Testing Internet applications – Terminology and Applicability
INTERTEKTESTINGSERVICES,NAINC.

PELLET VENTS
FIXTURES FOR USE IN RECREATIONAL VEHICLES)
WOOD-FIRED BAKING OVENS
SHOWERHEADS
SOLID-FUEL-FIRED CENTRAL HEATING APPLIANCES
ROOF DRAINS
SOLID-FUEL AND COMBINATION-FUEL CENTRAL &
This is to signify that
INTERTEK TESTING SERVICES, NA INC.
545 EAST ALGONQUIN ROAD ARLINGTON HEIGHTS, ILLINOIS 60005
Product Certification Agency PCA-101 Third-Party Certification Body
CATEGORIES of CERTIFICATION
Thomas Patterson Certification Manager
312.906.7778
BUILDING MATERIALS WITH SURFACE BURNING CHARACTERISTICS
FIRE RESISTANT PRODUCTS AND COMPONENTS ACCESS DOOR/FRAME ASSEMBLIES DAMPERS DOOR & FRAME HARDWARE DOOR FRAMES DOOR LIGHT FRAMES/KITS DOORS DOORS – ROLLING STEEL ELEVATOR DOOR/FRAME ASSEMBLIES EXPANSION/SEISMIC JOINTS FIRE WINDOW FRAMES FIRESTOP SYSTEMS FIXTURES FOR RECESSED INSTALLATION IN FIRE RATED CONSTRUCTION GARBAGE CHUTES
IBM认证证书分类

IBM认证证书分类IBM认证证书分类IBM根据其产品分类设置了相应的专业认证项目,那么IBM认证是什么呢?IBM认证的优势又怎样的呢?下面是店铺整理的关于IBM认证证书分类,欢迎大家参考!面向销售的IBM认证种类Certifications for SellersIBM Certified Sales Specialist - Power Systems with POWER7 and AIX - v1IBM Certified Sales Specialist - Power Systems with POWER7 and IBM i - v1IBM Certified Sales Expert - Power Systems with POWER7 - v1Certifications for T echnical SellersIBM Certified Technical Sales Specialist - PowerLinux v1IBM Certified Technical Sales Specialist - Power Systems with POWER7 and AIX - v1IBM Certified Technical Sales Specialist - Power Systems with POWER7 and IBM i - v1IBM Certified Technical Sales Expert - Power Systems with POWER7 - v1面向高级用户和实施者的IBM认证种类IBM Certified Advanced Technical ExpertIBM Certified Advanced Technical Expert - Power Systems with AIX v3IBM Certified Systems ExpertIBM Certified Systems Expert - Enterprise Technical Support for AIX and Linux v2IBM Certified Systems Expert - Virtualization TechnicalSupport for AIX and Linux v2IBM Certified Systems Expert - Virtualization Technical Support for IBM i -v1IBM Certified Systems Expert - High Availability for AIX Technical Support and Administration -v2面向用户的IBM认证种类IBM Certified Operator IBM Certified Operator - AIX 6.1 Basic OperationsIBM Certified System AdministratorIBM Certified System Administrator - AIX 7IBM Certified System Administrator - IBM i 7.1IBM Certified Associate System Administrator - IBM i 7IBM证书的三个认证等级AIX 认证AIX 认证作为业界重要的系统管理认证,受到很多企业的认同,含金量很高。
信而泰TeleExplorer_路由器测试

TeleExplorer路由器测试文档信息文档编号RENIX版本作者修改时间修改版本2.7.4.818157周坤坤2019.08.20V1.0TeleExplorer-201908201物理拓扑:WAN 口port1LAN1口port2LAN2口port3LAN3口port4LAN4口port5192.168.5.1192.168.1.1192.168.1.1192.168.1.1192.168.1.1192.168.5.2192.168.1.2192.168.1.3192.168.1.4192.168.1.5测试仪配置:BigTao200+V6016C+TeleExplorer_2.7.4.818157路由器配置:1个WAN 口,4个LAN 口。
WAN 口设置为固定IP 192.168.5.1/24;LAN 口IP 设置为192.168.1.1/24。
路由器WAN口配置:WAN口设置为固定IP192.168.5.1/24;与路由器WAN口相连的测试仪端口IP为192.168.5.2(在同网段即可)路由器LAN口配置:LAN口IP设置为192.168.1.1/24。
流程❖ 1. Resource Setup界面配置IP地址❖ 2. LAN口向WAN口添加UDP流❖ 3. WAN口向LAN口添加UDP流❖ 4. 修改端口速率❖ 5. 添加流统计❖ 6. 开始测试,查看统计1.1 Port1端口配置IP,测试仪端口的IPv4 地址设置为192.168.5.2/24,DUT 的IP地址设置为192.168.5.1/24,点击OK;配置完成后,选中该端口,点击“ARP and NDP”,Port1可以学习到WAN口的MAC地址,BC:46:99:65:99:9F。
1.2 Port2端口配置IP,测试仪端口的IPv4 地址设置为192.168.1.2/24,DUT 的IP地址设置为192.168.1.1/24,点击OK;配置完成后,选中该端口,点击“ARP and NDP”,Port2可以学习到LAN1口的MAC地址,BC:46:99:65:99:9E。
Pearson Computer Delivered Testing Test Administra

1. IntroductionPearson’s Computer Delivered Test (CDT) program, using patented Ordinate® speech processing technology, enables test administrators to deliver Versant language tests on a test center computer and upload completed tests for scoring.This Guide is written for administrators of CDT. It explains how to:•Configure Testing Center Computers•Download Tests•Take a TestThis Guide assumes that you have successfully installed the CDT program on each of the computers on which you intend to administer tests. If you have not completed the installation process, please consult the CDT Installation Guide which can be downloaded on Pearson’s website:https:///english/versant/cdt.html2. Configuring Testing Center ComputersBefore administrating a test, prepare the computer for test delivery. Preparation involves three steps:•Verify screen resolution settings•Verify that the microphone is working and that the volume is properly set•Verify bandwidth of your Internet connection for your expected testing volume2.1 Verify screen resolution settings1.Open the Control Panel.2.In the Control Panel, click Display.3.Click the Settings tab.4.Check the screen resolution setting in the Screen Area. It should be at least 1024 x 768.5.Move the slider to adjust the settings to the required minimum if needed.2.2 Verify microphone volume levelMicrophone volume level for Windows XP, 7, 8 and 10 is adjusted automatically by the CDT Client. For Windows Vista it is required that microphone volume level is adjusted by following these steps:1.In the Start Menu, locate the search box, type Speech Recognition Options and press Enter.2.In the Speech Recognition Options Window click on Set up microphone.3.Follow the instructions provided and click Next.4.Read the full sentence that appears on the screen into the microphone, then click Next.5.Click Finish, to complete your microphone calibration.2.3 Verify bandwidth for expected testing volumeThe CDT program operates by downloading a test to the local machine and then uploading theresponses once the test is complete for scoring. This requires network access to an Internet connection of sufficient bandwidth to accommodate the volume of concurrent testing that you plan to conduct inyour test center. (Note: In addition to a real-time mode, CDT also supports an option that allows you to pre-load tests, complete the tests offline, and then reconnect later to upload results for scoring). To ensure your test center has adequate Internet bandwidth, please consult the document “Network and Bandwidth Requirements.”3. Downloading TestsAfter the CDT software has been installed and each computer has been configured, testing can proceed. For test takers to be able to take a test, a Test Identification Number (TIN) must be entered for each test to download the appropriate test materials. There are 2 administrative options for downloading TINs:1. Pre-loading TINs before scheduled testing: As the test administrator, you can pre-load thecomputer with tests before your scheduled testing. We recommend this method if:a.You have any concerns about the speed or performance of your Internet connection.