WO2007010593A1 - Tcp session emulator - Google Patents

Tcp session emulator

Info

Publication number
WO2007010593A1
WO2007010593A1 PCT/JP2005/013164 JP2005013164W WO2007010593A1 WO 2007010593 A1 WO2007010593 A1 WO 2007010593A1 JP 2005013164 W JP2005013164 W JP 2005013164W WO 2007010593 A1 WO2007010593 A1 WO 2007010593A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
packet
session
tcp
state
protocol
Prior art date
Application number
PCT/JP2005/013164
Other languages
French (fr)
Japanese (ja)
Inventor
Hiroaki Yamamoto
Wataru Nakamura
Original Assignee
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP]
    • H04L69/163Adaptation of TCP data exchange control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/14Network-specific arrangements or communication protocols supporting networked applications for session management

Abstract

A TCP session emulator comprising a session search table searched for an identifier for specifying a session of the TCP protocol by using at least the IP (Internet Protocol) acquired from the header of the received packet or the port number as the search key, a session status management memory for acquiring the session status code provided according to the identifier acquired by the search, and a sequencer for determining a pseudo-session operation of the TCP protocol used by one of application protocols according to the session status code acquired from the session status management memory.

Description

Specification

TCP session emulation device

Technical field

[0001] The present invention relates to a device for us, Te verifies the TCP communication performance in a communication network system using a TCP (Transmission Control Protocol) as a communication protocol, the device (the communication device connected to a particular IP (Inter net Protocol) network ) or related TCP tweezers Ae Miyu rate Chillon apparatus for an event (event) that occurs Te per cent ヽ the application software Touea emulates (mock).

BACKGROUND

[0002] such as Japanese Patent Laid-Open 11-27308 (Patent Document 1), by emulating the behavior and internal procedures of the TCP protocol, and analyzes the communication sequence state, to investigate the cause of the time throughput low down technique There has been disclosed. In these techniques, the actual communication mode Yutashi, by analyzing the state transition of the TCP protocol are investigating the condition causing the operation problem.

[0003] However, the conventional emulation technology, to monitor the actual communication between the communication system or communication device, it is possible to confirm the normality of the state transition of the TCP protocol, (artificially) intentionally generates such abnormal sequence state or the high load state, it is impossible to confirm the validity of the processing operation at that time the communications system. Also, by intentionally generating the response delay of the handshake operation of the communication system between, it is also impossible to confirm the validity of the operation at the time of the response-waiting processing data Imuauto.

[0004] In the force this configuration shown in FIG. 10 a configuration example of a conventional test apparatus performs the identification of the protocol to extract the header of the received packet in the header extraction. Protocol identification section 20, the selected writing a packet to receive packet buffer 22 by the received packet read Z write (RZW) control unit 21, and the data in the header contents of the transmission packet buffer 24 designated by the transmission packet read Z write (RZW) controller 23 the header generated by the setting register 25 collaboration 及 beauty packet header generation unit 26 adds, to generate a transmission packet by sending the packet generating unit 27, it is possible to be sent to the network. However, this conventional testing devices are not also artificially occurred the state transition of the TCP protocol.

[Patent Document 1] JP-A 11 27308 discloses

[Patent Document 2] JP 2000 - 267963 Patent Publication

[Patent Document 3] JP 2000 - 106557 Patent Publication

[Patent Document 4] JP 2004- 140596 JP

Disclosure of the Invention

Problems that the Invention is to you'll solve

[0005] An object of the present invention, allows arbitrarily generated according to the setting of the actual intentionally occurrence of generation or high load state of the abnormal sequence state on difficult TCP protocol be generated by network It is to provide a technique for.

Means for Solving the Problems

[0006] In order to solve the above problem, TCP session emulation device of the present invention, the one Kutomo 1 small IP (Internet Protocol) address and port number obtained from the header of the received packet as a search key TCP (Transmission Control protocol) protocol session and the session lookup table for searching an identifier that identifies the emissions; the session search table of the search results as a group with the identifier obtained Dzu, pulled Te, the session status code session state management memory and for obtaining; sheet one in response to the session status code the session state management memo Rica obtained, to determine the pseudo session operation of the TCP protocol or multiple application protocols are used sequencer provided with a door.

[0007] In the TCP session emulation device employing this configuration, the sequencer is provided for each application protocols, including HTTP (Hyper Text Transfer Protocol), FTP (File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol) is not that.

