EAST System Architecture
EAST System Architecture
Contents
1. INTRODUCTION.............................................................................................................................................................5
1.1 PURPOSE.....................................................................................................................................................................5
1.2 SCOPE.........................................................................................................................................................................5
1.3 VOCABULARY.............................................................................................................................................................5
1.4 REFERENCES...............................................................................................................................................................7
2. ARCHITECTURE CONSIDERATION..........................................................................................................................8
2.1 ASSUMPTIONS AND DEPENDENCIES............................................................................................................................8
2.2 CONSTRAINTS.............................................................................................................................................................8
2.3 RISKS AND VOLATILE AREAS.....................................................................................................................................9
3. HIGH LEVEL ARCHITECTURAL OVERVIEW........................................................................................................9
3.1 SOFTWARE ARCHITECTURE.......................................................................................................................................10
3.1.1 Description..........................................................................................................................................................10
3.2 HARDWARE ARCHITECTURE.....................................................................................................................................11
3.2.1 Description..........................................................................................................................................................11
3.3 SYSTEM BLOCK DIAGRAMS......................................................................................................................................13
3.3.1 Main EAST Block Diagram................................................................................................................................13
3.3.2 EAST Platform Block Diagram...........................................................................................................................14
3.3.3 EAST Adaption Layer Diagram..........................................................................................................................15
3.3.4 EAST Services Block Diagram............................................................................................................................15
3.3.5 EAST Core Block Diagram.................................................................................................................................17
4. SYSTEM DECOMPOSITION.......................................................................................................................................18
4.1.1 Introduction.........................................................................................................................................................19
4.1.2 EAST Platform Subsystem...................................................................................................................................19
4.1.2.1 Base Hardware sub subsystem..................................................................................................................................19
4.1.2.2 Interface Hardware sub subsystem............................................................................................................................20
4.1.2.3 Operating System sub subsystem..............................................................................................................................21
4.1.2.4 Interface Drivers sub subsystem................................................................................................................................21
4.1.2.5 System Tools sub subsystem.....................................................................................................................................21
4.1.3 EAST Adaption Layer Subsystem........................................................................................................................22
4.1.3.1 OS Adaption Layer ss-system...................................................................................................................................22
4.1.3.2 NH Adaption Layer sub subsystem...........................................................................................................................22
4.1.3.3 NPU Adaption Layer sub subsystem.........................................................................................................................23
4.1.4 EAST Services Subsystem...................................................................................................................................23
4.1.4.1 Protocol Server..........................................................................................................................................................24
4.1.4.2 IPXPress ss-system...................................................................................................................................................34
4.1.4.3 DataGenerator ss-system...........................................................................................................................................36
4.1.4.4 Licensing sub subsystem...........................................................................................................................................36
4.1.4.5 Security:.................................................................................................................................................................... 37
4.1.4.6 CLI............................................................................................................................................................................ 37
4.1.4.7 Event......................................................................................................................................................................... 38
4.1.4.8 Database....................................................................................................................................................................39
4.1.4.9 Process [Service Component]...................................................................................................................................39
4.1.4.10 Command [Service Component]...............................................................................................................................39
4.1.4.11 Resource [Service Component].................................................................................................................................39
Table of Figures
Figure 3 - EAST Software Architecture...................................................................................10
Figure 4 - EAST Hardware Architecture..................................................................................11
Figure 5 - Main EAST Block Diagram.....................................................................................13
Figure 6 - EAST Platform Block Diagram................................................................................14
Figure 7 - EAST Adaption Layer Block Diagram.......................................................................15
Figure 8 - EAST Services Block Diagram................................................................................16
Figure 9 - EAST Protocol Layer Block Diagram........................................................................17
Figure 12 - Installing EAST Use Case Diagram........................................................................49
1. Introduction
The EAST is a tool comprises of its set of H/W and S/W to simulate different network
elements to test telecom network entities.
It provides integrated environment for Test Case development, platform to execute Test
Cases and automated environment for testing.
1.1 Purpose
The purpose of this document is to outline the EAST System, sub-system, sub sub-system †,
component and modules.
1.2 Scope
Audiences of the document are architects, designers. This document also helps to add new
component/module to EAST and reuse EAST existing Component/Modules. The document will
provide enough high-level information to allow R&D to create additional high-level documents
specifying EAST sub-systems, sub sub-system†, which will lead to a detailed design of every
Component in EAST.
1.3 Vocabulary
TERM DESCRIPTION
EAST Environment for Automated System Testing
System A group of interacting, interrelated, or interdependent elements forming
a complex whole.
Sub-system A unit that is a part of large system.
Sub sub-system It is unit of large sub-system, too large to be treated as a
component. Now onwards it will be called as “ss-system”.
Component Component is a software package or a module that encapsulates a set of
related functions.
Service Component: If all the modules (Internal modules)
of a component are used in other components, then that will
be termed as Service Component
TERM DESCRIPTION
TERM DESCRIPTION
SAP fields.
Streams A SysV feature that allows user-space applications to access
drivers in full-duplex mode.
TALI Tekelec’s Transport Adapter Layer Interface. Used to route SS7
messages over IP connections.
TC Test Case. These are created by the user, and generated to run
in the LoadEngine.
TCP Transmission Control Protocol. A streamed-based layer over IP.
Handles reliability and ordering of data.
TIO Test Independent Object. This is a generic object in EAST that
can be used to build individual state machines that make up the
Test Cases. Since these objects originally did not represent a
specific protocol, network element, or hardware, they were
referred to as Independent.
TLP Test Logic Procedure. When a given sequence of TIOs can be
reused across multiple parts of a TC (or in multiple TCs), it
makes sense to isolate those sequences in a separate TLP to
allow for reuse and easier modification.
TLT Test Logic Thread. Used to create separate threads of execution,
which can be run at the same time. Can be used in TCs, TLPs,
and TSs.
TS Test Suite. A collection of TCs that may contain TLPs and TSs,
which then can be scheduled for execution.
SS7 Signaling System #7. A series of protocols used to setup and
maintain calls over the PSTN system.
SUT System Under Test. The customer’s hardware that needs to be
evaluated and tested by EAST.
UDP User Datagram Protocol. A datagram-based layer over IP. Does
not handle reliability or ordering of data.
UMA Unlicensed Mobile Access. Also known as GAN (Generic Access
Network). Allows roaming and handover between local-area and
wide-area networks.
UMTS Universal Mobile Telecommunications System.
UTRAN UMTS Terrestrial Radio Access Network. Collective term for
NodeBs and RNCs in a UMTS system.
WiMAX Worldwide Interoperability for Microwave Access. Allows wireless
data to be sent over long distances.
1.4 References
Document Location
Wikipedia http://en.wikipedia.org/wiki/Main_Page.
This is used for some definitions of protocols, etc.
2. Architecture Consideration
When designing for the EAST system, there are several considerations to keep in mind.
Below link contain list of all 3rd party S/W as well as H/W list and their licenses.
https://nhdocuments.nethawk.fi/productcreation/linemanagementindia/RD
%20Meetings/Product%20Architecture/EAST_3rd_party_licences.xls
2.2 Constraints
Although EAST supports cross platform compatibility of Win32 and Linux, Test Creation and
Test Execution is done in Linux OS and Win32 is used only for Test Creation. Since the GUI
must run on multiple platforms, the Java platform is used.
