Network Design Testing and Prototyping in Computer Networks

itec 275 n.w
1 / 83
Embed
Share

"Learn about the importance of testing network designs in computer networks, including reasons to test, industry testing tools, respected independent test labs, and the scope of prototype systems. Understand the difference between testing simple and complex network designs for optimal performance and reliability."

  • Network Design
  • Testing
  • Prototyping
  • Computer Networks
  • Network Tools

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. ITEC 275 Computer Networks Switching, Routing, and WANs Week 11 Robert D Andrea 2015

  2. Agenda Learning Activities Industry Tests Build and Test a Prototype Write and Implement a Test Plan Tools for Testing a Network Design Multicasting QoS Queuing and Traffic Shaping

  3. Reasons to Test Verify that the design meets key business and technical goals Validate LAN and WAN technology and device selections Verify that a service provider provides the agreed- up service Identify bottlenecks or connectivity problems Determine optimization techniques that will be necessary

  4. Reasons to Test Proving that your network design is better than a competing design Passing an acceptance test that gives you approval to go forward with the network implementation Reassure mangers and co-workers that your design is effective Identifying any risks that might impede implementation and planning for contingencies Determine how much additional testing might be required. Will the new system be deployed as a pilot and undergo additional testing before being implemented

  5. Testing Your Network Design Use industry testing services Build and test a prototype system Use third-party and Cisco tools

  6. Respected Independent Test Labs The Interoperability Lab at the University of New Hampshire (IOL) ICSA Labs Miercom Labs AppLabs The Tolly Group Penetration Testing test your network and applications before the bad guys do.

  7. Simple verses Complex Network Designs Simple network designs can rely on test results from vendors, independent labs, or trade journals to prove to your customer that your design will perform as intended. Complex network designs require more considerations. Testing should be implemented in-house Testing will require more than component testing. There will be a need for unit, integration, and system testing.

  8. Scope of a Prototype System Normally, it is impractical to implement a full-scale network system. A prototype should verify important capabilities and functions that might not perform adequately. Risky functions include complex, intricate functions and functions that were influenced by the need to make tradeoffs with other network components.

  9. Live Production Network Perform initial testing during off-hours to minimize issues with user community, performance, and existing traffic flow. Perform final testing during normal hours and benchmark the performance. Perform final testing at various times to exercise the network during typical loads and benchmark the performance.

  10. Test Plan What is a Test Plan? Your test plan is primarily comprised of test cases and test items. Think of a test case as a scenario or a finite state in which your network might find itself. In each test case, you'll have a list of test items or functions or features that you want to evaluate. Each test item should include not just an action, but the success criteria, and if you want to get more sophisticated, criticality. For example, you might want to make sure a business-critical application still work after a network change. So you'd arrange to have the application owners create a transaction or operate the application.

  11. Components of a Test Plan Test objectives and acceptance criteria The types of tests that will be run Network equipment and other resources required Testing scripts The timeline and milestones for the testing a project

  12. Components of a Test Plan Test objectives and acceptance criteria Objectives and acceptance should be based on a customer s business and technical goals Acceptance of test results are acceptable by both the customer and the tester. Measure response time Measure applications throughput Measure the amount of time it takes to hear a dial tone using Voice over IP Establish a baseline measurement of CRC errors

  13. Test Objectives and Acceptance Criteria Specific and concrete Based on business and technical goals Clear criteria for declaring that a test passed or failed Avoid biases and preconceived notions about outcomes If appropriate, reference an established baseline

  14. Test Plan Considerations Network Connectivity Section Is Layer 2 set up appropriately? (VLANs on the right trunks, PVCs, etc.) Do your router tables have the proper routes? (Check the next hops and ages, too.) Can you ping everywhere in the network? (Performance: Are the times acceptable?) Do traceroutes show paths you would expect? If you load balance across the core of your network, verify each link is being used. Is DHCP handing out addresses? DNS resolving names properly? Does your remote access still work?

  15. Test Plan Considerations Application Connectivity Section Does VOIP work? Is it showing up in the right queues? Are your firewalls and proxies blocking and allowing traffic appropriately? Can you browse the Web? Are your network management and logging systems working? Do your business applications work? (And do transactions complete in an acceptable time?) Are backup jobs still working?

