Abstract:
Methods, systems, and computer readable media for receiving a clock synchronization message are disclosed. According to one exemplary method, the method occurs at a first node configured to operate on a protected side of a firewall device. The method includes sending, via the firewall device and to a second node configured to operate on a non-protected side of the firewall device, a clock lease message indicating an amount of time for clock synchronization, wherein the clock lease message triggers the firewall device to allow a clock synchronization message from the second node to the first node. The method also includes receiving, via the firewall device and from the second node, the clock synchronization message.
Abstract:
Methods, systems, and computer readable media for receiving test configuration information are disclosed. According to one exemplary method, the method occurs at a node configured to operate in a private network. The method includes registering node identification information with a registration server. The method also includes sending a keep-alive message to the registration server. The method further includes receiving, in response to the keep-alive message and via the registration server, test configuration information from a configuration system outside the private network.
Abstract:
Methods, systems, and computer readable media for receiving test configuration information are disclosed. According to one exemplary method, the method occurs at a node configured to operate in a private network. The method includes registering node identification information with a registration server. The method also includes sending a keep-alive message to the registration server. The method further includes receiving, in response to the keep-alive message and via the registration server, test configuration information from a configuration system outside the private network.
Abstract:
Methods, systems, and computer readable media for receiving a clock synchronization message are disclosed. According to one exemplary method, the method occurs at a first node configured to operate on a protected side of a firewall device. The method includes sending, via the firewall device and to a second node configured to operate on a non-protected side of the firewall device, a clock lease message indicating an amount of time for clock synchronization, wherein the clock lease message triggers the firewall device to allow a clock synchronization message from the second node to the first node. The method also includes receiving, via the firewall device and from the second node, the clock synchronization message.
Abstract:
Methods, systems, and computer readable media for network diagnostics are disclosed. According to one method, the method occurs at a diagnostics controller implemented using at least one processor. The method includes configuring a plurality of diagnostics nodes to observe traffic behavior associated with a system under test (SUT). The method also includes observing, using the diagnostics nodes, traffic behavior associated with the SUT. The method further includes detecting, using the traffic behavior, a SUT issue. The method also includes identifying, using SUT topology information, a network node in the SUT associated with the SUT issue. The method further includes triggering one of the diagnostics nodes to obtain node related information from the network node, wherein the diagnostics node uses at least one communications protocol to poll the network node for the node related information. The method also includes diagnosing, using the node related information, the SUT issue.
Abstract:
Methods, systems, and computer readable media for facilitating the resolving of endpoint hostnames in test environments with firewalls, network address translators (NATs), or clouds is disclosed. According to one exemplary method, the method occurs at a registration server configured to operate in a public network. The method includes receiving, from a first endpoint, a packet including a payload containing a first address and a hostname associated with the first endpoint. The method also includes identifying a second address from a header of the packet. The method also includes initiating, using the second address, a connection to the first endpoint. The method also includes determining whether the connection is successful. The method further includes associating the hostname of the first endpoint with one of the first address and the second address based on results of the determination.
Abstract:
Methods, systems, and computer readable media for testing network devices using simulated application traffic are disclosed. One method includes steps implemented in a network equipment test device including at least one processor. The method includes emulating data transfer operations of a plurality of server applications. The method further includes receiving application traffic from a plurality of different client applications. The method further includes queuing incoming connections received from the client applications. The method further includes, for each of the connections, attempting to correlate application-level data with one of the emulated server applications. The method further includes, in response to successful correlation of the received application-level data one of the emulated server applications, performing application-specific processing for the emulated server application. Performing application-specific processing includes sending data from an emulated server application to a client application through a device under test.
Abstract:
The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for testing a network device under test (DUT) includes exchanging a sequence of data packages over a transmission control protocol (TCP) connection between a client and a server and through the network DUT. The method includes storing client sequence identifiers and server sequence identifiers. The method includes synchronizing, in response to detecting an error on the TCP connection, the client and the server to a last data package exchanged prior to the error using the client sequence identifiers and the server sequence identifiers and resuming a test script at a next data package after the last data package exchanged prior to the error in the sequence of data packages.
Abstract:
Methods, systems, and computer readable media for initiating and executing a performance test of a private network and/or components thereof are disclosed. Methods and systems include a receiver endpoint in a private network, and a sender endpoint in a public network. The receiver endpoint initiates a transport layer connection with the sender endpoint. The sender endpoint allocates a port, binds to the port, and sends an Internet Protocol (IP) address and a port number over the transport layer connection. The receiver endpoint then sends a hole punch datagram from the private network to the public network to create a hole in a firewall that is separating the public and private networks. The sender endpoint receives the hole punch datagram and uses IP address and port information in the hole punch datagram to send test traffic through the hole in the firewall.
Abstract:
The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for testing a network device under test (DUT) includes exchanging a sequence of data packages over a transmission control protocol (TCP) connection between a client and a server and through the network DUT. The method includes storing client sequence identifiers and server sequence identifiers. The method includes synchronizing, in response to detecting an error on the TCP connection, the client and the server to a last data package exchanged prior to the error using the client sequence identifiers and the server sequence identifiers and resuming a test script at a next data package after the last data package exchanged prior to the error in the sequence of data packages.