US Pat. No. 9,488,685

OVER-THE-AIR TEST

Keysight Technologies Sin...

1. A method, the method comprising:
selecting a subset of positions of antenna elements from a plurality of potential positions of antenna elements around a device
under test on the basis of a simulated radio channel of a plurality of paths in an over-the-air test; and

connecting only the antenna elements in the subset and a radio channel emulator together for physically realizing the simulated
radio channel.

US Pat. No. 9,407,381

RADIO CHANNEL EMULATION

Keysight Technologies Sin...

1. An apparatus, wherein the apparatus comprises:
a radio channel emulator of a radio system; and
a combiner, the combiner being configured to receive antenna data defining a characteristic radiation pattern of each predetermined
antenna element of a predetermined antenna array,

the combiner being configured to form modified antenna data associated with a predetermined number of modified antenna elements
by weighting the antenna data with a predetermined coefficient data,

the combiner being configured to form modified radio channel data by combining a predetermined radio channel data and the
modified antenna data,

the combiner being configured to feed the modified radio channel data to a radio channel emulation,
the emulator being configured to receive at least one signal each of which being associated with one of the modified antenna
elements and perform emulation with the at least one signal and the modified radio channel data.

US Pat. No. 9,450,640

APPARATUS AND METHOD FOR PILOT DETECTION

Keysight Technologies Sin...

1. An apparatus in a code division multiple access based system for detecting pilot sequences, comprising:
a receiver for receiving a signal;
a sampling circuit to sample the received signal;
a plurality of parallel correlators each having a given correlation length, wherein the sampled signal is input into the parallel
correlators; and

a controller, wherein the controller:
controls the correlation the sampled signal in each correlator with a unique time shift section of a pilot sequence of the
communication system,

determines the strongest correlation peaks,
determines on the basis of the correlation peaks and corresponding time shifts the strongest pilots in the signal,
determines in the correlators ratios of received pilot energy to total received energy,
compares a first and a second of the determined ratios, and
determine, on the basis of the comparison of the determined ratios, a correlation result including a timing from the time
shift of the pilot sequence and the time reference of the communication system, wherein the apparatus is configured to feed
the sampled signal to N parallel correlators having a correlation length of L, wherein the number of samples required equals
A*B where A=32768/N+L and B=the chip rate.

US Pat. No. 9,629,110

WIRELESS COMMUNICATION APPARATUS AND METHOD PERFORMING SIGNAL SCANNING TO DETERMINE THE STRONGEST SIGNAL USEABLE FOR STABILIZING A LOCAL OSCILLATOR

Keysight Technologies Sin...

4. An apparatus comprising:
a processor;
a local oscillator having a given frequency; and
a receiver controlled by said processor to scan for signals transmitted by one or more base stations of one or more telecommunication
systems,

wherein said processor is configured to:
determine a strongest signal of the signals found during the scan and the frequency of the strongest signal;
generate a corresponding frequency value utilizing the frequency of the local oscillator;
obtain a carrier frequency offset by comparing the generated frequency and the frequency of the strongest signal with each
other; and

control the frequency of said local oscillator based at least in part on the determined carrier frequency offset; and
identifies the strongest signal as a time synchronization reference for the receiver, and tracking the strongest signal back
to a measured carrier frequency offset relative to an internal local clock.

US Pat. No. 9,560,667

SYSTEM FOR RADIO TRANSCEIVER TIMING

Keysight Technologies Sin...

1. A transceiver adapted to emulate devices using one or more of a plurality of different radio access protocols, the transceiver
comprising:
a timing module adapted to maintain a record of the current timing state which would apply to each of the different radio
access protocols the transceiver is adapted to use, if that radio access protocol was being used;

wherein, when the transceiver changes a radio access protocol being used to emulate a device from a first radio access protocol
used to emulate a first device to a second radio access protocol used to emulate a second device, the transceiver is adapted
to: use the record of the current timing state which would apply to the second radio access protocol to set the timing of
the second radio access protocol; and to emulate devices using one or more of a plurality of different frame based communication
radio access protocols and the record of the current timing state which would apply to each of the different radio access
protocols comprises the frames number, sub-frame number and sample number of that radio access protocol.

US Pat. No. 10,097,442

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RECEIVING TEST CONFIGURATION INFORMATION

KEYSIGHT TECHNOLOGIES SIN...

1. A method for receiving test configuration information using a registration server, the method comprising:at a node configured to execute a test in a private network and to operate in the private network:
registering node identification information with a registration server,
sending a keep-alive message to the registration server; and
receiving, in response to the keep-alive message and via the registration server, test configuration information for configuring the test from a configuration system outside the private network, wherein the node is behind a firewall that blocks direct communications sent from the configuration system and wherein the test configuration information is sent to the node without opening a port for an inbound connection from the configuration system; wherein prior to the node receiving the test configuration information from the configuration system outside the private network, the configuration system is configured to request node identification information from the registration server; to generate, using the node identification information, the test configuration information; and to send the test configuration information to the registration server.

US Pat. No. 9,936,027

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR APPLICATION SESSION SHARING

KEYSIGHT TECHNOLOGIES SIN...

1. A method for application session sharing, the method comprising:receiving, from a first client node, a request for initiating a remote application session for interacting with an application instance by one or more users;
configuring, at a connection manager, a remote control proxy server for sending messages between one or more client nodes and the remote application session;
initiating the remote application session and configuring a remote control server at the first client node for interacting with the remote application session;
receiving, from a second client node, a request for accessing the remote application session; and
providing communications between the second client node and the application instance associated with the remote application session using the remote control server, wherein providing the communications between the second client node and the application instance associated with the remote application session includes providing, via the remote control proxy server, user-initiated commands from the second client node to the remote control server and providing the user-initiated commands from the remote control server to the application.