‡b.You plan to conduct testing on multiple computers at the same time.‡c.You need to conduct testing on a computer that cannot be connected to the Internetduring the test (for example, if you conduct testing with a laptop in a remote location).2. On-demand downloading of TINs: If you can stay connected to the Internet and have enoughbandwidth for the volume of testing you plan to do‡, you may also provide TINs to the testtakers and instruct them to enter the TIN as the first step of their test. The test materials willdownload then, on-demand. This download will need to complete before the test taker canbegin the test.‡ To verify that you have enough bandwidth for the volume of testing that you plan to do, please consult the document titled “Network and Bandwidth Requirements.”Note that he same TINs cannot be downloaded to multiple computers. If a batch or TIN was mistakenly downloaded to the incorrect computer, please contact Pearson Support (+1 650-470-3503 or*********************) to release the TIN(s) from the computer.3.1 Getting Started1.Ensure the computer is connected to the Internet.2.Start CDT by double-clicking the CDT Client icon on the desktop.3.Go to Menu located on the top right of the screen.4.Click on Administration.5.Enter your ScoreKeeper Username and Password to enter the Administrator’s configurationpreferences and click Enter. If you do not have a ScoreKeeper Username and Password,contact your Account Manager.3.2 Pre-loading TINs Before Scheduled TestingTests can be pre-loaded by batch, or by Test Identification Numbers (TINs).1.In the Administrator menu, click Download Tests.2.To download an entire batch of testsa.Click the Batch Key tab.b.Enter the alpha-numeric batch key into the space provided (Note: the batch key can befound by going to the batch in your ScoreKeeper account and clicking the TestMaterials link).c.Click Enter. CDT will then download all of the unused TINs in that batch.3.To download individual Test Identification Numbers (TINs) from multiple batchesa.Click the TIN(s) tab.b.Enter each TIN or a comma-separated list of TINs.c.Click Enter.3.3 On-Demand Downloading of TINsTo download tests on-demand, you may also provide TINs to the test takers and instruct them to enter the TIN as the first step of their test.1.Start CDT, enter the TIN in the space provided and click Enter.2.The TIN will then begin to download. The download progress will be displayed. Do not exit CDTwhile the TIN is downloading.3.Once the TIN is fully downloaded, CDT will display the headset (and for speaking test,microphone) check.3.4 View TestsOnce you have downloaded tests to the computer, you can view all the unused tests that are available for use on this computer.1.In the Administrator menu, click View Tests.2.Verify the total number of tests available match your records.3.Click Refresh TIN List to check the availability of the local test inventory against yourScoreKeeper account.4. Taking a TestTo begin a test, the administrator or test taker must enter a valid Test Identification Number (TIN) into the Welcome screen of the CDT Client.1.Start CDT and go to Home page.2.Give the test taker a TIN.3.The test taker enters the TIN in the space provided and clicks Enter to start the test.If the TIN has been pre-loaded, then the test will begin immediately, starting with an audio check. If not, then the TIN will be downloaded before the test can begin.4.1 Audio Volume and Microphone CheckAt the beginning of each test, test takers will go through an audio volume check. For speaking tests, test takers will also go through a microphone volume check.1.The test taker is instructed to put on their headset (for speaking tests) or headphones (forwriting tests) as shown on the screen.2.Click Next to proceed.3.The test taker listens to a passage and is instructed to move the slider to change the volume.Note: Test takers can also change the volume during the test in the upper right corner of thescreen.4.Click Next to proceed.5.For speaking tests, test takers are asked to read a sentence into their microphone to verify thatit is working correctly.6.If CDT cannot verify that the microphone is working correctly, an error message will appear.Follow the instructions to complete the microphone check. Is important to verify that themicrophone is working properly. If the microphone is unable to properly record the test taker’s responses, then that test’s score may be affected. If error messages persist, exit CDT and check the microphone volume and functioning using your computer’s audio and microphone controls (see Section 2.2).7.Once the calibration checks are complete, the test will begin.4.2 Completing the TestWhen the test taker is finished, the application will prompt the test taker to click Finish. If the computer is connected to the Internet with the test taker clicks Finish, then the test responses will be automatically uploaded to the Versant system for scoring. Note: if the test taker exits CDT before clicking Finish, then the test will not be completed and sent for scoring.If the Internet connection was disabled during testing, administrators must