Another constraint is the speed of the software, especially in the protocol-based Servers. Most
protocol servers must be able to run against a customer’s SUT, and as a result, must be able
to service requests quickly, and not spend a lot of time processing events.
The third constraint on EAST software is memory. All EAST software and its data must be able
to fit into the memory of a GPU, which is critical since the EAST hardware setup does not allow
for a swap file (due to performance).
Multiple Cores in New Hardware: The current form of EAST is running on SMP OS where
we are availing limited functionality of multiple cores of the processor. So to use multiple cores
of the future hardware, we need to take advantage of multithreading and kernel based
threading.
The Bearer services can make use of multi core Network processors units for L2 and L3
transport services and various bearer protocols to support more scalable and performance in
bearer services.
64 bit Operating System: Currently EAST uses 32 bit address space programming. But the
new era of H/W and OS is moving towards 64 bit, so EAST system should migrate to 64 bit
processing.
Third-party Tools: There is a risk of using 3rd party tools. These include:
1. Vendor going out of business: Self-explanatory.
2. Vendor discontinuing product: This may or may not affect EAST, depending on our
licensing agreement.
3. Vendor no longer supporting an OS that EAST must support: This can be risky. If
Vendor A drops support for RH9.0, for example, but Vendor B won’t support RHEL4, then
EAST becomes stuck between two opposing requirements.
4. Changes to the interfacing API: If the Vendor changes the API for a new version of the
product, EAST must change its API calls, which takes time.
5. Prohibitive change in licensing agreements: For example, the Vendor may decide to
change future licensing from flat-fee to a per-item royalty, which may make using the
Vendor’s product painful enough to require a change.
In the above cases, EAST can minimize the impact by taking the following steps:
1. Wrap all API calls: By isolating where the API calls are made to the Vendor’s library,
EAST can make it simple to change vendors, or modify the API used.
2. Keep EAST platform requirements up to date: EAST must be able to support the
newer releases of the platform operating system. While we can drop older versions, we
must be able to support the newer versions in a reasonable amount of time.
3. Check alternatives: More than likely, the Vendor in question isn’t the only one with that
particular type of offering. R&D must keep an eye on trends, and make suggestions as to
changing Vendors if appropriate.
3.1.1 Description
The above diagram shows high level architectural view of the EAST Systems, mainly aligned
along the application level.
3.2.1 Description
The diagram above represents a basic EAST Hardware setup. There are multiple ways to
configure an EAST installation with various hardware configurations based on customer
requirement matching to EAST product portfolio.
4. Switch Card: Used for communication in-between Data Server and the individual
boards in the Chassis.
5. GPU: General Processing Unit. The basic board with the CPU, memory based on
TCA and AdvancedTCA. The personality of the card is derived from the attached
PMC/AMC respectively.
6. Chassis: It is a rack mount which is used to contain the EAST boards.
7. Interface Cards: These are PMC/AMC H/W mounted in GPU is used for
communication with SUT over OC3/E1/T1/J1 for ATM, E1/T1/FR for SS7, Ethernet
and NPU.
8. SUT: The User’s System Under Test. The Customer hardware that will be tested
by EAST.
There are four main EAST configurations, each with sub-configurations that will need to be
managed:
These are discussed (and examples given) in the Appendix (Section 5.1).
1. Platform: This Sub-system describes H/W and OS images. Also it handles all the 3 rd
party interface hardware like Xalyo PMC/AMC, Adax PMC/AMC, NPU and system tools.
2. Adaption Layer: This Sub-system describes the OS abstraction layer and 3 rd party
S/W wrappers which, hides their implementations from the rest of the EAST layers.
This abstraction makes easier for the EAST system to be ported on different hardware
and operating systems. This includes providing a common interface for IPC, Memory
Management, File Management, 3rd party S/W and other utilities.
4. Core: This Sub-system includes Test Creation, Test Execution, Test Management and
Automation.
5. Test Packages: Test Packages are used to simulate protocol specific call flows. These
are Customer deliverables developed using EAST.
6. Operating System: The Operating System used in EAST Base H/W. EAST uses
Red Hat Enterprise Linux as its OS. This version of RHEL may contain a customized
kernel, if needed.
7. System Tools: This provides all the different software which will run in operating
system to provide utility.
The EAST Adaption Layer is built on top of the EAST Platform Layer, and can be broken up into
the following ss-systems:
1. OS Adaption Layer: This ss-system provides a common interface to rest of EAST
applications and hides the OS specifics system calls and utilities.
3. NPU Adaption Layer: This ss-system provides a common interface for NPU SDK
and Linux kernel irrespective of its architecture.
This ss-system lies on top of Adaption Layer providing specific services to upper layer.
The EAST Services layer contains functionality needed by other EAST applications and
Subsystems. These include the following ss-systems:
1. Event: Handles Data communication between all EAST processes using TCP/IP.
This provides a serialization and publisher/subscriber model for communications.
3. IPXPress: These provide NPU base service using NPU H/W for faster IP packet
processing and various IP services.
5. Process: This is a system service to fork and handle any processes from the OS for
EAST. e.g starting or stopping any OS utility application from EAST.
8. Logging: Handles all logging and recording the execution status for post execution
analysis.
9. Licensing: Facilitates Licensing verification for EAST User and application.
10.CLI: Command Line Interface services of EAST. This allows User to operate EAST
and execute EAST applications, locally as well as remotely without any GUI
interaction.
14.Compression: This provides data compression for signaling messages for SIP,
SIPT using Deflate algorithm.
The layer handles the core of EAST System which, consists of EAST UI, EAST Engine and Basic
Utilities of EAST System. The Core Layer is used by Test Packages.
1. Desktop: The main User Interface to start any other EAST applications.
3. Message Editor: This facilitate user to create protocol messages as per the
specification.
7. Log Viewer: This is user interface for post execution analysis of Engine logs.
10.Admin Utility: This provides environment to create user, grant user permissions.
4. System Decomposition
4.1.1 Introduction
EAST is the System and all applications, libraries, tools, files, etc, are considered part of the
EAST system.
Note: Wherever applicable the languages used to develop components/modules are noted in
each section explained below. If not noted it implies that C++ Language is used.
This subsystem is the lower most layers of EAST systems which includes H/W, OS images, all
the 3rd party interface hardware like Xalyo PMC/AMC, Adax PMC/AMC, NPU and system tools.
1) Chassis: The chassis refers to the rigid framework of rack mount into which the GPU
blades, RTMs, switch card, cooling modules, power modules etc are mounted.
2) GPU: General Processing Unit. This consists of mother board, CPUs, memory modules.
The personality of the blade is based on the architecture of PCI Industrial Computer
Manufacturers Group (PICMG). EAST supports cPCI and ATCA form factor.
3) RTM: This is Rear Transition Module mounted in the rear side of the Chassis basically
include the internal HDD for GPU.
4) Switch Card: This is the internal switch attached to the chassis and provides Ethernet
connectivity for all the GUPs and Data Server.
5) Data Server: Used as a boot agent for all the GPUs, host the file system for EAST and
allow users to login to GPU via IP forwarding.
6) TravelHawk : A standalone and portable system for EAST installation and execution.
EAST supports both AMC and PMC form factor depending up on type of GPU used. PMC
card are used for cPCI form factor and AMC card are used for ATCA form factor.
