mirror of
https://github.com/Telecominfraproject/wlan-lanforge-scripts.git
synced 2025-11-05 05:07:59 +00:00
534 lines
26 KiB
Python
534 lines
26 KiB
Python
#!/usr/bin/env python3
|
|
import sys
|
|
import os
|
|
import importlib
|
|
import time
|
|
import datetime
|
|
import argparse
|
|
import allure
|
|
from pprint import pprint
|
|
|
|
if sys.version_info[0] != 3:
|
|
print("This script requires Python 3")
|
|
exit(1)
|
|
|
|
sys.path.append(os.path.join(os.path.abspath(__file__ + "../../../")))
|
|
|
|
LFUtils = importlib.import_module("py-json.LANforge.LFUtils")
|
|
realm = importlib.import_module("py-json.realm")
|
|
Realm = realm.Realm
|
|
l3_cxprofile = importlib.import_module("py-json.l3_cxprofile")
|
|
multicast_profile = importlib.import_module("py-json.multicast_profile")
|
|
station_profile = importlib.import_module("py-json.station_profile")
|
|
wifi_monitor = importlib.import_module("py-json.wifi_monitor_profile")
|
|
cv_test_reports = importlib.import_module("py-json.cv_test_reports")
|
|
from lf_sniff_radio import SniffRadio
|
|
lf_rpt = cv_test_reports.lanforge_reports
|
|
|
|
import pyshark as ps
|
|
|
|
'''
|
|
Usage: python3 lf_power_save_with_unicast.py --mgr 192.168.200.229 --ssid Endurance1 --radio wiphy0
|
|
--upstream_port 1.1.eth1 --monitor_radio wiphy0
|
|
--report_path /home/mahesh/Desktop/lanforge-scripts/lanforge-scripts/py-scripts
|
|
'''
|
|
|
|
|
|
class UnicastPowersaveTraffic(Realm):
|
|
|
|
def __init__(self, host, port, ssid, security, password, station_list, min_rate_multi_cast=56,
|
|
max_rate_multi_cast=56,
|
|
side_a_unicast_min_rate=56, side_b_unicast_min_rate=56, side_a_unicast_max_rate=0,
|
|
side_b_unicast_max_rate=0, pdu_size=1000,band="sixg",
|
|
upstream="1.1.eth1", interface_to_capture=None,
|
|
prefix="00000", test_duration="5m", report_path="",
|
|
station_radio="wiphy0", monitor_radio="wiphy0", remote_host_cap_ip=None,
|
|
output_file_for_cap="",
|
|
remote_host_cap_interface=None,
|
|
_debug_on=False, _exit_on_error=False, _exit_on_fail=False):
|
|
super().__init__(lfclient_host=host, lfclient_port=port, debug_=_debug_on)
|
|
self.host = host
|
|
self.port = port
|
|
self.ssid = ssid
|
|
self.security = security
|
|
self.password = password
|
|
self.sta_list = station_list
|
|
self.prefix = prefix
|
|
self.station_radio = station_radio
|
|
self.monitor_radio = monitor_radio
|
|
self.debug = _debug_on
|
|
self.upstream = upstream
|
|
self.min_rate = min_rate_multi_cast
|
|
self.max_rate = max_rate_multi_cast
|
|
self.output_file = output_file_for_cap
|
|
self.enable_multicast_testing = False
|
|
self.enable_unicast_testing = False
|
|
self.filter = ""
|
|
self.report_dir = report_path
|
|
self.captured_file_name = ""
|
|
self.sta_mac = ""
|
|
self.ap_mac = ""
|
|
self.upstream_mac = ""
|
|
self.band = band
|
|
if interface_to_capture is not None:
|
|
self.live_cap_timeout = interface_to_capture
|
|
else:
|
|
self.live_cap_timeout = station_radio
|
|
if remote_host_cap_ip and remote_host_cap_interface is not None:
|
|
self.remote_cap_host = remote_host_cap_ip
|
|
self.remote_cap_interface = remote_host_cap_interface
|
|
|
|
self.new_monitor = self.new_wifi_monitor_profile()
|
|
self.test_duration = test_duration
|
|
# upload
|
|
self.cx_prof_upload = l3_cxprofile.L3CXProfile(self.host, self.port, local_realm=self,
|
|
side_a_min_bps=side_a_unicast_min_rate, side_b_min_bps=0,
|
|
side_a_max_bps=side_a_unicast_max_rate, side_b_max_bps=0,
|
|
side_a_min_pdu=pdu_size, side_a_max_pdu=pdu_size,
|
|
side_b_min_pdu=0, side_b_max_pdu=0, debug_=self.debug)
|
|
|
|
# download
|
|
self.cx_prof_download = l3_cxprofile.L3CXProfile(self.host, self.port, local_realm=self,
|
|
side_a_min_bps=0, side_b_min_bps=side_b_unicast_min_rate,
|
|
side_a_max_bps=0, side_b_max_bps=side_b_unicast_max_rate,
|
|
side_a_min_pdu=0, side_a_max_pdu=0,
|
|
side_b_min_pdu=pdu_size, side_b_max_pdu=pdu_size,
|
|
debug_=self.debug)
|
|
self.multi_cast_profile = multicast_profile.MULTICASTProfile(self.host, self.port, local_realm=self)
|
|
|
|
self.station_profile = station_profile.StationProfile(self.lfclient_url, local_realm=self, ssid=self.ssid,
|
|
ssid_pass=self.password,
|
|
security=self.security, number_template_=self.prefix,
|
|
mode=0,
|
|
up=True,
|
