Home
last modified time | relevance | path

Searched refs:traffic (Results 1 – 25 of 190) sorted by relevance

12345678

/external/webrtc/test/network/
Dnetwork_emulation_manager.cc196 auto traffic = in CreateRandomWalkCrossTraffic() local
198 RandomWalkCrossTraffic* out = traffic.get(); in CreateRandomWalkCrossTraffic()
201 [this, config, traffic = std::move(traffic)]() mutable { in CreateRandomWalkCrossTraffic()
202 auto* traffic_ptr = traffic.get(); in CreateRandomWalkCrossTraffic()
203 random_cross_traffics_.push_back(std::move(traffic)); in CreateRandomWalkCrossTraffic()
217 auto traffic = in CreatePulsedPeaksCrossTraffic() local
219 PulsedPeaksCrossTraffic* out = traffic.get(); in CreatePulsedPeaksCrossTraffic()
221 [this, config, traffic = std::move(traffic)]() mutable { in CreatePulsedPeaksCrossTraffic()
222 auto* traffic_ptr = traffic.get(); in CreatePulsedPeaksCrossTraffic()
223 pulsed_cross_traffics_.push_back(std::move(traffic)); in CreatePulsedPeaksCrossTraffic()
[all …]
Dcross_traffic_unittest.cc61 TrafficRoute traffic(&fixture.clock, &fixture.counter, &fixture.endpoint); in TEST() local
62 traffic.TriggerPacketBurst(100, 1000); in TEST()
70 TrafficRoute traffic(&fixture.clock, &fixture.counter, &fixture.endpoint); in TEST() local
78 PulsedPeaksCrossTraffic pulsed_peaks(config, &traffic); in TEST()
95 TrafficRoute traffic(&fixture.clock, &fixture.counter, &fixture.endpoint); in TEST() local
105 RandomWalkCrossTraffic random_walk(config, &traffic); in TEST()
/external/iptables/extensions/
Dlibxt_nfacct.man9 accounting the traffic that this rule-set is matching.
13 nfacct add http\-traffic
17 iptables \-I INPUT \-p tcp \-\-sport 80 \-m nfacct \-\-nfacct\-name http\-traffic
19 iptables \-I OUTPUT \-p tcp \-\-dport 80 \-m nfacct \-\-nfacct\-name http\-traffic
21 Then, you can check for the amount of traffic that the rules match:
23 nfacct get http\-traffic
25 { pkts = 00000000000000000156, bytes = 00000000000000151786 } = http-traffic;
Dlibxt_socket.man13 then local services could intercept traffic that would otherwise be forwarded.
14 This option therefore has security implications when used to match traffic being
/external/bcc/examples/networking/tunnel_monitor/
DREADME.md12 clients in different segments of the overlay network. The script `traffic.sh`
14 clients+hosts at different traffic rates.
19 displayed to give a visual clue as to the nature of the traffic flowing over
55 connect to from your browser. There will likely be a blank canvas until traffic
58 To simulate traffic, use the traffic.sh script to generate a distribution of
63 As an exercise, try modifying the traffic.sh script to cause one of the clients
64 to send much more traffic than the others, and use the chord diagram to identify
/external/ltp/testcases/network/stress/ns-tools/
D00_Descriptions.txt41 Kill all of the icmp traffic utilities (ping or ping6)
44 Kill all of the udp traffic utilities (ns-udpserver, ns-udpclient)
47 Kill all of the tcp traffic utilities (ns-tcpserver, ns-tcpclient)
56 UDP traffic server.
60 UDP traffic client
64 TCP traffic server.
68 TCP traffic client
/external/bcc/tools/
Dnfsdist_example.txt80 In this example you can see that the read traffic is rather bi-modal, with about
82 8191 usecs. Write traffic is largely clustered in the 64 - 127 usecs bracket.
83 The faster read traffic is probably coming from a filesystem cache and the slower
84 traffic from disk. The reason why the writes are so consistently fast is because
86 caching all the write traffic to memory.
97 traffic end up being getattr calls and are a good indicator of problems
Dtcpsubnet_example.txt35 By default, tcpsubnet will categorize traffic in the following subnets:
46 of subnets. Let's say we would like to know how much traffic we
96 traffic going to 192.130.253.112/32 will have been categorized in
/external/iproute2/examples/
DREADME.cbq61 # DEVICE: eth0 - device where we do control our traffic
80 # RULE=10.1.1.0/24:80 - all traffic for network 10.1.1.0 to port 80
83 # RULE=:25,10.2.2.128/25:5000 - all traffic from any address and port 25 to
86 # RULE=10.5.5.5:80, - shaper active only for traffic from port 80 of
94 # All shapers do work only for outgoing traffic!
102 # Let all traffic from backbone to client will be shaped at 28Kbit and
103 # traffic from client to backbone - at 128Kbit. We need two config files:
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-natt12 # traffic. Don't forget to open these ports on your firewall!