1) Ethernet Card: This is an additional card which provisions multiple Ethernet port to the
Base H/W. This can be an AMC/PMC/PCI-X form factor. EAST supports these H/Ws from
vendor Kontron and Intel (PCI-X).
2) ATM/CU (OC3/E1/T1/J1) Card: This card provides ATM link over OC3/E1/T1/J1. This
card can have cPCI/AMC/PMC form factor. EAST supports these H/Ws from vendor
Xalyo.
3) SS7 (E1/T1/J1/FR) card: This card provide SS7 functionalities over E1/T1/J1/FR
link. This card can have AMC/PMC form factor. EAST supports these H/Ws from vendor
Adax HDCII and HDC3.
4) DSP (E1/T1): This card provides bearer functionalities over E1/T1. This card can have
cPCI and PCI form factor. EAST supports these H/Ws from vendor NMS (both cPCI/PCI),
FACT (PCI).
5) Analog Card: This card handles the Analog Signal to connect to the PSTN Networks.
This card can have PCI form factor and EAST supports Dialogic analog card for this.
6) PMC2PCI adapter: This card used to convert PMC card into PCI card, so that that will
fit in PCI slot of a system.
7) NPU Card: This is multi core network processor cards in both AMC/PCI-X form factor
used for bearer services. EAST use Radisys(AMC), Kontron(AMC) and Cavium(PCI-X and
PCI-Express) as NPU vendor.
8) External Data Generator: This provide facility to generate application (ftp, http, mms)
Data from external H/W. EAST use Shenick for External Data Generator.
1) Linux (RedHat): Linux Operating system. EAST uses RHEL4.5 32 bit as Operating
System for its Base H/Ws.
2) Windows (XP SP3, 2000): Microsoft Operating System for EAST Desktop.
3) SimpleEx: Debian3 Linux and this operating system is used in NPU ss-system.
1) Adax Driver: It provides a framework to interact with Adax card and following
services.
qcx: Provides an API to send commands to the Adax card.
LiS: The Linux Streams library. Adax uses this to send messages to their
driver.
hdc: The driver to support MTP2/HDLC on the Adax card.
fr driver: The driver to support FR on Adxa card.
3) NMS Driver: This driver is used by EAST to interact with NMS DSP card.
4) FACT Driver: This driver is used by EAST to interact with FACT DSP card.
5) Dialogic Driver: This driver is used by EAST to interact with Dialogic Analog card.
6) Cavium Ethernet Driver: This is the ICD driver used in NPU as Ethernet device driver.
7) Cavium BSP: This is Board Software Package which includes uboot loader, Debian 3.1
64 bit Linux Image, Octeon root file system and Octeon tools used in NPU subsystem.
8) Ethernet Driver: This driver is used by EAST to interact with Ethernet Card. i.e. Intel
e1000 driver.
1) Compilation Tool: Used to compile EAST source code. The Compilation tools are
dependent upon operating System and development language. In Linux EAST uses gcc,
java and cross compiler (Cavium SDK) as compilation tool. In windows EAST uses VC6+
+ and java as compilation tool.
2) Scripting Tool: EAST uses various scripting tools like bash script, TTCN, pearl etc.
3) Utility Tool : These tools are used in EAST for various purposes, such as capturing the
Data flow in Ethernet, ftp services, Ethernet throughput measure etc. All these are 3 rd
party tools.
1) IPC Management[Service Module]: This module is used by all EAST application for
Inter process communication related system calls, utilities. On the above OS Adaption
Layer, NH AL and NPU AL resides.
This ss-system provides a common interface to all EAST applications for basic
programming utilities.
4) File Management[Service Module]: This module provides file handling operations like
create file, read/write from file etc.
NPU Adaption Layer is an achieve library with name libnhal.a which is statically liked to the
IPXpress module. Both IPXpress CPLANE and DPLANE of NPU link the library which contains
separate utility source files in c library format besides these utility IPXpress also uses NHAL
as libCommon, libIO, libEvent for other EAST component interoperability.
MTP3Server depends upon the following Service modules and Internal modules:
Serviece Modules:
a. Platforms/libNetwork
b. Platforms/libEvent
c. Platforms/libIo
d. Platforms/libCommon
e. Platforms/libProtocol
f. platforms/libSecurity
g. platforms/seqChecker
h. platforms/libXMLParser
i. servers/utran/libUtranCommon
j. servers/utran/common
k. servers/utran/libLoadGen
Internal Modules:
l. servers/utran/libMtp3common
m. servers/utran/libTALI
n. servers/utran/mtp3common
o. servers/utran/mtp3
p. servers/utran/libMTP2Adax
The EAST MTP2 and MTP3 Conformance server is intended to be used to verify
that a SS7 device is compliant with the SS7 MTP2 and MTP3 protocols. Test Cases are
provided for each Test Case defined within the ITU-T Q.781 and ITU-T Q.782 Test
Specifications. It requires a single 4-port SS7 board to verify SS7 low speed (56Kbps or
64Kbps) links and also for High Speed Links (2Mbps) for the MTP2 Tests. Two 4-port
SS7 boards are required for High Speed Links for the MTP3 Configuration B Tests.
The SS7 Conformance Server relies on the following Service and Intarnal Modules:
Service Modules:
a. Platforms/libNetwork
b. Platforms/libEvent
c. Platforms/libProtocol
d. Platforms/libIO
e. Platforms/libCommon
f. Platforms/libIpc
g. Platforms/libTCPConn
h. Platforms/libLiS
i. servers/utranlibTALI_conf
j. Platforms/libSecurity
Internal Modules:
k. libMTP2Adax_conf
l. libSS7Conformance
m. libMTP3Conformance
n. libMTP2Monitor
o. libMTPConformMsg
p. libMTP2Stack
q. libCapture
r. libSS7Filter
s. libSS7Msgs
t. libMTP3_conf
u. libMTP3Common_conf
v. libMTP3_conf
w. libUtranCommon_conf
x. libMTP3Common_conf
y. libATMDriver_conf
This Component is the interface for communication between EAST and NMS DSP using ISDN
signaling protocol.
Service Modules:
a. Platforms/libProtocol
b. Platforms/libEvent
c. Platforms/libIO
d. Platforms/libCommon
Internal Modules:
e. NMS Library
This Component is the interface for communication between EAST and NMS DSP which
basically facilitates the Play/Record of Wav file and also DTMF Generation/Detection.
Service Modules:
a. Platforms/libVoice
b. Platforms/libEvent
c. Platforms/libIO
d. Platforms/libCommon
Internal Modules:
f. NMS Library
Service Modules:
a. Platforms/libEvent
b. Platforms/libIO
c. Platforms/libCommon
d. Platforms/protcols
Internal Modules:
e. Platforms/libVoice
f. Dialogic Library
a. Platforms/libEvent
b. Platforms/libIO
c. Platforms/libCommon
d. Platforms/protcols
Internal Modules:
e. Dialogic Library
Service Modules:
a) platforms/libEvent
b) platforms/libIO
c) platforms/libCommon
d) platforms/libProtocol
e) platforms/libNetwork
f) platforms/libVoice
g) platforms/libXMLParser
h) platforms/libLicense
Internal Modules:
i) Telchemy’s VqMon Library
j) VoiceAge Library
k) NMS Library
l) Commetrex’s T.38 Fax Library
m) Servers/rtp/CodecConverter
n) Servers/rtp/log
Service Modules:
a) Platforms/libNetwork
b) Platforms/libEvent
c) Platforms/libIO
d) Platforms/libCommon
e) Platforms/libProtocol
f) Platforms/libLicense
g) Platforms/libXMLParser
h) Servers/rtp/log
i) Servers/rtp/CodecConverter
Internal Modules:
The ATM Driver is a software program that serves as a high-level API to the ATM board.
