Application Testing Final v4
-
Upload
alex-molea -
Category
Documents
-
view
228 -
download
2
Transcript of Application Testing Final v4
![Page 1: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/1.jpg)
PROPRIETARY AND CONFIDENTIAL
Christian Hutter
EMEA Senior System Engineer
Application & Security Testing
![Page 2: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/2.jpg)
2 PROPRIETARY AND CONFIDENTIAL
� Market Drivers and Trends
� Security
� Applications
� Video (ABR)
� Spirent Solutions
Agenda
![Page 3: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/3.jpg)
3 PROPRIETARY AND CONFIDENTIAL
Market Trends & Challenges
The Mobile Network in 2011 and 2012
� Last year’s mobile data traffic was eight times the size of the entire global Internet in 2000.
� Mobile video traffic will exceed 50 percent for the first time in 2011
� Smartphones represent only 12 percent of total global handsets in use today, but they represent over 82 percent of total global handset traffic.
The Mobile Network in 2016
� Global mobile data traffic will increase 18-fold between 2011 and 2016
� Two-thirds of the world’s mobile data traffic will be video by 2016
� Mobile-connected tablets will generate almost as much traffic in 2016 as the entire global mobile network in 2012
Cisco Visual Networking Index: Global Mobile Data
Traffic Forecast Update, 2011–2016
![Page 4: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/4.jpg)
4 PROPRIETARY AND CONFIDENTIAL
Mobile Device sales are growing…
![Page 5: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/5.jpg)
5 PROPRIETARY AND CONFIDENTIAL
� Market Drivers and Trends
� Security
� Applications
� Spirent Solutions
Agenda
![Page 6: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/6.jpg)
6 PROPRIETARY AND CONFIDENTIAL
Security Devices in LTE
� LTE or Mobile networks are full of security devices
![Page 7: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/7.jpg)
7 PROPRIETARY AND CONFIDENTIAL
Top 10 Testing Tips for Security Devices
1. Application Mix
� It’s important to tune the devices appropriately for the application running within the environment
� A simple mix of HTTP,SMTP,DNS,FTP may not be a good representative of your network
� The device under test should also be configured to protect all the applications.
2. Packet Size Mix
� A “normal” RFC 2544 is not recommended
� Instead of using single Packet sizes use a MIX different Sizes
� To understand the traffic mix administrators can use a protocol analyser to collect statistics form the real-life environment
![Page 8: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/8.jpg)
8 PROPRIETARY AND CONFIDENTIAL
Top 10 Testing Tips for Security Devices
3. Security Coverage
� It’s important to tune the devices appropriately for the application running within the environment
� Don’t use the “Standard” preconfigured filters, signatures and rules
4. VLAN Tagging
� VLAN Tag will consume processing resources within the security device
5. IPv6
� Use IPv4 and IPv6 simultaneously
6. Attacks Traffic
� Mix of both legitimate and malicious traffic
7. TCP sessions
� Ensure that performance test are conducted with a appropriate amount of TCP Sessions
![Page 9: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/9.jpg)
9 PROPRIETARY AND CONFIDENTIAL
Top 10 Testing Tips for Security Devices
8. Physical Connectivity
� Test Setup must reflect the real-life physical environment
� For modular designed devices it will be important to test traffic going into one module and out of a different module
9. Performance Testing for Long-Haul
� Take into account that the device will likely need to support growth over his lifetime.
� Global IP traffic is expected to increase fourfold over the next five years.
10.The Point of Failure
� One of the final tests is to find the point at which the device essentially fails.
Source: Crossbeam
![Page 10: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/10.jpg)
10 PROPRIETARY AND CONFIDENTIAL
� Market Drivers and Trends
� Security
� Applications
� Video (ABR)
� Spirent Solutions
Agenda
![Page 11: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/11.jpg)
11 PROPRIETARY AND CONFIDENTIAL
It’s all about apps
![Page 12: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/12.jpg)
12 PROPRIETARY AND CONFIDENTIAL
What is there to test?
� Applications suffer from low bandwidth
• Response time goes low
• Retransmissions saturate the network
� Applications are not always designed for Mobile
� Application are still very similar to fixed Internet
• Browsing
• Skype
� Infrastructure testing with multiple applications is a must
![Page 13: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/13.jpg)
13 PROPRIETARY AND CONFIDENTIAL
Testing these applications
� This is very similar to testing applications in the web. Hence the web is providing the services.
� The extra comes with the mobile bandwidth that can be reached with multiple emulated users.
• Bandwidth has impact on performance of the application
• How many mobile users a can you handle
![Page 14: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/14.jpg)
14 PROPRIETARY AND CONFIDENTIAL
� Market Drivers and Trends
� Security
� Applications
� Video (ABR)
� Spirent Solutions
Agenda
![Page 15: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/15.jpg)
15 PROPRIETARY AND CONFIDENTIAL
Most of the traffic is to be Video…
![Page 16: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/16.jpg)
16 PROPRIETARY AND CONFIDENTIAL
How does that work
For ABR to work, a video is first encoded at different bitrates to accommodate varying bandwidth connections. Each bitrate version is sliced up into tiny fragments —typically 2 to 10 seconds.
The video player then pulls fragments from the different encodings and inserts them into the stream as bandwidth dictates.
![Page 17: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/17.jpg)
17 PROPRIETARY AND CONFIDENTIAL
Adaptive Bitrate Streaming –The 4 C’s of Streaming TV
Consumption - Adapting to bandwidth, network conditions, and client CPU usage to deliver uninterrupted video
Connections - Client responsibility to request appropriate bit rate(s)
Continuity - Minimize delay by using WAN
acceleration technologies (caching
appliances)
Content - Cache video content on the edge and
distribute based on client requests
Adaptive Streaming
![Page 18: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/18.jpg)
18 PROPRIETARY AND CONFIDENTIAL
How does that work?
![Page 19: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/19.jpg)
19 PROPRIETARY AND CONFIDENTIAL
� Market Drivers and Trends
� Security Testing
� Application Testing
� Spirent Solutions
Agenda
![Page 20: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/20.jpg)
20 PROPRIETARY AND CONFIDENTIAL
Spirent Solutions in LTE Networks –Applications and Security
Applications
ePacket core Internet
Backhaul & Backbone
LTE Access
Spirent solution LTE Applications and Security- Avalanche• Simulation of todays Application Traffic
• Support of IPv4 and IPv6
• Malicious traffic
• Ipsec
• Video
Spirent solution LTE Applications and Security- Spirent Studio • Millions of pre-built protocol fuzz tests
• Auto-generate tests for any protocol or application
• Thousands of pre-built known attacks & DDoS
• Integrated monitors & automation
AvalancheAvalanche
Studio
![Page 21: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/21.jpg)
21 PROPRIETARY AND CONFIDENTIAL
Spirent Solutions in LTE Networks –Applications and Security
Applications
ePacket core Internet
Backhaul & Backbone
LTE Access
Spirent solution LTE Applications and Security TestCenter• Support of all interface link speeds (1G, 10G, 40G,100G)
• Support of IPv4 and IPv6
• L2-3 testing for Switch/Router testing
• .........
Spirent TestCenterSpirent TestCenter
![Page 22: Application Testing Final v4](https://reader033.fdocuments.in/reader033/viewer/2022051503/577ccf091a28ab9e788eb5e6/html5/thumbnails/22.jpg)
PROPRIETARY AND CONFIDENTIAL
Thank you