CN106686640A - System used for constructing and configuring weak network system environment and method thereof - Google Patents

System used for constructing and configuring weak network system environment and method thereof Download PDF

Info

Publication number
CN106686640A
CN106686640A CN201611116965.2A CN201611116965A CN106686640A CN 106686640 A CN106686640 A CN 106686640A CN 201611116965 A CN201611116965 A CN 201611116965A CN 106686640 A CN106686640 A CN 106686640A
Authority
CN
China
Prior art keywords
network
data
environmentss
vulnerable
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611116965.2A
Other languages
Chinese (zh)
Inventor
夏运思
刘勇
李爱华
赖炳新
张经生
杨明邦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Western Hills Residence Guangzhou Shi You Network Technology Co Ltd
Zhuhai Kingsoft Online Game Technology Co Ltd
Original Assignee
Western Hills Residence Guangzhou Shi You Network Technology Co Ltd
Zhuhai Kingsoft Online Game Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Western Hills Residence Guangzhou Shi You Network Technology Co Ltd, Zhuhai Kingsoft Online Game Technology Co Ltd filed Critical Western Hills Residence Guangzhou Shi You Network Technology Co Ltd
Priority to CN201611116965.2A priority Critical patent/CN106686640A/en
Publication of CN106686640A publication Critical patent/CN106686640A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • H04L41/145Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic

Abstract

The technical scheme of the invention comprises a system used for constructing and configuring a weak network system environment and a method thereof. The method is characterized by acquiring network data of a communication operator corresponding to a mobile terminal, and storing the collected network data and current test environment data; reading the network data, and simultaneously based on the network data, using an interactive interface to generate configuration on a corresponding server; according to the server, configuring and generating a gateway, and based on the gateway, further creating a wireless hot spot; and using a test module to receive data sent by the mobile terminal through the wireless hot spot and sending the data to Internet. The system and the method have advantages that a regression test difficulty caused by an unstable network is avoided; a condition that a network parameter can not be known so that a test result is unreliable is prevented; and high cost generated by an outgoing test can be greatly reduced.

