SlideShare a Scribd company logo
1 of 5
Download to read offline
BreakingPoint LTE At-A-Glance




Test LTE/4G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE
Network Infrastructure


Telecom carriers rolling out Long Term Evolution (LTE) and 4G              With a BreakingPoint CTM, you can:
networks must test mobile infrastructures efficiently and accurately
                                                                              • Measure and harden the performance, security, and stability
under punishing real-world conditions, without spending a fortune
                                                                                of load balancers, firewalls, IPS devices, and other equipment
to do so. BreakingPoint CTM products answer this challenge with
                                                                                with up to 120 gigabits per second of application, attack, and
the industry’s most sophisticated and cost-effective Internet-scale
                                                                                malformed traffic.
LTE emulation.
                                                                              • Validate network and data center performance by re-creating
These products allow carriers to test their networks and the devices            more than 150 application protocols, including Twitter Mobile,
within them against the behavior of millions of simulated users                 AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
downloading rich media content, placing calls, purchasing music,                BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
browsing the Web, or unknowingly sharing the latest malware. A                  Facebook®, YouTube®, and Apple® FaceTime®, as well as other
BreakingPoint CTM replaces racks of equipment and complicated                   mobile, social, and gaming protocols—with Multicast support.
setup processes with a single-chassis device and a single user                • Stress network infrastructures with more than 4,500 security
interface (shown below).                                                        attacks and 28,000 pieces of malware—including more
                                                                                than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                evasions.
Effective Device
                                                                              • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
LTE network conditions needed to harden carrier-grade network                 • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                     botnet attacks to uncover previously hidden weaknesses.




          BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
BreakingPoint LTE At-A-Glance


