This document provides an overview of IxExplorer, a traffic generation and measurement tool from Ixia. It discusses IxExplorer's key features such as generating up to 255 unique packet streams, operating within OSI layers 1-4, and measuring latency and packet sequencing. The document then reviews IxExplorer's operation, including its local and remote access modes, port ownership, generating and configuring packet streams, and transmitting streams. It also covers IxExplorer's statistical views for analyzing received data and its packet group statistic views for measuring latency and sequencing on a per-stream basis.
This document provides an overview of configuring the Ixia system for network testing. It describes the IxServer software that controls the Ixia chassis hardware. It also describes the IxExplorer software used to program the Ixia hardware and perform network testing. Key aspects covered include configuring packet streams and flows, frame data, filtering, and using the IxRouter window to configure protocol interfaces and traffic management.
Présentation de la technologie d'aggrégation de liens sous Cisco.
Fonctionnement, Protocoles PaGP et LACP, Configuration sur les switchs Cisco Catalyst
This document provides an overview of advances in Ethernet technology. It discusses the evolution of Ethernet beyond its original use as a LAN technology. It describes different standards body views of Ethernet and key Ethernet concepts like frames, addressing, clients, and link layer control protocols. The document also outlines modern Ethernet features like VLANs, Ethernet services, QoS, link aggregation, and OAM functions.
The document provides an overview of the responsibilities and functions of the Genie-PCIe data link layer. The data link layer is responsible for reliable transmission of transaction layer packets (TLPs) between the physical and transaction layers. It handles flow control initialization, sequencing, buffering, error detection and recovery for transmitted TLPs using ACK/NAK protocols and data link layer packets (DLLPs). The data link control state machine manages the link status and ensures proper initialization and maintenance of the link.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
This document provides an overview of configuring the Ixia system for network testing. It describes the IxServer software that controls the Ixia chassis hardware. It also describes the IxExplorer software used to program the Ixia hardware and perform network testing. Key aspects covered include configuring packet streams and flows, frame data, filtering, and using the IxRouter window to configure protocol interfaces and traffic management.
Présentation de la technologie d'aggrégation de liens sous Cisco.
Fonctionnement, Protocoles PaGP et LACP, Configuration sur les switchs Cisco Catalyst
This document provides an overview of advances in Ethernet technology. It discusses the evolution of Ethernet beyond its original use as a LAN technology. It describes different standards body views of Ethernet and key Ethernet concepts like frames, addressing, clients, and link layer control protocols. The document also outlines modern Ethernet features like VLANs, Ethernet services, QoS, link aggregation, and OAM functions.
The document provides an overview of the responsibilities and functions of the Genie-PCIe data link layer. The data link layer is responsible for reliable transmission of transaction layer packets (TLPs) between the physical and transaction layers. It handles flow control initialization, sequencing, buffering, error detection and recovery for transmitted TLPs using ACK/NAK protocols and data link layer packets (DLLPs). The data link control state machine manages the link status and ensures proper initialization and maintenance of the link.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
There are three types of First Hop Redundancy Protocols (FHRP): HSRP, VRRP, and GLBP. HSRP and VRRP elect an active router to forward traffic for a virtual IP address, while GLBP allows multiple routers to act as active forwarders. Only GLBP supports load balancing traffic across multiple routers. All FHRP protocols run per VRF and VDC.
This presentation features a walk through the Linux kernel networking stack covering the essentials and recent developments a developer needs to know. Our starting point is the network card driver as it feeds a packet into the stack. We will follow the packet as it traverses through various subsystems such as packet filtering, routing, protocol stacks, and the socket layer. We will pause here and there to look into concepts such as segmentation offloading, TCP small queues, and low latency polling. We will cover APIs exposed by the kernel that go beyond use of write()/read() on sockets and will look into how they are implemented on the kernel side.
This document provides instructions for configuring Jumbo Frames on various Cisco and VMware networking devices. It discusses setting the MTU on Nexus switches, ACI fabrics, UCS Fabric Interconnects, and VMware vSwitches. It also provides examples of checking the MTU configuration and performing jumbo frame tests to validate the end-to-end network configuration supports larger frame sizes.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
In this talk Jiří Pírko discusses the design and evolution of the VLAN implementation in Linux, the challenges and pitfalls as well as hardware acceleration and alternative implementations.
Jiří Pírko is a major contributor to kernel networking and the creator of libteam for link aggregation.