This software runs on VxWorks or Linux platform. This program is responsible for
communication between the host (UTRANServer) and the ATM board. The host
communicates to the ATMDriverProgram through TCP/IP. This driver is responsible for
sending and receiving packets on the ATM board. Host can send various commands to the
ATMDriverprogram and different stacks can be created for different PVCs (permanent
virtual circuit).
Service Modules:
a. platforms/common
b. platforms/common
c. platforms/security
d. platforms/security
e. platforms/io
f. platforms/io
Internal Modules:
g. servers/atmmessage
h. servers/atmmessage
i. servers/utran/common
j. servers/utran/common
k. platforms/event
l. platforms/event
m. servers/rtp
n. servers/rtp
o. servers/rtp/nms
p. servers/rtp/nms
q. servers/rtp/log
r. servers/rtp/log
s. servers/voice
t. servers/voice
u. servers/libIPCNDriver
v. servers/libIPCNDriver
Service Module:
a. libCommon
b. libEvent
c. libIO
The 3G Network is divided broadly into different interfaces such as Iub, Iur, Iu-PS and Iu-
CS. These interfaces are again subdivided into planes such as control plane, transport
control plane and user plane. The control plane uses ATM Adaption Layer 5 whereas the
user plane uses ATM Adaption Layer 2. The only difference being in Iu-PS user plane
which, uses AAL5 layer as the lower layer. UTRANServer supports all the described
interfaces for the majority of the planes in two different loads. One is called AAL5 and
another one AAL2, with AAL5 load handling all the control planes along with the Iu-PS user
plane and AAL2 handling the remainder of the user planes.
Also SIGTRAN Protocols are an integrated part of UTRANServer. SS7 has been the tried
and true signaling mechanism for providing signaling in traditional PSTN networks. But
with voice-over-IP (VoIP) becoming a more important technology for carriers, carriers are
starting to look for more IP friendly signaling schemes to use in their network
architectures. SIGTRAN developed by the Internet Engineering Task Force (IETF), the
Sigtran protocol suite lets operators carry SS7 signaling traffic between a signaling
gateway (SG) and a media gateway controller (MGC) or IP-enabled signaling control point
(IP-SCP), thus allowing carriers to maintain their SS7 signaling schemes while being able
to tap into the IP network for transport. SIGTRAN is a suite of networking protocols
consisting of Stream Control Transport Protocol (SCTP) and a set of user Adaption (UA)
layers (which transform the look and feel of SCTP into the lower layers of SS7).
UTRANServer supports SIGTRAN protocols like SCTP, M3UA, IUA, SUA and M2PA.
Service Modules:
a. platforms/common
b. platforms/event
c. platforms/io
d. platforms/protocol
e. platforms/network
f. platforms/security
g. platforms/libXMLParser
h. platforms/libBERPRBS
i. servers/atmmessage
j. servers/atm/driver
k. servers/atm/pvc
l. servers/utran/common
m. servers/utran/libLoadGen
n. servers/utran/libTALI
o. servers/libPacketGen
p. servers/PacketServer
q. servers/libPacketDevice
r. servers/utran/mtp3common
Internal Modules:
s. servers/utran/libLTEPDCP
t. servers/utran/aal2
u. servers/utran/iuup
v. servers/utran/sigtran/common
w. servers/utran/sigtran/m3ua
x. servers/utran/sigtran/iua
y. servers/utran/sigtran/sua
z. servers/utran/sigtran/sctp
aa. servers/utran/udp
bb. servers/utran/ip
cc. servers/utran/llc
dd. servers/utran/snap
ee. servers/utran/atmarp
ff. servers/utran/icmp
gg. servers/utran/gtp
hh. servers/utran/mtp3
ii. servers/utran/mtp3b
jj. servers/utran/aal5
kk. servers/utran/ethernet
ll. servers/libPacketCodec
mm. servers/utran/sigtran/m2pa
nn. servers/utran/server
Service Modules:
a) Platforms/libCommon
b) Platforms/libIO
c) Platforms/libNetwork
d) Platforms/libProtocol
e) Platforms/libEvent
f) libXMLParser
g) libLicense
h) libUtranCommon
i) libTCP
This is used to in between SSGN-GGSN interface and main motto of this component is to
provide all the functionalities of Gn interface. This includes both GTP-C and GTP-U of Gn
interface.
The GnServer component dependents upon following modules:
Service Modules:
a. Platforms/libNetwork
b. Platforms/libEvent
c. libCommon
d. libProtocol
e. libIO
f. libPacketCodec
g. libPacketDevice
h. libPacketGen
i. libUtranCommon
j. libATMMessage
Internal Modules:
k. libETH
l. libGtp
p) libXMLParser
q) libsctp
Internal Module:
Previously SCTP was designed for SIGTRAN for its transport layer which was a
component of UTRAN/SigtranServer. Later due to usage of SCTP as LTE signaling transport
and high performance requirement a separate Linux kernel based SCTP server was
developed to have SCTP services of Linux. This SCTP Service has external services as well
as integrated with load engine. The external server has Requced Resource functionality for
DIAMTER protocols.
The LoadGen is a library that allows generating sample Sequence data with a repeating
message to test the capability of a particular stack to achieve higher data rates than they
could with the LoadRunner alone. The current LoadGen feature is supported on the
following protocol stacks:
MTP3/MTP2
M3UA/SCTP/IP
M2PA/SCTP/IP
SUA/SCTP/IP
MTP3b/SSCF-NNI/SSCOP/AAL5/ATM
Service Module
a. source/servers/utran/common
b. source/servers/utran/mtp3
c. source/servers/utran/mtp3common
d. source/servers/utran/sigtran/m3ua
e. source/servers/utran/sigtran/sua
source/servers/utran/sigtran/m2pa
f. source/servers/utran/sigtran/common
g. source/servers/utran/mtp3
h. source/servers/utran/mtp3b
i. source/servers/utran/mtp3common
j. source/servers/utran/aal5
Internal Module:
j) libLoadgen
k) libMtpLoadGen
18) IPSecServer:
a) libCommon
b) libEvent
c) libNetwork
d) libIO
e) libSecurity
f) libXMLParser
g) libLicense
Internal Module:
h) XpressVPN library
19) GbServer:
Gb interface is between the BSS and SGSN (as shown below). Signaling and Data
transmission can take place using either Frame Relay or UDP/IP. The common entity within
the GB Interface is the Network Service Virtual Connection Identifier (NSVCID). The
NSVCID can associate with the DLCI (srcDLCI/dstDLCI) for Frame Relay and UDP (srcIP,
dstIP) for IP transmission.
b. server/GbServer
c. servers/libGbServer
d. servers/libGbStats
e. servers/libGbDebug
f. servers/libGbStatsVisitor
g. platforms/protocol
h. platforms/network
i. platforms/event
j. platforms/io
k. platforms/common
l. platforms/libBERPRBS
m. servers/utran/common
n. servers/utran/ethernet
o. servers/libPacketCodec
p. servers/libPacketDevice
q. servers/libPacketGen
r. servers/PacketServer
s. external/linux/GbStack/libBSSStack
t. external/linux/GbStack/libSGSNStack
u. external/linux/GbStack/libCommon
Currently the H/W component of NPU for OCTEON is of CN38XX model. The key components
are described below.