reconnect to the Internet and launch the CDT Client for the response files to be automatically submitted for scoring. Keep CDT open until all responses have been uploaded. You can check the status of completed tests by doing the following:1.Go to Menu located on the top right of the screen.2.Click on Administration.3.Enter your ScoreKeeper Username and Password to access the Administrator’s configurationpreferences and click Enter. If you do not have a ScoreKeeper Username and Password,contact your Account Manager.4.In the View Tests section, click Refresh TIN List.5.Look at the “Sessions” information. If there are tests that still need to upload for scoring, theywill be listed here. If you see “No local sessions/response,” then all completed tests have been uploaded and you can exit CDT.4.3 Checking ScoresTest scores are available within minutes after the voice files are successfully submitted to the Versant system. To view scores, go to https:///english/versant/score.html or log into your ScoreKeeper account.5. TroubleshootingThis section contains suggestions for troubleshooting problems. If you encounter any problem that cannot be resolved, contact our Technical Support team at ********************* or +1 650-470-3503.5.1 Microphone ErrorsMicrophone volume levels for Windows XP, 7, 8 and 10 users will automatically adjust in the CDT Client. For Windows Vista users, follow the steps in Section 2.2 to verify the microphone volume level. If the volume levels have been verified but error messages are still occurring, it could be for one of the following reasons:1.The microphone has not been positioned correctly as shown on the computer screen.2.The microphone may not be compatible or working properly with the computer. Exit the CDTClient, and go to the Control Panel. Select Sound and Audio Devices and then click on theVoice tab. Next, click on the Test Hardware button and follow the steps on the screen to make sure the microphone is working properly.5.2 Downloading TestsIf you are experiencing difficulties downloading tests, it could be for one of the following reasons:1.The Batch Key may not be valid. The Batch Key is a 12 character alpha-numeric code that isunique to each batch. The Batch Key can be found in your ScoreKeeper account List Batches >> Test Materials for each batch.2.The Batch has no available tests. If the batch is already downloaded into your computer it isrecommended to Refresh the TIN list before starting using those TINs (see Section 3.3), toensure the most up to date list of unused TINs are displayed. Only unused TINs will bedownloaded to the computer.3.The TIN(s) or Batch cannot be located. The TIN(s) or entire batch may have already been used. Loginto your ScoreKeeper account and go to List Batches >> View Scores and select Click here to see a list of all tests in this batch to ensure the TIN(s) or batch are unused.5.3 Scoring DelaysTest scores are typically available in ScoreKeeper within minutes of completing a test and uploading the responses to the Versant Testing System. If scores are not available within 15 minutes, it could be for one of the following reasons:1.Your internet connection may have been interrupted. Exit the CDT Client, re-connect to theInternet, and open the CDT Client. Tests will be automatically uploaded to the Versant testing system and the scores will become available shortly.2.The Versant testing system may be experiencing a brief outage. Check with your Account Managerto see if there is any scheduled maintenance downtime and when the system will becomeavailable. Once the outage is complete, tests that were administered during the outage window will be scored on a first-come, first-served basis to the best of our scoring capacity.。
DO-178B中译文

RTCA DO——178B机载系统和设备合格审定中的软件考虑签署和注记签署姓名签名更改历史更改单号发放日期作者更改描述版本号/修订号目录签名和注记 (2)更改历史 (3)1.0 引言 (9)1.1 目的 (9)1.2 范围 (9)1.3 与其他文件的关系 (9)1.4 怎样使用本文件 (9)1.5 文件综述 (10)2.0 与软件开发有关的系统情况 (10)2.1 系统和软件生存周期过程之间的信息流 (12)2.2 失效状态和软件等级 (13)2.3 系统结构考虑 (15)2.4 系统对用户可更改软件、可选择选项软件和商用成品软件的考虑 (16)2.5 系统设计对外场可加载软件的考虑 (16)2.6 系统需求对软件验证的考虑 (17)2.7 系统验证中的软件考虑 (17)3.0 软件生存周期 (17)3.1 软件生存周期过程 (17)3.2 软件生存周期定义 (18)3.3 过程之间的转换准则 (18)4.0 软件计划过程 (19)4.1 软件计划过程目标 (19)4.2 软件计划过程活动 (20)4.3 软件计划 (20)4.4 软件生存周期环境计划 (21)4.5 软件开发标准 (22)4.6 软件计划过程的评审和保证 (22)5.0 软件开发过程 (23)5.1 软件需求过程 (23)5.2 软件设计过程 (24)5.3 软件编码过程 (24)5.4 综合过程 (25)5.5 可追踪性 (26)6.0 软件验证过程 (26)6.1 软件验证过程目标 (27)6.2 软件验证过程活动 (27)6.3 软件评审和分析 (27)6.4 软件测试过程 (30)7.0 软件配置管理过程 (33)7.1 软件配置管理过程目标 (34)7.2 软件配置管理过程活动 (34)7.3 资料控制类 (37)8.0 软件质量保证过程 (37)8.1 软件质量保证过程目标 (38)8.2 软件质量保证过程活动 (38)8.3 软件符合性评审 (38)9.0 合格审定联络过程 (39)9.1 符合性方法和计划 (39)9.2 符合性声明 (39)9.3 提交给合格审定机构的最少软件生存周期资料 (39)9.4 与型号设计有关的软件生存周期资料 (39)10.0航空器和发动机合格审定综述 (40)10.1 合格审定基础 (40)10.2 合格审定的软件方面 (40)10.3 符合性确定 (40)11.0软件生存周期资料 (40)11.1 软件合格审定计划 (41)11.2 软件开发计划 (42)11.3 软件验证计划 (42)11.4 软件配置管理计划 (43)11.5 软件质量保证计划 (43)11.6 软件需求标准 (44)11.7 软件设计标准 (44)11.8 软件编码标准 (44)11.9 软件需求资料 (44)11.10 设计说明 (45)11.11 源代码 (45)11.12 可执行目标代码 (45)11.13 软件验证用例和规程 (45)11.14 软件验证结果 (46)11.15 软件生存周期环境配置索引 (46)11.16 软件配置索引 (46)11.17 问题报告 (46)11.18 软件配置管理记录 (47)11.19 软件质量保证记录 (47)11.20 软件实施概要 (47)12.0 其它考虑 (47)12.1 以前开发软件的使用 (47)12.2 工具鉴定 (49)12.3 替代方法 (52)附件A 按软件等级描述的过程目标和输出 (56)附件B 缩略语和术语汇编 (66)附录A DO—178文件的背景 (72)附录B 委员会全体成员 (75)附录C 术语索引 (76)附录D 改进建议表 (81)图和表的清单图图1—1 文件综述 (11)图2—1 在系统和软件生存周期过程之间与系统安全性有关的信息流 (12)图3—1 使用四种不同开发顺序的软件项目的例子 (19)图6—1 软件测试过程 (30)表表7—1 与CC1和CC2资料有关SCM过程目标 (37)表A—1 软件计划过程 (56)表A—2 软件开发过程 (57)表A—3 软件需求过程输出的验证 (58)表A—4 软件设计过程输出的验证 (59)表A—5 软件编码和综合过程输出的验证 (60)表A—6 综合过程输出的测试 (61)表A—7 验证过程结果的验证 (62)表A—8 软件配置管理过程 (63)表A—9 软件质量保证过程 (64)表A—10 合格审定联络过程 (65)AC 20—115B (82)出版说明RTCA DO—178B《机载系统和设备合格审定中的软件考虑》是美国航空无线电技术委员会为支持含有数字计算机的机载系统和设备的研制工作而开发的软件开发过程中应遵循的准则。
NAC解决方案测试

NAC解决方案测试NAC(网络接入控制)解决方案测试一、背景介绍网络接入控制(Network Access Control,NAC)是一种网络安全技术,旨在确保只有经过授权的设备和用户可以访问企业网络资源。