This document provides an overview of Metro Ethernet (ME) concepts and technology. It defines ME as a carrier-class Ethernet service defined by five attributes that distinguish it from traditional Ethernet networks. The document discusses ME drivers like simplicity and transport flexibility. It also covers ME technologies like Ethernet, MPLS, VPLS, and various access methods. The author is Anuradha Udunuwara, a chartered engineer with experience in telecom network design and implementation.
This document chapter discusses spanning tree protocols, including Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree (MST). It covers STP operations such as electing a root bridge, root ports, and designated ports. BPDU frame formats and port states are also explained. The chapter objectives are to provide an overview of spanning tree, implement RSTP, describe various STP features, and configure MST.
Here are some useful GDB commands for debugging:
- break <function> - Set a breakpoint at a function
- break <file:line> - Set a breakpoint at a line in a file
- run - Start program execution
- next/n - Step over to next line, stepping over function calls
- step/s - Step into function calls
- finish - Step out of current function
- print/p <variable> - Print value of a variable
- backtrace/bt - Print the call stack
- info breakpoints/ib - List breakpoints
- delete <breakpoint#> - Delete a breakpoint
- layout src - Switch layout to source code view
- layout asm - Switch layout
The document discusses static routing and key concepts related to router configuration and operation. It defines static routes as manually configured paths that specify how a router will transmit packets to certain networks. The summary describes how to configure static routes, default routes, and route summarization. It also outlines tools for troubleshooting routing issues like missing routes.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
This document discusses the internals of the ixgbe driver, which is the Intel 10 Gigabit Ethernet driver for Linux. It describes how the driver handles transmission and reception of packets using ring buffers and NAPI. It also discusses how the driver supports eXpress Data Path (XDP) by using a separate ring for XDP packets and adjusting page reference counts to support XDP operations like redirection. Upcoming features that will improve XDP support for this driver are also mentioned.
Developing Real-Time Data Pipelines with Apache KafkaJoe Stein
Apache Kafka is a distributed streaming platform that allows for building real-time data pipelines and streaming apps. It provides a publish-subscribe messaging system with persistence that allows for building real-time streaming applications. Producers publish data to topics which are divided into partitions. Consumers subscribe to topics and process the streaming data. The system handles scaling and data distribution to allow for high throughput and fault tolerance.
Developing Realtime Data Pipelines With Apache KafkaJoe Stein
Developing Realtime Data Pipelines With Apache Kafka. Apache Kafka is publish-subscribe messaging rethought as a distributed commit log. A single Kafka broker can handle hundreds of megabytes of reads and writes per second from thousands of clients. Kafka is designed to allow a single cluster to serve as the central data backbone for a large organization. It can be elastically and transparently expanded without downtime. Data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine and to allow clusters of co-ordinated consumers. Messages are persisted on disk and replicated within the cluster to prevent data loss. Each broker can handle terabytes of messages without performance impact. Kafka has a modern cluster-centric design that offers strong durability and fault-tolerance guarantees.
There are three types of First Hop Redundancy Protocols (FHRP): HSRP, VRRP, and GLBP. HSRP and VRRP elect an active router to forward traffic for a virtual IP address, while GLBP allows multiple routers to act as active forwarders. Only GLBP supports load balancing traffic across multiple routers. All FHRP protocols run per VRF and VDC.
This presentation features a walk through the Linux kernel networking stack covering the essentials and recent developments a developer needs to know. Our starting point is the network card driver as it feeds a packet into the stack. We will follow the packet as it traverses through various subsystems such as packet filtering, routing, protocol stacks, and the socket layer. We will pause here and there to look into concepts such as segmentation offloading, TCP small queues, and low latency polling. We will cover APIs exposed by the kernel that go beyond use of write()/read() on sockets and will look into how they are implemented on the kernel side.
This document provides instructions for configuring Jumbo Frames on various Cisco and VMware networking devices. It discusses setting the MTU on Nexus switches, ACI fabrics, UCS Fabric Interconnects, and VMware vSwitches. It also provides examples of checking the MTU configuration and performing jumbo frame tests to validate the end-to-end network configuration supports larger frame sizes.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
In this talk Jiří Pírko discusses the design and evolution of the VLAN implementation in Linux, the challenges and pitfalls as well as hardware acceleration and alternative implementations.
Jiří Pírko is a major contributor to kernel networking and the creator of libteam for link aggregation.