- IPXpress is a generic framework for data generation and transport should be laid out
and Common Control interface should be provided towards EAST to access to the
different services.
- The Inter-module transmission is only IP based only.
- Octeon multi core architecture is based on MIPS64 which uses Cavium SDK as a cross
compiler for its binaries.
- All the applications functionality is divided into c-plane and d-plane and are executed in
multiple cores of NPU H/W all the time in order to take advantage of multiple cores.
- The NPU H/W has both AMC (from Radisys AMC7211) and PCI-X (Cavium) form factor
cards. The AMC H/W has 12 cores and the PCI contains 16 cores and the number can
vary from model to model. The 1st 2nd cores will be used for control plane and rest of the
cores will be used for data plane.
- The IPXpress sub system has Control plane and data plane. The control plane interacts
with the NPUAL sub system through socket and ICD interface. ICD stands for Inter Core
Communication Driver and it is used to send/receive data to/from data plane. The data
plane interacts with the NPU AL sub system through the socket or POW interface.
- Various IP based protocols simulation can use the IPXpress framework such as IPSec,
GTP, GRE, PRBS, RTP FTP, HTTP etc. The following Application modules are currently
supported in IPXpress.
RTP module is responsible for creating concurrent RTP Sessions and generating RTP
packets based on various codec, It interact with the RTPQA to calculate the MOS
statistics.
b. IPXpress-PRBS: [Internal Component]
PRBS module is used to create PRBS sessions generate a pseudo random bit pattern
which is used to test integrity of any protocol layer basically the radio interface and
come back to itself and then do a comparison to calculate the loss in the radio interface.
Also it will be used to generate continuously to do the synchronization. Various Noise
insertions techniques can be used to verify the layer under test.
c. IPXpress-Shenick: [Internal Component]
Shenick is an external DataGen H/W used to generate a bit patterns based on support
stateful and stateless sessions. It provides the FTP and HTTP application data generation
over GTP used for bearer testing.
d. IPXpress-GTP: [Internal Component]
GTP module is used to create the GTP tunnels, the IP based data bearers used to
provide PDP context and EPS bearer for LTE. The GTP tunnels are used for filtering and
transmitting data based on TFT filters either generated by the internal data gen modules
or external data generator.
e. IPXpress-IPSec: [Internal Component]
IPSec module provides the IP Security and Integrity both in transport and Tunnel mode.
This is used for transmitting Signalling data over secured IP based tunnels. The module
provides both IKE based signaling for creating Security associations and data
transmission.
f. IPXpress-PMIP/GRE: [Internal Component]
PMIP/GRE module is used to create the GRE tunnels, another IP based data bearers used
to EPS bearer in LTE and CDMA. The GRE tunnels are used for transmitting data either
generated by the internal data gen modules or external data generator. The respective
PMIP based Signaling are also handled by this modules
Service Modules:
a. Platforms/libNetwork
b. Platforms/libEvent
c. Platforms/libCommon
d. Platforms/libProtocol
e. Platforms/libIO
Internal Modules:
f. libPacketCodec
g. libPacketGen
h. libPacketDevice
i. libUtranCommon
This component is used for data generation services to various Protocol Servers. These
include Sequenced packets, Dummy or Pseudo Noise Data and various codecs data
Generation. These services are basically embedded inside the protocol services to test
various bearer capabilities of the interface.
Service Modules:
a. Platforms/libNetwork
b. Platforms/libEvent
c. Platforms/libCommon
d. Platforms/libProtocol
e. Platforms/libIO
Internal Modules:
f. libPacketCodec
g. libPacketGen
h. libPacketDevice
i. libUtranCommon
4.1.4.5 Security:
This sub sub-system supports encryotion and authentication alogorithm.
a. EAP [Service Component]
This Component is handing authentication using EAP.
The EAP is dependent upon following modules:
a. platforms/common/libCommon
b. platforms/security/libSecurity
a. platforms/netork/libNetwork
4.1.4.6 CLI
1. CLIv1 [Internal Component]
This Component is handling CLI in EAST. This is the EASTCLI v1, which supports non-
MUMB mode of script/profile execution in EAST.
This Component is handling CLI in EAST. This is the EASTCLI v2, which supports both
MUMB and non-MUMB mode of script/profile execution in EAST.
Service Modules:
a. libIO
b. libCommon
c. libLogs
d. libEvent
e. libNetwork
f. libProtocol
4.1.4.7 Event
4.1.4.8 Database
Used to store EAST specific system data and also EAST user specific data. EAST
supports MySQL, MSAccess and own flatfile databases. EAST uses JDBC-ODBC database
connectivity for database operations. Also used for report generation. (It is a Java
application.)
This sub system is the foundation of EAST. All product lines uses this sub-system for GUI based
test case development, generating desired calls, managing protocol server, loggings, licensing
and protocol based message encoding an decoding .
2) TLP Editor[Internal Component]: Used for modular test case design. Once created
can be used by all the editors.
3) TLT Editor[Internal Component]: Used for threaded test case design. Once created
can be used by other editors except TLT editor.
This is a Java application.
This Used to create Database Tables. It connects to configured database create table
and also populate data in the table. It consists of TIOs for defining table name, column
name and type. EAST supports INTEGER, VARCHAR column types. This is a java application.
Service Modules:
a. Platforms/libIO
b. Platforms/libCommon
c. Platforms/libEvent
d. Platforms/libNetwork
e. Platforms/libProtocol
f. Platforms/libsecurity
g. Platforms/libdynamicsigcomp
h. Platforms/libXMLParser
i. Platforms/libLicense
j. Platforms/libSigComp
k. Platforms/libLogs
l. Platforms/libThreads
m. Servers/libTCP
n. Servers/libeSCTP
Internal Modules:
o. libAdmin
p. libDatasource
q. libDb
r. libDLLIinterface
s. libServerClients
t. libber
u. libascii
v. libasn
w. libload
x. libEap
y. libbinary
z. Osal/libosal.lib
Internal Modules:
h. applications/load/asn/libAsn
i. applications/load/ber/libBer
j. applications/load/binary/libBinary
Internal Modules:
k. applications/load/common/libLoad
l. applications/load/serverclients/libServerclient
m. platforms/sigcomp/libsigcomp
n. platforms/dynamicsigcomp/libsigcportlayer
o. platforms/dynamicsigcomp/libdynamicsigcomp
p. applications/load/DLLInterface/libDLLInterface
the TLP Editor saves the TLP itself in the tlp/graphs directory with the “.tlp” extension,
and generates a “.script” file in the tlp/scripts directory. The LoadEngine can then read
the script file and process it as needed.
2) Regression Log Viewer: View the offline logs of Test Cases, Test Suites, and the
Regressions Load Runner log. This is a Java application.
3) Load Log Viewer: View the offline logs generated in LoadTC Runner and Traffic Runner.
This is a Java application
Internal Modules:
f. libLogger
g. libEvent
h. libNetwork
i. libLoad
j. libDLLInterface
2. Run Reporter: Displays the Event Trace information in HTML format and offline
logs. This is a Java application
4. Update License Key: Used to update license key from EAST Desktop. This is a
Java application.