US Pat. No. 9,698,920

RADIO CHANNEL DATA AND THE USE THEREOF

Keysight Technologies Sin...

1. An apparatus comprising:
a receiver comprising at least three omni-directional antennas arranged in a manner occupying a two dimensional domain for
separating reception directions three dimensionally, the receiver being configured to receive wireless transmission of a real
radio system comprising predetermined data from at least one base station of a radio system as a function of reception direction;
and

a processing unit configured to:
form taps of a delay profile based on a comparison between the data that is received and corresponding predetermined data,
estimate direction for the taps of the delay profile based on a reception direction of the transmission, and
form radio channel data, for a radio channel model in a multiple input multiple output radio channel emulation in an over-the-air
chamber having a plurality of antennas around a test zone where a device-under-test is placeable, by associating the taps
of the delay profile with the estimated direction.

US Pat. No. 10,019,333

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR EMULATING NETWORK DEVICES WITH DIFFERENT CLOCKS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for emulating network devices with different clocks, the method comprising:in a network equipment test device:
generating or obtaining timing information to produce a first clock;
obtaining clock modification information, wherein the clock modification information includes at least one of frequency adjustment factors and phase offsets for generation of different emulated clocks that differ from each other in at least one of frequency and phase to simulate at least one of clock drift and clock jitter;
emulating the different clocks using the timing information and the clock modification information, wherein the different emulated clocks differ from each other in at least one of frequency and phase to simulate at least one of clock drift and clock jitter; and
emulating at least one network device that transmits test packets to a device under test using the different clocks, wherein different ones of the test packets include timestamps generated using the emulated clocks that differ from each other in at least one of frequency and phase.

US Pat. No. 9,998,213

NETWORK TAP WITH BATTERY-ASSISTED AND PROGRAMMABLE FAILOVER

KEYSIGHT TECHNOLOGIES SIN...

14. The network tap of claim 10 comprising a power source for powering the at least one optical-electrical transceiver, the at least one multiplexer/demultiplexer module and the multiplexer/demultiplexer controller when operating in the second or the third mode.

US Pat. No. 10,003,517

WIRELESS COMMUNICATION TEST SYSTEM ARRANGEMENT

KEYSIGHT TECHNOLOGIES SIN...

1. A network equipment test device comprising:a plurality of sets of device under test (DUT) interface components for interfacing with a physical layer interface of a DUT;
a plurality of sets of hardware traffic generation and analysis components for generating packets to be sent to the DUT and for analyzing packets from the DUT using hardware;
a plurality of sets of software traffic generation and analysis components for generating packets to be sent to the DUT and for analyzing packets from the DUT using software;
a plurality of packet switch interfaces respectively associated with the sets DUT interface components, the sets of hardware traffic generation and analysis components, the sets of software traffic generation and analysis components and configurable to implement logical bindings between the sets of components; and
a packet switch for switching traffic between the packet switch interfaces to direct test traffic to the DUT and direct traffic from the DUT to the packet switch interfaces associated with the sets of hardware or software traffic analysis components required for a particular test, wherein the sets of DUT interface components each include a medium access control (MAC) functions block configured to identify traffic from the DUT requiring analysis by the sets of software traffic analysis components and traffic requiring analysis by the sets of hardware traffic analysis components, wherein the MAC functions blocks are configured to tag the traffic identified as requiring analysis by the sets of software traffic analysis components with identifiers for the sets of software traffic analysis components and to tag the traffic as requiring analysis by the sets of hardware traffic analysis components with identifiers for the sets of hardware traffic analysis components.

US Pat. No. 9,910,125

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR ADAPTIVELY CALIBRATING TEST SYSTEMS FOR DIFFERENT INTERCONNECTS

KEYSIGHT TECHNOLOGIES SIN...

1. A system comprising:
a receiver for processing a received signal from an interconnect, wherein the receiver is configured to process the signal
using a plurality of configurable calibration parameters each having a range of valid values; and

a control circuit configured to calibrate the configurable calibration parameters to the interconnect by performing operations
comprising:

for each configurable calibration parameter:
sweeping the configurable calibration parameter across a subset of values from the range of valid values for the configurable
calibration parameter, wherein sweeping the configurable calibration parameter comprises holding each of the configurable
calibration parameters, other than the configurable calibration parameter, constant while sweeping the configurable calibration
parameter; and

testing the received signal from the interconnect for each value in the subset of values and storing a result of the testing
for the value; and

determining a set of calibrated values for the configurable calibration parameters based on the results of the testing.

US Pat. No. 10,102,020

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR VIRTUAL MACHINE (VM) DEPLOYMENT USING READ-ONLY MEMORY

KEYSIGHT TECHNOLOGIES SIN...

1. A method for deploying a virtual machine, the method comprising:at a computing platform comprising a hypervisor:
receiving a request for creating a virtual machine (VM) from a hypervisor controller;
creating the VM using a VM operating system (OS) stored in a read-only memory, wherein the read-only memory is shared among a plurality of VMs;
receiving a request for updating the plurality of VMs from the hypervisor controller; and
updating the plurality of VMs without the hypervisor controller communicating with the plurality of VMs directly by overwriting or replacing the VM OS in the read-only memory with a different VM OS via the hypervisor, wherein connectivity with the plurality of VMs is not required during the updating, wherein each of the plurality of VMs is restarted after the updating by the hypervisor and wherein each of the plurality of VMs uses the different VM OS after the updating.

US Pat. No. 9,979,502

APPARATUS AND METHOD FOR SAMPLE CLOCK CORRECTION

Keysight Technologies Sin...

