SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
BreakingPoint LTE At-A-Glance




Test LTE/4G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE
Network Infrastructure


Telecom carriers rolling out Long Term Evolution (LTE) and 4G             With a BreakingPoint CTM, you can:
networks must test mobile infrastructures e ciently and accurately
                                                                             • Measure and harden the performance, security, and stability
under punishing real-world conditions, without spending a fortune
                                                                                of load balancers, rewalls, IPS devices, and other equipment
to do so. BreakingPoint CTM products answer this challenge with
                                                                                with up to 120 gigabits per second of application, attack, and
the industry’s most sophisticated and cost-e ective Internet-scale
                                                                                malformed tra c.
LTE emulation.
                                                                             • Validate network and data center performance by re-creating
These products allow carriers to test their networks and the devices            more than 150 application protocols, including Twitter Mobile,
within them against the behavior of millions of simulated users                 AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
downloading rich media content, placing calls, purchasing music,                BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
browsing the Web, or unknowingly sharing the latest malware. A                  Facebook®, YouTube®, and Apple® FaceTime®, as well as other
BreakingPoint CTM replaces racks of equipment and complicated                   mobile, social, and gaming protocols—with Multicast support.
setup processes with a single-chassis device and a single user               • Stress network infrastructures with more than 4,500 security
interface (shown below).                                                        attacks and 28,000 pieces of malware—including more
                                                                                than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                evasions.
E ective Device
                                                                             • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
LTE network conditions needed to harden carrier-grade network                • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                     botnet attacks to uncover previously hidden weaknesses.




          BreakingPoint CTM™ Products Enable Con guration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
BreakingPoint LTE At-A-Glance


  The Solution for Simulating Multi-Million-User LTE Networks,
  with Additional 3G Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest LTE networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of thousands of eNodeBs connecting to millions of devices
         such as smartphones, tablet computers, and netbooks.
     • Interactions among all the network elements involved in LTE
         communications, including user equipment (UE), eNodeBs,                               BreakingPoint FireStorm CTM Speci cations
         Service Gateways (SGWs), Packet Data Network Gateways                                 A single BreakingPoint FireStorm CTM provides the equivalent
         (PGWs), and Mobility Management Entities (MMEs).                                      performance of many racks of servers from a 4U chassis, including:
     • A full Dynamic Host Control Protocol (DHCP) network, with                                   • 120 gigabits per second of blended stateful application tra c
         support for both DHCP Client and DHCP Server processes.                                   • 90 million concurrent TCP sessions
     • Support for both 3G and LTE environments with GTPv1 and                                     • 4 million TCP sessions per second
         GTPv2.
                                                                                                   • 1.5 million steady-state complete TCP sessions per second
  Technological Breakthroughs from an Easy-to-Use Product                                          • 120,000+ SSL sessions per second
  That Is Always Current                                                                           • 150+ stateful application protocols
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 4,500+ live security attacks
  con guration in a variety of network environments. Because of their
                                                                                                   • 28,000+ pieces of malware
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  the landscape for applications, attacks, and telecom standards. With
  a BreakingPoint CTM, you will:                                                               To learn more about all BreakingPoint products and services, visit
                                                                                               www.breakingpoint.com/products.
     • Receive frequent updates from the BreakingPoint Application
         and Threat Intelligence (ATI) research team, which is dedicated                       Schedule a Demonstration Today
         to keeping applications and attacks current and providing                             Find out why the world’s largest service providers rely on
         frequent feature and performance enhancements.                                        BreakingPoint to measure and harden the resiliency of their LTE
     • Employ built-in network tra c pro les—created using                                     infrastructures. Visit
         data collected from top global telecom carriers—or easily                             www.breakingpoint.com/LTE.
         customize these pro les to t your own network’s unique
                                                                                               1.866.352.6691 U.S. Toll-Free
         conditions.
                                                                                               www.breakingpoint.com
     • Con gure simulations in just minutes through a single user-
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and Data Loss Prevention solutions with a
         digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Technical Speci cations                                                                          • North American Wireless Carrier Weeknight
                                                                                                   • North American Wireless Carrier Weeknight with iPhone
                                                                                                   • Sandvine Mobile Internet Report – Caribbean / Latin America
  Devices Emulated:                                                                                • Sandvine Mobile Internet Report – Europe
      • eNodeBs + UEs
                                                                                                   • Sandvine Mobile Internet Report – North America
      • PDN
                                                                                               Wireless Reporting Statistics:
      • MME
                                                                                                   • UE Attach Requests Sent / Accepted / Failed
      • SGW + PGW + PDN
                                                                                                   • UE Detach Requests Sent / Successes
      • eNodeBs + UEs + MME, SGW + PGW + PDN
                                                                                                   • S1AP Setup Requests / Successes
      • SGSN + UEs
                                                                                                   • S1AP Reset Requests Received / Reset ACKs Sent
      • GGSN + PDN
                                                                                                   • SCTP Open Requests / Open Successes
  Interfaces Supported:                                                                            • SCTP Close Requests / SCTP Close Successes
      • S1-U (eNodeB and SGW sides)
                                                                                                   • GTP Create Requests Processed
      • S1-MME (eNodeB side)
                                                                                                   • GTP Create Responses Processed
      • SGi (PDN side)
                                                                                                   • GTP Delete Requests Processed
      • S11 (MME and SGW sides)
                                                                                                   • GTP Delete Responses Processed
      • Gn (SSGN and GGSN sides)
                                                                                                   • GTP Client Side Tunnels
  Wireless Protocols Supported:                                                                    • GTP Client Side Sent / Received Data
      • S1AP                                                                                       • GTP Server Side Tunnels
      • GTP-C v1, GTP-C v2, GTP-U v1                                                               • GTP Server Side Sent / Received Data
      • SCTP (over UDP or IP)
                                                                                               Other Features:
  Performance (per FireStorm blade):                                                               • LTE speci cation supported: v9
      • Up to 4,000 eNodeBs                                                                        • All security strikes and live malware supported over LTE and 3G
      • Up to 3,000,000 UEs                                                                        • Speci c mobile malware support
      • Up to 3,000,000 concurrent GTP tunnels                                                     • All application protocols supported
      • Up to 1,800 UE registrations/sec on the S1 interface                                       • Can emulate multiple device instances concurrently (MME,
      • Up to 225,000 UE registrations/sec on the S11 interface                                       SGW, GGSN, SSGN)
      • Up to 13 Gbps GTP-encapsulated application tra c                                           • Automatic generation of IMSI, MSISDN, and UE secret keys
      • Up to 11 (1 default + 10 dedicated) bearers / UE

