Calabasas, CA, United States
Calabasas, CA, United States

Time filter

Source Type

A method for transmitting and coherently detecting data transmitted over electrical lanes that experience different amounts of skew includes, at a traffic generation or forwarding device, self calibrating transmit and receive-side components of the traffic generation or forwarding device to account for skew between electrical lanes and setting per-electrical lane delays based on the calibration. Data to be transmitted to a network device is generated. The data to be transmitted is spread, using one of the transmit-side components, over a first number of electrical lanes. The data is multiplexed from the electrical lanes onto a second number of optical lanes, the second number being different from the first number. Data is transmitted to and received from the network device over the optical lanes. Transmitted data is reconstructed from the received data using the receive-side components.

Systems and methods are disclosed that provide direct network traffic monitoring within virtual machine (VM) platforms operating in virtual processing environments. The disclosed embodiments in part provide direct network packet monitoring through client packet monitor applications that run within client VM platforms to obtain packet traffic and to forward this traffic directly to tool packet monitor applications operating within tool VM platforms. Further, the tool VM platforms can receive multiple incoming streams of network packets from various client VM platforms, and these incoming streams can change over time due to changes in the number of client VM platforms running within the virtual processing environment. Preferably, the network packet streams are communicated using encapsulation tunnels and related encapsulation headers, such as GRE tunnels using GRE identifiers in related encapsulation headers. These tunnels can be used to selectively forward particular packet streams to particular destination tool VM platforms.

Methods and systems are disclosed that pre-classify network traffic monitored within virtual machine (VM) platforms. Client packet monitor applications operate within client VM platforms to monitor network packets, generate monitored packets representing traffic of interest, determine packet classifications for the monitored packets based upon packet contents, identify tags associated with the packet classifications, encapsulate monitored packets with encapsulation headers including the tags to form encapsulated packets, and forward the encapsulated packets to tool VM platforms. Tool packet monitor applications operate within the tool VM platforms to receive the encapsulated packets, identify packet classifications associated with the tags, remove the encapsulation headers from the encapsulated packets, and forward de-encapsulated packets to network destinations based upon the packet classifications. The tool packet monitor applications can also aggregate de-encapsulated packets having the same packet classification prior to forwarding the aggregated packets to one or more network destinations.

Systems and methods are disclosed to provide egress port overload protection for network packet forwarding systems. Input packets are received at one or more ingress ports and load balanced among a plurality of egress ports for the packet forwarding system. Load balanced packets associated with each egress port are then sampled to generate sampled load balanced packets that are output from the egress port. For certain embodiments, a sampling percentage is used for the packet sampling, and the sampling percentage for each egress port is set based upon a comparison of a current traffic rate for the egress port to a threshold rate for the egress port. The threshold rates for the egress ports are allowed to be configured through a user interface. Further, session and non-session traffic can be identified, and session aware load balancing and/or per-port packet sampling can be applied.

Systems and methods are disclosed herein to provide efficient support for the exchange of trigger information between wireless data communication devices and systems, including Multi-User Multiple Input Multiple Output (MU-MIMO) devices and systems that may utilize Orthogonal Frequency Division Multiple Access (OFDMA). In accordance with one or more embodiments, a trigger information exchange mechanism is disclosed that transfers trigger data as part of a pre-existing data frame handshake. Such a system may offer improved capabilities such as a reduced channel overhead incurred due to the trigger information exchange.

Systems and methods are disclosed to provide on demand packet traffic monitoring for packet communications within virtual packet processing environments. Virtual TAPs (test access ports) within virtualization layers for VM (virtual machine) host hardware systems are controlled by external controllers to configure watch filters for VM platforms operating within the virtualization layer based upon trigger events determined within packet flow data and/or based upon other external trigger events. The virtual TAP controller then periodically receives watch filter packet data updates from the virtual TAP and further controls the virtual TAP to configure more detailed focus filters for the VM platforms based upon watch filter trigger events. The virtual TAP controller can further communicate one or more VM action commands (e.g., stop VM, stop application, etc.) to the virtual TAP for application to the VM platforms based upon trigger events associated with this more detailed focus filter data.

Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs). The method also includes configuring the first NFT to analyze or ignore traffic matching filtering information, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs. The method further includes inserting, at the first insertion point, the first NFT into the service chain.

A network equipment test device provides a user interface for user specification of a test traffic source, a test traffic destination, SUT and waypoint topology and one or more test cases. In response to receiving the specified input from the user via the interface, the test traffic source is automatically configured to send the test traffic to the destination via the SUT. The waypoint is automatically configured to measure the test traffic. When the test is initiated, test traffic is sent from the test traffic source to the test traffic destination via the SUT and the at least one waypoint. Test traffic is measured at the waypoint, and traffic measurement results are displayed on a visual map of SUT topology.

Methods, systems, and computer readable media for providing fuzz testing functionality are disclosed. According to one method, the method includes at a fuzz testing module (FTM), generating a plurality of test messages, including a test message including fuzzed data, generating fuzzed message identification information, and transmitting the test message and the fuzzed message identification information to a device under test (DUT). The method also includes at a packet analyzer located between the FTM and the DUT, receiving the plurality of test messages and the fuzzed message identification information, and identifying the test message including the fuzzed data using the fuzzed message identification information.

In one embodiment, packet forwarding apparatus includes a data packet receiving interface, a data packet forwarding interface, and a configuration interface. The apparatus also includes circuitry that defines a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface. The circuitry defines at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfigures at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus.

Loading IXIA collaborators
Loading IXIA collaborators