1. 7.3 Example Use Cases
Spirent Automation Platform Technologies
2. PROPRIETARY AND CONFIDENTIAL 2
• Stateful awareness: Show and connect what’s available
• Abstract devices: Connect to logically defined devices
• Open standards based: TOSCA, YANG import/export
• Vendor-neutral: Programmable to support many vendors
• Enable self-service agility: On-demand, connectivity services
• Centrally managed: One, easy to use connectivity controller
• Programmatically configured: Provision connectivity services
• Intelligent paths: System calculates shortest path connectivity
Velocity Software Defined Connectivity
Velocity UX (Common GUI, API)
Software Defined
Networks
Virtual
Networks
L2-L3 (eVPN) Networks
L2 (VLAN)
Networks
Velocity Software Defined Connectivity Service
L1 Ethernet,
L1 RF Networks
vRAN, C-RAN, WiFi NFV/NFVi SD-WAN SDN
Easily automate connectivity and interconnectivity between legacy and modern network
Network Slicing
v7.3
3. PROPRIETARY AND CONFIDENTIAL 3
Render and connect
both virtual and
physical network
devices connected
via SDN controller
Orchestrate SDN controller
Velocity provides
seamless and
programmable SDN
applications
• SDN makes
networks more
complex
• Making
connection is too
difficult/error
prone for lab
users
• Velocity users
simply draw
connections
• Velocity manages
the connectivity
complexity under
the hood
SDN Use Case: Major Service Provider
4. PROPRIETARY AND CONFIDENTIAL 4
eVPN Use Case: Major NEM
• Completely remote lab in low cost datacenter
• Entire lab infrastructure powered by Velocity
– Connects anything to anything
• Automated 8,000 port infrastructure
• Velocity makes lab scalable and affordable
– Using new Juniper QFX5100-48S EVPN VXLAN
– Mostly avoided expensive L1 switches
• Top of rack switch in all 200 racks
• Eliminates patch panels for Ethernet connections
Feature Software Defined Connectivity
Top of rack
L2 switches
(1 per rack)
DUT
DUT
DUT
DUT
DUT
DUT
DUT
DUT
DUT
DUT
DUT
DUT
…
Rack 1 Rack 2 Rack N
L1 #1 L1 #2
5. PROPRIETARY AND CONFIDENTIAL 5
NEM Model Supports Many Connection Types
Connects two untagged ports–
appears like L1 connection
Point to Point Single VLAN Cloud
Connects multiple ports in a
single broadcast domain
Multi-VLAN Cloud
• Connect ports in fan in/out
• VLANs defined by user
• Velocity allows VLANs in
different topologies to be reused
6. PROPRIETARY AND CONFIDENTIAL 6
New Resource Analytics Dashboard
• Resource purchase planning
• Regression test selection
• Enterprise Network Engineering
Typical
Use
Cases
Need graphic
• Velocity dashboards
now expanded with
Lab utilization data
• Display high-level
statistics for lab usage
and drill down
• Apply custom filters
dependent on the data
points customer is
interested in
7. PROPRIETARY AND CONFIDENTIAL 7
Upgraded TaaS Analytics Engine
• Test as a Service Analytics
– Highly scalable, open and test environment aware analytics engine
– Easily publish our automated tests to Velocity, link to topologies, schedule and publish all
data into clustered indexable database
TaaS Benefits:
Elastic Scale:
Store large
amounts of test
execution data
in a clustered,
elastic data lake
Trend Analysis:
Easily flag test
data points to be
monitored and
trended for
faster isolate
specific problem
areas
Deep
Correlation:
Integrate and
correlate test
execution results
with
environment
states
Real-Time
Event Triggers:
iSite tap of
Velocity
message bus,
assign real-time
automated
actions
Kibana
Visualization:
Open format,
highly
configurable
dashboards
8. PROPRIETARY AND CONFIDENTIAL 8
TaaS Analytics Dashboard Example
Developers link scripts to topologies to test
and publish their test for scheduled execution
Easily build Kibana
dashboard to track
templates
Test runs pipe all data to
scalable, very fast, open
and indexable storage
system
With Velocity iSite,
developers can link
scripted tasks to real-time
message triggers by
monitoring the Velocity
run-time execution
message bus
Build TaaS Analytic
Dashboards
Build in triggers and tap
message bus for real-time action
Scale and fast results
management
Monitor and trend all your testing indefinitely, link to tests,
devices, logs, builds, etc.
9. PROPRIETARY AND CONFIDENTIAL 9
Simplify Security Automation & Testing
• Automated security with
CyberFlood
– Supported by iTest and Velocity
• Easily create complex network
security automation
– Capture, Replay CyberFlood sessions
– Dynamically connect virtual CyberFlood
to physical elements, link changes to
automation
– Response map output to analysis rules
– Aggregate all system under test
integrations, test cases, all system logs
and results for detailed, easy to read,
correlated analysis of the entire SUT
CyberFlood Appliance CyberFlood Virtual
New CyberFlood
Capture/Replay and
Response Mapping Session
Spirent iTest
Model and instantiate
complex physical and
virtual CyberFlood
networking environments
Link security
environments, create
automation,
schedule testing,
manage results
10. PROPRIETARY AND CONFIDENTIAL 10
Example Use Case: Military Branch
• Velocity+iTest+Cyberflood creates on-
demand cyber training environments
• Velocity generates enterprise traffic
profiles using iTest + Cyberflood
• Mixed legitimate and threat/bad traffic
• Physical and Virtual supported
environments
• Emulating up to 40 remote concurrent
simulated territories or security groupings
• Enables bad/good guy team exercises
– Easily creates automated training resources
– Self-service access and launch topologies and
test/training profiles
Test Case
Creation
Test Case
Publishing
Test Case
Consumption
Abstract
iTest
Test Case
CyberFlood
+
iTest
11. Spirent® Communications, Inc. and its related company names, branding, product names and logos referenced herein,
and more specifically “Spirent” are either registered trademarks or pending registration within relevant national laws.
Editor's Notes
Now expanded with TaaS Analytics
Enables test execution trends to be extracted and represented in a dashboard
E.g., boot time, A/B comparisons
Easy to visualize test execution data trends
Know early in test cycle if it’s on track
Determine whether tests can be eliminated from regression
Simple to correlate across executions, environments and devices