collaborators