Description

A kind of system and method that building with configuration of vulnerable network system environmentss
Technical field
The present invention relates to a kind of system and method built with configuration of vulnerable network system environmentss, belong to computer movement eventually End field tests.
Background technology
In this day and age, smart mobile phone is more and more extensive using scene, and types of applications and game are both needed in real time and server Communicated, and coverage condition of the wireless network in different regions differs, the standard of each operator is also different, causes user In moving process, it may appear that various possible network environments, so as to the normal operation for having influence on application or play.
Software developer during software development, in order to test the ruuning situation applied in the case of heterogeneous networks, can only Tested under actual network environment with tested application, but problem is:
First, network is unstable, even if in same place, two secondarys are at that it is possible that the inconsistent feelings of network Condition, so as to cannot orientation problem exactly;
Second, tester does not know the concrete condition of network at that time, if the weak situation of network really occur unknown;
3rd, due to the relation of cost, want all typical vulnerable network environment of covering and be nearly impossible.
The content of the invention
For the deficiencies in the prior art, technical scheme provides a kind of building and matching somebody with somebody for vulnerable network system environmentss The system and method put, for realizing the vulnerable network interactive testing of accurately and conveniently mobile terminal.
Technical scheme includes a kind of system built with configuration of vulnerable network system environmentss, it is characterised in that The system includes:Data acquisition module, for obtaining the network data of the corresponding common carrier of mobile terminal, and to being gathered Network data stored with preset test environment data;Service configuration module, for reading network data, while being based on net Network data and using can interactive interface correspondence one server generate configuration;Gateway module, for being generated according to server configures Gateway, based on the gateway hotspot is further created;Test module, for receiving what mobile terminal sent by hotspot Data, and be transmitted to the Internet.
According to the system built with configuration of described vulnerable network system environmentss, described network data includes but does not limit In:Bandwidth, delay, packet loss, Packet Error Rate, out of order rate.
According to the system built with configuration of described vulnerable network system environmentss, described gateway module module also includes: For reading network configuration, focus is created, wherein, create focus is arranged at network settings unanimously, exists for imitating mobile phone Corresponding vulnerable network environment carries out the situation of data interaction with the Internet.
According to the system built with configuration of described vulnerable network system environmentss, described gateway module module also includes: For being acquired with the data that the Internet is interacted by hotspot to mobile terminal and corresponding form is generated, enter one Step, and form is carried out to be recycled to server.
A kind of technical scheme also building and collocation method including vulnerable network system environmentss, it is characterised in that The method includes:Obtain the network data of the corresponding common carrier of mobile terminal, and to the network data that gathered with it is current Test environment data are stored;Read network data, while based on network data and using can interactive interface correspondence one clothes Business device generates configuration;Gateway is generated according to server configures, hotspot is further created based on the gateway;Test module, uses In the data sent by hotspot reception mobile terminal, and it is transmitted to the Internet.
Further, the method also includes:Network data therein includes but is not limited to bandwidth, delay, packet loss, Cuo Bao Rate, out of order rate.
Further, the method also includes:Network configuration is read, focus is created, wherein, create focus is arranged at network Arrange consistent, the situation of data interaction is carried out in corresponding vulnerable network environment and the Internet for imitating mobile phone.
Further, the method also includes:Mobile terminal is carried out by the data that hotspot and the Internet are interacted Corresponding form is gathered and generated, further, and form is carried out to be recycled to server.
Beneficial effects of the present invention are:Unstable networks may caused regression test difficulty;Network parameter is unknowable, surveys The incredible situation of test result;The high cost that outgoing test is produced can be reduced with first mate.
Description of the drawings
Fig. 1 show overview flow chart of the invention;
Fig. 2 show the flow chart according to embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with the accompanying drawings with specific embodiment pair The present invention is described in detail.The system and method built and configure of the vulnerable network system environmentss of the present invention are applied to mobile whole The test that end interacts in different vulnerable network environment with internet data.
Fig. 1 show overview flow chart of the invention.
The first step:Collection mainstream applications are used under scene, the network data of each operator, including but not limited to:Bandwidth, prolong Late, packet loss, Packet Error Rate, out of order rate etc.;
Second step:By the data for getting, in being configured to server;
3rd step:By the server configures into a gateway, and a focus is shared out, make the data of all connection focuses equal Data exchange is carried out by the configuration in the first step and the Internet;
4th step by step:Collection and analysis interaction data.
Fig. 2 show the flow chart according to embodiment of the present invention.The present embodiment is used in the environment of such as elevator, can Response timeout is asked under the UNICOM's 3G network that can occur,
The first step:In elevator, the data for obtaining UNICOM's 3G network are as follows(Data are only for example):
Bandwidth:3mbps
Postpone:1000ms
Packet loss:10%
Packet Error Rate:5%
Out of order rate:10%;
Second step:The data configuration obtained by more than is in server;
3rd step:By above server configures into a gateway, and a focus is shared out, make the data of all connection focuses Carry out data exchange by the configuration in the first step and the Internet;
4th step:Afterwards mobile phone is acquired and is analyzed with the interaction data of the Internet.
The above, simply presently preferred embodiments of the present invention, the invention is not limited in above-mentioned embodiment, as long as It reaches the technique effect of the present invention with identical means, should all belong to protection scope of the present invention.In the protection model of the present invention Its technical scheme and/or embodiment can have a variety of modifications and variations in enclosing.

Claims (8)

1. a kind of vulnerable network system environmentss build and configure system, it is characterised in that the system includes:
Data acquisition module, for obtaining the network data of the corresponding common carrier of mobile terminal, and the network to being gathered Data are stored with preset test environment data;
Service configuration module, for reading network data, while based on network data and using can interactive interface correspondence one clothes Business device generates configuration;
Gateway module, for generating gateway according to server configures, based on the gateway hotspot is further created;
Test module, for receiving the data that mobile terminal sends by hotspot, and is transmitted to the Internet.
2. vulnerable network system environmentss according to claim 1 build and configure system, it is characterised in that described net Network data are included but is not limited to:
Bandwidth, delay, packet loss, Packet Error Rate, out of order rate.
3. vulnerable network system environmentss according to claim 1 build and configure system, it is characterised in that described net Closing module also includes:
For reading network configuration, focus is created, wherein, create focus is arranged at network settings unanimously, for imitating handss Machine carries out the situation of data interaction in corresponding vulnerable network environment and the Internet.
4. vulnerable network system environmentss according to claim 1 build and configure system, it is characterised in that described net Closing module also includes:
For being acquired with the data that the Internet is interacted by hotspot to mobile terminal and generate corresponding form, Further, and to form carry out being recycled to server.
5. a kind of vulnerable network system environmentss are built and collocation method, it is characterised in that the method includes:
Obtain the network data of the corresponding common carrier of mobile terminal, and the network data and preset test environment to being gathered Data are stored;
Read network data, while based on network data and using can interactive interface correspondence one server generate configure;
Gateway is generated according to server configures, hotspot is further created based on the gateway;
Test module, for receiving the data that mobile terminal sends by hotspot, and is transmitted to the Internet.
6. vulnerable network system environmentss according to claim 5 are built and collocation method, it is characterised in that the method is also wrapped Include:
Network data therein includes but is not limited to bandwidth, delay, packet loss, Packet Error Rate, out of order rate.
7. vulnerable network system environmentss according to claim 5 are built and collocation method, it is characterised in that the method is also wrapped Include:
Network configuration is read, focus is created, wherein, create focus is arranged at network settings unanimously, exists for imitating mobile phone Corresponding vulnerable network environment carries out the situation of data interaction with the Internet.
8. vulnerable network system environmentss according to claim 5 are built and collocation method, it is characterised in that the method is also wrapped Include:
It is acquired and generates corresponding form with the data that the Internet is interacted by hotspot to mobile terminal, enters one Step, and form is carried out to be recycled to server.
CN201611116965.2A 2016-12-07 2016-12-07 System used for constructing and configuring weak network system environment and method thereof Pending CN106686640A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611116965.2A CN106686640A (en) 2016-12-07 2016-12-07 System used for constructing and configuring weak network system environment and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611116965.2A CN106686640A (en) 2016-12-07 2016-12-07 System used for constructing and configuring weak network system environment and method thereof