This document provides an overview of Metro Ethernet (ME) concepts and technology. It defines ME as a carrier-class Ethernet service defined by five attributes that distinguish it from traditional Ethernet networks. The document discusses ME drivers like simplicity and transport flexibility. It also covers ME technologies like Ethernet, MPLS, VPLS, and various access methods. The author is Anuradha Udunuwara, a chartered engineer with experience in telecom network design and implementation.
This document chapter discusses spanning tree protocols, including Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree (MST). It covers STP operations such as electing a root bridge, root ports, and designated ports. BPDU frame formats and port states are also explained. The chapter objectives are to provide an overview of spanning tree, implement RSTP, describe various STP features, and configure MST.
Here are some useful GDB commands for debugging:
- break <function> - Set a breakpoint at a function
- break <file:line> - Set a breakpoint at a line in a file
- run - Start program execution
- next/n - Step over to next line, stepping over function calls
- step/s - Step into function calls
- finish - Step out of current function
- print/p <variable> - Print value of a variable
- backtrace/bt - Print the call stack
- info breakpoints/ib - List breakpoints
- delete <breakpoint#> - Delete a breakpoint
- layout src - Switch layout to source code view
- layout asm - Switch layout
The document discusses static routing and key concepts related to router configuration and operation. It defines static routes as manually configured paths that specify how a router will transmit packets to certain networks. The summary describes how to configure static routes, default routes, and route summarization. It also outlines tools for troubleshooting routing issues like missing routes.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
This document discusses the internals of the ixgbe driver, which is the Intel 10 Gigabit Ethernet driver for Linux. It describes how the driver handles transmission and reception of packets using ring buffers and NAPI. It also discusses how the driver supports eXpress Data Path (XDP) by using a separate ring for XDP packets and adjusting page reference counts to support XDP operations like redirection. Upcoming features that will improve XDP support for this driver are also mentioned.
Developing Real-Time Data Pipelines with Apache KafkaJoe Stein
Apache Kafka is a distributed streaming platform that allows for building real-time data pipelines and streaming apps. It provides a publish-subscribe messaging system with persistence that allows for building real-time streaming applications. Producers publish data to topics which are divided into partitions. Consumers subscribe to topics and process the streaming data. The system handles scaling and data distribution to allow for high throughput and fault tolerance.
Developing Realtime Data Pipelines With Apache KafkaJoe Stein
Developing Realtime Data Pipelines With Apache Kafka. Apache Kafka is publish-subscribe messaging rethought as a distributed commit log. A single Kafka broker can handle hundreds of megabytes of reads and writes per second from thousands of clients. Kafka is designed to allow a single cluster to serve as the central data backbone for a large organization. It can be elastically and transparently expanded without downtime. Data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine and to allow clusters of co-ordinated consumers. Messages are persisted on disk and replicated within the cluster to prevent data loss. Each broker can handle terabytes of messages without performance impact. Kafka has a modern cluster-centric design that offers strong durability and fault-tolerance guarantees.
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docxsmile790243
This document provides instructions for a lab exercise on the IPv4 network layer protocol. The objectives are to learn about IP packet structure and examine an IP packet trace using Wireshark. Students are instructed to capture an IP packet trace of a web request using Wireshark, inspect the IP header fields of packets in the trace, answer questions about IP addressing and routing, and draw a diagram of the network path between their computer and the web server based on traceroute output.
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPPROIDEA
Netflow is a widely used tool by network operators to monitor network traffic. It works by collecting IP traffic flow information from routers and switches. This flow information can then be used for various purposes such as monitoring network applications and users, network planning, identifying attacks and security threats, usage in billing systems, and analyzing traffic at peering points between operators. The presentation discusses the benefits of using Netflow/cflow mechanisms for network operators and aims to start a discussion on how it can be utilized in service provider and enterprise networks.
This document provides an overview of initial setup and configuration of NetFlow Analyzer. It discusses exporting network flow data, viewing traffic details in the inventory, and configuring alerts. The steps include:
1) Configuring flow export from network devices using manual commands or the Network Configuration Manager tool.
2) Viewing traffic statistics and details for devices, interfaces, applications and other groups in the inventory section.
3) Creating alert profiles to monitor thresholds and receive notifications for issues like interface overutilization or link downs.
The document discusses network visibility solutions from Net Optics and Ixia. It summarizes that Net Optics was acquired by Ixia but will remain a brand name. It then discusses challenges of network growth outpacing monitoring tools, security threats increasing, and the need for improved network performance and visibility. The document promotes Ixia and Net Optics solutions like network taps, packet brokers, and virtual monitoring tools that provide intelligent traffic distribution and filtering to gain complete network visibility without blind spots.
