SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
BreakingPoint LTE At-A-Glance




Test LTE/4G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE
Network Infrastructure


Telecom carriers rolling out Long Term Evolution (LTE) and 4G             With a BreakingPoint CTM, you can:
networks must test mobile infrastructures e ciently and accurately
                                                                             • Measure and harden the performance, security, and stability
under punishing real-world conditions, without spending a fortune
                                                                                of load balancers, rewalls, IPS devices, and other equipment
to do so. BreakingPoint CTM products answer this challenge with
                                                                                with up to 120 gigabits per second of application, attack, and
the industry’s most sophisticated and cost-e ective Internet-scale
                                                                                malformed tra c.
LTE emulation.
                                                                             • Validate network and data center performance by re-creating
These products allow carriers to test their networks and the devices            more than 150 application protocols, including Twitter Mobile,
within them against the behavior of millions of simulated users                 AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
downloading rich media content, placing calls, purchasing music,                BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
browsing the Web, or unknowingly sharing the latest malware. A                  Facebook®, YouTube®, and Apple® FaceTime®, as well as other
BreakingPoint CTM replaces racks of equipment and complicated                   mobile, social, and gaming protocols—with Multicast support.
setup processes with a single-chassis device and a single user               • Stress network infrastructures with more than 4,500 security
interface (shown below).                                                        attacks and 28,000 pieces of malware—including more
                                                                                than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                evasions.
E ective Device
                                                                             • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
LTE network conditions needed to harden carrier-grade network                • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                     botnet attacks to uncover previously hidden weaknesses.




          BreakingPoint CTM™ Products Enable Con guration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
BreakingPoint LTE At-A-Glance


  The Solution for Simulating Multi-Million-User LTE Networks,
  with Additional 3G Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest LTE networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of thousands of eNodeBs connecting to millions of devices
         such as smartphones, tablet computers, and netbooks.
     • Interactions among all the network elements involved in LTE
         communications, including user equipment (UE), eNodeBs,                               BreakingPoint FireStorm CTM Speci cations
         Service Gateways (SGWs), Packet Data Network Gateways                                 A single BreakingPoint FireStorm CTM provides the equivalent
         (PGWs), and Mobility Management Entities (MMEs).                                      performance of many racks of servers from a 4U chassis, including:
     • A full Dynamic Host Control Protocol (DHCP) network, with                                   • 120 gigabits per second of blended stateful application tra c
         support for both DHCP Client and DHCP Server processes.                                   • 90 million concurrent TCP sessions
     • Support for both 3G and LTE environments with GTPv1 and                                     • 4 million TCP sessions per second
         GTPv2.
                                                                                                   • 1.5 million steady-state complete TCP sessions per second
  Technological Breakthroughs from an Easy-to-Use Product                                          • 120,000+ SSL sessions per second
  That Is Always Current                                                                           • 150+ stateful application protocols
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 4,500+ live security attacks
  con guration in a variety of network environments. Because of their
                                                                                                   • 28,000+ pieces of malware
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  the landscape for applications, attacks, and telecom standards. With
  a BreakingPoint CTM, you will:                                                               To learn more about all BreakingPoint products and services, visit
                                                                                               www.breakingpoint.com/products.
     • Receive frequent updates from the BreakingPoint Application
         and Threat Intelligence (ATI) research team, which is dedicated                       Schedule a Demonstration Today
         to keeping applications and attacks current and providing                             Find out why the world’s largest service providers rely on
         frequent feature and performance enhancements.                                        BreakingPoint to measure and harden the resiliency of their LTE
     • Employ built-in network tra c pro les—created using                                     infrastructures. Visit
         data collected from top global telecom carriers—or easily                             www.breakingpoint.com/LTE.
         customize these pro les to t your own network’s unique
                                                                                               1.866.352.6691 U.S. Toll-Free
         conditions.
                                                                                               www.breakingpoint.com
     • Con gure simulations in just minutes through a single user-
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and Data Loss Prevention solutions with a
         digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Technical Speci cations                                                                          • North American Wireless Carrier Weeknight
                                                                                                   • North American Wireless Carrier Weeknight with iPhone
                                                                                                   • Sandvine Mobile Internet Report – Caribbean / Latin America
  Devices Emulated:                                                                                • Sandvine Mobile Internet Report – Europe
      • eNodeBs + UEs
                                                                                                   • Sandvine Mobile Internet Report – North America
      • PDN
                                                                                               Wireless Reporting Statistics:
      • MME
                                                                                                   • UE Attach Requests Sent / Accepted / Failed
      • SGW + PGW + PDN
                                                                                                   • UE Detach Requests Sent / Successes
      • eNodeBs + UEs + MME, SGW + PGW + PDN
                                                                                                   • S1AP Setup Requests / Successes
      • SGSN + UEs
                                                                                                   • S1AP Reset Requests Received / Reset ACKs Sent
      • GGSN + PDN
                                                                                                   • SCTP Open Requests / Open Successes
  Interfaces Supported:                                                                            • SCTP Close Requests / SCTP Close Successes
      • S1-U (eNodeB and SGW sides)
                                                                                                   • GTP Create Requests Processed
      • S1-MME (eNodeB side)
                                                                                                   • GTP Create Responses Processed
      • SGi (PDN side)
                                                                                                   • GTP Delete Requests Processed
      • S11 (MME and SGW sides)
                                                                                                   • GTP Delete Responses Processed
      • Gn (SSGN and GGSN sides)
                                                                                                   • GTP Client Side Tunnels
  Wireless Protocols Supported:                                                                    • GTP Client Side Sent / Received Data
      • S1AP                                                                                       • GTP Server Side Tunnels
      • GTP-C v1, GTP-C v2, GTP-U v1                                                               • GTP Server Side Sent / Received Data
      • SCTP (over UDP or IP)
                                                                                               Other Features:
  Performance (per FireStorm blade):                                                               • LTE speci cation supported: v9
      • Up to 4,000 eNodeBs                                                                        • All security strikes and live malware supported over LTE and 3G
      • Up to 3,000,000 UEs                                                                        • Speci c mobile malware support
      • Up to 3,000,000 concurrent GTP tunnels                                                     • All application protocols supported
      • Up to 1,800 UE registrations/sec on the S1 interface                                       • Can emulate multiple device instances concurrently (MME,
      • Up to 225,000 UE registrations/sec on the S11 interface                                       SGW, GGSN, SSGN)
      • Up to 13 Gbps GTP-encapsulated application tra c                                           • Automatic generation of IMSI, MSISDN, and UE secret keys
      • Up to 11 (1 default + 10 dedicated) bearers / UE

