METHOD OF ANALYZING NETWORK WITH GENERATED TRAFFIC

Information

  • Patent Application
  • 20070211697
  • Publication Number
    20070211697
  • Date Filed
    March 13, 2007
    17 years ago
  • Date Published
    September 13, 2007
    17 years ago
Abstract
Generating traffic in a network environment. A traffic generator can be used to record the low level network data that is generated in response to high level user input. The low level network data can be processed to simulate multiple virtual users. Once the network data is processed, the virtual data can be sent over a network as if multiple users were using the network. The response and functionality of the network and of network components can then be monitored and evaluated based on the response to the virtual data.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

To further clarify the above and other advantages and features of the present invention, a more particular description of the invention will be rendered by making reference to specific embodiments thereof which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:



FIG. 1 is a schematic diagram illustrating an embodiment of an operating environment in accordance with the present invention;



FIG. 2 is a schematic diagram illustrating an embodiment of a computing system;



FIG. 3 is a flow diagram of an embodiment of a method of generating virtual network traffic data;



FIG. 4 is a flow diagram of an embodiment of a method of generating virtual network traffic data with a computer program;



FIG. 5 is a flow diagram of an embodiment of a method of generating virtual network traffic data;



FIG. 6 is a flow diagram of an embodiment of a method of generating virtual network traffic data; and



FIG. 7 is a flow diagram of an embodiment of a method of monitoring a response of a network to virtual users.


Claims
  • 1. A method for analyzing a response of a network to a volume of network traffic, the method comprising: transmitting at least one virtual data packet over the network, the at least one virtual data packet being generated from at least one data packet transmitted over the network from a computer, the at least one data packet being comprised of low-level data arising from high-level data being input into the computer system; andmonitoring the response of the network to the transmission of the at least one virtual data packet.
  • 2. The method of claim 1, further comprising presenting a user interface to a user and receiving input initiating the recording of low level network data.
  • 3. The method of claim 2, further comprising receiving high level user input including mouse input and keyboard input from a user and converting the high level user input to low level network data.
  • 4. The method of claim 3, further comprising recording the low level data.
  • 5. The method of claim 4, further comprising processing the recorded low level into the at least one virtual data packet, the at least one virtual data packet corresponding with a plurality of virtual users.
  • 6. A method for analyzing a response of a network to a volume of network traffic, the method comprising: notifying a remote monitoring firm that a response of a network to a volume of virtual network traffic will be tested, the notifying including at least one of a location of the network, identity of the network, type of network, time of the test, source of the network traffic, type of network traffic, or amount of data packets to be transmitted over the network;transmitting at least one virtual data packet over the network, the at least one virtual data packet being generated from at least one data packet transmitted over the network from a computer, the at least one data packet being comprised of low-level data arising from high-level data being input into the computer system;monitoring, by the remote monitoring firm, the response of the network to the transmission of the at least one virtual data packet; andanalyzing the response of the network to the at least one virtual data packet.
  • 7. The method of claim 6, further comprising analyzing the response of the network with a protocol analyzer, a bit rate error tester, a jammer, or a generator.
  • 8. The method of claim 6, wherein transmitting the at least one virtual data packet further comprises altering the at least one data packet such that the at least one virtual data packet represents multiple users.
  • 9. The method of claim 6, wherein the at least one virtual data packet represents actual input of a user.
  • 10. The method of claim 6, further comprising analyzing the response of a network storage device, a router, a switch, a hub, a server, an Intranet, or any combination thereof to the at least one virtual packet.
  • 11. A method for testing a response of a data storage network to network traffic, the method comprising: installing a data storage device at a remote location;receiving input from a user to open a traffic generator program;using a browser to download and upload data to the data storage device, wherein high level data input to the browser is converted to low level network data that is recorded by the traffic generator program;closing the traffic generator program;generating virtual traffic from the recorded low level network data, the virtual traffic based on the recorded low level network data; andtesting a response and a functionality of the data storage device using the virtual traffic.
  • 12. The method of claim 11, wherein generating virtual traffic further comprises identifying a number of virtual users.
  • 13. The method of claim 11, wherein generating virtual traffic comprises altering the recorded low-level data to reflect different users and different IP addresses.
  • 14. The method of claim 12, further comprising generating a set of virtual data for each virtual user.
  • 15. The method of claim 11, further comprising providing the virtual traffic to a monitoring firm that can simulate multiple IP addresses and then testing the response and functionality via the monitoring firm.
  • 16. The method of claim 12, further comprising testing the response and functionality of the data storage device in response to simultaneous requests from the number of virtual users.
  • 17. The method of claim 11, further comprising simulating a plurality of users.
  • 18. A method for analyzing a response of a network to a volume of network traffic, the method comprising: simulating a plurality of virtual users sending traffic data over a network by transmitting at least one virtual data packet for each virtual user in the plurality of virtual users over the network, each at least one virtual data packet having a unique identifier and being comprised of low-level data; andmonitoring the response of the network to the plurality of virtual data packets, wherein the monitoring includes at least one of: monitoring a server response to multiple requests for a first data;monitoring a data storage device response to multiple requests for a second data;monitor a functionality of a database response to multiple queries;comparing a functionality of a first endpoint device to a functionality of a second endpoint device in response to the plurality of virtual data packets;monitoring an load-level early warning system; andmonitoring a system configuration in order to determine whether the configuration properly shares a load including a portion of the plurality of the virtual data packets.
  • 19. The method of claim 18, further comprising recording low level data that is generated from high level input of at least one user.
  • 20. The method of claim 19, further comprising converting the high level input into the low level data.
  • 21. The method of claim 20, further comprising transmitting the at least one virtual data packet over the network.
  • 22. The method of claim 18, wherein the at least one virtual data includes a denial of service attack
Provisional Applications (1)
Number Date Country
60781934 Mar 2006 US