The document discusses routers and routing. It begins by defining a router as a specialized computer that sends packets over a network by selecting the best path and forwarding packets to their destination. It then covers router architecture, including input and output ports, switching fabrics, routing processors, and forwarding tables. The document also discusses different routing techniques like source routing, virtual circuits, and forwarding using IP addresses. It explains how routing tables are used to determine the next hop for packet forwarding.
This document provides an overview of the ELK stack architecture and its components. It discusses Elasticsearch for search and analytics, Logstash for data processing, and Kibana for data visualization. Beats are lightweight data shippers that send data from sources to Logstash or Elasticsearch. The document then focuses on Logstash, explaining that it ingests data from various sources, transforms it through filters like grok and mutate, and outputs it to destinations like Elasticsearch. It provides examples of Logstash configuration with Beats as the input, grok and lowercase filters, and Elasticsearch as the output.
FabricPath is a Layer 2 technology from Cisco that provides multi-path Ethernet capabilities and eliminates the need for Spanning Tree Protocol. It combines the benefits of Layer 2 switching with greater scalability, availability, and loop prevention capabilities. FabricPath adds routing-like capabilities to Layer 2 switching such as all active links, fast convergence, and built-in loop avoidance mechanisms.
Apache Kafka is a distributed publish-subscribe messaging system that was originally created by LinkedIn and contributed to the Apache Software Foundation. It is written in Scala and provides a multi-language API to publish and consume streams of records. Kafka is useful for both log aggregation and real-time messaging due to its high performance, scalability, and ability to serve as both a distributed messaging system and log storage system with a single unified architecture. To use Kafka, one runs Zookeeper for coordination, Kafka brokers to form a cluster, and then publishes and consumes messages with a producer API and consumer API.
This document summarizes an article about SDN, OpenFlow, and the ONF. It discusses how OpenFlow and SDN are emerging technologies that have the potential to enable network innovation and optimize costs. It also introduces the Open Networking Foundation (ONF) and how the community around SDN and OpenFlow has grown rapidly.
This document discusses network virtualization and its history. It provides the following key points:
1) Network virtualization aims to decouple virtual networks from physical infrastructure through techniques like tunneling and encapsulation, allowing independent address spaces and topologies.
2) Early work included overlay networks for deployment and experimentation. Virtualization is now used in data centers to isolate tenant traffic and connect virtual machines across sites.
3) The OpenVirteX project aims to advance network virtualization by exposing the entire physical topology to virtual network controllers and allowing independent address spaces and topologies through header rewriting. This would provide more flexibility than existing solutions.
Practical 7 - Using Wireshark Tutorial and Hands-onQaisSaifQassim
This document discusses using Wireshark, a network packet analyzer tool. It describes what Wireshark is, how to capture and analyze packets, how to filter packets, and how to save and manipulate captured packets. Useful statistical analysis features are also outlined, including protocol hierarchies, conversations, IO graphs, and TCP stream graphs. Finally, some references for further Wireshark information and documentation are provided. A lab activity is proposed to have students launch Wireshark, capture sample traffic, answer questions about the capture, apply filters, and analyze the captured packets.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
This document summarizes the key features of OpManager v12 network management software. It provides increased visibility and control over networks through comprehensive monitoring, reporting, and automation capabilities. Some highlights include monitoring over 100 performance metrics for routers, switches and servers, bandwidth analysis, firewall log management, configuration management, and workflow automation to remediate issues. It aims to provide full visibility and control over IT infrastructure from a single centralized platform.
Client Server Network and Peer to Peer.pptxDevChaudhari17
The document discusses different network models and their key differences. A client-server network uses centralized servers to store data and respond to client requests. In a peer-to-peer network, each node acts as both a client and server by sharing its own resources and consuming resources from other nodes. The document also covers congestion in networks and different techniques for congestion control, including open loop methods like adjusting transmission policies and closed loop methods that react to congestion like backpressure.
The document provides an overview of I/O architectures including PCI, PCI-X and PCI-e. It discusses the bus architectures, speeds and loading of PCI and PCI-X. It describes the different transaction types (programmed I/O, DMA, peer-to-peer) and protocols (retry, disconnect). It also covers features of PCI-e such as lanes, bandwidth and link initialization. Finally, it mentions where to find information on current issues and links to specifications.