  Prede ned Mobility Application Pro les:
      • Mobile User
      • European Wireless Carrier Daytime
      • European Wireless Carrier Daytime with iPhone
      • European Wireless Carrier Weekday
      • European Wireless Carrier Weeknight
      • European Wireless Carrier Weeknight with iPhone
      • North American Wireless Carrier Weekday
      • North American Wireless Carrier Weekday Daytime
      • North American Wireless Carrier Weekday Daytime with
         iPhone
      • North American Wireless Carrier Weekday with iPhone

www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking PointMUK Extreme
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationDenham Pearce
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)ixiademandgen
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solutionCPqD
 

La actualidad más candente (20)

Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
IXIA Breaking Point
IXIA Breaking PointIXIA Breaking Point
IXIA Breaking Point
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
Vision one-customer
Vision one-customerVision one-customer
Vision one-customer
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise Presentation
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693 SANGFOR NGAF FIREWALL  SG TECHNICAL PVT LTD 03002019693
SANGFOR NGAF FIREWALL SG TECHNICAL PVT LTD 03002019693
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 

Destacado

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3G Network Solutions
 
Qualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneQualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneJJ Wu
 
LTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionLTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionQualcomm Research
 
Qualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorQualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorKrishna Gehlot
 
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldThe essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldQualcomm Research
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTESofian .
 

Destacado (9)

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
LTE Measurement: How to test a device
LTE Measurement: How to test a deviceLTE Measurement: How to test a device
LTE Measurement: How to test a device
 
3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services3GNets LTE Testing Solutions and Services
3GNets LTE Testing Solutions and Services
 
Qualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhoneQualcomm Snapdragon 600-based SmartPhone
Qualcomm Snapdragon 600-based SmartPhone
 
LTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and EvolutionLTE Advanced—Leading in Chipsets and Evolution
LTE Advanced—Leading in Chipsets and Evolution
 
Qualcomm Snapdragon Processor
Qualcomm Snapdragon ProcessorQualcomm Snapdragon Processor
Qualcomm Snapdragon Processor
 
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G WorldThe essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
The essential role of Gigabit LTE and LTE Advanced Pro in the 5G World
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 

Similar a LTE Testing

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms todayDell World
 

Similar a LTE Testing (20)

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Building a Digital Telco
Building a Digital TelcoBuilding a Digital Telco
Building a Digital Telco
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Xpt
XptXpt
Xpt
 
Xpt
XptXpt
Xpt
 
XPT Corporate Capability
XPT Corporate Capability XPT Corporate Capability
XPT Corporate Capability
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms today
 

