Vous êtes sur la page 1sur 22

Application & Security Testing

Christian Hutter EMEA Senior System Engineer

PROPRIETARY AND CONFIDENTIAL

Agenda
Market Drivers and Trends Security Applications Video (ABR) Spirent Solutions

PROPRIETARY AND CONFIDENTIAL

Market Trends & Challenges


The Mobile Network in 2011 and 2012
Last years mobile data traffic was eight times the size of the entire global Internet in 2000. Mobile video traffic will exceed 50 percent for the first time in 2011 Smartphones represent only 12 percent of total global handsets in use today, but they represent over 82 percent of total global handset traffic.

The Mobile Network in 2016


Global mobile data traffic will increase 18-fold between 2011 and 2016 Two-thirds of the worlds mobile data traffic will be video by 2016 Mobile-connected tablets will generate almost as much traffic in 2016 as the entire global mobile network in 2012

Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 20112016
3 PROPRIETARY AND CONFIDENTIAL

Mobile Device sales are growing

PROPRIETARY AND CONFIDENTIAL

Agenda
Market Drivers and Trends Security Applications Spirent Solutions

PROPRIETARY AND CONFIDENTIAL

Security Devices in LTE


LTE or Mobile networks are full of security devices

PROPRIETARY AND CONFIDENTIAL

Top 10 Testing Tips for Security Devices


1. Application Mix
Its important to tune the devices appropriately for the application running within the environment A simple mix of HTTP,SMTP,DNS,FTP may not be a good representative of your network The device under test should also be configured to protect all the applications.

2. Packet Size Mix


A normal RFC 2544 is not recommended Instead of using single Packet sizes use a MIX different Sizes To understand the traffic mix administrators can use a protocol analyser to collect statistics form the real-life environment

PROPRIETARY AND CONFIDENTIAL

Top 10 Testing Tips for Security Devices


3. Security Coverage
Its important to tune the devices appropriately for the application running within the environment Dont use the Standard preconfigured filters, signatures and rules

4. VLAN Tagging
VLAN Tag will consume processing resources within the security device

5. IPv6
Use IPv4 and IPv6 simultaneously

6. Attacks Traffic
Mix of both legitimate and malicious traffic

7. TCP sessions
Ensure that performance test are conducted with a appropriate amount of TCP Sessions

PROPRIETARY AND CONFIDENTIAL

Top 10 Testing Tips for Security Devices

8. Physical Connectivity
Test Setup must reflect the real-life physical environment For modular designed devices it will be important to test traffic going into one module and out of a different module

9. Performance Testing for Long-Haul


Take into account that the device will likely need to support growth over his lifetime. Global IP traffic is expected to increase fourfold over the next five years.

10.The Point of Failure


One of the final tests is to find the point at which the device essentially fails.
Source: Crossbeam

PROPRIETARY AND CONFIDENTIAL

Agenda
Market Drivers and Trends Security Applications Video (ABR) Spirent Solutions

10

PROPRIETARY AND CONFIDENTIAL

Its all about apps

11

PROPRIETARY AND CONFIDENTIAL

What is there to test?


Applications suffer from low bandwidth
Response time goes low Retransmissions saturate the network

Applications are not always designed for Mobile Application are still very similar to fixed Internet
Browsing Skype Email

Infrastructure testing with multiple applications is a must

12

PROPRIETARY AND CONFIDENTIAL

Testing these applications


This is very similar to testing applications in the web. Hence the web is providing the services. The extra comes with the mobile bandwidth that can be reached with multiple emulated users.
Bandwidth has impact on performance of the application How many mobile users a can you handle

13

PROPRIETARY AND CONFIDENTIAL

Agenda
Market Drivers and Trends Security Applications Video (ABR) Spirent Solutions

14

PROPRIETARY AND CONFIDENTIAL

Most of the traffic is to be Video

15

PROPRIETARY AND CONFIDENTIAL

How does that work


For ABR to work, a video is first encoded at different bitrates to accommodate varying bandwidth connections. Each bitrate version is sliced up into tiny fragments typically 2 to 10 seconds. The video player then pulls fragments from the different encodings and inserts them into the stream as bandwidth dictates.

16

PROPRIETARY AND CONFIDENTIAL

Adaptive Bitrate Streaming The 4 Cs of Streaming TV


Consumption - Adapting to bandwidth, network conditions, and client CPU usage to deliver uninterrupted video Connections - Client responsibility to request appropriate bit rate(s)

Adaptive Streaming
Continuity - Minimize delay by using WAN acceleration technologies (caching appliances) Content - Cache video content on the edge and distribute based on client requests

17

PROPRIETARY AND CONFIDENTIAL

How does that work?

18

PROPRIETARY AND CONFIDENTIAL

Agenda
Market Drivers and Trends Security Testing Application Testing Spirent Solutions

19

PROPRIETARY AND CONFIDENTIAL

Spirent Solutions in LTE Networks Applications and Security

Application s

ePacket core LTE Access Backhaul & Backbone

Internet

Spirent solution LTE Applications and Security- Avalanche


Simulation of todays Application Traffic Support of IPv4 and IPv6 Malicious traffic Ipsec Video Millions of pre-built protocol fuzz tests Auto-generate tests for any protocol or application Thousands of pre-built known attacks & DDoS Integrated monitors & automation

Avalanche

Spirent solution LTE Applications and Security- Spirent Studio

Studio

20

PROPRIETARY AND CONFIDENTIAL

Spirent Solutions in LTE Networks Applications and Security

Applications

ePacket core LTE Access Backhaul & Backbone

Internet

Spirent solution LTE Applications and Security TestCenter


Support of all interface link speeds (1G, 10G, 40G,100G) Support of IPv4 and IPv6 L2-3 testing for Switch/Router testing .........

Spirent TestCenter

21

PROPRIETARY AND CONFIDENTIAL

Thank you

PROPRIETARY AND CONFIDENTIAL

Vous aimerez peut-être aussi