IEEE 802 refers to a family of standards dealing with local and metropolitan area networks. The 802 standards specify the lower two layers - data link and physical layers. The most widely used standards are 802.3 (Ethernet), 802.4 (Token Bus), and 802.5 (Token Ring). 802.3 uses CSMA/CD access method and is the most commonly used today. 802.4 uses token passing on a bus topology. 802.5 also uses token passing but on a logical and physical ring topology. All three standards define frame formats for transmission with fields like preamble, addresses, length, data, error checking.
IEEE 802 refers to a family of IEEE standards
Dealing with local area network and metropolitan area network.
Restricted to networks carrying variable-size packets.
Specified in IEEE 802 map to the lower two layers
Data link layer
Physical layer
The most widely used standards
.802.3 - Ethernet
802.4 - Token Bus
802.5 - Token Ring
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
2. Content
Introduction To IxExplorer:
• Features
• Section Review
IxExplorer Operation:
• Operating Modes (Local or Remote)
• The Interface
• Client / Server Configuration and Port Ownership
• Generating Packet Streams
• Configuring Packet Streams
• Transmitting Streams
• Section Review
Statistics view
• Per Port Statistics view
• Grouped Port Statistics View
• Graphed Data
• Section Review
Packet Group Statistic Views
Port Group and Stream Statistic Views
4. Introduction to IxExplorer
IxExplorer
Layer 1 to 4 Traffic Generation
& Measurement Capabilities
IxNetwork
Routing / Switching Protocol
Testing
IxLoad / IxCharriot
Layer 4 to 7
Capabilities
IxExplorer
OSI Layer 1 to 4 Capabilities ***
Complete packet / frame header configuration
True interface emulation with ARP, Ping
Runt and Jumbo frame support (12 Byte to 13,312 Byte Frames) ***
Statistical results and packet capture with filtering
Routing Protocol Emulation
5. Introduction to IxExplorer
Non-Stateful Traffic Emulation to Layer 7
The ability to adjust the TCP / UDP port numbers allows Non-stateful layer 7
traffic emulation.
IxExplorer
Layer 1 to 4 stateful
interface.
IxExplorer
Layer 4 to 7 Non-
Stateful Traffic
Emulation
6. Introduction to IxExplorer
True Multi-User Environment Through Login Identification
The server software allows local and remote access across multiple client
consoles through secure or unsecured login process.
Daisy Chaining of up to 255 Chassis ***
Ixia allow up to 255 chassis to be Daisy-Chained via a sync cable or GPS
clock synchronisation.
Chassis chain control from a single or multiple client consoles.
7. Introduction to IxExplorer
Up to 255 Packet Streams ***
IxExplorer can generate up to 255 unique packet streams with an individual
data rate per stream.
Up to 255 Interleaved (Advanced) Streams ***
IxExplorer can generate up to 255 unique interleaved packet streams with
each allocated a % of the total line rate.
8. Introduction to IxExplorer
Latency and Packet Sequencing
IxExplorer can measure latency and packet sequencing across 65K packet
groups.
Operation Across Ixia’s Range of Hardware.
IxExplorer can be used on ATM, 10/100, Gig-E and 10 Gig-E Load Modules.
10. Introduction to IxExplorer
How Many interleaved packet streams can explorer
generate?
What OSI layers does IxExplorer operate within?
255
Section Review.
Layers 1 to 4. Non-stateful traffic to layer 7.
What is the maximum and minimum frame size IxExplorer
supports?
12 Bytes to 13,312 Bytes
How many chassis can be Daisy-Chained with IxExplorer?
255
Next Up: IxExplorer Operation
12. IxExplorer Operation – Operating Modes.
Operating Modes
IxExplorer can be operated locally (On chassis desktop) or remotely via
client software.
On opening IxExplorer you will be prompted to enter the I.P address of the
chassis.
• For local operation acceptable addresses are: ***
– 127.0.0.1
– The Chassis IP address or
– The word: “loopback”
• For Remote operation you must enter the Chassis IP address only.
13. IxExplorer Operation – The Interface.
The Interface
The interface consists of a Title Bar, Menus, Tool Bar, Transmit Bar,
Windows Area, Status Window and Status Bar.
Port Ownership allows multiple users to coincide without interfering with
each others tests. ***
14. IxExplorer Operation – Resource Tree.
Windows Area: Resource Tree
The resource tree is a tree view of available Chassis, cards and ports
available. ***
The tree view displays ownership of ports in brackets.
If port is already owned by another user the settings to adjust the packet
streams will be grayed out. ***
Ports 1,2 & 3 are owned by user 1,2 & 3 so the packet
streams are grayed out for configuration.