  16. Achieve Success with a New Network Design Your chances of success are much greater if you perform several simple tests along the way, rather than waiting until you think you're done and discovering that something doesn't work. Performing simple incremental tests along the way help testers and customers maintain a sense of truthfulness and confidence about in the system being tested.

  17. Types of Tests Application response-time tests with terminal Throughput tests (I/O) Availability tests (failure test) Regression tests (does the network perform similarly after changes were implemented)

  18. Types of Tests What is Protocol Testing? To understand the behavior of a protocol, it must be tested to observe the protocol s functionality Verify every phase of testing life cycle for 1. Functionality testing 2. Interoperability testing (IOT) is the process of testing to determine the interoperability of a software product 3. Performance Obtain tools to generate and test the protocol messages

  19. Types of Tests Why is Protocol Testing required? Different vendor products need to communicate with each other If any product is using this standards in their devices they are interoperable with other vendor devices as both must meet compliance to Standards of IETF/RFC to study the network through their packet data Protocol testing ensures proper functionality of various elements of a message. It also ensures whether it has designed as per specification.

  20. Resources Needed for Testing Test plan should include a network topology drawing for tester to be able to reference. A list of switches, routers, bridges, firewalls, servers, telephone equipment, and wireless access points. A list of documented version numbers for hardware and software. Scheduled time in a lab either at your site or the customer s site Power, air conditioning, rack space, and other physical resources Help from co-workers or customer staff Help from users to test applications Network addresses and names

  21. Resources Needed for Testing How it is carried out? Objective: To test the protocol i.e. to check every node with their packet data. Tools: Protocol Analyzer and simulator.

  22. Example Test Script Workstations Server 1 Firewall Network A Network B Protocol Analyzer Protocol Analyzer

  23. Example Test Script (continued) Test objective. Assess the firewall s capability to block Application ABC traffic, during both light and moderately heavy load conditions. Acceptance criterion. The firewall should block the TCP SYN request from every workstation on Network A that attempts to set up an Application ABC session with Server 1 on Network B. The firewall should send each workstation a TCP RST (reset) packet.

  24. Example Test Script (continued) 1. Start capturing network traffic on the protocol analyzer on Network A. Start capturing network traffic on the protocol analyzer on Network B. Run Application ABC on a workstation located on Network A and access Server 1 on Network B. Stop capturing network traffic on the protocol analyzers. 2. 3. 4.

  25. Example Test Script (continued) Display data on Network A s protocol analyzer 5. and verify that the analyzer captured a TCP SYN packet from the workstation. Verify that the network layer destination address is Server 1 on Network B, and the destination port is port 1234 (the port number for Application ABC). Verify that the firewall responded to the workstation with a TCP RST packet.

  26. Example Test Script (continued) 6. Display data on Network B s protocol analyzer and verify that the analyzer did not capture any Application- ABC traffic from the workstation. Log the results of the test in the project log file. Save the protocol-analyzer trace files to the project trace- file directory. Gradually increase the workload on the firewall, by increasing the number of workstations on Network A one at a time, until 50 workstations are running Application ABC and attempting to reach Server 1. Repeat steps 1 through 8 after each workstation is added to the test. 7. 8. 9.

  27. Example Test Script (continued) Host A sends a TCP SYNchronize packet to Host B Host B receives A's SYN Host B sends a SYNchronize-ACKnowledgement Host A receives B's SYN-ACK Host A sends ACKnowledge Host B receives ACK. TCP socket connection is ESTABLISHED.

  28. Tools for Testing a Network Design Network-management and monitoring tools. These monitoring tools are used to alert network management to problems and report significant network problems. Traffic generation tools Modeling and simulation tools QoS and service-level management tools Protocol analyzer http://www.topdownbook.com/tools.html

  29. Protocol Analyzer Tool A protocol analyzer is used to analyze traffic behavior, errors, utilization, efficiency, and rates of broadcast and multicast packets. A protocol analyzer can be a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.

  30. Simulation Tool A simulation tool enables you to develop a model of a network, estimate the performance of the network and compare alternatives for implementing the network. iTrinegy Network Emulator (INE) products enable you to realistically recreate a wide variety of network conditions like latency, jitter, packet loss/error/reordering and bandwidth restrictions so that you can simulate environments such as Wide Area Networks (WANs), Wireless LANs, GPRS, 3G, IP over Radio / Radio over IP(RoIP), Satellite or MPLS networks.

