Abstract:
A method for network tapping and packet brokering in wireless networks includes tapping a signal in a wireless network and determining whether the signal is a valid signal according to a wireless network protocol. In response to determining that the signal is a valid signal according to the wireless network protocol, the signal is demodulated into a sequence of bits arranged according to the wireless network protocol. In response to determining that the signal is not a valid signal according to the wireless network protocol, an indication that the signal is not a valid signal according to the wireless network protocol is generated. A packet in a format compatible with a network tapping and packet brokering system is generated. At least some of the bits or the indication is inserted in the packet. The packet is transmitted to the network tapping and packet brokering system.
Abstract:
Methods, systems, and computer readable media for testing wireless devices is disclosed. In some examples, a system for testing wireless devices in wireless environments comprises a test server and a wireless device tester implemented on the test server. The test server includes at least one processor and memory storing, for each wireless device of different types of wireless devices, a wireless emulation waveform received from the wireless device during operation of the wireless device. The wireless device tester is configured for receiving emulation requests specifying wireless devices and wireless environments for testing. The wireless device tester is configured for transmitting, for each request, a responsive wireless emulation waveform to a wireless device emulator physically located in the specified wireless environment and determining a performance metric for the wireless device within the specified wireless environment.
Abstract:
The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting physical link intrusions includes monitoring a link delay signature associated with a physical link based on one-way link delay measurements obtained using at least one network tap. The method also includes determining whether a change in the link delay signature has met or exceeded a threshold value. The method further includes in response to determining that the change in the link delay signature has met or exceeded the threshold value, determining that a physical link intrusion has occurred.
Abstract:
The subject matter described herein relates to method, systems, and computer readable media for detecting physical link intrusions. A method for detecting physical link intrusions includes monitoring a link delay signature associated with a physical link based on one-way link delay measurements obtained using at least one network tap. The method also includes determining whether a change in the link delay signature has met or exceeded a threshold value. The method further includes in response to determining that the change in the link delay signature has met or exceeded the threshold value, determining that a physical link intrusion has occurred.
Abstract:
A method for network tapping and packet brokering in wireless networks includes tapping a signal in a wireless network and determining whether the signal is a valid signal according to a wireless network protocol. In response to determining that the signal is a valid signal according to the wireless network protocol, the signal is demodulated into a sequence of bits arranged according to the wireless network protocol. In response to determining that the signal is not a valid signal according to the wireless network protocol, an indication that the signal is not a valid signal according to the wireless network protocol is generated. A packet in a format compatible with a network tapping and packet brokering system is generated. At least some of the bits or the indication is inserted in the packet. The packet is transmitted to the network tapping and packet brokering system.
Abstract:
Methods, systems, and computer readable media for monitoring and/or testing network communications are disclosed. A method for monitoring network communications includes receiving packets from a network connected device, determining features associated with either the network connected device or a communications network to which the network connected device is connected by actively or passively monitoring or testing the packets, and automatically switching between passively monitoring or testing the packets and actively monitoring or testing the packets in response to receiving a packet carrying instructions.
Abstract:
Methods, systems, and computer readable media for monitoring, adjusting, and utilizing latency associated with accessing distributed computing resources are disclosed. One method includes measuring a first latency associated with accessing a first computing resource located at a first site. The method further includes the measuring a second latency associated with accessing a second computing resource located at a second site different from the first site. The method further includes selectively impairing transmission of packets to or processing of packets by at least one of the first and second computing resources in accordance with a performance, network security, or diagnostic goal.
Abstract:
A wireless access point or other transmitter can be configured to inject a supplemental signal into a data modulated carrier signal. In some examples, a transmitter system includes an antenna, a primary modulator, and a supplemental modulator. The primary modulator receives a baseband data signal and a carrier signal and outputting to the antenna a data modulated carrier signal according to a communications protocol. The supplemental modulator injects a supplemental signal into the data modulated carrier signal by distorting the data modulated carrier signal within an error bound of the communications protocol. A corresponding receiving system includes an antenna and a supplemental signal detector for detecting the supplemental signal by detecting the distortion within the data modulated carrier signal.
Abstract:
A wireless access point or other transmitter can be configured to inject a supplemental signal into a data modulated carrier signal. In some examples, a transmitter system includes an antenna, a primary modulator, and a supplemental modulator. The primary modulator receives a baseband data signal and a carrier signal and outputting to the antenna a data modulated carrier signal according to a communications protocol. The supplemental modulator injects a supplemental signal into the data modulated carrier signal by distorting the data modulated carrier signal within an error bound of the communications protocol. A corresponding receiving system includes an antenna and a supplemental signal detector for detecting the supplemental signal by detecting the distortion within the data modulated carrier signal.
Abstract:
Methods, systems, and computer readable media for monitoring and/or testing network communications are disclosed. A method for monitoring network communications includes receiving packets from a network connected device, determining features associated with either the network connected device or a communications network to which the network connected device is connected by actively or passively monitoring or testing the packets, and automatically switching between passively monitoring or testing the packets and actively monitoring or testing the packets in response to receiving a packet carrying instructions.