15. IxExplorer Operation – Port Ownership.
Windows Area: Resource Tree
When you select an un-owned port the packet streams are free for
configuration.
Ports 4 has no current ownership and can be configured.
16. IxExplorer Operation – Port Ownership.
User Management
You can select the user management pop-up through Multi-user > User
Management.
Ownership can also be taken and released by right clicking the level
required in the resource tree.
17. IxExplorer Operation – Generating Packet Streams.
Packet Streams
By default each port is configured with a single packet stream.
This is displayed by clicking on Packet Streams under the required port.
18. IxExplorer Operation – Generating Packet Streams.
Packet Streams
Streams are added as line items much like in an excel spread sheet. Right
clicking a stream gives you the ability to copy, paste, duplicate or insert a
new stream with default values.
Streams can be copied across ports, cards and chassis within the
resource tree.
Delete, copy, paste and duplicate
streams. Like Excel, multiple streams
can be selected simultaneously by
using the Ctl and shift keys.
19. IxExplorer Operation – Generating Packet Streams.
Packet Streams
Double clicking an individual packet stream brings up the stream properties
window, allowing you to configure the packet properties.
Double click the packet stream to
bring up the stream properties
window.
20. IxExplorer Operation – Configuring Packet Streams.
Stream Property Window
The stream property window has four main tabs. They are Frame Data,
Stream Control, Packet View and Warnings. ***
Frame Data to configure
frame size, payload and
MAC address.
Packet View breaks the
packet into it’s OSI layer
properties and displays in
both clear text and
Hexidecimal.
Stream Control to configure
stream rate and duration.
Warnings display any illegal
or incorrectly formed
packets. This tab is red
when an active warning is
present..
21. IxExplorer Operation – Configuring Packet Streams.
Packet Streams: Frame Data Tab
The frame data tab allows you to set the frame size, payload, preamble
size, MAC address and to insert time and sequence stamps.
Payload can be fixed,
increment, decrement,
random or custom.
Frame size can be
fixed, random,
increment or Auto.
DA / SA MAC.
Protocols tab allows you to set layer 3 – 4
properties.
22. IxExplorer Operation – Configuring Packet Streams.
Packet Streams: Frame Data Tab / Protocols
The protocols tab allows you to set the layer 2 – 4 properties. It also adds
Cisco ISL, VLAN’s and MPLS tags as required.
Ether Type Layer 3 Layer 4
Edit button to edit
IP parameters.
Layer 2
23. IxExplorer Operation – Configuring Packet Streams.
Packet Streams: Frame Data Tab / Protocols / Edit IP
The IP header allows you to set poriority (TOS QoS), Ip Dest and Source
address, packet fragmentation and TTL. ***
Clicking Edit TCP
opens the TCP
header window.
Here you can set the TCP / UDP
port numbers, sequence
number and all relevant flags.
24. IxExplorer Operation – Configuring Packet Streams.
Packet Streams: Stream Control
Through the stream control tab you can adjust the data rate by % of line
rate, packets/sec or bit rate. You also select how you want the stream to
terminate.
Rate Control.
Stream
Termination
25. IxExplorer Operation – Configuring Packet Streams.
Packet Streams: Stream Control
The available stream termination controls are continuous packet,
continuous burst, stop after this stream, advance to next stream return to
ID and return to ID for count.
26. IxExplorer Operation – Transmitting Streams.
Transmitting Streams
Once streams have been configured, you have inspected the packet view
for errors and the warning are clear you are able to start transmitting. ***
To run the packet streams select the level you would like to run from
• Selecting a chassis will run all streams attached to the chassis.
• Selecting a card will run all streams attached to the card.
• Selecting a port will only run streams attached to that port.
Port 1 of Card 2 Selected. Only streams on
this port will be transmitted.
Select desired option from Transmit Bar.
29. IxExplorer Practical Session.
Multi-User Logon
Use the Multi User Tab to logon to the Ixia chassis.
Take ownership of your allocated port.
• Verify your logon name next to your port in the tree view.
Click on a port that has a different logon name
• Try to change the packet settings
• Verify that the settings are grayed out.
Open the User Management window.
• View the current logins.
The instructor will now demonstrate how to clear your / some-one else's and
all logons.