1. A radio transceiver apparatus configured to transmit and receive radio frequency signals, the radio transceiver apparatus comprising:a sample clock configured to generate samples at a clock frequency fs;
a processor configured to generate a transmission data stream signal, wherein the transmission data stream signal comprises frames separated by frame boundaries between the frames, and wherein the frames are comprised of at least one sample; and
a sample clock correction unit;
wherein:
in a first transmission configuration when the clock frequency fs is greater than a desired clock frequency fr, the sample clock correction unit is configured to insert at least one sample into at least one frame boundary between frames; and
in a second transmission configuration when the clock frequency fs is less than a desired clock frequency fr, the sample clock correction unit is configured to remove at least one sample from at least one frame boundary between the frames.

US Pat. No. 9,917,924

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SIMPLISTIC VISUAL REPRESENTATION OF COMPLEX INTERDEPENDENT NETWORK PROTOCOL FIELDS FOR NETWORK PROTOCOL FUZZING AND GRAPHICAL FRAMEWORK FOR REPORTING INSTANTANEOUS SYSTEM LEVEL PROG

KEYSIGHT TECHNOLOGIES SIN...

1. A method for network communications protocol fuzzing, the method comprising:
in a computing device including a processor and a memory:
providing, by the processor, a fuzzer graphical user interface (GUI) including a stacked representation of individual network
protocol fields to be fuzzed;

displaying, by the processor and in the fuzzer GUI, indications of the individual network protocol fields that can be fuzzed;
in response to interaction with the fuzzer GUI, changing at least one of the indications of network protocol fields that can
be fuzzed to an indication of a network protocol field that cannot be fuzzed;

receiving, via the stacked representation, selections of the individual network protocol fields to be fuzzed and specifications
of fuzzed parameter values for the selections;

creating test packets with fuzzed parameter values corresponding to the selections of the individual network protocol fields
to be fuzzed and the specifications; and

transmitting the test packets with the fuzzed parameter values to a network communications protocol stack under test.

US Pat. No. 9,876,543

SYSTEMS AND METHODS FOR CHANNEL STATE INFORMATION EXCHANGE

KEYSIGHT TECHNOLOGIES SIN...

1. A system for transferring a channel estimate for wireless digital communications,
comprising:
a channel estimator for receiving information over a wireless channel and generating a channel estimate;
a transmit processor for generating protocol information to be transmitted over said wireless channel;
a channel estimate piggyback communications module for piggybacking said channel estimate on said protocol information and
transmitting said protocol information with said piggybacked channel estimate over said wireless channel; and

a pilot subcarrier generator operatively coupled to said transmit processor for inserting pilot data within said protocol
information transmitted over said wireless channel, wherein said channel estimate piggyback communications module provides
said channel estimate to said pilot subcarrier generator, which encodes said channel estimate into said pilot data.

US Pat. No. 9,787,414

OVER-THE AIR TEST

Keysight Technologies Sin...

1. An apparatus comprising:
a signal processing unity; and
at least one calibration antenna placable in at least two positions in a test zone in an over-the-air chamber including over-the-air
antennas, the at least one calibration antenna, at each position, being configured to receive calibration transmission from
the over-the-air antennas via undesired interactions between the calibration transmission and structures associated with the
over-the-air chamber, and the signal processing unit being configured to receive signals from the at least one calibration
antenna of the at least two positions in response to a reception of the calibration transmission, form a chamber model with
the undesired interactions based on the received signals, and store the chamber model for a cancellation of effects of the
undesired interactions by a predistortion of a radio frequency transmission from the over-the-air antennas in the over-the-air
chamber; and

wherein the signal processing unit is configured to form a distortion electric field by a convolution of a measured chamber
model and a frequency response of a desired radio channel to be emulated, an inversion of the distortion electric field, a
formation of a frequency response based on an inverted distortion electric field, and a combination of the frequency response
of the desired radio channel to be emulated and the frequency response associated with the inverted distortion electric field
for a cancellation of effects of the undesired interactions during emulation.

US Pat. No. 10,073,931

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR OBTAINING POWER CONSUMPTION DATA ASSOCIATED WITH PACKET PROCESSING

KEYSIGHT TECHNOLOGIES SIN...

1. A method for obtaining power consumption data associated with packet processing, the method comprising:at a test device:
sending, via a first communications interface, at least one test packet to a system under test (SUT), wherein a timestamp associated with the at least one test packet is generated by the test device;
receiving, via a second communications interface, power consumption data associated with the at least one test packet, wherein a timestamp associated with the power consumption data associated with the at least one test packet is generated or obtained by the test device;
correlating the power consumption data and test packet information to generate at least one packet related power consumption metric, wherein correlating the power consumption data and the test packet information includes using the timestamp associated with the power consumption data and the timestamp associated with the at least one test packet for correlation; and
generating, using the correlated power consumption data and test packet information, the at least one packet related power consumption metric.

US Pat. No. 9,967,150

METHODS AND APPARATUSES FOR IMPLEMENTING NETWORK VISIBILITY INFRASTRUCTURE

KEYSIGHT TECHNOLOGIES SIN...

1. A visibility infrastructure network configured for monitoring a switching network by directing copies of packets traversing said switching network to monitoring tools performing functions separate from packet switching performed by said switching network, said visibility infrastructure network comprising:a plurality of network infrastructure visibility elements, said plurality of network infrastructure visibility elements including forwarding hardware for forwarding said copies of said packets traversing said switching network to said monitoring tools for performing said functions separate from said packet switching performed by said switching network, said plurality of network visibility elements including at least one tap and at least one network packet broker, separate from switching devices that perform said packet switching in said switching network, for forwarding said copies of said packets to said monitoring tools;
an abstracted operating system shared by said plurality of network infrastructure visibility elements and operates as a control layer for said plurality of network infrastructure visibility elements;
at least one application executing on said abstracted operating system, said at least one application utilizing a function of one of said plurality of network infrastructure visibility elements; and
a common logical architecture having a first common protocol for enabling said abstracted operating system to communicate with said at least one application and a second common protocol for enabling said plurality of network infrastructure visibility elements to communicate with said abstracted operating system, wherein said common logical architecture utilizes OpenFlow™ to configure and manage said at least one network tap and said at least one network packet broker.