NAC解决方案的测试是为了验证其功能和性能,以确保其在实际应用中的可靠性和稳定性。
二、测试目的本次测试的目的是评估NAC解决方案的性能和功能,包括但不限于以下几个方面:1. 认证和授权功能:测试NAC解决方案是否能够准确识别和验证设备和用户的身份,并根据其权限进行访问控制。
2. 安全策略执行:测试NAC解决方案是否能够按照预设的安全策略对设备和用户进行访问控制,如防火墙规则、访问控制列表等。
3. 设备完整性检测:测试NAC解决方案是否能够检测设备的安全状态,如操作系统的补丁情况、防病毒软件的更新情况等。
4. 网络访问控制:测试NAC解决方案是否能够对设备和用户的网络访问进行控制,如限制特定应用程序的访问、限制特定网站的访问等。
5. 故障恢复能力:测试NAC解决方案在网络故障发生时的自动恢复能力,如设备断线后的重新认证和授权过程。
三、测试环境为了进行NAC解决方案的测试,我们搭建了以下测试环境:1. 服务器:使用一台高性能的服务器作为NAC解决方案的控制中心,负责认证、授权和安全策略的执行。
2. 网络设备:在测试环境中部署了多个网络设备,包括交换机、路由器和防火墙,用于实现网络访问控制。
3. 客户端设备:使用多台计算机和移动设备作为测试终端,模拟实际用户的访问行为。
四、测试步骤1. 配置NAC解决方案:在服务器上安装和配置NAC解决方案软件,包括认证服务器、授权服务器和安全策略等。
2. 设备和用户认证:使用测试终端设备进行认证测试,验证NAC解决方案是否能够准确识别设备和用户的身份。
3. 访问控制测试:测试NAC解决方案是否能够按照预设的安全策略对设备和用户进行访问控制,如限制特定应用程序的访问、限制特定网站的访问等。
ⅠNR检验操作流程
ⅠNR检验操作流程NR检验操作流程是指对新无线电技术(5G)的网络进行测试和验证,以确保其性能和功能符合标准和规范。
下面是一个基本的NR检验操作流程,包括准备、测试和辅助工具等方面。
一、准备工作1.确定测试目标:明确要测试的功能和能力,比如信号覆盖范围、容量和吞吐量等。
2.准备测试平台和设备:根据测试目标选择合适的测试平台和设备,如基站仿真器、信号发生器和接收器等。
3.确定测试环境:选择合适的测试环境,包括室内或室外、城市或农村等。
1.设置测试参数:根据测试目标和环境,设置合适的测试参数,如频段、带宽、调制方式等。
2.进行信号发射:使用信号发生器模拟NR信号,并发送到待测试的基站。
3.基站接收信号:让待测试的基站接收并处理NR信号。
4.监测信号传输:使用测试工具监测信号的传输过程和质量,比如信号强度、误码率和误比特率等。
5.测量无线覆盖:在不同位置和距离上进行测量,评估信号的覆盖范围和强度。
6.测试吞吐量:通过发送不同大小的数据包,测试基站的吞吐量性能。
7.测试容量:通过同时连接多个用户设备,在不同负载条件下测试基站的容量。
8.验证调度与资源分配:测试基站在不同调度算法和资源分配策略下的行为和性能。
9.测试干扰和抗干扰性能:模拟其他无线设备的干扰和干扰抑制能力,评估基站的干扰和抗干扰性能。
10.测试时延和时钟同步:测试基站处理信号的时延和时钟同步的准确性。
11.验证功能:测试基站的各种功能,如呼叫控制、数据传输、移动切换等。
12.分析和记录测试结果:对测试结果进行分析和记录,包括信号质量、容量、干扰等方面。
三、辅助工具1.基站仿真器:用于模拟基站的行为和响应,为测试提供基础环境。
2.信号发生器:生成和发送模拟的NR信号,供基站接收和处理。
3.接收器:用于接收和分析基站传输的NR信号。
4.频谱分析仪:用于监测信号的频谱特性,包括频率、带宽和幅度等。
5.信号发射分析工具:用于监测和分析信号发射的过程和性能。
NAC解决方案测试
NAC解决方案测试引言概述:网络接入控制(Network Access Control,NAC)是一种用于保护企业网络安全的解决方案。
通过对用户和设备的身份验证、安全策略的强制执行和网络访问控制的实施,NAC能够确保网络资源只能被授权用户和设备访问。
为了确保NAC解决方案的有效性和可靠性,对其进行测试是至关重要的。
本文将详细介绍NAC解决方案测试的内容和步骤。
一、功能测试1.1 身份验证功能测试NAC解决方案的核心功能之一是对用户和设备进行身份验证。
在测试过程中,需要验证NAC解决方案是否能够正确识别和验证用户的身份信息,如用户名和密码、数字证书等。
同时,还需要测试解决方案是否能够对设备进行身份验证,如MAC地址、IP地址等。
验证身份的过程应该准确、快速和安全。
1.2 安全策略强制执行功能测试NAC解决方案的另一个关键功能是强制执行安全策略。
在测试中,需要验证解决方案是否能够根据预设的安全策略,对用户和设备进行访问控制。
测试过程中应该包括对不同用户和设备的权限控制、网络资源的访问控制等方面的测试。
同时,还需要测试解决方案是否能够自动检测并应对网络攻击,如入侵检测系统(Intrusion Detection System,IDS)和入侵防御系统(Intrusion Prevention System,IPS)等。
1.3 网络访问控制功能测试NAC解决方案的最后一个功能是网络访问控制。
在测试中,需要验证解决方案是否能够实现对网络资源的访问控制,包括对不同用户和设备的访问控制、对不同网络服务和应用的访问控制等。
测试过程中应该模拟不同的网络环境和场景,验证解决方案的可扩展性和适应性。
二、性能测试2.1 响应时间测试NAC解决方案的性能直接关系到用户体验。
在测试过程中,需要测试解决方案对用户请求的响应时间,包括用户登录、设备认证、安全策略强制执行等过程的响应时间。
测试过程中应该模拟不同用户和设备的并发请求,验证解决方案的并发处理能力。
RFC3918协议测试——网络测试仪实操
三、测试配置..................................................................................................................................... 4 3.1 准备工作: 添加机框............................................................................................................4 3.2 准备工作: 预约端口............................................................................................................5 3.3 选择向导............................................................................................................................... 5 3.4 选择混合吞吐量测试...........................................................................................................6 3.5 选择端口............................................................................................................................... 6 3.6 配置接口............................................................................................................................... 7 3.7 向导配置接口.......................................................................................................................7 3.8 向导配置 关键-MAC.......................................................................................................... 8 3.9 向导配置 关键-IP................................................................................................................8 3.10 向导接口配置结果.............................................................................................................9 3.11 选择接口............................................................................................................................. 9 3.12 配置组播流量...................................................................................................................10 3.13 配置组播参数................................................................................................................... 11 3.14 关键参数........................................................................................................................... 11 3.15 选择测试参数...................................................................................................................12 3.16 配置 混合吞吐................................................................................13 3.17 关键参数...........................................................................................................................14 3.18 配置单播流量...................................................................................................................15 3.19 配置单播流-选择端口..................................................................................................... 15 3.20 配置单播流量-选择流量接口......................................................................................... 16 3.21 配置单播流-常规............................................................................................................. 16 3.22 配置单播流-配置帧......................................................................................................... 17 3.23 配置单播流.......................................................................................................................17 3.24 开始测试...........................................................................................................................18
网络安全实践指南系列
NIST网络安全实践指南系列导语NIST(美国国家标准与技术研究所)在安全行业几乎是无人不知吧。
作为NIST的一部分,NCCoE的名气虽然没有那么大,但其名称“国家网络安全卓越中心”也是够大气。
在笔者心目中,NIST是典型的标准派,而NCCoE则是典型的实践派。
作为美国联邦的标准制定机构,还同步开展实践项目,这种标准与实践相结合的方式值得我们学习。