[0008] Also, the session status code, the port number session of the TCP protocol is communicating, TCP status code indicating the transition state of the TCP protocol, and the upper state code indicating a transition state before Symbol Application Protocol It is configured. [0009] TCP Session emulation device may further comprise a status setting register for holding a preset is set value to generate error processing operation of intentionally the TCP protocol session; the set value and depending on the value of both the session status code, to determine the operation of the sequencer.

[0010] In addition, TCP session emulation device, as the header information from the header of the received packet, together with the IP address and the port number, sequence number of the TCP protocol

An extraction means for obtaining an acknowledgment number and code bits; based on the header contents instruction from the header information and the sequencer obtained by the extraction means Te, generates header information of a transmission packet, as a header of the response packet and means for transmitting additional to.

[0011] In addition, TCP session emulation apparatus, means and for storing a reception time on the session state management memory for each corresponding session as timestamp information of the received packet; register sets the delay time of a response packet to achieve a response delay by sending the response packet after the set delay time; further comprising and.

Effect of the invention

[0012] According to the present invention, by the session operation of TCP protocol pseudo feasible, intentionally abnormal sequence, heavy traffic, it is possible to generate a like response delay, network devices (communication apparatus) and is beneficial to the verification of the application software. Thus, greatly contributes to the quality improvement of the IP network-related system.

[0013] Other objects, features and advantages of the present invention, when Ru is taken in conjunction with the accompanying drawings and claims, will become apparent upon reading the one embodiment described below. BRIEF DESCRIPTION OF THE DRAWINGS

[0014] [FIG 1] FIG 1 is a block diagram showing a configuration of a communication network system TCP session emulation device according to one embodiment of the present invention is applied.

FIG. 2 is a block diagram showing the configuration of a TCP session emulation device according to the embodiment of the present invention.

3] Fig for explain the operation procedure of the TCP session emulation device according to the embodiment of the present invention.

[4] shows a configuration example of a transmission packet buffer. Diagram illustrating a configuration example of FIG. 5 session lookup table.

圆 6] shows a configuration example of a session state management memory.

圆 7 a diagram for illustrating an operation procedure of the response packet generation sequencer.

圆 8] shows an example of a configuration of a response packet generation sequencer.

[9] the state transition diagram of the TCP protocol.

Block diagram illustrating a configuration example of a 圆 10] conventional test apparatus.

DESCRIPTION OF SYMBOLS

TSE TCP session emulation device

1 header extraction, the protocol identification section

2 session Search table

3 session state management memory

4 reception packet buffer

5 transmission packet buffer

6 response packet generation sequencer

7 state setting register

8 the packet header generation unit

9 reply packet generating unit

10 time stamp generating 咅

11 received packet read Z write (RZw) controller

12 transmission packet read Z write (RZW) controller

13 delay setting register

BEST MODE FOR CARRYING OUT THE INVENTION

[0016] Hereinafter, with reference to the accompanying drawings, a more detailed explanation of the present invention. A preferred embodiment of the present onset Akira is shown in the drawings. This invention may, however, many are capable of being implemented in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are disclosed herein will be thorough and complete, it is provided will fully convey the scope of the invention to those skilled in the art.

[0017] 开態 of TCP (Transmission Control Protocol) tweezers ae Miyu rate Chillon device TSE of an embodiment of the present invention shown in FIG. 2, FIG. 1 (A), the communication network system SYS showing an example configuration (B) to apply to.

[0018] FIG. 1, with reference also to FIG. 3 showing the FIG. 2 and the operation procedure, the communication network system SY S includes at least one network (IP (Internet Protocol) network) NW. Network NW This constitutes a UNIX (registered trademark) computer network or a wide area of ​​the packets switched networks such as the. The network NW, usually as a communication device with an IP address, respectively, Sano SV and the client CL is connected. The Sano SV and the client CL, performs transmission and reception (TCP communication) data through a communication line through the network NW (sometimes referred to as a communication path or connection).

[0019] TCP as a communication protocol is a protocol of the OSI (Open Systems Interconnection) a fourth layer above the IP of the third layer of the Reference Model (the network layer) (transport layer). TCP features to perform reliable data transmission (the transfer), i.e. a control of successful transmission of the data holding reliability of the communication path from the beginning of the communication to the exit, further error detection and when an error there to be done and the recovery. Therefore, 'by setting the Oriente head virtual channel, full duplex to the user's upper layers' TCP In connection provides two-way streaming service.