US Pat. No. 9,923,656

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TESTING RECOVERED CLOCK QUALITY

KEYSIGHT TECHNOLOGIES SIN...

1. A system for testing recovered clock quality, the system comprising:
a test device for operating as a timing synchronization protocol master for communicating with a device under test functioning
as a timing synchronization protocol slave or a timing synchronization protocol boundary clock to synchronize a clock of the
device under test with a clock of the test device; and

a recovered clock quality tester for receiving, from the device under test, a reverse synchronization message including clock
information and for using the clock information to quantify a synchronization error between the clock of the device under
test and the clock of the test device,

wherein the test device is configured to perform operations comprising:
sending a synchronization message to the device under test, causing the device under test to synchronize the clock of the
device under test with the clock of the test device;

receiving, from the device under test, the reverse synchronization message and a sent timestamp for the reverse synchronization
message, generating a received timestamp for the reverse synchronization message using the clock of the test device; and

determining the synchronization error for the clock of the device under test based on the sent timestamp, the received timestamp,
and a path delay between the test device and the device under test over a data communications network.

US Pat. No. 9,967,165

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PACKET MONITORING IN A VIRTUAL ENVIRONMENT

KEYSIGHT TECHNOLOGIES SIN...

1. A method for packet monitoring in a virtual environment, the method comprising:at a virtual tap controller implemented using at least one processor:
sending, to a virtual tap in a virtual environment implemented using at least one computing platform, at least one summarization rule for generating summary packet information about packet traffic associated with the virtual environment;
receiving, from the virtual tap, the summary packet information generated using the at least one summarization rule;
generating, using the summary packet information, at least one processing rule for copying or forwarding packet data associated with the virtual environment; and
sending, to the virtual tap, the at least one processing rule, wherein generating the at least one processing rule includes using the summary packet information to identify a virtual machine (VM) or a virtualization container contributing to a network condition and generating the at least one processing rule for instructing the virtual tap to copy or forward packet data associated with the VM or the virtualization container.

US Pat. No. 9,961,588

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DISTRIBUTING MONITORED NETWORK TRAFFIC

KEYSIGHT TECHNOLOGIES SIN...

1. A method for distributing monitored network traffic, the method comprising:at a monitoring node load balancer implemented using at least one processor:
monitoring S1-MME traffic and S6a traffic in a core network of a telecommunications network, wherein monitoring the S1-MME traffic and S6a traffic comprises building a table with a record for each subscriber of a plurality of subscribers attaching to the telecommunications network, and wherein building the table comprises correlating, in each record, a first subscriber identifier extracted from an attachment request in the S1-MME traffic with a second subscriber identifier extracted from an attachment response in the S1-MME traffic;
decrypting encrypted S1-MME traffic using information extracted from the S6a traffic, including extracting, from at least one encrypted message, a respective second subscriber identifier from the encrypted message; and
load balancing between a plurality of monitoring nodes using the decrypted S1-MME traffic, wherein load balancing comprises distributing tapped traffic from the core network across the plurality of monitoring nodes using the first and second subscriber identifiers, and wherein distributing the tapped traffic includes distributing the encrypted S1-MME traffic by selecting a respective monitoring node for the encrypted message by accessing the respective record for the respective second subscriber identifier in the table.

US Pat. No. 9,786,999

OVER-THE-AIR TEST

Keysight Technologies Sin...

1. A method of communicating with an electronic device under test through a simulated radio channel of an emulator, the method
comprising:
optimizing a cost function of a theoretical spatial cross correlation and a spatial correlation associated with a plurality
of antenna elements coupled to an emulator in an anechoic chamber to determine weights of the plurality of antenna elements;
and

forming, based on the weights, a beam of a signal of at least one path of a simulated radio channel with at least two antenna
elements of the plurality of antenna elements, wherein a direction of each path depends on a direction of each antenna element.

US Pat. No. 10,097,366

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MONITORING LATENCY AND/OR TIME-BASED DATA LOCATIONS OF MULTICAST COMMUNICATIONS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for monitoring latency associated with multicast communications, the method comprising:monitoring sequence numbers of multicast messages at a plurality of physical network locations, wherein the physical network locations are hops along at least one path in a network for the multicast messages;
at each physical network location, sending a report when a sequence number value for the multicast messages reaches a predetermined value, wherein the reports each include a sequence number associated with a monitored message and a time stamp of an arrival time at which the monitored message arrived at the respective physical network location, wherein the sequence number being reported is the same across each physical network location; and
at a latency determination server (LDS), receiving the reports and using the reports to generate an indication of relative latencies and/or time-based data locations across the physical network locations, wherein using the reports to generate an indication of relative latencies and/or time-based data locations across the physical network locations includes generating a latency metric based upon the time stamps in the reports indicating the arrival times at which the monitored message with the same sequence number was received at the physical network locations.

US Pat. No. 10,110,556

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR INITIATING AND EXECUTING PERFORMANCE TESTS OF A PRIVATE NETWORK AND/OR COMPONENTS THEREOF

KEYSIGHT TECHNOLOGIES SIN...