Publications (1)

Publication Number Publication Date
CN106686640A true CN106686640A (en) 2017-05-17

Family

ID=58868551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611116965.2A Pending CN106686640A (en) 2016-12-07 2016-12-07 System used for constructing and configuring weak network system environment and method thereof

Country Status (1)

Country Link
CN (1) CN106686640A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010314A (en) * 2019-12-13 2020-04-14 北京小米智能科技有限公司 Communication test method and device for terminal equipment, routing equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130010646A1 (en) * 2010-03-25 2013-01-10 Zte Corporation Method and device for managing network topology structure of machine to machine network
CN103517311A (en) * 2013-09-11 2014-01-15 百度在线网络技术(北京)有限公司 Method and device simulating wireless network
US20160218952A1 (en) * 2014-07-29 2016-07-28 Aruba Networks, Inc. Testing by simulation using variations of real-time traffic
CN106059858A (en) * 2016-06-24 2016-10-26 武汉斗鱼网络科技有限公司 Network performance testing system and method
CN106095682A (en) * 2016-06-15 2016-11-09 浪潮软件集团有限公司 A kind of Android application stability test method simulating complex network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130010646A1 (en) * 2010-03-25 2013-01-10 Zte Corporation Method and device for managing network topology structure of machine to machine network
CN103517311A (en) * 2013-09-11 2014-01-15 百度在线网络技术(北京)有限公司 Method and device simulating wireless network
US20160218952A1 (en) * 2014-07-29 2016-07-28 Aruba Networks, Inc. Testing by simulation using variations of real-time traffic
CN106095682A (en) * 2016-06-15 2016-11-09 浪潮软件集团有限公司 A kind of Android application stability test method simulating complex network
CN106059858A (en) * 2016-06-24 2016-10-26 武汉斗鱼网络科技有限公司 Network performance testing system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010314A (en) * 2019-12-13 2020-04-14 北京小米智能科技有限公司 Communication test method and device for terminal equipment, routing equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105264859B (en) For generating the method and apparatus known clearly to the customer experience of the application based on web
Goel et al. Survey of end-to-end mobile network measurement testbeds, tools, and services
US20160344606A1 (en) Method and apparatus to determine network quality
US11271671B2 (en) WLAN testing using an RF abstraction layer
CN106534289B (en) Automatic testing method, device and system
CN102413500A (en) Method and system for testing throughput of wireless network card in wireless local area network
Cinque et al. Microservices monitoring with event logs and black box execution tracing
US9407522B2 (en) Initiating data collection based on WiFi network connectivity metrics
US10716088B2 (en) Location determination of internet-of-things devices based on access point emulation
CN106776346B (en) Test method and device of CCMTS (China center testing System) equipment
CN109450743A (en) Platform of internet of things pressure testing system, method, apparatus and server
CN107079320A (en) The terminal data call performance test of network control
Mavromatis et al. A software defined device provisioning framework facilitating scalability in Internet of Things
CN1741663A (en) UTRAN monitoring instrument, monitoring system and monitoring method
CN105099822A (en) Method and physical machine for measuring network performance
CN106686640A (en) System used for constructing and configuring weak network system environment and method thereof
CN108184008A (en) A kind of terminal Communication Performance Evaluation method and apparatus
CN106301977A (en) The method and device that network tests the speed
CN113518022A (en) Method for connection configuration of user equipment and household equipment
CN110635965B (en) IPv6 network quality monitoring method, equipment and storage medium
Díaz-Zayas et al. Remote control and instrumentation of Android devices
TW201620320A (en) Mobile Internet access quality analysis system and method
Fontes Improving the performance evaluation of wireless networks: towards a simulation-experimentation synergy using ns-3
US20210013992A1 (en) Service validation using emulated virtual clients
CN108124280B (en) Monitoring diagnosis system and network monitoring diagnosis method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517