[0020] In the communication network system SYS, performs connection 'Orient Ted data transfer stream service, to maintain reliability, you to practice test the performance of TCP communication becomes indispensable.

[0021] TCP Session emulation device TSE can be implemented in a pseudo client CL or pseudo server SV. Here, the pseudo client CL, which is for a large number of client CL is generated a state in which performs access to Sano SV artificially, pseudo Sano SV is simulated with many actual client CL and performs do not communication. The TCP session emulation device TSE as a pseudo client CL or pseudo server SV, by introducing the communication network system SYS, close to the limit performance difficult server SV in normal, Ya actual verification using the number of clients , Ru can der to a sequence abnormality caused by packet loss on the network NW to artificially generated. [0022] In TCP session emulation device TSE, header extraction 'protocol identification section 1 performs extraction and identification of the protocol of the header portion from the packet received network NW force (in FIG. 3, S10, Sl l). Header extraction 'protocol identifying unit 1 (strictly, TCPZIP packets) TCP bucket bets to be extracts the IP address and port number of the input as a search key in the session retrieval table 2 for searching a TCP session to (in FIG. 3, S1 2, S13). Associative memory Session search table 2 including a search engine (CAM: Conte nt Addressable Memory; consisting of.

[0023] Results session search table 2, the cell shows the respective TCP session number Sshiyon identifier (address), is used to identify the entry number of session state management memory 3 (in FIG. 3, S14) . The session state management memory 3, a connection is established, the state of the TCP session Rusorezore! (State: state) code indicating (tweezers Yung status code), the address indicating the packet storage position of the reception packet buffer 4 ( receive buffer address) is registered for each information force entry number, such as a time stamp indicating the time of packet reception (session number) (in FIG. 3, S15, S16).

[0024] Session status code outputted from the session state management memory 3 is used as a transition condition to the next state in response bucket preparative generation sequencer 6 (in FIG. 3, S17). In this case, the response packet generation sequencer 6 is a hard wear sequencer for realizing the state transition of the TCP session, and session status code, the main controller (CPU: Central Pr ocessor Unit) force set value of the state setting register 7 Ri by the fact that the transition bets condition, the normal operation or abnormal operation, realizing the handshaking (3way handshake) operation on a TCP session (in FIG. 3, S18). Response packet generation sequencer 6, write No write session status code indicating the state after transition to the session state management memory 3 (in FIG. 3, S19).

[0025] After determining the response operation to the received packet in the response packet generation sequencer 6, the transmission header of the content and the content of the transmitted data packet header producing formation unit 8 and transmits the packet read Z writing corresponding to the response operation (RZW) Control It is passed to the part 12. Packet header producing formation unit 8 based on the instruction content from the response packet generation sequencer 6 (content of the transmission header), it generates a transmission packet header, and outputs the response packet generation unit 9. Transmission packet R ZW control unit 12, based on the instruction content from the response packet generation sequencer 6 (the contents of the transmission data), and outputs the transmission packet read address to the transmission packet buffer 5. Reply packet generating unit 9 Tsukeka卩 the transmission packet header from the packet header generation unit 8 to transmit packet data from the transmission packet buffer 5, and generates a response packet, and returns to the other party through the connection network NW (in FIG. 3, S 21).

[0026] Whether or not the elapsed delay time set in the delay setting register 13, the time stamp information to be read from the session state management memory 3, based on a comparison between the timer value of the time stamp generating unit 10 , is determined in the transmission packet RZW controller 12, after a set delay time, the transmission packet data is read from the transmission packet buffer 5, it is transmitted from the response packet generating unit 9 (in FIG. 3, S20, S21).

[0027] If there is no matching entry in the session retrieval table 2, IP address and port number of the received packet is registered in the session retrieval table 2, set corresponding session status code in the session state management memory 3 to the initial value is the (in Fig. 3, S 14, S22, S23).

[0028] In the header extraction 'protocol identification section 1, as the header information of a packet to be transmitted, TCP header sequence number (sequence number) and acknowledgment number is further extracted, sent to the packet header generation unit 8 It is. These sequence numbers and acknowledgment numbers are used to generate a response packet in the response packet generation unit 9.