1. A method for initiating and executing a performance test of a private network and/or components thereof, the method comprising:providing, by a test controller, test configuration information for configuring a performance test to a receiver endpoint in a private network and to a sender endpoint in a public network, wherein the test configuration information received at each endpoint is devoid of destination port addresses for receiving traffic from the other endpoint;
at the receiver endpoint in a private network, initiating a transport layer connection with the sender endpoint in a public network;
at the sender endpoint in the public network, allocating a first port for testing purposes, binding to the first port, and sending an Internet Protocol (IP) address and a port number associated with the first port over the transport layer connection to the receiver endpoint;
at the receiver endpoint, allocating a second port for testing purposes, binding to the second port, and sending an IP address and a port number associated with the second port in a hole punch datagram from the private network to the public network to create a hole in a firewall that is separating the public and private networks, wherein the hole punch datagram comprises a User Datagram Protocol (UDP) datagram in which a source IP address field stores the IP address and a source port field stores the port number associated with the second port; and
at the sender endpoint, receiving the hole punch datagram and using the IP address and port information in the hole punch datagram to send test traffic to the receiver endpoint in the private network through the hole in the firewall.

US Pat. No. 9,774,407

APPARATUS AND METHOD FOR NON-DETERMINATIVE TESTING USING UNSCRIPTED COMMUNICATIONS BETWEEN A NETWORK SIMULATOR AND AN EQUIPMENT UNDER TEST

Keysight Technologies Sin...

1. A test apparatus configurable to perform non-determinative testing of equipment, the apparatus comprising:
a test computer arranged to automatically execute a non-determinative test regime under control of a test application; and
a network simulator connected to the test computer and provided with communication circuitry operable to communicate with
the equipment under test, the network simulator being configurable into a plurality of different network states with an unscripted
interactive period interposed between each of the plurality of different network states, and according to the non-determinative
test regime, wherein the test application is operable to control the network simulator to transition between the plurality
of different network states and to monitor data of communications between the network simulator and the equipment during each
unscripted interactive period between said transitions.

US Pat. No. 9,985,864

HIGH PRECISION PACKET GENERATION IN SOFTWARE USING A HARDWARE TIME STAMP COUNTER

KEYSIGHT TECHNOLOGIES SIN...

1. A network testing system having at least one network card, the network card including a processor, a hardware counter, a memory and a network communications unit, the network testing system coupled with a network, the network testing system having instructions stored thereon which when executed cause the network testing system to perform operations comprising:receiving user selection to create a network test;
receiving test information from the user, the test information including a transmission rate and packet creation information;
calculating a packet transmission interval based on the transmission rate, wherein the packet transmission interval defines how often packets will be sent to achieve evenness in packet transmissions during a time period at the user specified packet transmission rate;
receiving user selection to execute the network test transmitting packets specified in the network test over the network at the packet transmission rate, including:
preparing a packet including at least a payload and a header according to the packet creation information;
directly accessing and checking the hardware counter to learn if the packet transmission interval has elapsed, wherein the hardware counter comprises a time stamp counter (TSC) register included within processor that increments or counts at regular uniform intervals from when the processor is powered on and wherein directly accessing the hardware counter includes reading the TSC register using a routine located within a kernel of an operating system executing on the network card; and
when the packet transmission interval has elapsed, sending the packet over the network.

US Pat. No. 9,935,707

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING TRAFFIC GENERATION OR FORWARDING DEVICE THAT COMPENSATES FOR SKEW BETWEEN ELECTRICAL LANES IN A MANNER THAT ALLOWS COHERENT DETECTION OF TRANSMITTED DATA

KEYSIGHT TECHNOLOGIES SIN...

1. A method for transmitting and coherently detecting data transmitted over electrical lanes that experience different amounts of skew, the method comprising:in a traffic generation or forwarding device:
self calibrating transmit and receive-side components of the traffic generation or forwarding device to account for skew between electrical lanes and setting per-electrical lane delays based on the calibration;
generating or receiving data to be transmitted to a network device;
spreading, using one of the transmit-side components, the data to be transmitted over a first number of electrical lanes;
multiplexing the data from the electrical lanes onto a second number of optical lanes, the second number being different from the first number;
transmitting the data to the network device over the optical lanes.
receiving the data from the network device; and
reconstructing transmitted data from the received data using the receive-side components, wherein the traffic generation or forwarding device comprises a network equipment test device and wherein the network device comprises a device under test.

US Pat. No. 10,116,527

METHODS AND APPARATUSES FOR VALIDATING NETWORK PACKET BROKERS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for validating a network packet broker, comprising:providing a software model of a network packet broker including a modeled filter and a modeled load balancer;
using filter logic of a software protocol analyzer to implement said modeled filler:
using said software protocol analyzer to implement said modeled load balancer;
providing a packet capture file, said packet capture file containing data packets captured from a production network or generated by a traffic generator;
creating a first association between an input port of said software model of said network packet broker and said packet capture file;
creating a second association between said input port and at least one of an input port of said modeled filter of said software model of said network packet broker and an input port of said modeled load balancer of said software model of said network packet broker;
creating a third association between said at least one of said input port of said modeled filter and said input port of said modeled load balancer with an output port of said software model of said network packet broker;
creating a fourth association between said output port of said software model of said network packet broker and said software protocol analyzer, thereby designating data packets output from said output port of said software model of said network packet broker be received by said software protocol analyzer for analysis; and
invoking said software protocol analyzer to transmit said data packets from said packet capture file through said modeled filter implemented by said software protocol analyzer and said modeled load balancer implemented by said software protocol analyzer to validate said modeled filter and said modeled load balancer.

US Pat. No. 10,181,997

METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PROVIDING RECEIVE PORT RESILIENCY IN A NETWORK EQUIPMENT TEST DEVICE

KEYSIGHT TECHNOLOGIES SIN...