  The Solution for Simulating Multi-Million-User LTE Networks,
  with Additional 3G Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest LTE networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of thousands of eNodeBs connecting to millions of devices
         such as smartphones, tablet computers, and netbooks.
     • Interactions among all the network elements involved in LTE
         communications, including user equipment (UE), eNodeBs,                               BreakingPoint FireStorm CTM Specifications
         Service Gateways (SGWs), Packet Data Network Gateways                                 A single BreakingPoint FireStorm CTM provides the equivalent
         (PGWs), and Mobility Management Entities (MMEs).                                      performance of many racks of servers from a 4U chassis, including:
     • A full Dynamic Host Control Protocol (DHCP) network, with                                   • 120 gigabits per second of blended stateful application traffic
         support for both DHCP Client and DHCP Server processes.                                   • 90 million concurrent TCP sessions
     • Support for both 3G and LTE environments with GTPv1 and                                     • 4 million TCP sessions per second
         GTPv2.
                                                                                                   • 1.5 million steady-state complete TCP sessions per second
  Technological Breakthroughs from an Easy-to-Use Product                                          • 120,000+ SSL sessions per second
  That Is Always Current                                                                           • 150+ stateful application protocols
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 4,500+ live security attacks
  configuration in a variety of network environments. Because of their
                                                                                                   • 28,000+ pieces of malware
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  the landscape for applications, attacks, and telecom standards. With
  a BreakingPoint CTM, you will:                                                               To learn more about all BreakingPoint products and services, visit
                                                                                               www.breakingpoint.com/products.
     • Receive frequent updates from the BreakingPoint Application
         and Threat Intelligence (ATI) research team, which is dedicated                       Schedule a Demonstration Today
         to keeping applications and attacks current and providing                             Find out why the world’s largest service providers rely on
         frequent feature and performance enhancements.                                        BreakingPoint to measure and harden the resiliency of their LTE
     • Employ built-in network traffic profiles—created using                                  infrastructures. Visit
         data collected from top global telecom carriers—or easily                             www.breakingpoint.com/LTE.
         customize these profiles to fit your own network’s unique
                                                                                               1.866.352.6691 U.S. Toll-Free
         conditions.
                                                                                               www.breakingpoint.com
     • Configure simulations in just minutes through a single user-
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and Data Loss Prevention solutions with a
         digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Technical Specifications                                                                         • North American Wireless Carrier Weeknight
                                                                                                   • North American Wireless Carrier Weeknight with iPhone
                                                                                                   • Sandvine Mobile Internet Report – Caribbean / Latin America
  Devices Emulated:                                                                                • Sandvine Mobile Internet Report – Europe
      • eNodeBs + UEs
                                                                                                   • Sandvine Mobile Internet Report – North America
      • PDN
                                                                                               Wireless Reporting Statistics:
      • MME
                                                                                                   • UE Attach Requests Sent / Accepted / Failed
      • SGW + PGW + PDN
                                                                                                   • UE Detach Requests Sent / Successes
      • eNodeBs + UEs + MME, SGW + PGW + PDN
                                                                                                   • S1AP Setup Requests / Successes
      • SGSN + UEs
                                                                                                   • S1AP Reset Requests Received / Reset ACKs Sent
      • GGSN + PDN
                                                                                                   • SCTP Open Requests / Open Successes
  Interfaces Supported:                                                                            • SCTP Close Requests / SCTP Close Successes
      • S1-U (eNodeB and SGW sides)
                                                                                                   • GTP Create Requests Processed
      • S1-MME (eNodeB side)
                                                                                                   • GTP Create Responses Processed
      • SGi (PDN side)
                                                                                                   • GTP Delete Requests Processed
      • S11 (MME and SGW sides)
                                                                                                   • GTP Delete Responses Processed
      • Gn (SSGN and GGSN sides)
                                                                                                   • GTP Client Side Tunnels
  Wireless Protocols Supported:                                                                    • GTP Client Side Sent / Received Data
      • S1AP                                                                                       • GTP Server Side Tunnels
      • GTP-C v1, GTP-C v2, GTP-U v1                                                               • GTP Server Side Sent / Received Data
      • SCTP (over UDP or IP)
                                                                                               Other Features:
  Performance (per FireStorm blade):                                                               • LTE specification supported: v9
      • Up to 4,000 eNodeBs                                                                        • All security strikes and live malware supported over LTE and 3G
      • Up to 3,000,000 UEs                                                                        • Specific mobile malware support
      • Up to 3,000,000 concurrent GTP tunnels                                                     • All application protocols supported
      • Up to 1,800 UE registrations/sec on the S1 interface                                       • Can emulate multiple device instances concurrently (MME,
      • Up to 225,000 UE registrations/sec on the S11 interface                                       SGW, GGSN, SSGN)
      • Up to 13 Gbps GTP-encapsulated application traffic                                         • Automatic generation of IMSI, MSISDN, and UE secret keys
      • Up to 11 (1 default + 10 dedicated) bearers / UE

  Predefined Mobility Application Profiles:
      • Mobile User
      • European Wireless Carrier Daytime
      • European Wireless Carrier Daytime with iPhone
      • European Wireless Carrier Weekday
      • European Wireless Carrier Weeknight
      • European Wireless Carrier Weeknight with iPhone
      • North American Wireless Carrier Weekday
      • North American Wireless Carrier Weekday Daytime
      • North American Wireless Carrier Weekday Daytime with
         iPhone
      • North American Wireless Carrier Weekday with iPhone

www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

More Related Content

What's hot

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesTuan Phan
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guidenajeeb625
 
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesNFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesAli Kafel
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Networkhypknight
 
Intel® Select Solutions for the Network
Intel® Select Solutions for the NetworkIntel® Select Solutions for the Network
Intel® Select Solutions for the NetworkLiz Warner
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM System Networking
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsLiz Warner
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratusAli Kafel
 
Floorvision Brochure
Floorvision BrochureFloorvision Brochure
Floorvision BrochureFides Sales
 