[0029] TCP in the session emulation device TSE, the received packet read Z write (R ZW) to read the packet data stored in the reception packet buffer 4 by the control unit 11 from the CPU, and for the transmission packet buffer 5 packet data it is possible for the CPU to set, it is possible to treat the upper protocol processing by the CPU. When the protocol processing by the CPU is required in the response packet generation sequencer 6, an interrupt notification to the CPU is performed from the response packet generation sequencer 6. Incidentally, the first from the TCP session emulation device TSE, i.e. when transmitting (packets for traffic generation rather than response packet) bucket bets to network NW, CP U force also delivered to the transmission packet RZW controller 12 by notifying the control, transmission of the packet is performed. [0030] With more detail, in the TCP session emulation device TSE described above, feeding the contents of the signal packet buffer 5, as shown in FIG. 4, each of the application protocols (e.g., HTTP (Hyper Text Transfer Protocol), FTP (File Transfer Protoco 1), packet data corresponding to the SMTP (Simple Mail Transfer Protocol), etc.) have been written in advance by CPU. Therefore, the response packet generation sequencer 6 which has received the session status code from the session state management memory 3, by passing the transmit data content instruction indicating ヽ Ru address corresponding protocol is store in transmit packet RZW controller 12, address force transmission packet data stored in the corresponding protocol in the transmit packet buffer 5 is read.

[0031] FIG. 5 shows a configuration example of a session search table 2. As shown in this constitutional example, the tweezers Yung search table 2, the source address and destination address (both IP address), flop Rotokorukodo, source port number and destination port number are stored. Each entry in this tape le 2 corresponds to the individual sessions of TCP (session number), the header information extracted from the received packet, i.e. the source address, destination address, protocol Rukodo, source port number, and based on at least one destination port number, by retrieving the table 2, TCP sessions are identified.

[0032] FIG. 6 shows a configuration example of a session status management memory 3. Each entry in the session state management memory 3 correspond to each entry in the session retrieval table 2. The session state management memory 3, the session status code indicating the session state, the receiving buffer address indicating the storage position location of the received packet, and a time stamp indicating the time the packet was received is stored. Here, the session status code, TCP session port number that are communicating, TCP status code indicating a transition state of the TCP, and is configured from an upper status code indicating a transition state of the higher level protocol (app cable Chillon Protocol)! Ru. The state transition of the upper protocol, when carrying out the state transition by the force software implemented by either hardware or software, an interrupt is notified from the response packet generation sequencer 6, the next state state transitions There occur.

[0033] Figure 7 shows an operation procedure example of the response packet generation sequencer 6. This operation procedure (S71~S 78), the force TCP protocol state where the state transition of the TCP protocol is realized if it has been EST ABLISHED, communication in an upper protocol is implemented. The state transition of the upper protocol, hardware or upper protocol processing sequencer (Protocol sequencer) of the internal response packet generation sequencer 6 configured by software to pass higher status code indicating the current state (FIG. 8) It is carried out by.

[0034] Further, in the case of generating the abnormal sequence, depending on the setting of the status setting register 7, it causes the transition to a different state and normal state transitions of the TCP protocol. The state transition of the TCP protocol shown in this operation step than be implemented in hardware, it is possible to generate a lot of traffic generation state.

[0035] Figure 8 shows an example of a configuration of a response packet generation sequencer 6. As in this configuration example, the response packet generation sequencer 6, when it became possible to communicate ESTABL ISHED next higher protocol in the state transition of the TCP protocol shown in FIG. 9, depending on the port number, the response packet generation sequencer 6 internal upper protocol processing sequencer takes a hierarchical structure to operate. The higher level protocol processing sequencer, when the transition to the state transition force CLOSE state of the I Ri TCP protocol for sending and receiving FIN, the sequence operation to complete.

Specific examples of the [0036] abnormal state occurs, indicating a case that the response packet ACK is not returned to normal for the SYN packet received in the TCP protocol, to set the abnormal state occurs to the state setting register 7, it generates a response packet sequencer 6 internal TCP sequencer SYN - in the state of RCVD, the place to send ACK packet transmission instruction that returns to the source of the SYN packet to the transmission packet RZW controller 12 and the packet header generation unit 8 would normally without sending an ACK packet to the operation without executing, the operation of stays SYN- RCVD.