1. A system for providing test receive port resiliency, the system comprising:a network equipment test device including a port module for transmitting test packets to and receiving packets from a device under test (DUT);
a configurable pre-filter associated with the port module for pre-filtering the packets received from the DUT;
a port central processing unit (CPU) associated with the port module for processing packets passed by the configurable pre-filter;
a pre-filter rules generator implemented by at least one processor for analyzing the packets forwarded to the port CPU and for automatically generating a pre-filtering rule to be used by the pre-filter for filtering subsequent packets received from the DUT; and
a CPU status monitor for monitoring status of the port CPU, wherein the port CPU status monitor indicates occurrence of a condition regarding the port CPU and wherein the pre-filter rules generator analyzes the packets forwarded to the port CPU prior to the occurrence of the condition and generates, based on the packets forwarded to the port CPU prior to the occurrence of the condition, the pre-filtering rule.

US Pat. No. 10,178,015

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TESTING NETWORK EQUIPMENT DEVICES USING CONNECTIONLESS PROTOCOLS

KEYSIGHT TECHNOLOGIES SIN...

1. A system for testing a network equipment device under test (DUT), the system comprising:a network equipment test device including at least one processor and configured to execute a test script to test the network equipment DUT by sending network traffic to and receiving network traffic from the network equipment DUT using a connectionless protocol;
a test message generator implemented on the network equipment test device and configured for transmitting a first message using the connectionless protocol for a network flow to the network equipment DUT according to the test script and for storing a record for the network flow including a first flow identifier for the network flow based on a first payload of the first message; and
a test analyzer implemented on the network equipment test device and configured for receiving a second message from the network equipment DUT and determining that the second message belongs to the network flow by determining a second flow identifier based on a second payload of the second message and matching the second flow identifier to the first flow identifier;
wherein the test analyzer is configured for capturing a flow tuple from the second message, adding the flow tuple to the record for the network flow in a flow map table, and determining that one or more subsequently received messages belong to the network flow using the flow tuple; and
wherein the test analyzer is configured for analyzing the subsequently received messages in accordance with the test script and producing a test report for the network equipment DUT based on analyzing the subsequently received messages.

US Pat. No. 10,205,938

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MONITORING AND/OR TESTING NETWORK COMMUNICATIONS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for monitoring and/or testing network communications, the method comprising:at a computing platform comprising a Layer 2 (L2) switch:
receiving packets from a network connected device;
determining performance metrics associated with either the network connected device or a communications network to which the network connected device is connected by actively or passively monitoring or testing the packets;
detecting a specially coded packet instruction; and
engaging the L2 switch in response to detecting the specially coded packet instruction and automatically switching the computing platform from a passive mode to an active mode, wherein, in the passive mode, the computing platform monitors existing packets that traverse the computing platform using a passive tap module but does not insert test packets into the communications network; and
after switching from the passive mode to the active mode, emulating the network connected device by generating and sending test packets that appear to originate from the network connected device, wherein the test packets originate from the computing platform and not the network connected device, wherein the test packets bypass the passive tap module.

US Pat. No. 10,116,541

TCP CONNECTIONS RESILIENCY SYSTEM FOR TESTING NETWORKS IN UNSTABLE ENVIRONMENTS

KEYSIGHT TECHNOLOGIES SIN...

1. A system for testing a network device under test (DUT), the system comprising:a network equipment test device including at least one processor;
a client and a server implemented by the network equipment test device and configured to establish a transmission control protocol (TCP) connection between the client and the server and through the network DUT, wherein the client and the server are implemented on one or more processors;
a test controller implemented by the network equipment test device and configured to execute a test script to test the network DUT by exchanging a sequence of data packages over the TCP connection between the client and the server; and
a resiliency system including a client side portion and a server side portion implemented by the network equipment test device and configured to store, for each data package exchanged between the client and the server over the TCP connection, a client sequence identifier for the data package and a server sequence identifier for the data package, and, in response to detecting an error on the TCP connection, synchronizing the client and the server to a last data package exchanged prior to the error using the client sequence identifiers and the server sequence identifiers and resuming the test script at a next data package after the last data package exchanged prior to the error in the sequence of data packages;
wherein the resiliency system is configured to store a unique receive sequence number (RSN) for each of a plurality of received data packages and a unique send sequence number (SSN) for each of a plurality of sent data packages, and wherein synchronizing the client and the server comprises exchanging at least a first RSN from the client to the server and a second RSN from the server to the client.

US Pat. No. 10,122,636

PROCESSING DATA UNITS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for processing data units, the method comprising: at a computing platform comprising a network equipment test device, wherein the network equipment test device comprises a plurality of processors for performing data unit concatenation, wherein the computing platform has throughput limitations associated with processing data:sorting or classifying individual data units using processor affinity values, wherein each of the processor affinity values identifies to which processor of the plurality of processors an individual data unit should be forwarded to for concatenation with other individual data units associated with the same processor affinity value;
concatenating, using a first processor of the plurality of processors associated with a first processor affinity value, multiple individual data units into a concatenated data unit (CDU), wherein the CDU includes a header portion for at least one of the multiple data units, wherein the multiple individual data units in the CDU are associated with the first processor affinity value;
processing the CDU as a single data unit rather than as multiple individual data units such that the CDU incurs processing overhead of a single data unit rather than that of multiple individual data units; and
de-concatenating the CDU into the multiple individual data units, wherein the concatenating, processing, and de-concatenation occur in a network interface of the network equipment test device.

US Pat. No. 10,205,590

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR REDUCING THE SIZE OF A CRYPTOGRAPHIC KEY IN A TEST SIMULATION ENVIRONMENT

KEYSIGHT TECHNOLOGIES SIN...