30. IxExplorer Practical Session.
Creating Packet Streams
Create a single packet stream on your first assigned port with the following
parameters:
• Source MAC Address: 01 02 03 04 05 06 – Fixed
• Destination MAC: 06 05 04 03 02 01 – Fixed
• Payload Fixed – 01 02 03 04
• Frames Size: Random between 64 and 1518 Bytes
• Destination IP address: 100.0.0.1 - Fixed
• Source Address 100.0.0.2 – Fixed
• TCP Source Port: 1025
• TCP Destination Port: 80
On the second assigned port reverse the above parameters and apply
Transmit both streams
Open the statistic view and confirm traffic in both directions.
32. IxExplorer Operation
What are the acceptable IP address when accessing a
chassis in local mode?
Can you adjust the TOS / QoS bits in a packet? If so, how?
127.0.0.1, Chassis IP Address and the word “Loopback”
Section Review.
Yes, the IP configuration windows allows this action.
If a port is currently owned by another user can you release
their ownership without their consent?
Yes, you can clear all ownership through the User Management window
If you have selected card 2 from chassis 1 and clicked the
Run packet streams (Play) what streams will be transmitted?
All those attached to ports on card 2
34. Statistic Views.
Statistic Overview
Statistic views allows you to see the received data on a port.
Statistics are closely tied to capture filters and receive modes of the port.
Statistics are available as total count and rate per second.
Statistics can be viewed and graphed per packet stream.
Statistics can be used to generate logging and alerts.
Statistics can include filters for:
• TOS/QOS.
• Frame size.
• IP / MAC DA/SA.
• User defended filters set to a byte off-set.
Statistics can be:
• Graphed
• Combined with simple formulas i.e. Tx port 1 – Rx Port 2.
• Used to determine latency and packet sequence.
35. Statistic Views.
Quick Statistic on Individual ports
The quickest method to view statistics is per port.
Per Port Statistics
The quickest method to view statistics is per port.
Packet view is replaced with
statistics view.
Select the required port
and click statistics
view
36. Statistic Views.
Multi-port statistic view
You can select a number of ports to view statistics
together. This is possible by selecting the Statistics view
folder.
Select the Statistic
View Folder
Right click in the main
window.
Select the
required ports
from the
Select Port
window.
38. Statistic Views.
Multi-Port Statistics View Features
Add formulas
• The Stat view allows lines and formulas to be manipulated much
like an excel spread sheet.
Here you can
insert columns
and rows.
New Line
Inserted and
titled Frame
Loss
Formula for Port 1 Tx
subtract Port 2 Rx
entered according to
rows and columns
Rows, columns
and lines can
be formatted to
give emphasis.
39. Statistic Views.
Multi-Port Statistics View Graphing.
The statistic view is able to graph selected fields or save the chart
directly to an Excel spread sheet.
Select multiple
field by using
the Ctl or Shift
Key
Click the graph
button
Choose Line Graph
OR …..
A Bar Graph
40. Statistic Views.
Multi-Port Statistics View Alerts and Logging
By double clicking and field you can also add alerts and logging to the
Stats view:
• Setting the alert parameters and warning to be visual, audible or
both and click O.K.
Green for no alert
or alert trap
Amber to indicate
a previous alert
Red to indicate
current alert
41. Statistic Views.
Multi-Port Statistics View Receive Modes (TOS/QoS).
The receive mode selections creates automatic TOS/QOS filters or
allows user defined filters.
Selecting the receive mode of a port
allows for extended filters or
TOS/QOS filters on the statistics
view.
Additional
statistic filters on
routing and other
I.P protocols can
be added.
Statistic view with additional TOS filters.
42. Statistic Views.
Multi-Port Statistics View Receive Modes (UDS Filters).
Ixia also provide up to 4 User Defined Statistics and 1 Capture trigger.
These apply to addressing or a packet off-set.
45. IxExplorer Practical Session.
Statistic Views
Create 3 basic packet streams with different TOS, frames lengths, MAC
DA/SA and IP DA/SA.
Transmit into a loop-back with another port.
On the second port open a quick statistic view and verify you are receiving
packets. Identify the statistic available in this view.
Create a multi port statistic view containing your two ports.
Open the view and:
• Create a line and bar graph with at least two statistics,
• Add a line and create a formula to identify frame loss between the two
ports and format the line to give emphasis,
• Save the view as an Excel spreadsheet to your desktop,
• Add a few alerts to the view and practice with the parameters available.
46. IxExplorer Practical Session.
Statistic Views (Cont….)
Delete your statistic view
Change the receive mode of the port to QoS.
Create a new statistics view and verify you are filtering on TOS as set in the
transmit packet streams.