5. Package History: Used to displays all the packages installed in NetHawk EAST
through library installation. The packages build date and version information is
also displayed. This is a Java application.
6. Install
Library: Used to install the package libraries. This is a Java application.
7. Uninstall
Library: Used to uninstall the ASCII/Binary libraries. This is a Java
application.
Add-Ins: Used to uninstall add-in applications, which are installed through
EAST. This is a Java application.
9. Decoder: Used to analyze the dump data of all Binary and ASCII protocols
supported in NetHawk EAST. This also helps one to view the dump details for the
message and elements. This is a Java application.
10. Script Import Export: Used for import/export the graphs, their generated files
and dependents. This is a Java application.
11. Script Difference: Used to check the difference between two graphs from one
version to another version. This is a Java application.
13. DebugUtility: Helps in logging in and browsing remote Linux machine while
working in Windows. Many a times we come across several problems in Linux,
ATM and ISDN boards. In such situations, it is not enough to know just the status
of the servers running on the board and the status of the board itself, but we
need a mean to debug what’s going wrong on the boards, by executing some
commands on the board. Debug Utility functionality helps in providing interactive
session with the board. This utility establishes a session with the board, accepts
commands from users, and executes them on the board, displays the results at
the local utilities display panel. This is a Java application.
14. iPro: Used to capture network data for network analysis. This is a Java
application.
15. Patch History: Used to display the list of installed patch in EAST. This is a Java
application.
1) Keyword Editor: Allow to add, delete and update the keywords used in EAST
environment. The keywords provide a suitable way of grouping Test Suites in different
Category: Choices and to explore the test suites more efficiently. Keyword is defined as
combination of Categories and Choices. Keyword management makes it easy to search
for a test program. This is a Java application.
2) Batch Builder: Using this feature many files can be grouped into a batch and user can
generate the scripts. This process consumes much less time compared to performing the
operation individually for each file. This is a Java application.
3) File Management: Allows managing files in File System & Database as well as provides
the facility to view the properties of a particular file. This is a Java application.
1) Installer/uninstaller:
EAST Software comes with an EastSetup.zip for Linux OS and an EastSetup.exe for
Windows OS.
User can install/uninstall EAST software in Windows and Linux OS mentioned below
In Windows OS
Installation: By double clicking on EastSetup.exe
Un-Installation: By selecting Uninstall option of Installed EAST software from
Program Menu.
In Linux OS
Installation: By executing setup.sh script after unzipped EastSetup.zip into a
specified location.
Un-Installation: By executing unistall.sh from installed EAST software.
This is used to configure the various ProtocolServers which test a SUT. Since the
ProtocolServers create links with the SUT, these links must be configured properly to
ensure that the link remains active and stable throughout the test. This application
allows the user to configure various parameters based on the protocol tested and the
type of link needed.
5. Use Cases
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram
defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by EAST system in terms of different Sub-systems,
their goals (represented asuse cases), and any dependencies between those use cases.
The main purpose of a use case diagram is to show what system functions are performed for
which Sub-systems/sub Sub-systems.
In the above Use Case, the EAST User will start the EAST Installation Wizard.
i) The Wizard will first display a Welcome screen, describing what the EAST installation will
do. When the EAST User clicks on the Next button, the Wizard prompts the EAST User
as to what kind of installation this will be (New/Upgrade).
ii) The Wizard will then display the Licensing Agreement between Nethawk Corporation and
the EAST User. If the EAST User does not accept this license, the Installation will exit.
iii) The Wizard then prompts the EAST User for their name and company information.
iv) The Wizard then prompts the EAST User for the IP Address and Network Interface for
the installation. This is needed for several configuration files and licensing information.
v) The Wizard then asks the EAST User for the desired location of the installation, and
calculates how much disk space will be needed, and how much there is at that location.
vi) The Wizard prompts the EAST User as to where any current environment files for EAST
are located.
vii) Next, the Wizard asks the EAST User if any existing libraries are already installed on this
machine. If so, the EAST User may point the Installation at those files.
viii) The Wizard then asks if the EAST User wants the EAST Installation to create a
Program Folder for EAST.
ix) Next, the Wizard prompts the EAST User as to whether this installation will use flat files
or MySQL for a database. If MySQL is chosen, the EAST User is prompted for
configuration information.
x) The EAST User is then asked for a valid JRE for EAST to use. The EAST User will then
need to select a path to the appropriate JRE.
xi) The Wizard will then display a summary of the EAST User’s choices that were made so
far. The EAST User can then back up and change configuration information, cancel out,
or continue with the installation.
xii) The Wizard then has the appropriate EAST files installed in the selected locations, and
updates the configuration files as needed.
xiii) Finally, the Wizard displays a message stating that the installation has completed,
and gives the EAST User the opportunity to read this EAST version’s Readme file. At this
point, the installation exits.
i) To start EAST Desktop,EAST user will launch the start.sh script or execute Process,
usually found in the installation area, or in that particular user’s directory (depending on
type of Installation).
ii) The start.sh script will then setup some environment variables, and then launch the
EAST Desktop.
iii) The EAST Desktop will check if the EAST User is licensed to use the Desktop. If so, the
Desktop continues to run.
iv) Next, the EAST Desktop will launch any other servers needed (including the EventServer
and any other Protocol Servers, etc).
i) The EAST Java and C++ applications both will access EAST licenses. The EAST Java
Application will use the libJNILicense JNI library to interface with the C++-based
libLicense Subsystem, which is directly accessed by the EAST C++ Application.
ii) In both cases, the libLicense Subsystem will use the LicenseServer to determine if the
license is valid, and return the results to the appropriate caller.
i) The EAST User starts the Message Editor (Binary, ASN1 PER, ASN1 BER). The Message
Editor loads the messages and their related elements from the graphs/messages and
graphs/elements directories.
ii) Once the messages are modified, the Message Editor resaves them in the above
directories and files.
iii) Before the messages can be used in a script, the messages must be generated. Once
this is done, the messages are converted from their binary versions to ASCII versions
stored in the templates/messages and templates/elements directories. These then can
be accessed and loaded as part of a script.
1. The User first starts the Test Case Editor, and creates a Test Case. Then they add a
Resource TIO, and add in the target resources along with the local resource name.
2. This information is then generated into a script, and fed into the LoadEngine, which
parses it and configures its internal data accordingly.
3. When the Protocol Server starts up, it creates its Protocol Layers according to the
supplied Protocol Server configuration file. Once all of the layers are created, the
Protocol Server will register the individual Protocol Layer resource names with the
EventServer.
4. When the LoadEngine runs into a Transmit TIO (ASCII or Binary), it will use the
resource name as part of the message to send to the EventServer. The EventServer
receives the message, and determines who is subscribed for this particular resource.
The EventServer then sends the message to the Protocol Server.
5. The Protocol Server receives the message, checks what resource it belongs to, and
forwards the message to that Adaption Layer. At that point, the Protocol Layer
processes the message.
6. Note that the EventServer step is bypassed if the LoadEngine and Protocol Server are
connected directly, as opposed to going through the EventServer itself (P2P).
1. When the EAST User needs to update or create a database, they start the Database
Editor.
2. The Database Editor works similar to the Message Editor and the Test Case Editor, in
that it works primarily with binary-based files until the user needs to generate
something usable by the LoadEngine, at which it produces ASCII data.