1. A method for reducing the size of a cryptographic key in a test simulation environment, the method comprising:determining, by a first test simulation endpoint, a minimum key size value and a maximum key size value for a private cryptographic key for each of a plurality of key exchange value pairs, wherein the key exchange value pair for each private cryptographic key includes at least one numeric value that is used to derive a public cryptographic key and a shared secret key used by the first test simulation endpoint;
deriving, for each of the plurality of key exchange value pairs, a key sizing constant by dividing the minimum key size value by the maximum key size value;
storing each of the plurality of selected key exchange value pairs and associated key sizing constant in a data store;
selecting a key exchange value pair to be applied to a test simulation session conducted between the first test simulation endpoint and a second test simulation endpoint;
generating a private cryptographic key based on the key sizing constant associated with the selected key exchange value pair, wherein the size of the private cryptographic key is determined by multiplying the key sizing constant and a predefined default size of the private cryptographic key; and
utilizing the generated private cryptographic key to obtain a shared secret key that is used to establish secure tunnels for communicating test packet traffic in the test simulation session between the first test simulation endpoint and the second endpoint.

US Pat. No. 10,176,068

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TOKEN BASED MESSAGE CAPTURE

KEYSIGHT TECHNOLOGIES SIN...

1. A method for token based message capture, the method comprising:generating a test message including a token indicative of message data and a data integrity check value (DICV) computed based on at least a portion of the message data;
sending the test message to a system under test (SUT);
receiving, from the SUT, a version of the test message, wherein the version of the test message includes the token and the DICV;
storing a representation of the version of the test message using the token and the DICV, wherein storing the representation of the version of the test message using the token and the DICV includes analyzing the version of the test message for identifying one or more differences between the test message sent to the SUT and the version of the test message received from the SUT and storing delta information about the one or more differences; and
reconstructing the version of the test message received from the SUT using the representation of the version of the test message by obtaining, using the token and a data store indexed by the token, original message data and modifying the original message data using the delta information to obtain actual message data of the version of the test message received from the SUT.

US Pat. No. 10,135,702

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TESTING NETWORK FUNCTION VIRTUALIZATION (NFV)

KEYSIGHT TECHNOLOGIES SIN...

1. A method for testing network function virtualization, the method comprising:at a network test controller implemented using at least one processor:
determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs);
configuring the first NFT based on traffic matching filtering information, wherein the traffic matching filtering information indicates a first portion of traffic for analysis and a second portion of the traffic for bypassing analysis;
inserting, using a software defined networking (SDN) related interface and at the first insertion point, the first NFT into the service chain, wherein the first NFT performs analysis on the first portion of the traffic to test at least one of the plurality of VNFs and wherein the second portion of the traffic bypasses analysis, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs; and
inserting, at a second insertion point, a second NFT into the service chain, wherein the at least one VNF is located between the second NFT and the first NFT in the service chain.

US Pat. No. 10,212,125

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TESTING NETWORK EQUIPMENT DEVICES USING CONNECTION-ORIENTED PROTOCOLS

KEYSIGHT TECHNOLOGIES SIN...

1. A system for testing a network equipment device under test (DUT), the system comprising:a network equipment test device including at least one processor and configured to test the network equipment DUT by sending network traffic to and receiving network traffic from the network equipment DUT using a connection-oriented protocol;
a test message generator implemented on the network equipment test device and configured for inserting, during a connection establishment process of the connection-oriented protocol for a network flow to the network equipment DUT, a flow-identifying sequence number into a sequence number field of a first message of the network flow, wherein the flow-identifying sequence number is a number uniquely identifying the network flow from a plurality of other network flows, and wherein inserting the flow-identifying sequence number comprises storing the flow-identifying sequence number in a record for the network flow in a flow map table, capturing a flow tuple from the first message, and associating the flow tuple with the record for the network flow in the flow map table; and
a test analyzer implemented on the network equipment test device and configured for receiving a second message from the network equipment DUT and determining that the second message belongs to the network flow by extracting the flow-identifying sequence number from the second message, wherein the test analyzer is configured for capturing a different flow tuple from the second message, adding the different flow tuple to the record for the network flow, and determining that one or more subsequently received messages belong to the network flow using the different flow tuple.

US Pat. No. 10,193,773

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DISTRIBUTED NETWORK PACKET STATISTICS COLLECTION IN A TEST ENVIRONMENT

KEYSIGHT TECHNOLOGIES SIN...

1. A method for distributed network packet statistics collection in a test environment, the method comprising:instantiating first and second operations that implement different portions of a network packet statistics collection task on processing nodes implemented on different processors in a network packet statistics collection system;
utilizing an auto-discovery mechanism for the second operation to subscribe to a set of capabilities and identify the first operation as a matching operation, wherein utilizing the auto-discovery mechanism includes:
publishing a set of attributes from the first operation to a broker;
at the second operation, subscribing, by transmitting a message to the broker, to an operation having the set of attributes;
receiving, at the second operation and from the broker, notification of the matching operation, the notification including information for connecting to the first operation; and
establishing a channel between the first and second operations; and
executing the network packet statistics collection task, where the first and second operations perform the different portions of the network packet statistics collection task.

US Pat. No. 10,191,826

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING AN ANTICIPATED DATA INTEGRITY CHECK

KEYSIGHT TECHNOLOGIES SIN...

1. A method for providing an anticipated data integrity check, the method comprising:generating a test message including an anticipated data integrity check value (ADICV), wherein the ADICV is computed using at least one expected value based on at least one expected modification to at least one actual value in the test message by at least one system under test (SUT), wherein the ADICV is computed and inserted in the test message prior to the test message being sent to the at least one SUT for modification;
sending the test message to the at least one SUT;
receiving, from the at least one SUT, a modified version of the test message, wherein the modified version of the test message includes the ADICV; and
determining whether the at least one SUT operates as expected by analyzing the modified version of the test message using the ADICV.

US Pat. No. 10,230,824

PACKET CLASSIFICATION USING MEMORY POINTER INFORMATION

KEYSIGHT TECHNOLOGIES SIN...