NIST在安全领域以几个系列的出版物而著称:FIPS(联邦信息处理标准)系列;SP 800(计算机/信息安全)系列;SP 1800(网络安全实践指南)系列;SP 500(计算机系统技术)系列;NISTIR(NIST 机构间或内部报告)等。
本文要介绍的正是其中的SP 1800(网络安全实践指南)系列,该系列正是NCCoE的作品。
NCCoE以实践项目著称,而且每一个实践项目都计划产生一份可免费公开获取的NIST网络安全实践指南(NIST Cybersecurity Practice Guide),即SP 1800系列指南。
这些实践指南正是关切所在。
NCCoE的实践项目包含两种类型:一是积木(Building Blocks);二是用例(Use Cases)。
积木是技术领域,用例是行业领域。
两者分别包含了十几个具体项目。
在本文中,只是简单罗列这些实践项目的摘要内容,展示一下概貌。
一、NCCoE背景国家网络安全卓越中心(NCCoE)是NIST的一部分,成立于2012年。
NCCoE是一个协作中心,行业组织、政府机构、学术机构在此共同应对企业最紧迫的网络安全挑战。
通过政府机构与私营机构的合作,为特定行业和广泛的跨部门技术挑战,创建实用的网络安全解决方案。
作为“国家网络安全卓越中心”,NCCoE发起了“国家网络安全卓越伙伴”(NCEP)计划,与多家美国公司联手。
这些合作伙伴承诺为合作项目提供硬件、软件、研究人员和专业知识,为NCCoE的测试环境提供设备和产品,以推动安全技术的迅速采用。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Testing Internet applications – Terminology andApplicabilityMazen Malek and Roland GecseConformance Center, Ericsson Ltd.H-1037 Budapest, Laborc u. 1., Hungary,Tel: +36 1 437 7682,Fax: +36 1 437 7374,AbstractThis paper examines the applicability of OSI conformance test methodology to Internet protocols. It summarizes the differences between them and introduces the Internet Reference Model along with a new abstract test method, which was designed for the practical purposes of conformance testing of TCP/IP protocols. Some interesting test cases and points, that were chosen from RIP, demonstrate the facilities of the model and give impression of testing Internet protocols.KeywordsConformance test, Internet, routing protocols (RIP).1. INTRODUCTIONUp to now, in the Internet community, conformance testing was an unknown concept. However, the need for recommendation conforming TCP/IP implementations grows, as the application of Internet protocols in business telecommunication systems is becoming reality. It is probable that more and more vendors are going to provide Internet products, whose reliability and interoperability with other products have to be assured.Although conformance testing methodology [1] was originally intended for OSI based systems, there are ongoing discussions about its applicability to the TCP/IP protocol stack. Numerous articles and conference contributions justify that these questions present a current topic. [2] founds theoretical base of relay system testing, which is then used, among others, for the testing of Simple Mail Transfer Protocol [3] and IP router. [4] and [5] focus on detailed analysis of Transmission Control Protocol’s flow control algorithms that are expected to be used on measuring and fixing the majority of implementation problems listed in [6]. On the other hand, [7] deals with interoperability test suite derivation that may be used for the purpose of Internet testing.The following issues, beside others, will be argued in this paper. Sections 2-5 give an overview of the Internet protocol structure, introduce the Internet Reference Model and suggest a new abstract test method. Also, similarities and differences in layering,data flow and configuration are fetched in comparison to the OSI Basic Reference Model (BRM) [8].After the presentation of a possible test realization (section 6) and a short overview of the Routing Information Protocol and related Internet routing concepts (section7), sections 8 and 9 give some practical testing experience.2. COMPARING INTERNET AND OSI ARCHITECTUREThe OSI BRM has 7 layers, each of which with a well-defined task. OSI protocol stacks are designed to fit to this model. The protocol entities (PEs) of a particular protocol suite are associated to the appropriate layers. Peer-to-peer communication between two PEs of the same layer takes place in abstract protocol data units (PDUs) while physical communication with upper and lower layers’ PEs is only possible via service primitives (SPs).Unfortunately, Internet was not planned to have such a detailed abstract model. The structure of TCP/IP, which represents the actual state of Internet, has evolved gradually from the beginning [9]. Internet has only four layers: link, network, transport and application. Although the general functions of these layers are not as well defined as OSI’s, they provide almost the same functionality. Disregarding that reliable service appears first only in the transport layer, network and transport layers map to their OSI counterparts. Internet link layer maps, in general, to OSI physical and data-link layers. Since the application layer holds all remaining functionality (OSI layers 5-7), applications may gain enormous complexity. Internet protocols do not have standardized SPs, thus in contrast to open systems; the communication between neighboring layers is implementation specific. This, besides the loosely specified layer characteristics, results that layer boundaries are flexible. Another feature that must be kept in mind when talking about Internet is the whole TCP/IP protocol stack should be considered as a single unit together with a set of alternative protocols. The transport layer for example consists of two protocols: the transmission control protocol (TCP), which is a connection-mode service and the user datagram protocol (UDP) that provides a connectionless service. In a particular communication process, at most one of these services is used.From the configuration point of view a real open system can act as end system, relay system or both simultaneously. Internet systems have also this kind of configurations with noting that relay systems are called also intermediaries. Intermediaries are further subdivided according to working aspects to proxy, gateway and tunnel. In our paper we limit our discussion to relay systems and call them routers.3. CONFORMANCE TESTING OF INTERNET PROTOCOLSFrom the conformance testing perspective it is worth to distinguish between hardware and software implementations. Hardware implementations (e.g. IP router) neither implement the whole TCP/IP