Skip to content

cnsuhao/tcpburn

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A tcp stream replay tool devoted to concurrentcy

#Description TCPBurn is a replay tool which focuses on concurrency. All TCP-based applications which could be replayed could be stressed by this powerful tool .

#Characteristics 1) Network latency could be reserved 2) No need to bind multiple IP addresses and the number of client IP addresses is unlimited 3) The maximum number of concurrent users is restricted to bandwidth, memory and CPU processing power 4) Only TCP-based applications that could be replayed are supported

#Scenarios 1) Stress testing 2) Comet 3) Performance testing

#Architecture

tcpburn

As shown in the above Figure, TCPBurn consists of two parts: tcpburn and intercept. While tcpburn runs on the test server and sends the packets from pcap files, intercept runs on the assistant server and does some assistant work, such as passing response info to tcpburn.

tcpburn reads packets from pcap files and does the necessary processing (including TCP interaction simulation, network latency control, and common upper-layer interaction simulation), and uses raw socket output technique by default to send packets to the target server(pink arrows).

The only operation needed in the target server for TCPBurn is setting appropriate route commands to route response packets(green arrows) to the assistant server.

intercept is responsible for passing the response header to tcpburn. By capturing the response packets, intercept will extract response header information and send the response header to tcpburn using a special channel(purple arrows). When tcpburn receives the response header, it utilizes the header information to modify the attributes of pcap packets and continues to send another packet. It should be noticed that the responses from the target server are routed to the assistant server which should act as a black hole.

#tcpburn configure Options --with-debug compile tcpburn with debug support (saved in a log file) --pcap-send send packets at the data link layer instead of the IP layer --single if intercept is configured with "--single" option, so does tcpburn --comet replay for comet applications

#Installation and Running

###1) intercept a) Install intercept on the assistant server git clone git://github.com/session-replay-tools/intercept.git cd intercept ./configure --single
make make install

b) Running intercept on the assistant server(root privilege or the CAP_NET_RAW capability is required):

  ./intercept -F <filter> -i <device,> 

  Note that the filter format is the same as the pcap filter.

  For example:

    ./intercept -i eth0 -F 'tcp and src port 80' -d

    Intercept will capture response packets of the TCP-based application which 
  listens on port 80 from device eth0 

###2) Set route commands on the target server which runs server applications

  Set route commands appropriately to route response packets to the assistant server

  For example:

  Assume 65.135.233.161 is the IP address of the assistant server. We set the following
  route commands to route all responses to the 62.135.200.x's clients to the assistant
  server.

  route add -net 62.135.200.0 netmask 255.255.255.0 gw 65.135.233.161

###3) tcpburn (root privilege or the CAP_NET_RAW capability is required when running) a) Install tcpburn on the test server git clone git://github.com/session-replay-tools/tcpburn.git cd tcpburn

if not comet scenarios
  ./configure --single 
else
  ./configure --single --comet  
endif

make
make install

./tcpburn -x historyServerPort-targetServerIP:targetServerPort -f <pcapfile,> 
 -s <intercept address> -u <user num> -c <ip range,>

For example:

Assume 65.135.233.160 is the IP address of the target server and 10.110.10.161 is the
internal IP address of the assistant server and 65.135.233.161 is the external IP 
address of the assistant server.
  ./tcpburn -x 80-65.135.233.160:80 -f /path/to/80.pcap -s 10.110.10.161 
   -u 10000 -c 62.135.200.x

  tcpburn extracts packets from 80.pcap file on dst port 80 and replays these to the
target server 65.135.233.160 which runs the application listening on port 80. Total 
sessions replayed are 10000 and client IP addresses used are belonging to 62.135.200.x
series. tcpburn connects to the assistant server(10.110.10.161) for asking response 
information.

#Note 1) All sessions are retrieved from pcap files and make sure the sessions in pcap files are complete. 2) tcpburn uses raw socket to send packets by default, and if you want to avoid ip_conntrack problems or get better performance, configure tcpburn with "--pcap-send" and refer to "./tcpburn -h" for how to set appropriate parameters for running. 3) The test server and the assistant server could share the same machine. 4) For comet applications, exclude publish sessions if they exist in pcap files. 5) tcpburn could not replay TCP-based sessions that could not be replayed, such as SSL/TLS sessions 6) ip_forward should not be set on the assistant server. 7) Root privilege or the CAP_NET_RAW capability is required 8) Please execute "./tcpburn -h" or "./intercept -h" for more details.

##Release History

  • 2014.09 v1.0 TCPBurn released

##Bugs and feature requests Have a bug or a feature request? Please open a new issue. Before opening any issue, please search for existing issues.

Copyright and license

Copyright 2014 under the BSD license.

About

The most powerful tool for stress testing of Internet server applications

Resources

License

Unknown, Unknown licenses found

Licenses found

Unknown
LICENSE
Unknown
COPYING

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 99.5%
  • C++ 0.5%