Software Frame Simulator (SFS) Technion CS Computer Communications Lab (236340) in cooperation with ECI telecom Uri Ferri & Ynon Cohen January 2007.

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

Technology Made Easy!! Telnet and Voice over internet Protocol(VOIP) By: Nicolette Johnson Peta-Lee Richards.
Categories of I/O Devices
TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
September 20, 2002G2E 2002 GSA Technical Forum1 Best Of Breed (BOB) Standard.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
 Introduction Originally developed by Open Software Foundation (OSF), which is now called The Open Group ( Provides a set of tools and.
CSCI 4550/8556 Computer Networks Comer, Chapter 3: Network Programming and Applications.
CompuNet Grid Computing Milena Natanov Keren Kotlovsky Project Supervisor: Zvika Berkovich Lab Chief Engineer: Dr. Ilana David Spring, /
Octopus system1 Moshe Tocker Avihai Mejer. Octopus system2 The Octopus system Goal The system’s primary goal is to Measure performance parameters in real.
1 Network Packet Generator Characterization presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Student Projects in Computer Networking: Simulation versus Coding Leann M. Christianson Kevin A. Brown Cal State East Bay.
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing software on personal computer
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
UNIT-V The MVC architecture and Struts Framework.
Interconnection Protocol Mustafa Kara Term Work.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
UNIX SVR4 COSC513 Zhaohui Chen Jiefei Huang. UNIX SVR4 UNIX system V release 4 is a major new release of the UNIX operating system, developed by AT&T.
Introducing Axis2 Eran Chinthaka. Agenda  Introduction and Motivation  The “big picture”  Key Features of Axis2 High Performance XML Processing Model.
DELTA TAU Data Systems, Inc. 1 UMAC TurboTurbo PMAC PCIGeo Drive Single Source Machine Control motion logic data Power PMAC Project Management November.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks QUME 185 Introduction to Computer Applications.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
1 © 2008 Avaya Inc. All rights reserved. IPOffice Configuration Service Emil Ratnam.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila.
BLU-ICE and the Distributed Control System Constraints for Software Development Strategies Timothy M. McPhillips Stanford Synchrotron Radiation Laboratory.
© 2008 Open Grid Forum Independent Software Vendor (ISV) Remote Computing Primer Steven Newhouse.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
1 Cisco Unified Application Environment Developers Conference 2008© 2008 Cisco Systems, Inc. All rights reserved.Cisco Public Introduction to Etch Scott.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
TTCN-3 MOST Challenges Maria Teodorescu
Grid Services I - Concepts
SEE-GRID-SCI The SEE-GRID-SCI initiative is co-funded by the European Commission under the FP7 Research Infrastructures contract no.
Client-Server Model of Interaction Chapter 20. We have looked at the details of TCP/IP Protocols Protocols Router architecture Router architecture Now.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
SKYPIAX, how to add Skype capabilities to FreeSWITCH (and Asterisk) CHICAGO, USA, September 2009.
Information Technology Division Executive Office for Administration and Finance Service Oriented Architecture An Enterprise Approach to Enabling the Business.
Kemal Baykal Rasim Ismayilov
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Copyright © 2012 Kendall Electric, Inc. All rights reserved.
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
Reconfigurable Communication Interface Between FASTER and RTSim Dec0907.
By J Swetha ( ) V V Aishwarya ( ).
Executive Overview. Software modeling is essential, because it is the map that guides your developers. Additionally: Modeling Software  Visual information.
Copyright © 2004, Keith D Swenson, All Rights Reserved. OASIS Asynchronous Service Access Protocol (ASAP) Tutorial Overview, OASIS ASAP TC May 4, 2004.
Integrating and Extending Workflow 8 AA301 Carl Sykes Ed Heaney.
CSCI/CMPE 4334 Operating Systems Review: Exam 1 1.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 13 Computer Programs and Programming Languages.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Chapter Objectives In this chapter, you will learn:
Data Transport for Online & Offline Processing
Enterprise Computing Collaboration System Example
WEB API.
Presentation transcript:

Software Frame Simulator (SFS) Technion CS Computer Communications Lab (236340) in cooperation with ECI telecom Uri Ferri & Ynon Cohen January 2007

AGENDA Background and Motivation Product overview Features Deployment Technology

Background and Motivation High cost of network testing and simulation hardware High cost of network testing and simulation hardware Low availability of hardware-based testing equipment Low availability of hardware-based testing equipment Software-based simulators are more agile and therefore easier to configure and extend. Software-based simulators are more agile and therefore easier to configure and extend.