3. The Database Editor will read the binary graphs/db file to get the table data itself, while
the schema information and help text comes from the schemas/schema and
schemas/hlp2 directories. The user can then modify and edit these files.
4. When the database is complete, the user can generate the ASCII-based db and
signature files, which contain the table data and the schema information respectively.
1. When the EAST User wants to create a test case, they first start the EAST Desktop.
2. From the EAST Desktop, the EAST User launches the Logic Editor. This starts in the TC
flavor, but can be changed during execution to handle TLPs, TLTs, or TSs.
3. Using the Logic Editor, the user will add TIOs for their desired test logic. If the user has
defined a TLP (or wishes to), they will add or edit that TLP.
4. If the user uses the Receive or Transmit TIOs, the editors read the graphs/messages and
graphs/elements files to construct that message internally.
5. If the user wants to add in a database, the editors read the graphs/db and schemas/schema
files.
6. Once the EAST User has created the desired test case, it is then saved into a graph file.
7. Finally, the EAST User selects the Generate functionality to convert the graph file into a
script file, which then can be read by the LoadEngine itself.
i. The LoadEngine allows the EAST User to design a test case that transmits and
receives messages with the customer’s SUT.
ii. In this case, we examine how the LoadEngine and UDPServer work together
to send data using the UDP protocol stack to the customer’s SUT.
iii. In this case, we assume that the LoadEngine and UDP Server are
communicating via EventServer. When the LoadEngine needs to transmit a
message (via the ASCII Send TIO), the message is passed to the libEvent
module, which then passes it to the libIO module for serialization and
transmission over TCP/IP to EventServer.
vi. libNetwork module then transmit message to libIO. Then libIO delived
message to Customer SUT.
vii. To receive a message, the process is reversed, with the UDPServer receiving
the message on the UDP Protocol tack, passing it to the EventServer, which
then forwards it to the Load Engine.
a. In this case, we assume that the LoadEngine uses inbuild UDP Server for transmit
messages over UDP Protocol stack. When the LoadEngine needs to transmit a
message (via the ASCII Send TIO), the message is passed to the libNetwork module
based on configured resource, which then passes it to the libIO module for
serialization and transmission over TCP/IP to Customer SUT.
i. In this case, we assume that the LoadEngine and TCP Server are
communicating via EventServer. When the LoadEngine needs to transmit a
message (via the Binary Send TIO), the message is passed to the libEvent
module, which then passes it to the libIO module for serialization and
transmission over TCP/IP to EventServer.
iii. The libIO/libEvent module on the TCPServer gets the message, unserializes,
and passes it to the TCPServer. The TCPServer check appropriate resource
and delivered message to libTCP for encode header. After endocing header,
libTCP delived message to libNetowrk.
iv. libNetwork module then transmit message to libIO. Then libIO delived
message to Customer SUT.
a. In this case, we assume that the LoadEngine uses inbuilt TCP Server for
transmit messages over TCP Protocol stack. When the LoadEngine needs to
transmit a message (via the Binary Send TIO), the message is passed to the
libTCP for encoding appropriate header. Then transmit message to libNetwork
module based on configured resource, which then passes it to the libIO
module for serialization and transmission over TCP/IP to Customer SUT.
ii. When the LoadEngine needs to transmit a message (via the Binary
Transmit TIO), the message is passed to the libEvent subsystem, which
then passes it to the libIO Subsystem for serialization and transmission
over TCP/IP.
iii. In this case, we assume that the LoadEngine and Protocol Server are
using P2P communications. In older releases, the LoadEngine and
UTRANServer would communicate via the EventServer, which added an
additional step for each message transmitted and received. Now, the
LoadEngine has the option to communicate directly to the UTRANServer.
This functionality is hidden in the libEvent Subsystem.
iv. The libIO Subsystem on the UTRANServer gets the message, unserializes,
and passes it to the UTRANServer itself. The UTRANServer sees this is a
message to transmit, and passes it to the libAal2 Subsystem for
encoding.
v. Note that this could easily have been the libAal5 Subsystem, or any other
protocol stack supported in the UTRANServer over ATM. For the purposes
of this example, we use the libAal2 for the Iub protocol stack.
vi. Once the message has been encoded with the RLC/MAC/FP layers, the
message is passed to the libPVC Subsystem, then to the
libDriverInterface Subsystem. The libDriverInterface is responsible for
adding ATM headers that the ATMDriver will expect for each message, as
well as buffering the messages under load so that fewer large
transmissions to the ATMDriver is done, as opposed to many smaller
transmissions.
vii. Once this is done, the libDriverInterface sends the message across the
TCP/IP interface to the ATMDriver itself.
viii. The ATMDriver then receives the messages, pulls out the header
information, then sends it to the Xalyo API code, which in turn sends the
message out the ATM link to the customer SUT.
ix. To receive a message, the process is reversed, with the Xalyo Hardware
receiving the message on the ATM links, passing it to the Xalyo software,
which then forwards it to the ATMDriver Subsystem itself, etc.
i. The LoadEngine allows the EAST User to design a test case that transmits
and receives messages with the customer’s SUT (by way of the
SigtranServer).
ii. In this case, we examine how the LoadEngine and SigtranServer work
together to send data using the M3UA/SCTP/IP protocol stack to the
customer’s SUT.
iii. When the LoadEngine needs to transmit a message (via the Binary
Transmit TIO), the message is passed to the libEvent subsystem, which
then passes it to the libIO Subsystem for serialization and transmission
over TCP/IP.
iv. In this case, we assume that the LoadEngine and SigtranServer are using
P2P communications, as mentioned above.
vi. The libM3UA Subsystem works with the libSigtran Subsystem to encode
messages according to the Sigtran standard. Once this has been
completed, the libM3UA sends the message to the libSctp Subsystem.
vii. The libSctp Subsystem works either by emulating the actual SCTP
protocol layer, or by serving as an interface to the sctp.ko Linux kernel
module. This Use Case assumes the latter, although the only real
difference would be the elimination of the sctp.ko module and direct
access to the Linux kernel.
viii. Finally, the sctp.ko kernel module forwards the message to the Linux
kernel, which then sends the message to the customer’s SUT via IP.
ii. First, the LoadEngine passes the message to be sent to the libEvent
Subsystem, which then passes the message to libIO for serialization and
transmission to the MTP3Server.
iii. The libIO Subsystem on the MTP3Server gets the message, unserializes,
and passes it to the MTP3Server itself. The MTP3Server sees this is a
message to transmit, and passes it to the libMTP3 Subsystem for
encoding.
vi. The Adax HDC driver then encodes the MTP2 protocol layer on the
message, and sends it from the specified SS7 link to the customer’s SUT.
i. In this case, we assume that the LoadEngine and SCTP Server are commincating
via EventServer. When the LoadEngine needs to transmit a message (via the
Binary Send TIO), the message is passed to the libEvent module, which then
passes it to the libIO module for serialization and transmission over TCP/IP to
EventServer.
iii. The libIO/libEvent module on the SCTPServer gets the message, unserializes, and
passes it to the SCTPServer. The SCTPServer check appropriate resource and
delivered message to libeSCTP module for encode header. After endocing header,
libeSCTP delived message to lksctp module.
iv. lksctp module then transmit message to Linux SCTP Kernel. Then Linux Kernel
delived message to Customer SUT.