Take the guesswork out of video surveillance with pre-validated Milestone s...
Take the guesswork out of video  surveillance with pre-validated  Milestone s...Take the guesswork out of video  surveillance with pre-validated  Milestone s...
Take the guesswork out of video surveillance with pre-validated Milestone s...Principled Technologies
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Michelle Holley
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Zuora, Inc.
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Principled Technologies
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaperAccenture
 

What's hot (20)

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
 
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesNFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Network
 
Intel® Select Solutions for the Network
Intel® Select Solutions for the NetworkIntel® Select Solutions for the Network
Intel® Select Solutions for the Network
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
 
Veryx Services Catalog
Veryx Services CatalogVeryx Services Catalog
Veryx Services Catalog
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
 
Floorvision Brochure
Floorvision BrochureFloorvision Brochure
Floorvision Brochure
 
Floor Vision Brochure
Floor Vision BrochureFloor Vision Brochure
Floor Vision Brochure
 
Pankaj_Joshi_Resume
Pankaj_Joshi_ResumePankaj_Joshi_Resume
Pankaj_Joshi_Resume
 
Take the guesswork out of video surveillance with pre-validated Milestone s...
Take the guesswork out of video  surveillance with pre-validated  Milestone s...Take the guesswork out of video  surveillance with pre-validated  Milestone s...
Take the guesswork out of video surveillance with pre-validated Milestone s...
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaper
 

Similar to LTE Testing - Network Performance, Security, and Stability at Massive Scale

LTE Testing
LTE TestingLTE Testing
LTE TestingIxia
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionIxia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 

Similar to LTE Testing - Network Performance, Security, and Stability at Massive Scale (20)

LTE Testing
LTE TestingLTE Testing
LTE Testing
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Xpt
XptXpt
Xpt
 
Xpt
XptXpt
Xpt
 
XPT Corporate Capability
XPT Corporate Capability XPT Corporate Capability
XPT Corporate Capability
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Building a Digital Telco
Building a Digital TelcoBuilding a Digital Telco
Building a Digital Telco
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 