1. A method for packet classification, the method comprising:receiving a packet containing header information for packet classification;
determining, using the header information and a first hash function, a first memory address identifier indicating a first memory address of a memory;
determining, using one or more hash functions and the header information, a first memory access queue associated with the first memory address identifier, wherein the one or more hash functions includes the first hash function or a second hash function, wherein a plurality of memory access queues are utilized to access the memory and wherein each of the plurality of memory access queues is associated with one or more different portions of the memory;
determining, using the first memory address identifier and the first memory access queue associated with the first memory address identifier, memory pointer information indicating a second memory address identifier indicating a second memory address of the memory, wherein the memory pointer information is stored at the first memory address;
obtaining, using the memory pointer information indicating the second memory address identifier and a second memory access queue associated with the second memory address identifier, packet related information stored at the second memory address; and
performing, using the packet related information, a packet classification action.

US Pat. No. 10,237,122

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING HIGH AVAILABILITY SUPPORT AT A BYPASS SWITCH

KEYSIGHT TECHNOLOGIES SIN...

1. A method for providing high availability support at a first bypass switch, the method comprising:at the first bypass switch:
connecting between a network device separate from the first bypass switch and a plurality of inline network monitoring or security tools that receive and process traffic from the network device that is forwarded to the inline network monitoring or security tools through the first bypass switch, wherein receiving and processing the traffic includes inspecting the traffic for network monitoring or security purposes;
determining, by the first bypass switch, that a first inline network monitoring or security tool of the inline network monitoring or security tools connected to the first bypass switch is unavailable;
determining, by the first bypass switch, that the first inline network monitoring or security tool connected to the first bypass switch is required, and, in response to determining that the first inline network monitoring or security tool is unavailable and required, disabling at least one link connecting the first bypass switch to the network device, wherein the disabling of the at least one link triggers the network device to switch over to a second bypass switch connected to a second inline network monitoring or security tool that provides the same service as the first inline network monitoring or security tool and to forward traffic to the second inline network monitoring or security tool providing the same service as the first inline network monitoring or security tool through the second bypass switch; and
determining that a third inline network monitoring or security tool of the inline network monitoring or security tools connected to the first bypass switch is unavailable and optional, and, in response to determining that the third inline network monitoring or security tool is unavailable and optional, activating a bypass mode at the first bypass switch, wherein activating the bypass mode includes sending the network traffic destined for the third inline network monitoring or security tool to a fourth inline network monitoring or security tool of the inline network monitoring or security tools connected to the first bypass switch that is available and that provides the same service as the third inline network monitoring or security tool and such that network traffic traversing the first bypass switch and destined for the third inline network monitoring or security tool is sent back to the network without being sent to the third inline network monitoring or security tool.

US Pat. No. 10,228,976

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR BALANCING INCOMING CONNECTIONS ACROSS MULTIPLE CORES

KEYSIGHT TECHNOLOGIES SIN...

1. A method for balancing incoming connections, the method comprising:at a first processor of a multi-core connection server, wherein the first processor is one of multiple processors of the multi-core connection server, wherein the multiple processors are configured to receive notification of incoming connection requests associated with a socket, wherein a first connection request and a second connection request are stored in a queue shared by the multiple processors of the multi-core connection server, wherein requests in the queue are awaiting processing by any of the multiple processors of the multi-core connection server:
accepting, by the first processor, the first connection request from the queue;
after accepting the first connection request, determining, by the first processor, that a connection quota for the first processor has been reached; and
in response to determining that the connection quota for the first processor has been reached, performing an appropriate action based on state information associated with other processors of the multiple processors, wherein performing an appropriate action based on the state information includes:
determining whether another processor of the multiple processors can accept the second connection request;
in response to determining that the another processor can accept the second connection request, ignoring the second connection request and refraining from rejecting the second connection request, wherein the another processor with available processing capacity accepts the second connection request; and
in response to determining that none of the multiple processors can accept the second connection request, rejecting the second connection request by removing the second connection request from the queue and sending a rejection message to a sender of the second connection request.

US Pat. No. 10,313,493

METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR NETWORK TAPPING AND PACKET BROKERING IN WIRELESS NETWORKS

KEYSIGHT TECHNOLOGIES SIN...

1. A method for network tapping and packet brokering in wireless networks, the method comprising:using a wireless network tap to tap a signal transmitted between devices separate from the wireless network tap in a wireless network;
determining that the signal is a valid signal according to a wireless network protocol;
in response to determining that the signal is a valid signal according to the wireless network protocol, demodulating the signal into a sequence of bits arranged according to the wireless network protocol;
in response to determining that the signal is not a valid signal according to the wireless network protocol, generating an indication that the signal is not a valid signal according to the wireless network protocol;
generating a frame in a format compatible with a network tapping and packet brokering system;
inserting, in the frame, at least some of the bits, wherein inserting, in the frame, at least some of the bits includes inserting a payload of a wireless network protocol packet in an Ethernet frame; and
transmitting the frame from a network tapping and packet brokering system interface of the wireless network tap to the network tapping and packet brokering system.

US Pat. No. 10,278,087

CORRELATING TAPPED GENERAL PACKET RADIO SERVICE (GPRS) TUNNELING PROTOCOL (GTP) AND NON-GTP PACKETS FOR A SUBSCRIBER'S SESSION FOR LOAD BALANCING AND FILTERING MONITORED TRAFFIC IN A MOBILE NETWORK

KEYSIGHT TECHNOLOGIES SIN...

1. A method for correlating and filtering tapped general packet radio service (GPRS) tunneling protocol (GTP) and non-GTP packets, the method comprising:receiving GTP packets tapped from a plurality of GTP network tap points;
receiving non-GTP packets tapped from at least one non-GTP network tap point; and
correlating GTP packets with non-GTP packets for a particular subscriber; and
forwarding the GTP packets and non-GTP packets correlated for the particular subscriber to a chosen network monitoring tool.