[0037] Further, in the case of generating the abnormality of the packet header inside the acknowledgment number, to set the abnormal condition occurs in the status setting register 7 via a response packet generation sequencer 6, the transmission packet header contents instructed abnormal generation instruction signal is transmitted Te, the packet header producing formation unit 8, usually the packet header contains the different acknowledgment number is generated and the communication destination, the packet having the abnormality header is transmitted It becomes Rukoto.

[0038] Figure 9 shows the state transition of the TCP protocol defined in RFC793, in accordance with this state transition, operation of the response packet generation sequencer 6 is determined. The TCP protocol, establishing a source port number and destination port number in the TCP header, the connection identified by the IP address in the IP header. The connection establishment is 3-way hand shell over click, i.e. SYN (synchronization), ACK (acknowledgment), and carried out in three TCP segments that SYN + ACK (acknowledgment). In data transfer, using the sequence number and the acknowledgment number in the TCP header. When the data transfer is completed, by performing in FIN (End) and ACK (acknowledgment) that communication device or communication system the exchange of two TCP segments, to release the connection Kushiyon.

The [0039] TCP header, source port number, destination port number, sequence number, acknowledgment number, code bits (control bits), the window size, there is a field, such as a checksum, and emergency (Ajento) pointer.

[0040] The code bits field 6 bits in the TCP header, there URG, ACK, PSH, RST, six flag bits SY N, and FIN. The meaning of each code bit is as follows.

(1) URG: is an urgent pointer is valid.

(2) ACK: acknowledgment number is valid.

(3) PSH: receiving side (receiver) must Re only such passed to the application as soon as possible the data.

(4) RST: to reset the connection.

(5) SYN: connection to synchronize the sequence number to initialize the.

(6) FIN: sender (sender) has finished sending data.

[0041] These code bits can be turned on forces only one ON state, a plurality of simultaneously. Code bits called a TCP segment in the ON state, as follows.

(1) SYN segment: only SYN bit is on (ACK bit off).

(2) SYN + ACK segment: only the SYN bit and the ACK bit is on.

(3) ACK segments: only Mugu ACK bit user data in the data field is on

(4) DT Segment: URG regardless bit and RST bit on and off, there is user data, only the ACK bit sign. (5) FIN segment: FIN bit is on (ACK bit multi be turned on,!).

(6) RST segment: RST bit is on (ACK bit multi be turned on,!).

[0042] The event (event) for the TCP protocol, or sending an event (transmitted TCP segments) and receive events (TCP segment received), representative examples and their meanings are shown in the following.

(1) SYNsent: SYN segment sent.

(2) S YN + ACKsent: transmitted SYN + ACK segment.

(3) ACKsent: ACK segment sent.

(4) DT / ACKsent: DT segment or ACK segment sent.

(5) FINsent: FIN segment that sent.

(6) SYNrecv: SYN segment received.

(7) SYN + ACKrecv: received SYN + ACK segment.

(8) ACKrecv: ACK segment received.

(9) DTZ ACKrecv: DT segment or ACK segment is received.

(10) FINrecv: FIN segment received.

[0043] states in TCP protocol (state), as shown in FIG. 9, CLOSED, LISTE N, SYN- SENT ゝ SYN one RCVD ゝ ESTABLISHED, FIN one WAIT one 1, FIN- WAIT one 2, CLOSING, CLOSE one WAIT, LAST one ACK, and may take a value of TIME one WAIT. The meaning of these values ​​are as shown below.

(1) CLOSED: state of no connection.

(2) LISTEN: wait state.

(3) SYN- SENT: state of the connection establishing process in sending the SYN segment.

(4) SYN- RCVD: state during connection establishment process receives a SYN segment.

(5) ESTABLISHED: enabling bidirectional data transfer state.

(6) FIN- WAIT- 1: state of the data transmission termination request.

(7) FIN- WAIT- 2: data transmission termination completion of the state.

(8) CLOSING: data transmission and reception simultaneous end of the state.

(9) TIME- WAIT: connection information retaining state at the time of connection release completion. (10) CLOSE- WAIT: connection release of the standby state.

(11) LAST- ACK: standby state for receiving the final ACK.

[0044] As described above, in the TCP session emulation device TSE, if the received packet be a communication line power network NW recognizes that it is a TCP packet, it searches the tweezers Yon search table 2, session state the set value of the stored information and status setting registers 7 of the management memory 3, the initial state and the operating state of the response packet generation sequencer 6 is determined. Moreover, time of receiving the packet as a time stamp is stored in the session state management memory 3 is used to determine the packet transmission timing.