Más de Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsIxia
 

Más de Ixia (11)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

LTE Testing

  • 1. BreakingPoint LTE At-A-Glance Test LTE/4G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE Network Infrastructure Telecom carriers rolling out Long Term Evolution (LTE) and 4G With a BreakingPoint CTM, you can: networks must test mobile infrastructures e ciently and accurately • Measure and harden the performance, security, and stability under punishing real-world conditions, without spending a fortune of load balancers, rewalls, IPS devices, and other equipment to do so. BreakingPoint CTM products answer this challenge with with up to 120 gigabits per second of application, attack, and the industry’s most sophisticated and cost-e ective Internet-scale malformed tra c. LTE emulation. • Validate network and data center performance by re-creating These products allow carriers to test their networks and the devices more than 150 application protocols, including Twitter Mobile, within them against the behavior of millions of simulated users AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, downloading rich media content, placing calls, purchasing music, BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, browsing the Web, or unknowingly sharing the latest malware. A Facebook®, YouTube®, and Apple® FaceTime®, as well as other BreakingPoint CTM replaces racks of equipment and complicated mobile, social, and gaming protocols—with Multicast support. setup processes with a single-chassis device and a single user • Stress network infrastructures with more than 4,500 security interface (shown below). attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. E ective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale LTE network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. BreakingPoint CTM™ Products Enable Con guration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
  • 2. BreakingPoint LTE At-A-Glance The Solution for Simulating Multi-Million-User LTE Networks, with Additional 3G Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest LTE networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of thousands of eNodeBs connecting to millions of devices such as smartphones, tablet computers, and netbooks. • Interactions among all the network elements involved in LTE communications, including user equipment (UE), eNodeBs, BreakingPoint FireStorm CTM Speci cations Service Gateways (SGWs), Packet Data Network Gateways A single BreakingPoint FireStorm CTM provides the equivalent (PGWs), and Mobility Management Entities (MMEs). performance of many racks of servers from a 4U chassis, including: • A full Dynamic Host Control Protocol (DHCP) network, with • 120 gigabits per second of blended stateful application tra c support for both DHCP Client and DHCP Server processes. • 90 million concurrent TCP sessions • Support for both 3G and LTE environments with GTPv1 and • 4 million TCP sessions per second GTPv2. • 1.5 million steady-state complete TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 120,000+ SSL sessions per second That Is Always Current • 150+ stateful application protocols BreakingPoint CTMs are designed for ease of use and rapid • 4,500+ live security attacks con guration in a variety of network environments. Because of their • 28,000+ pieces of malware exclusive design, they evolve along with the frequent changes in • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces the landscape for applications, attacks, and telecom standards. With a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit www.breakingpoint.com/products. • Receive frequent updates from the BreakingPoint Application and Threat Intelligence (ATI) research team, which is dedicated Schedule a Demonstration Today to keeping applications and attacks current and providing Find out why the world’s largest service providers rely on frequent feature and performance enhancements. BreakingPoint to measure and harden the resiliency of their LTE • Employ built-in network tra c pro les—created using infrastructures. Visit data collected from top global telecom carriers—or easily www.breakingpoint.com/LTE. customize these pro les to t your own network’s unique 1.866.352.6691 U.S. Toll-Free conditions. www.breakingpoint.com • Con gure simulations in just minutes through a single user- friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and Data Loss Prevention solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 3. BreakingPoint LTE At-A-Glance Technical Speci cations • North American Wireless Carrier Weeknight • North American Wireless Carrier Weeknight with iPhone • Sandvine Mobile Internet Report – Caribbean / Latin America Devices Emulated: • Sandvine Mobile Internet Report – Europe • eNodeBs + UEs • Sandvine Mobile Internet Report – North America • PDN Wireless Reporting Statistics: • MME • UE Attach Requests Sent / Accepted / Failed • SGW + PGW + PDN • UE Detach Requests Sent / Successes • eNodeBs + UEs + MME, SGW + PGW + PDN • S1AP Setup Requests / Successes • SGSN + UEs • S1AP Reset Requests Received / Reset ACKs Sent • GGSN + PDN • SCTP Open Requests / Open Successes Interfaces Supported: • SCTP Close Requests / SCTP Close Successes • S1-U (eNodeB and SGW sides) • GTP Create Requests Processed • S1-MME (eNodeB side) • GTP Create Responses Processed • SGi (PDN side) • GTP Delete Requests Processed • S11 (MME and SGW sides) • GTP Delete Responses Processed • Gn (SSGN and GGSN sides) • GTP Client Side Tunnels Wireless Protocols Supported: • GTP Client Side Sent / Received Data • S1AP • GTP Server Side Tunnels • GTP-C v1, GTP-C v2, GTP-U v1 • GTP Server Side Sent / Received Data • SCTP (over UDP or IP) Other Features: Performance (per FireStorm blade): • LTE speci cation supported: v9 • Up to 4,000 eNodeBs • All security strikes and live malware supported over LTE and 3G • Up to 3,000,000 UEs • Speci c mobile malware support • Up to 3,000,000 concurrent GTP tunnels • All application protocols supported • Up to 1,800 UE registrations/sec on the S1 interface • Can emulate multiple device instances concurrently (MME, • Up to 225,000 UE registrations/sec on the S11 interface SGW, GGSN, SSGN) • Up to 13 Gbps GTP-encapsulated application tra c • Automatic generation of IMSI, MSISDN, and UE secret keys • Up to 11 (1 default + 10 dedicated) bearers / UE Prede ned Mobility Application Pro les: • Mobile User • European Wireless Carrier Daytime • European Wireless Carrier Daytime with iPhone • European Wireless Carrier Weekday • European Wireless Carrier Weeknight • European Wireless Carrier Weeknight with iPhone • North American Wireless Carrier Weekday • North American Wireless Carrier Weekday Daytime • North American Wireless Carrier Weekday Daytime with iPhone • North American Wireless Carrier Weekday with iPhone www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 4. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 5. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.