  Prede ned Mobility Application Pro les:
      • Mobile User
      • European Wireless Carrier Daytime
      • European Wireless Carrier Daytime with iPhone
      • European Wireless Carrier Weekday
      • European Wireless Carrier Weeknight
      • European Wireless Carrier Weeknight with iPhone
      • North American Wireless Carrier Weekday
      • North American Wireless Carrier Weekday Daytime
      • North American Wireless Carrier Weekday Daytime with
         iPhone
      • North American Wireless Carrier Weekday with iPhone

www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationDenham Pearce
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)ixiademandgen
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solutionCPqD
 

Was ist angesagt? (20)

Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise Presentation
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 

Andere mochten auch

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3G Network Solutions
 
Qualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneQualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneJJ Wu
 
LTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionLTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionQualcomm Research
 
Qualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorQualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorKrishna Gehlot
 
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldThe essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldQualcomm Research
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTESofian .
 

Andere mochten auch (9)

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
LTE Measurement: How to test a device
LTE Measurement: How to test a deviceLTE Measurement: How to test a device
LTE Measurement: How to test a device
 
3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services
 
Qualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneQualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhone
 
LTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionLTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and Evolution
 
Qualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorQualcomm Snapdragon Processor
Qualcomm Snapdragon Processor
 
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldThe essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 

Ähnlich wie LTE Testing

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms todayDell World
 

Ähnlich wie LTE Testing (20)

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Building a Digital Telco
Building a Digital TelcoBuilding a Digital Telco
Building a Digital Telco
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Xpt
XptXpt
Xpt
 
Xpt
XptXpt
Xpt
 
XPT Corporate Capability
XPT Corporate Capability XPT Corporate Capability
XPT Corporate Capability
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms today
 