[0045] [Modification]

Processing in the embodiment described above is provided as a program executable by a computer, a recording medium such as a CD- ROM or a flexible disk, and further can be provided via a communication line.

[0046] Further, the processes in the embodiment described above can also be implemented in combination to select any of a plurality or all of them.

Claims

The scope of the claims
[1] and the session lookup table for searching an identifier that identifies the cell Sshiyon at least one TCP as a search key (Transmission Control Protocol) protocol IP obtained from the header of the received packet (Internet Protocol) address and a port number ;
The drawn on the basis of the identifier obtained as a search result of a session lookup table, session state management memory and for obtaining the session status code; in response to the session status code obtained from the session state management memory, a plurality of a sequencer for determining the pseudo session operation of the TCP protocol or application protocol uses;
TCP session emulation device comprising a.
[2] The sequencer, HTTP (Hyper Text Transfer Protocol), FTP (File Transfer P rotocol), and SMTP are provided for each application protocol comprising (Simple Mail Transfer Protocol)
TCP session emulation device according to claim 1.
[3] the session status code, composed from the TCP protocol port number as the session is communication, the TCP protocol TCP status code indicating the transition state, and the upper state code indicating a transition state of the Abu Rikeshi Yon Protocol TCP session emulation device according to claim 1, wherein is.
[4] further comprises a status setting register for holding a set value preset in order to generate the error processing operation of intentionally the TCP protocol session;
Depending on the value of both the set value and the session status code, to determine the operation of the sequencer
TCP session emulation device according to claim 1.
[5] as header forces the header information of the received packet, together with the IP address and the port number, and extracts the hand stage to obtain a sequence number, acknowledgment number and code bits in the TCP protocol;
Based on the header contents instruction from the header information and the sequencer was obtained by the extraction means generates the header information of the transmission packet, and means for transmitting by adding as a header of a response packet;
Further comprising TCP session emulation device according to claim 1, wherein the.
It means for storing the session state management memory for each corresponding session a reception time of the received packet as a time stamp information;
Further comprising a register for setting the delay time of a response packet;
TCP session emulation device according to claim 1, wherein to achieve a response delay by sending the response packet after the set delay time.
PCT/JP2005/013164 2005-07-15 2005-07-15 Tcp session emulator WO2007010593A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2005/013164 WO2007010593A1 (en) 2005-07-15 2005-07-15 Tcp session emulator

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/JP2005/013164 WO2007010593A1 (en) 2005-07-15 2005-07-15 Tcp session emulator
JP2007525461A JPWO2007010593A1 (en) 2005-07-15 2005-07-15 Tcp session emulation device

Publications (1)

Publication Number Publication Date
WO2007010593A1 true true WO2007010593A1 (en) 2007-01-25

Family

ID=37668482

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/013164 WO2007010593A1 (en) 2005-07-15 2005-07-15 Tcp session emulator

Country Status (2)