Product Overview SFS simulates networking hardware for testing purposes: Lower cost of testing equipment Support various protocols, network topologies and testing scenarios in a single user friendly tool Provide infrastructure for future extensions, such as additional protocols and testing behaviors

Features – packet generation Send frames of various protocols: Currently supported protocols include: EthernetIPArp Igmp V2&V3 TcpUdp Complete control over packet content using xml import/export Support packet customization storage and reuse Includes library of default packets for cases in which packet contents are insignificant Support for default packet customization

Configuring a Packet

Sending the Packet

Features – versatile behaviors –Compose complex behaviors using simple atomic behaviors: Send Message Listen for Message Wait –Example: Send Tcp Msg Wait 10 secs Receive Tcp Msg Wait 20 secs

Features – versatile behaviors –Composing operations: Concatenation Multiplication –Example: Repeat X10 Send Tcp Msg Wait 10 secs Receive Tcp Msg Wait 20 secs

Features – versatile behaviors –Arbitrary compositions: Free usage of atoms and customized composite behaviors Save complex pre-defined compositions for future use as parts of even more complex behaviors. –Example: Repeat X10 Activate behavior A from file A.xml Wait 10 secs Activate behavior B

Configuring an Agent using a protocol from a file

Configuring an Agent using an inlined protocol

Configuring an Agent using the default protocol

Using the Agent

Features – end point simulation –Simulate endpoints such as computers, set top boxes, servers etc. –Each simulated machine has its own properties and behaviors: Ethernet and IP address Configured agent to perform specific behavior Runs as an independent resource (thread) on the test machine itself

Configuring an EndPoint

Activating the EndPoint

Features – end point simulation Definition and usage of a sequence of similar (but not identical) endpoints - as simple as using a single endpoint. May be used to simulate a network of client computers, or set top boxes. Infrastructure also supports mixed endpoint sequences for use in future extensions.

Configuring an EndPoint sequence

Activating the EndPoint sequence

Features – configuration – Complete control over the main simulation entities: Packets of all supported protocols Composite behaviors End points and end point sequences – External configuration through use of xml documents: Every entity has a well defined configuration file. Support for three types of compositions : – Inline : for ease of use. – Reference: for extensibility and reuse of definitions. – Default: to shorten definition, when specific details are less important.

Deployment –External independent testing software tool. A single executable file, which includes a command line interface, may be installed on any PC with a network card. Command line enables single line, easy to use, stateless instructions. Simple xcopy installation Possible use: –Simulator for massive networks with multiple end users, routers and servers. –Specifically, simulate a full IPTV infrastructure for DSLAM testing –Embedded in an existing application Controller API is exposed for use by the programmer. Possible use: –Stub for unit testing without use of hardware.

Technology - overview Project involved refactoring and expanding of an existing tool into a versatile testing infrastructure. Most of the original code was refactored. Only few of the original communication services remain. Support for IGMP V3 protocol was added. Adopted Standards: – Object Oriented design and implementation – Use of design patterns – Utilization of industry standard STL as source for data containers, and other open-source libraries for services such as XML parsing. 23

Technology - design Object Oriented Design: – Full class hierarchy for packet protocols and behaviors. – Implementation in C++. 24

Technology – design Design Patterns: – Factory design pattern: Templated factories are utilized for creation of packets, Behaviors, and Endpoints. Required design and implementation of class metadata and reflection, not internally supported by c++. – Composite design pattern: Used to allow generic, complex Behaviors. More atoms and composition rules may easily be added programmatically, in order to further enhance this feature. 25

Technology – design example 26