Change the receive mode of the port to User Defined Stats 5 & 6
Set a filter according to the transmit packet streams for,
• IP SA/DA on User defined Statistic 1,
• MAC SA on User Defined Statistic 2,
• Frame size on Defined Statistic 5,
• Select your own filter for Defined Statistic 6 ensuring it only collects
statistics from a single transmit packet stream.
Open the statistics view and verify the filters have been applied correctly
48. Statistic Views.
What receive modes are available to define filters on the
statistic view?
Are Alerts and Logging available in Quick Stat view?
Normal- UDS1&2. QOS- TOS Stats. User Defined Stats 5&6- Extended filtering
Section Review.
Yes
Can you produce graphs in Quick Stat view?
No, there are no formula or graphing functions in quick stat view.
Can you adjust frame rates from the statistics view?
Yes, you can start and stop transmitting ports and adjust average
frame rates.
50. Packet Group Statistic Views.
Packet Group Statistic Overview
Through the Packet Group Statistic View function, Ixia provide a means of
measuring latency / sequence on a per Stream basis.
The per stream measurement allows the user to identify latency and packet
sequencing with different frame sizes, TOS/QOS, TCP port numbers and
protocols.
A maximum of 65,000 streams can be monitored individually on any
receiving port.
Operates through inserting a time stamp and Packet Group ID (PGID) at
user defined off-set.
Latency, like statistics views can be graphed or saved into a Excel spread
sheet.
LATENCY MUST BE SET UP TO SEND AND RECEIVE TIME STAMPS FROM
THE SAME OFF-SET IN BOTH TRANSMIT AND RECEIVE MODES.
51. Packet Group Statistic Views.
Receive Mode.
The intended receive port must be configured for latency measurements in
the receive mode configuration window.
Select the port receive mode
then check packet groups.
Assign off-set and packet
group signature to fit the
expected TX packet.
The apply to all port saves
configuring multiple times.
52. Packet Group Statistic Views.
Transmit Mode.
Create a packet capable of traversing the network / device under test.
Check Time Stamp and
Packet Group Signature
then click Edit
Unless there is a special
requirement check the Use
PGID config, Use Stream
Number and Apply to all
streams checkboxes.
53. Packet Group Statistic Views.
Creating View
Opening a Packet Group Statistic view is identical to opening a statistic view.
Right click in the main
window.
Select the
required ports
from the
Select Port
window.
54. Packet Group Statistic Views.
Results
You can now view latency / statistics for up to 65,000 individual packet
streams.
Latency only displays
Min/Avg/Max latency
and Total Frames
received.
Sequencing displays
small, big and reverse
errors.
55. Packet Group Statistic Views.
Results
You can now view latency / statistics for up to 65,000 individual packet
streams.
Add formulas to calculate
customised statistics
Right click and select create
report to take a snap shot of the
latency / sequence statistics.
Report is added as a additional
tab. You can perform this multiple
times throughout a test.
Select one or multiple fields to
graph over time.
58. IxExplorer Practical Session.
Packet Group Statistic Views
Create a basic packet stream with no Layer 2,3,or 4 protocols.
Set the data rate to 10 %.
Set the receive mode of your port to Packet Groups and Sequencing
Checking.
Open your basic packet and check Time Stamp and Sequencing.
Click edit and check use packet group config and Use Stream Number as ID
Create a Packet Group Statistic view for you are your parented port.
Clear all timestamps and sequence numbers.
Run your packet stream.
Open you Latency / Sequence view, start the capture and verify you latency
results are being received.
Add a formula to convert bits Rx’ed per Sec to Frames Rx’ed per Sec.
Create a latency report.
Graph over time your Max, Min and Avg latency.
60. Packet Group Statistic Views.
How many packet streams can be measured with the
Latency / Sequence view.
What are Big errors defined as in the Sequence view?
65,000
Section Review.
Errors that are larger than the defined sequence tolerance.
What is the name of the field that associates a received
frame with it’s transmitted counterpart?
Packet Group ID (PGID)
What are the TWO methods for assigning a PGID to a packet
stream?
Automatically assign from the stream number or assign manually.
62. Port Groups and Stream Statistics.
Port Groups
The Ixia chassis allows you to group ports.
This allows you to perform functions across a group of ports instead of
individually.
These functions include:
• Run, Stop and Step Through packet streams,
• Group capture,
• Group port ownership functions:
– Take ownership
– Clear ownership
Stream Statistics
Stream statistics allow you to view the frame count and rate transmitted from
a port on a per stream basis.