protocol stack, nor provide interface to protocol layers. Accordingly, they could be examined only by an external test system. Software implementations (e.g. FTP client, httpd programs), on the other hand, have numerous advantages over hardware systems. Besides the existing test methods [1][2], they imply the possibility of designing more effective new test methods. For theunderstanding of these methods, a particular TCP/IP implementation should be examined.4.4BSD-Lite’s Net/3 networking code [10] can be considered as a reference implementation of the Internet protocol suite (Besides TCP/IP, it also supports Xerox Network Systems (XNS), OSI communication protocol families and the Unix domain protocols that are provided for Inter Process Communication (IPC)).The structure of the Net/3 networking code is presented in figure 1. Application level protocols (FTP, Telnet, and RIP) are distinguished from the underlying TCP/IP stack. They are running as processes in the device’s user space while underlying layer protocols used to be implemented as a single unit in the operating system space. The internal structure of this unit consists of three layers: application programming interface (API) or socket layer, protocol layer and interface layer. The public functions of this unit can be reached at the kernel entry points using system calls (SCs) which represent the operating systems’ service primitives. API, in addition to separating the application layer, provides a protocol independent interface to the entities of the underlying protocol layer. It offers a set of different networking features of the kernel that can be reached uniformly via SCs. The protocol layer holds the Internet transport (UDP, TCP) and network (IP, ICMP, IGMP) layer protocols [11]. The protocol layer does not provide SCs to application layer entities. The interface layer consists of various device drivers implementing link layer protocols (e.g. Ethernet) and procedures that are used for address conversion between the protocol layer and it. The code for different pseudo devices (loopback interface, BSD packet filter (BPF)) can also be found there. Interface layer functions are accessible through SCs. The packet filtering functions are further applicable for control and observation. Now, having a global picture of the overall structure of TCP/IP, the Internet Reference Model will be introduced.4. THE INTERNET REFERENCE MODELIt can be stated that all of today’s software TCP/IP implementations are based upon the architecture of Net/3. By considering this, a model will be introduced that is suitable for conformance testing and incorporates the listed features of software implementations. In the Internet Reference Model (IRM), the functions of SPs are replaced by SCs of API (In this context, API is used as a general term, which in a particular implementation (e.g. Net/3) stands for both socket API and BPF. That is, because the socket API does not provide access to the interface layer). These SCs allow applications to send PDUs directly to each layer protocol entity. The API itself should be considered as a switch that connects applications to the selected underlying service via SCs. The functions of the API are provided at kernel entry points (rhombus). The semicircles present the possible destination protocol layers to which SCs provide access. The dashed line expresses that API itself is not a protocol. Although the IRM has some minor differences from OSI BRM, which are coming from design aspects, the applicability of existing conformance test methodology is straightforward.Figure 1. The Internet Reference Model (left), general organization of Net/3networking code (right).5. ABSTRACT TEST METHODSConsidering the open structure of software implementations, the new Joint Test method (JT) will be defined, which can be uniformly applied to testing of all protocols of IRM. JT can be applied both in Single Party Testing (SPyT) and in Multi Party Testing (MPyT) context. When used in SPyT, it resembles to the local [1] test method, whereas the MPyT variant has similarities to the local transverse test method in [2].JT is shown in figure 2, and uses the graphical notation of [12].Figure 2. The joint test method.JT has the following characteristics:• Test system and system under test (SUT) are on the same system.DSSOLFDWLRQ SUHVHQWDWLRQ VHVVLRQ WUDQVSRUW QHWZRUN OLQN SK\VLFDO•There is an optional Upper Tester (UT), and one Lower Tester (LT) in SPyT; no UT, an arbitrary number (usually 2) of LTs and a Lower Tester Control Function (LTCF) in MPyT. UT, LT(s) and LTCF are application layer processes.•The Points of Control and Observation (PCOs) are at the LT and UT.•Test coordination is done using Unix IPC.•Test events are exchanged in PDUs using SCs of API. The control and observation is provided by means of API.The most significant difference to the ancestor test methods, which is very advantageous in practical testing of software TCP/IP implementations, is that LT(s), UT and coordination procedures are placed in the application layer regardless of the layer which is occupied by IUT. Another good feature is that JT can be applied to both end systems (SPyT) and relay systems (MPyT), thus intermediaries can be tested out of their environment.Figure 3 SCS structure.6. TEST REALIZATIONHaving an implementation to be tested and an abstract test suite (ATS), the means of testing should be provided. It consists of the implementation of tester functionality, the derivation of ATS into executable test suite (ETS) and the production of test documents. System Certification System (SCS) is a set of tools provided by Ericsson that can be used in a wide variety of testing: functional testing (white-box technique), conformance and interoperability testing (black-box) and performance testing(white/black-box). SCS is based on the following principles:•Protocol independence. This means that different protocols can be tested on the same manner.