a. In this case, we assume that the LoadEngine uses inbuild SCTP module for
transmit messages over SCTP Protocl stack. When the LoadEngine needs to
transmit a message (via the Binary Send TIO), the message is passed to the
libSCTP for encoding appropriate header. Then transmit message to lksctp
module, which then passes it to the Linux Kernel SCTP module and
transmission over SCTP/IP to Cusomter SUT.
a. In this case, we assume that the LoadEngine and GTP Server are commincating via
EventServer. When the LoadEngine needs to transmit a message (via the Binary
Send TIO), the message is passed to the libEvent module, which then passes it to
the libIO module for serialization and transmission over TCP/IP to EventServer.
c. The libIO/libEvent module on the GTPServer gets the message, unserializes, and
passes it to the GTPServer. The GTPServer check appropriate resource and delivered
message to libIO module after encoding GTP header. Then libIO is trasmiting
message to Customer SUT over TCP/IP.
a. In this case, we assume that the LoadEngine and LUCP Server are commincating via
EventServer. When the LoadEngine needs to transmit a message (via the
ASCII/Binary Send TIO), the message is passed to the libEvent module, which then
passes it to the libIO module for serialization and transmission over TCP/IP to
EventServer.
c. The libIO/libEvent module on the LUCPServer gets the message, unserializes, and
passes it to the LUCPServer. The LUCPServer check appropriate resource and
delivered message to libIO module after encoding necesary header. Then libIO is
trasmiting message to External TM500 nox over TCP/IP. And further message is
forwarded to SUT.
A. During Signaling
B. During Bearer
6. Product Structure
Standalone hardware means EAST Machines which have their own hard disk (HDD) and OS
kernel running from local disk. In this class EAST offers following H/W’s with Single user EAST
installation which may have Regression (with/without Automation) or Load or Test Creation or
combination of one or more.
Super Micro
Travel Hawk
Customer Laptop/Desktop (Not provided by NetHawk, sold only for Test Creation)
https://nhdocuments.nethawk.fi/productcreation/simulators/EAST/Logistics
%20Documents/Deliverables/1.EAST%20Licensing%20Vs%20Hardware
%20Configuration/Single%20User%20EAST%20Configuration%20on%20Standalone
%20hardware.doc
This section describes the Multi User EAST Installation on standalone configured hardware
(i.e.) Super Micro or Travel Hawk or GPU with RTM with EAST licensing for multi user concept.
Maximum User limit is 4 Regression (with/without automation) or 4 Test Case Creation (5 Test
Creation valid for Super Micro and Travel Hawk) or combination of Regression, Load and Test
Creation like 1 Load + 3 Regression (with/without automation) etc. This document represents
Hardware configuration for standalone with EAST License for multi user configuration
Standalone hardware means EAST Machines which have their own hard disk (HDD) and OS
kernel running from local disk. In this class EAST offers following H/W’s with Multi EAST user
installation which may have Regression (with/without Automation) or Load or Test Creation or
combination of one or more.
Super Micro
Travel Hawk
https://nhdocuments.nethawk.fi/productcreation/simulators/EAST/Logistics
%20Documents/Deliverables/1.EAST%20Licensing%20Vs%20Hardware
%20Configuration/Multi%20User%20EAST%20Configuration%20on%20Standalone
%20Hardware.doc
EAST Admin should be created per H/W entity to invoke Individual EAST Event and License
servers and required EAST protocol Servers. This implies that all the users acting as EAST
Admin should have separate EAST Config files
Multi User Centralized Data implies user can have multiple points to generate EAST test
traffic against the system under test using multiple EAST hardware’s and data should be saved
at one place, in this class EAST offers following Hardware’s.
1. Super Micro:
No EAST license is applicable in this H/W as it just acts as a Data Server.
https://nhdocuments.nethawk.fi/productcreation/simulators/EAST/Logistics
%20Documents/Deliverables/1.EAST%20Licensing%20Vs%20Hardware
%20Configuration/Multi%20User%20Centralized%20Data.doc
Centralized Load implies user can have one single point of control to generate load against the
system under test using multiple EAST hardware’s, in this class EAST offers following
Hardware’s.
4. Super Micro:
No EAST license is applicable in this H/W as it just acts as a Data Server.
https://nhdocuments.nethawk.fi/productcreation/simulators/EAST/Logistics
%20Documents/Deliverables/1.EAST%20Licensing%20Vs%20Hardware
%20Configuration/EAST%20Configuration%20with%20Centralized%20Load.doc
This section updates about EAST Build procedure for different OS platform.
Before starting the Build Procedure the following are all assumed to be true if you wish to be
able to complete a build successfully using the build scripts.
jdk117_v1a
jdk1.3.1_04
commapi
java_help
jdk1.2
JMF-2.1.1e
1.1.7.orginal
j2sdk1.4.2
jdk1.3
swing-1.1.1fcs
xx. j2ee
xxi. jakarta-tomcat-5.5.9
xxii. JMF2.1.1
Tools on RHEL4.5:
a. GCC
i. compat-gcc-32-3.2.3-47.3
ii. gcc-g77-3.4.6-8
iii. gcc-c++-3.4.6-8
iv. gcc-3.4.6-8
v. compat-gcc-32-c++-3.2.3-47.3
vi. libgcc-3.4.6-8
vii. gcc-java-3.4.6-8
viii. compat-libgcc-296-2.96-132.7.2
b. Subversion
i. mod_dav_svn-1.4.3-1
ii. subversion-tools-1.4.3-1
iii. subversion-1.4.3-1
iv. subversion-perl-1.4.3-1
c. CN38XX NPU SDK for AMC and PCI [mips64-octeon (SDK 1.5.0)]
i. CN3XXX-SDK-1.5.0_p1-195
ii. CN3XXX-PCI-NIC-0.9.4-42
iii. CN3XXX-IP-1.3.3-49
iv. CN3XXX-COMPONENTS-COMMON-1.3.3-30
v. CN3XXX-PCI-BASE-0.9.4-42
vi. CN3XXX-TCP-1.3.3-49
vii. CN3XXX-PCI-CNTQ-0.9.4-42
viii. CN3XXX-LINUX-1.5.0_p1-195
d. /local/tools
i. Ibm
ii. JMF2.1.1
iii. j2ee
iv. javalib
v. javas
i. commapi
ii. j2sdk1.4.2_07
iii. java_help
iv. jdk1.6.0_17
Note: Server should have EAST Third Party Software installed with the latest version.
NMS
a. Version 8.1
ADAX
a. Version 1.1 delta 1.20 (qcx)
b. Version 1.1 delta 1.54 (hdc)
c. Version LiS-2.18.4 (LiS)
d. Version 3.0 delta 1.62 (fr)
This procedure will output EastSetup.zip, EastSetup.exe and build logs into a specified
directory on the Windows/Linux build server. All logs can be found in the build directory on
the Windows build server and the Linux logs can also be found in the build directory on the
Linux 9.0 build server.
This procedure will output EastSetup.zip and build logs into a specified directory on the Linux
RHEL4U5 build server. All logs can be found in the build directory on the RHEL4U5 build
server.
https://nhdocuments.nethawk.fi/productcreation/linemanagementindia/RD
%20Meetings/Product%20Architecture/EAST_Product_Build_Procedure_UserGuid.doc
8. Question/Answer