16 # for "normal" IKE traffic. IANA allocated port 500.
22 # ESP traffic.
30 # traffic between the peers. Normally the UDP-Encap traffic
40 # policy in the kernel SPD. For example for traffic between
/external/rust/crates/grpcio-sys/grpc/src/proto/grpc/testing/xds/v3/
Dendpoint.proto69 // An Endpoint that Envoy can route traffic to.
96 // of traffic for the locality. The sum of the weights of all localities at
121 // Each route from RDS will map to a single cluster or traffic split across
126 // granularity between the hosts within a locality. The percentage of traffic
139 // Percentage of traffic that should be dropped for the category.
143 // Action to trim the overall incoming traffic to protect the upstream
146 // incoming traffic volume for any reason.
149 // the 'actual' drop percentage on all outgoing traffic. For example:
158 // The actual drop percentages applied to the traffic at the clients will be
Dlrs.proto42 // 2. For each cluster, Envoy load balances incoming traffic to upstream hosts
55 // from around the world, computes global assignment and prepares traffic
86 // 2. For clusters that were already feature in the previous *LoadStatsResponse*, any traffic
/external/autotest/client/site_tests/platform_CryptohomeFio/
Dboot5 ; A simulation of disk traffic from power on to login screen. This is taken
6 ; from an average of 3 boots. It does not include the traffic generated by
7 ; the loader, but it does include the traffic generated by mounting the root
/external/autotest/client/cros/storage_tests/
Dboot5 ; A simulation of disk traffic from power on to login screen. This is taken
6 ; from an average of 3 boots. It does not include the traffic generated by
7 ; the loader, but it does include the traffic generated by mounting the root
/external/grpc-grpc-java/benchmarks/src/jmh/java/io/grpc/benchmarks/netty/
DREADME.md19 …w.linuxfoundation.org/collaborate/workgroups/networking/netem) to shape the traffic appropriately.
22 # Remove all traffic shaping from loopback
24 # Add a priority traffic class to the root of loopback
28 # Add a filter which selects the new qdisc class for traffic to 127.127.127.127
/external/autotest/client/deps/lansim/
Dcontrol7 allows to simulate network traffic on that interface from Python code.
11 the traffic through a hardware interface it allows a given program to
12 handle that traffic through a socket. It is essentially a
17 outbound traffic matching certain rules and take an action over that
32 Python classes to subscribe to its traffic. The TAP interface needs to
/external/bcc/examples/networking/vlan_learning/
DREADME.txt2 traffic into a pool of worker veth+namespaces (or any ifindex-based
9 traffic through to a dedicated namespace for processing. Clients may have
10 overlapping IP spaces and the traffic will still work.
/external/autotest/client/site_tests/graphics_HwOverlays/
Dcontrol.video15 …ttp://commondatastorage.googleapis.com/chromiumos-test-assets-public/traffic/traffic-1920x1080-83a…
Dcontrol.SkiaRenderer.video15 …ttp://commondatastorage.googleapis.com/chromiumos-test-assets-public/traffic/traffic-1920x1080-83a…
/external/bcc/examples/networking/vlan_filter/
DREADME.md2 …rse VXLAN packets and then extracts encapsulated VLAN packets to monitor traffic from each VLAN. E…
4 …tup by using test_setup.sh script. Then a sample script (traffic.sh) can be used to send traffic f…
/external/tcpdump/
DINSTALL.txt20 read saved captures. Whether a user will be able to capture traffic
23 capture traffic. If a user can capture traffic, he or she could use
24 utilities such as tcpdump to capture any traffic on your net, including
56 atm.h - ATM traffic type definitions
/external/libwebsockets/READMEs/
DREADME.lws_retry.md38 Connections may fail in a variety of ways, these include that no traffic
39 at all is passing, or, eg, incoming traffic may be received but no
40 outbound traffic is making it to the network, and vice versa. In the
53 To ensure that the generated traffic is only sent when necessary, user
/external/libwebsockets/lib/secure-streams/protocols/
DREADME.md9 traffic on the lws protocol being supported.
11 The various events and traffic are converted into calls using the Secure
/external/iproute2/
DREADME.iproute2+tc3 It's the first release of Linux traffic control engine.
97 # if traffic violate TBF (32kbit,5K)
106 # if traffic violate TBF (10kbit,5K)
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/sem_close/
Dcoverage.txt3 TEST WAS REMOVED: based on the Austin Group mailing list traffic "That

12345678