•Multiple simultaneous protocols. Not only one but also many protocols can be accessed from the same test.•Distribution. One test may be distributed (over the Internet), making it possible for each part of the test most closely related to one interface to reside in the box containing that physical interface.•Platform independence. SCS is independent of the platform in which the SUT executes. It can execute the same tests both against the physically real SUT and the SUT only simulated in a workstation (bypassing the lowest protocol layers).One of the main ideas in SCS is that it is an interpreting execution platform. This means that a TTCN test suite (an MP file) given as input to the Translator is first converted into an intermediate language, ExTeL (Executable Test Language), which then can be directly executed (interpreted) by the ExTeL Test Component Executor, TCE (see also figure 3 above). With this method there is only one phase from a TTCN test suite to the final executable format which makes it different compared to the compiling methods, where an extra compilation and linking phase has to be performed. Another important feature in SCS is the Test Port concept. With this solution it is possible to develop the core functionality separately without affecting the existing test ports and vice versa. For this reason, a complete set of test ports where realized and worked out by the authors, particularly, IP, TCP and UDP test ports. There exist also two built-in PDU encoder/decoders: BER (Basic Encoding Rules) and a raw binary encoder/decoder. TTCN Manager is the front end in SCS. It has the control over execution and monitoring. The log files for different test components can be observed in real time.7. ROUTING TECHNIQUESRouting involves two basic activities: determination of routing paths and the transport of information groups (packets) through an internetwork. In some literatures the later is referred to as switching. Path determination, on the other hand, can be very complex. To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information. Usually, routing algorithms fill routing tables with destination/next hop associations. These associations tell a router that a particular “destination” can be gained optimally by sending the packet to the node identified in “next hop”. Routers communicate with one another (and maintain their routing tables) through the transmission of a variety of messages. The routing update message is one such message. Routing updates generally consist of all or a portion of a routing table. They are the means by which routers communicate path information between one another.In this paper we limit our illustration on a very common routing technique, it is the RIP protocol. It is a distance vector, intra-domain routing protocol originally designed for PUP (Xerox PARC Universal Protocol, 1980) and used in XNS. RIP became associated with both UNIX and TCP/IP in 1982 when the Berkely Standard Distribution (BSD) implementation of UNIX was introduced.8. INTERESTING ISSUES IN TESTING ROUTINGWhen time comes and routing testing is to be performed, a lot of interesting points should be considered. As the basic representation of test cases is the stimuli-response pairs, one should define precisely the types and instances of such pairs. Accordingly, routing stimuli and responses were defined. We have found that we need to deal with two different layer concepts. Firstly, the Internet layer and its datagrams that is used to check the arrival of forwarded data. Secondly, the application layer, or the routing application in question. Within this context, majority of testing events will be written by applying types and instances of this application. Both stimuli and responses, at application level, are in a form of routing updates. These updates can be gotten at prescribed time intervals or synchronized to other testing events. Another point of interest is the alternatives to those responses. They may have the form of modified routing update, in terms of metrics and/or routes.A conformance test case has, typically, three phases of actions, preamble, test case body and postamble. The first and third phases are for state transition, to initial testing state and to idle state respectively. In the case of routing application, state inquiry is only possible when the routing table is to be accessed, through the usual updates or by asking the table on demand.In the Internet, routing is the main building block in its backbone. That’s why they play a crucial role when we think of the enormous growth of the Internet. Another important issue here is that routing techniques are evolving more quickly than host ones.9. EXAMPLEIn this section we try to illustrate our method of testing on a simple configuration of three test components connected to the IUT. Each test component has the role of simulating another router in the network, while connections through the configuration tries to indicate the subnetworks involved in the testing.According to the standard [13]: “An internet router should be capable of choosing a next-hop destination for each IP datagram”, and according to standard [14]: “After the validation process of a response finishes successfully, an update that changes the metric of an existing entry in the routing table should be a trigger for entry modification”. This modification varies between recalculating the metric according to the following formula:metric= MIN ( metric + cost , 16 )where 16 indicates that a link is inaccessable, and adding a new entry. In our example, we have established the tested condition as if one route is substituted by the other. In