  31. Command Tools Test Tools: ipconfig ping <IP address> ping <DNS name> tracert <DNS name> nslookup <DNS name> nslookup yahoo.com netstat ping ping yahoo.com tracert yahoo.com netstat -a

  32. Reasons to Optimize Meet key business and technical goals Use bandwidth efficiently Control delay and jitter Reduce serialization delay Support preferential service for essential applications Meet Quality of Service (QoS) requirements

  33. IP Multicast Server Server

  34. IP Multicast Router/MCS The Miscellaneous Control Subsystem (MCS) works with its companion Routing Engine to provide control and monitoring functions for router components. It also generates a clock signal for the SONET/SDH interfaces on the router.

  35. IP Multicast Applications Applications that take advantage of multicast include video conferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news.

  36. IP Multicast Helps Optimize Bandwidth Usage With IP multicast, you can send a high-volume multimedia stream just once instead of once for each user Requires support for Multicast addressing Multicast registration (IGMP) Multicast routing protocols

  37. IP Multicast Addresses IPv4 Multicast Addresses 224.0.0.0 to 239.255.255.255 IPv6 Multicast Addresses FF02:0:0:0:0:0:0:1 All Nodes Address FF02:0:0:0:0:0:0:2 All Routers Address

  38. IP Multicast Helps Optimize Bandwidth Usage To map an IP multicast address to a MAC- layer multicast address, the low order 23 bits of the IP multicast address are mapped directly to the low order 23 bits in the MAC-layer multicast address. Because the first 4 bits of an IP multicast address are fixed according to the class D convention, there are 5 bits in the IP multicast address that do not map to the MAC-layer multicast address.

  39. IP Multicast Addressing Uses Class D multicast destination address 224.0.0.0 to 239.255.255.255 Converted to a MAC-layer multicast destination address The low-order 23 bits of the Class D address become the low-order 23 bits of the MAC-layer address The top 9 bits of the Class D address are not used The top 25 bits of the MAC-layer address are 0x01:00:5E followed by a binary 0

  40. Internet Group Management Protocol (IGMP) Allows a host to join a multicast group Host transmits a membership-report message to inform routers on the segment that traffic for a group should be multicast to the host s segment IGMPv2 has support for a router more quickly learning that the last host on a segment has left a group

  41. Multicast Routing Protocols Becoming obsolete Multicast OSPF (MOSPF) Distance Vector Multicast Routing Protocol (DVMRP) Still used Protocol Independent Multicast (PIM) Dense-Mode PIM Sparse-Mode PIM

  42. Multicast Routing Protocols

  43. Multicast Routing Protocols What is PIM? Protocol-Independent Multicast (PIM) is a family of multicast routing protocol for Internet Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet. It is termed protocol- independent because PIM does not include its own topology discovery mechanism, but instead uses routing information supplied by other routing protocols.

  44. PIM (Protocol Independent Multicast) Dense mode is used when there are many members (employees listen to a company president). PIM is similar to DVMRP. Both use reverse-path forwarding (RPF) mechanism to compute the shortest (reserve) path between a source and all possible recipients of a multicast packet. Dense PIM does not require the computation of routing tables.

  45. PIM (Protocol Independent Multicast) What is PIM Dense Mode? Dense mode PIM is the older and simpler PIM mode. It works well in small networks where there are a large number of listeners, but is inefficient in larger network.

  46. PIM Dense Mode

  47. PIM Dense Mode

  48. PIM (Protocol Independent Multicast) Sparse mode utilizes a rendezvous point (RP). A rendezvous point provides a registration service for a multicast group. Sparse mode PIM relies on IGMP which let a host join a group by sending a membership- report message, and detach from a group by sending a leave message.

  49. PIM (Protocol Independent Multicast) PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PIM-SM generally scales fairly well for wide- area usage.

  50. Serialization What is serialization? Serialization is the process of translating data structures or object state into a format that can be stored (for example, in a file or memory buffer, or transmitted across a network connection link) and reconstructed later in the same or another computer environment. When the resulting series of bits is reread according to the serialization format, it can be used to create a semantically identical clone of the original object.

More Related Content