Country Link
JP (1) JPWO2007010593A1 (en)
WO (1) WO2007010593A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010020654A (en) * 2008-07-14 2010-01-28 Mitsubishi Electric Corp Communication reproducing device
JP2010157875A (en) * 2008-12-26 2010-07-15 Fujitsu Ltd Communication terminal, network interface card, and method therefor
JP2011048713A (en) * 2009-08-28 2011-03-10 Casio Computer Co Ltd Sales data processor, network system, and program
JP2011097423A (en) * 2009-10-30 2011-05-12 Nippon Telegr & Teleph Corp <Ntt> Error generating apparatus and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05260055A (en) * 1992-03-16 1993-10-08 Nippondenso Co Ltd Pseudo abnormal signal generator
JP2000508848A (en) * 1996-03-22 2000-07-11 エリクソン インコーポレイテッド Testing of Unix open systems interconnection layer
JP2002007232A (en) * 2000-06-21 2002-01-11 Cybird Co Ltd Performance testing method and server testing device for www server
JP2003316666A (en) * 2002-04-19 2003-11-07 Sony Computer Entertainment Inc Method and system for verifying the number of sessions of stack, program for verifying the number of sessions of stack to make computer perform, and computer readable recording medium recorded with program for verifying the number of sessions of stack to make computer perform
JP2004104450A (en) * 2002-09-09 2004-04-02 Ipsquare Inc Information processor and information processing method
JP2004180185A (en) * 2002-11-29 2004-06-24 Hitachi Ltd Network evaluating method of computer system, and communication data generating device
JP2005513914A (en) * 2001-12-10 2005-05-12 アパレント・ネットワークス・インコーポレイテッドApparent Networks,Inc. Test packets arrangement method and apparatus onto the data communication network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05260055A (en) * 1992-03-16 1993-10-08 Nippondenso Co Ltd Pseudo abnormal signal generator
JP2000508848A (en) * 1996-03-22 2000-07-11 エリクソン インコーポレイテッド Testing of Unix open systems interconnection layer
JP2002007232A (en) * 2000-06-21 2002-01-11 Cybird Co Ltd Performance testing method and server testing device for www server
JP2005513914A (en) * 2001-12-10 2005-05-12 アパレント・ネットワークス・インコーポレイテッドApparent Networks,Inc. Test packets arrangement method and apparatus onto the data communication network
JP2003316666A (en) * 2002-04-19 2003-11-07 Sony Computer Entertainment Inc Method and system for verifying the number of sessions of stack, program for verifying the number of sessions of stack to make computer perform, and computer readable recording medium recorded with program for verifying the number of sessions of stack to make computer perform
JP2004104450A (en) * 2002-09-09 2004-04-02 Ipsquare Inc Information processor and information processing method
JP2004180185A (en) * 2002-11-29 2004-06-24 Hitachi Ltd Network evaluating method of computer system, and communication data generating device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010020654A (en) * 2008-07-14 2010-01-28 Mitsubishi Electric Corp Communication reproducing device
JP2010157875A (en) * 2008-12-26 2010-07-15 Fujitsu Ltd Communication terminal, network interface card, and method therefor
JP2011048713A (en) * 2009-08-28 2011-03-10 Casio Computer Co Ltd Sales data processor, network system, and program
JP2011097423A (en) * 2009-10-30 2011-05-12 Nippon Telegr & Teleph Corp <Ntt> Error generating apparatus and method

Also Published As

Publication number Publication date Type
JPWO2007010593A1 (en) 2009-01-29 application

Similar Documents

Publication Publication Date Title
Schroeder et al. Autonet: a high-speed, self-configuring local area network using point-to-point links
US5101402A (en) Apparatus and method for realtime monitoring of network sessions in a local area network
US5594869A (en) Method and apparatus for end-to-end encryption of a data packet in a computer network
US6289461B1 (en) Bi-directional process-to-process byte stream protocol
US6940821B1 (en) Method and apparatus for detecting a fault in a multicast routing infrastructure
US6741566B1 (en) Remote management ethernet network and device
US5161193A (en) Pipelined cryptography processor and method for its use in communication networks
US5070528A (en) Generic encryption technique for communication networks
US5235644A (en) Probabilistic cryptographic processing method
US6034962A (en) Communication method with attaching identifiers to receive request and transmit request
US7031904B1 (en) Methods for implementing an ethernet storage protocol in computer networks
US20060159011A1 (en) Detecting unavailable network connections
US6738821B1 (en) Ethernet storage protocol networks
US6988235B2 (en) Checksum engine and a method of operation thereof
US20060168274A1 (en) Method and system for high availability when utilizing a multi-stream tunneled marker-based protocol data unit aligned protocol
US7260631B1 (en) System and method for receiving iSCSI protocol data units
US5745685A (en) Protocol extension in NSPP using an acknowledgment bit
US20060215691A1 (en) Network adaptor, communication system and communication method
US20030058870A1 (en) ISCSI receiver implementation
US20100128623A1 (en) End-to-end analysis of transactions in networks with traffic-altering devices
US20050044250A1 (en) File transfer system
US6804257B1 (en) System and method for framing and protecting variable-lenght packet streams
US6944688B1 (en) Queuing system using dual receive FIFO
US20070291654A1 (en) Memory Access Optimization and Communications Statistics Computation
US20090310491A1 (en) Distributed Flow Analysis

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2007525461

Country of ref document: JP

NENP Non-entry into the national phase in:

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct app. not ent. europ. phase

Ref document number: 05766385

Country of ref document: EP

Kind code of ref document: A1