particular, we have informed the IUT that the desired destination (address included in an IP datagram) is reachable with a lower cost through B router instead of C router. In terms of Tree and Tabular Combined Notation (TTCN) [15], the official test notation of the conformance testing, a preamble will contain the preliminary parts of testing;i.e. getting the configuration working, sending an update form B router (within thetesting context it is a test component) with a cost of the destination less than what is sent by C, and sending an IP datagram from A with the destination address. Test case body, however, is a set of test events that is responsible for issuing a test verdict,indicating the correctness of behaviour. Here, it is the arrival of the sent IP datagram at B instead of C. Before ending the test case, an action should take place to get the implementation right to its original state. This is possible by refreshing the routing table with the original route update, in terms of RIP it means a new response from C with higher cost or form B with lower cost. Figure 4 demonstrates the overall distribution of testing functionality. In the laboratory environment, testing was handled with software components, called gatewas, and with the standard SCS interface together with the newly defined test ports. Accordingly, IP test port was used to transfer the sample IP datagram and UDP test port to send and receive routing updates. The two solutions differ in the appearance of test cases. In the first solution,test cases where included in the code part of the gateways, while the other used an interface to a TTCN editor. In short we list below the tasks associated to test components.Tasks of test components l Simulate RIP l Test coordination & management (remote/local)l Execute Test CasesFigure 4. Illustration of a test application for IP routing.According to this example, the following Test Purpose was defined.Test Purpose 1.1:“To check if the router applies to changes in network topology after receiving the required update from other routers ”10. CONCLUSIONSIn this paper, differences between OSI and Internet systems were summarized. Then the Internet Reference Model was introduced together with the Joint Test method for conformance testing (which is major contribution to the base methodology).l &OLHQWl 6HUYHUl /LVWHQHU 5ROHV RI JDWHZD\VF $EEUHYLDWLRQVl ,87 ,PSOHPHQWDWLRQ 8QGHU 7HVWl $ % & JDWHZD\Vl D E F DL EL FL QHWZRUNVAfterwards, a practical application of the new concept was demonstrated on the testing of RIP routing protocol, which is a continuation of the progress reached in [16]. The Test Purpose viewed here is part of a complete set to provide complete testing for routing applications. We have shown a framework for testing Internet protocols, which was worked out on the basis of the conformance testing framework of [1]. Experiences with testing RIP showed that some extensions are necessary to TTCN for making it more suitable to describe test cases for testing Internet protocols. This is true especially for testing performance related features of the product. Our interest for the time being is to generate a complete test suite to test a routing application, RIP2 or OSPF. Future work can be for example the interoperability testing based on this concept of Internet protocols, and introduction of formal extensions that are more suitable for Internet testing.References[1] ITU-T X.290--X.296, OSI conformance testing methodology and framework for protocol recommendations for ITU-T applications, 1994-1995.[2] Bi, J. and Wu, J.: Towards abstract test methods for relay system testing. Testing of Communicating Systems, Volume 10 pp 381-397, IFIP, 1997.[3] Bi, J. and Wu, J.: Application of a TTCN based conformance test environment on the Internet email protocol. Testing of Communicating Systems, Volume 10 pp 324-330, IFIP, 1997.[4] Kato, T., Ogishi, T., Idoue, A. And Suzuki, K.: Design of Protocol Monitor Emulating Behaviors of TCP/IP Protocols. Testing of Communicating Systems, Volume 10 pp 416-431, IFIP, 1997.[5] Kato, T., Ogishi, T., Idoue, A. and Suzuki, K.: Intelligent Protocol Analyzer with TCP Behavior Emulation for Interoperability Testing of TCP/IP Protocols. Formal Description Techniques and Protocol Specification, Testing and Verification, FORTE X/PSTV XVII ‘97 pp 449-464, IFIP, 1997.[6] Paxton, V. (editor), Allman, M., Dawson, S., Heavens, I. and Volz, B.: Known TCP Implementation Problems, <draft-ietf-tcpimpl-prob-02.txt> Internet Draft, IETF Network Working Group, May 1998.[7] Malek, M. and Dibuz S.: A Pragmatic Method for Interoperability Test Suite Derivation. EUROMICRO'98, Proceedings of the 24th Euromicro Conference, Stockholm, Sweden, 1998. Aug 24-26.[8] ITU-T X.200, Information Technology - Open Systems Interconnection Basic Reference Model: The Basic Model, 1994.[9] Carpenter, B. (editor): Architectural Principles of the Internet, RFC 1958 Informational, IETF Network Working Group, 1996.[10] Wright, G. R. and Stevens, W. R.: TCP/IP Illustrated, Volume 2, The Implementation. Addison-Wesley, 1995.[11] Stevens, W. R. TCP/IP Illustrated Volume 1, The Protocols. Addison-Wesley, 1994.[12] Baumgarten, B. and Giessler, A.: OSI conformance testing methodology and TTCN, North. Holland, 1994.[13] P. Almquist: Towards requirements for IP routers, Network working group, RFC1716, November 1994.[14] C. Hedrick: Routing Information Protocol, Network working protocol, RFC1058 June 1988.[15] ISO/IEC~9646-3, The Tree and Tabular Combined Notation (TTCN), 1998.[16] Gecse Roland: Conformance testing methodology of Internet protocols, Internet application-layer, Protocol testing- the Hypertext Transfer Protocol. The IFIP 11th International workshop on Testing of Communicating Systems IWTCS’98, August 31- September 2, 1998, Tomsk, Russia。