More from Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 

More from Ixia (20)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

LTE Testing - Network Performance, Security, and Stability at Massive Scale

  • 1. BreakingPoint LTE At-A-Glance Test LTE/4G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE Network Infrastructure Telecom carriers rolling out Long Term Evolution (LTE) and 4G With a BreakingPoint CTM, you can: networks must test mobile infrastructures efficiently and accurately • Measure and harden the performance, security, and stability under punishing real-world conditions, without spending a fortune of load balancers, firewalls, IPS devices, and other equipment to do so. BreakingPoint CTM products answer this challenge with with up to 120 gigabits per second of application, attack, and the industry’s most sophisticated and cost-effective Internet-scale malformed traffic. LTE emulation. • Validate network and data center performance by re-creating These products allow carriers to test their networks and the devices more than 150 application protocols, including Twitter Mobile, within them against the behavior of millions of simulated users AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, downloading rich media content, placing calls, purchasing music, BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, browsing the Web, or unknowingly sharing the latest malware. A Facebook®, YouTube®, and Apple® FaceTime®, as well as other BreakingPoint CTM replaces racks of equipment and complicated mobile, social, and gaming protocols—with Multicast support. setup processes with a single-chassis device and a single user • Stress network infrastructures with more than 4,500 security interface (shown below). attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. Effective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale LTE network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
  • 2. BreakingPoint LTE At-A-Glance The Solution for Simulating Multi-Million-User LTE Networks, with Additional 3G Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest LTE networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of thousands of eNodeBs connecting to millions of devices such as smartphones, tablet computers, and netbooks. • Interactions among all the network elements involved in LTE communications, including user equipment (UE), eNodeBs, BreakingPoint FireStorm CTM Specifications Service Gateways (SGWs), Packet Data Network Gateways A single BreakingPoint FireStorm CTM provides the equivalent (PGWs), and Mobility Management Entities (MMEs). performance of many racks of servers from a 4U chassis, including: • A full Dynamic Host Control Protocol (DHCP) network, with • 120 gigabits per second of blended stateful application traffic support for both DHCP Client and DHCP Server processes. • 90 million concurrent TCP sessions • Support for both 3G and LTE environments with GTPv1 and • 4 million TCP sessions per second GTPv2. • 1.5 million steady-state complete TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 120,000+ SSL sessions per second That Is Always Current • 150+ stateful application protocols BreakingPoint CTMs are designed for ease of use and rapid • 4,500+ live security attacks configuration in a variety of network environments. Because of their • 28,000+ pieces of malware exclusive design, they evolve along with the frequent changes in • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces the landscape for applications, attacks, and telecom standards. With a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit www.breakingpoint.com/products. • Receive frequent updates from the BreakingPoint Application and Threat Intelligence (ATI) research team, which is dedicated Schedule a Demonstration Today to keeping applications and attacks current and providing Find out why the world’s largest service providers rely on frequent feature and performance enhancements. BreakingPoint to measure and harden the resiliency of their LTE • Employ built-in network traffic profiles—created using infrastructures. Visit data collected from top global telecom carriers—or easily www.breakingpoint.com/LTE. customize these profiles to fit your own network’s unique 1.866.352.6691 U.S. Toll-Free conditions. www.breakingpoint.com • Configure simulations in just minutes through a single user- friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and Data Loss Prevention solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 3. BreakingPoint LTE At-A-Glance Technical Specifications • North American Wireless Carrier Weeknight • North American Wireless Carrier Weeknight with iPhone • Sandvine Mobile Internet Report – Caribbean / Latin America Devices Emulated: • Sandvine Mobile Internet Report – Europe • eNodeBs + UEs • Sandvine Mobile Internet Report – North America • PDN Wireless Reporting Statistics: • MME • UE Attach Requests Sent / Accepted / Failed • SGW + PGW + PDN • UE Detach Requests Sent / Successes • eNodeBs + UEs + MME, SGW + PGW + PDN • S1AP Setup Requests / Successes • SGSN + UEs • S1AP Reset Requests Received / Reset ACKs Sent • GGSN + PDN • SCTP Open Requests / Open Successes Interfaces Supported: • SCTP Close Requests / SCTP Close Successes • S1-U (eNodeB and SGW sides) • GTP Create Requests Processed • S1-MME (eNodeB side) • GTP Create Responses Processed • SGi (PDN side) • GTP Delete Requests Processed • S11 (MME and SGW sides) • GTP Delete Responses Processed • Gn (SSGN and GGSN sides) • GTP Client Side Tunnels Wireless Protocols Supported: • GTP Client Side Sent / Received Data • S1AP • GTP Server Side Tunnels • GTP-C v1, GTP-C v2, GTP-U v1 • GTP Server Side Sent / Received Data • SCTP (over UDP or IP) Other Features: Performance (per FireStorm blade): • LTE specification supported: v9 • Up to 4,000 eNodeBs • All security strikes and live malware supported over LTE and 3G • Up to 3,000,000 UEs • Specific mobile malware support • Up to 3,000,000 concurrent GTP tunnels • All application protocols supported • Up to 1,800 UE registrations/sec on the S1 interface • Can emulate multiple device instances concurrently (MME, • Up to 225,000 UE registrations/sec on the S11 interface SGW, GGSN, SSGN) • Up to 13 Gbps GTP-encapsulated application traffic • Automatic generation of IMSI, MSISDN, and UE secret keys • Up to 11 (1 default + 10 dedicated) bearers / UE Predefined Mobility Application Profiles: • Mobile User • European Wireless Carrier Daytime • European Wireless Carrier Daytime with iPhone • European Wireless Carrier Weekday • European Wireless Carrier Weeknight • European Wireless Carrier Weeknight with iPhone • North American Wireless Carrier Weekday • North American Wireless Carrier Weekday Daytime • North American Wireless Carrier Weekday Daytime with iPhone • North American Wireless Carrier Weekday with iPhone www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 4. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 5. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.