Mehr von Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsIxia
 

Mehr von Ixia (11)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

LTE Testing

  • 1. BreakingPoint LTE At-A-Glance Test LTE/4G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE Network Infrastructure Telecom carriers rolling out Long Term Evolution (LTE) and 4G With a BreakingPoint CTM, you can: networks must test mobile infrastructures e ciently and accurately • Measure and harden the performance, security, and stability under punishing real-world conditions, without spending a fortune of load balancers, rewalls, IPS devices, and other equipment to do so. BreakingPoint CTM products answer this challenge with with up to 120 gigabits per second of application, attack, and the industry’s most sophisticated and cost-e ective Internet-scale malformed tra c. LTE emulation. • Validate network and data center performance by re-creating These products allow carriers to test their networks and the devices more than 150 application protocols, including Twitter Mobile, within them against the behavior of millions of simulated users AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, downloading rich media content, placing calls, purchasing music, BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, browsing the Web, or unknowingly sharing the latest malware. A Facebook®, YouTube®, and Apple® FaceTime®, as well as other BreakingPoint CTM replaces racks of equipment and complicated mobile, social, and gaming protocols—with Multicast support. setup processes with a single-chassis device and a single user • Stress network infrastructures with more than 4,500 security interface (shown below). attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. E ective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale LTE network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. BreakingPoint CTM™ Products Enable Con guration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
  • 2. BreakingPoint LTE At-A-Glance The Solution for Simulating Multi-Million-User LTE Networks, with Additional 3G Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest LTE networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of thousands of eNodeBs connecting to millions of devices such as smartphones, tablet computers, and netbooks. • Interactions among all the network elements involved in LTE communications, including user equipment (UE), eNodeBs, BreakingPoint FireStorm CTM Speci cations Service Gateways (SGWs), Packet Data Network Gateways A single BreakingPoint FireStorm CTM provides the equivalent (PGWs), and Mobility Management Entities (MMEs). performance of many racks of servers from a 4U chassis, including: • A full Dynamic Host Control Protocol (DHCP) network, with • 120 gigabits per second of blended stateful application tra c support for both DHCP Client and DHCP Server processes. • 90 million concurrent TCP sessions • Support for both 3G and LTE environments with GTPv1 and • 4 million TCP sessions per second GTPv2. • 1.5 million steady-state complete TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 120,000+ SSL sessions per second That Is Always Current • 150+ stateful application protocols BreakingPoint CTMs are designed for ease of use and rapid • 4,500+ live security attacks con guration in a variety of network environments. Because of their • 28,000+ pieces of malware exclusive design, they evolve along with the frequent changes in • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces the landscape for applications, attacks, and telecom standards. With a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit www.breakingpoint.com/products. • Receive frequent updates from the BreakingPoint Application and Threat Intelligence (ATI) research team, which is dedicated Schedule a Demonstration Today to keeping applications and attacks current and providing Find out why the world’s largest service providers rely on frequent feature and performance enhancements. BreakingPoint to measure and harden the resiliency of their LTE • Employ built-in network tra c pro les—created using infrastructures. Visit data collected from top global telecom carriers—or easily www.breakingpoint.com/LTE. customize these pro les to t your own network’s unique 1.866.352.6691 U.S. Toll-Free conditions. www.breakingpoint.com • Con gure simulations in just minutes through a single user- friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and Data Loss Prevention solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 3. BreakingPoint LTE At-A-Glance Technical Speci cations • North American Wireless Carrier Weeknight • North American Wireless Carrier Weeknight with iPhone • Sandvine Mobile Internet Report – Caribbean / Latin America Devices Emulated: • Sandvine Mobile Internet Report – Europe • eNodeBs + UEs • Sandvine Mobile Internet Report – North America • PDN Wireless Reporting Statistics: • MME • UE Attach Requests Sent / Accepted / Failed • SGW + PGW + PDN • UE Detach Requests Sent / Successes • eNodeBs + UEs + MME, SGW + PGW + PDN • S1AP Setup Requests / Successes • SGSN + UEs • S1AP Reset Requests Received / Reset ACKs Sent • GGSN + PDN • SCTP Open Requests / Open Successes Interfaces Supported: • SCTP Close Requests / SCTP Close Successes • S1-U (eNodeB and SGW sides) • GTP Create Requests Processed • S1-MME (eNodeB side) • GTP Create Responses Processed • SGi (PDN side) • GTP Delete Requests Processed • S11 (MME and SGW sides) • GTP Delete Responses Processed • Gn (SSGN and GGSN sides) • GTP Client Side Tunnels Wireless Protocols Supported: • GTP Client Side Sent / Received Data • S1AP • GTP Server Side Tunnels • GTP-C v1, GTP-C v2, GTP-U v1 • GTP Server Side Sent / Received Data • SCTP (over UDP or IP) Other Features: Performance (per FireStorm blade): • LTE speci cation supported: v9 • Up to 4,000 eNodeBs • All security strikes and live malware supported over LTE and 3G • Up to 3,000,000 UEs • Speci c mobile malware support • Up to 3,000,000 concurrent GTP tunnels • All application protocols supported • Up to 1,800 UE registrations/sec on the S1 interface • Can emulate multiple device instances concurrently (MME, • Up to 225,000 UE registrations/sec on the S11 interface SGW, GGSN, SSGN) • Up to 13 Gbps GTP-encapsulated application tra c • Automatic generation of IMSI, MSISDN, and UE secret keys • Up to 11 (1 default + 10 dedicated) bearers / UE Prede ned Mobility Application Pro les: • Mobile User • European Wireless Carrier Daytime • European Wireless Carrier Daytime with iPhone • European Wireless Carrier Weekday • European Wireless Carrier Weeknight • European Wireless Carrier Weeknight with iPhone • North American Wireless Carrier Weekday • North American Wireless Carrier Weekday Daytime • North American Wireless Carrier Weekday Daytime with iPhone • North American Wireless Carrier Weekday with iPhone www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 4. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 5. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.