|
dhcp=True,
|
|
debug_=self.debug)
|
|
self.new_monitor = wifi_monitor.WifiMonitor(self.lfclient_url, local_realm=self, debug_=self.debug)
|
|
|
|
def build_station_profile(self):
|
|
print("Station radio..in 108 lanfo-py-scri",self.station_radio)
|
|
self.station_profile.use_security(self.security, ssid=self.ssid, passwd=self.password)
|
|
self.station_profile.set_number_template(self.prefix)
|
|
self.station_profile.set_command_flag("add_sta", "create_admin_down", 1)
|
|
self.station_profile.set_command_param("set_port", "report_timer", 1500)
|
|
self.station_profile.set_command_flag("set_port", "rpt_timer", 1)
|
|
self.station_profile.set_command_flag("add_sta", "power_save_enable", 1)
|
|
self.station_profile.create(radio=self.station_radio, sta_names_=self.sta_list)
|
|
self._pass("PASS: Station builds finished")
|
|
|
|
def build_monitor(self, channel):
|
|
self.new_monitor.create(resource_=1, channel=channel, radio_=self.monitor_radio, name_="moni0")
|
|
|
|
def build_multi_cast_profile(self):
|
|
self.multi_cast_profile.create_mc_tx("mc_udp", self.upstream, min_rate=self.min_rate, max_rate=self.max_rate)
|
|
self.multi_cast_profile.create_mc_rx("mc_udp", self.sta_list)
|
|
|
|
def build_layer3_upload(self):
|
|
self.cx_prof_upload.name_prefix = "UDP_up"
|
|
print("Creating upload cx profile ")
|
|
self.cx_prof_upload.create(endp_type="lf_tcp", side_a=self.station_profile.station_names, side_b=self.upstream,
|
|
sleep_time=.05)
|
|
|
|
def build_layer3_download(self):
|
|
self.cx_prof_download.name_prefix = "TCP_down"
|
|
print("Creating download cx profile")
|
|
self.cx_prof_download.create(endp_type="lf_tcp", side_a=self.station_profile.station_names,
|
|
side_b=self.upstream,
|
|
sleep_time=.05)
|
|
|
|
# channel = self.json_get("/port/1/%s/%s/"%(1,"wiphy0"))
|
|
# rint("The channel name is...")
|
|
|
|
# station_channel = self.json_get("/port/1/%s/%s")
|
|
# pprint.pprint(station_channel)
|
|
|
|
def get_channel(self):
|
|
self.station_profile.admin_up()
|
|
# self.new_monitor.set_flag()
|
|
# print(self.station_profile.station_names)
|
|
print("Querying for channel from station created to create monitor interface on that particular channel")
|
|
if self.wait_for_ip(self.station_profile.station_names):
|
|
self._pass("All stations got IPs")
|
|
else:
|
|
self._fail("Stations failed to get IPs")
|
|
exit(1)
|
|
channel_info = self.json_get(f"port/1/1/{self.sta_list[0]}?fields=channel")
|
|
print(channel_info)
|
|
if channel_info is not None:
|
|
if 'interfaces' in channel_info:
|
|
for item in channel_info['interfaces']:
|
|
for k, v in item.items():
|
|
print("sta_name %s" % v['alias'])
|
|
print("mac %s" % v['mac'])
|
|
print("ap %s\n" % v['ap'])
|
|
elif 'interface' in channel_info:
|
|
print("channel %s" % channel_info['interface']['channel'])
|
|
self.station_profile.admin_down()
|
|
time.sleep(0.5)
|
|
return int(channel_info['interface']['channel'])
|
|
|
|
def get_captured_file_and_location(self):
|
|
return self.captured_file_name, self.report_dir, self.filter
|
|
|
|
def start(self,channel_info):
|
|
# start one test, measure
|
|
# start second test, measure
|
|
cur_time = datetime.datetime.now()
|
|
allure.attach(name="Test Start Time:", body=str(f"{cur_time}"))
|
|
end_time = self.parse_time(self.test_duration) + cur_time
|
|
allure.attach(name="Test End Time:", body=str(f"{end_time}"))
|
|
# admin up on new monitor
|
|
self.new_monitor.admin_up()
|
|
now = datetime.datetime.now()
|
|
date_time = now.strftime("%Y-%m-%d-%H%M%S")
|
|
curr_mon_name = self.new_monitor.monitor_name
|
|
# ("date and time: ",date_time)
|
|
duration_to_sec = 120
|
|
if self.test_duration[-1] == 'm':
|
|
duration_to_sec = int(self.test_duration.strip('m')) * 60
|
|
elif self.test_duration[-1] == 'h':
|
|
duration_to_sec = int(self.test_duration.strip('h')) * 60 * 60
|
|
elif self.test_duration[-1] == 's':
|
|
duration_to_sec = int(self.test_duration.strip('s'))
|
|
print(duration_to_sec)
|
|
|
|
self.captured_file_name = curr_mon_name + "-" + date_time + ".pcap"
|
|
if self.band == "sixg":
|
|
print("enterted into sixg")
|
|
lf_sniff_radio_obj = SniffRadio(lfclient_host=self.host,channel=channel_info,monitor_name="moni0")
|
|
print("frequency...",lf_sniff_radio_obj.freq)
|
|
lf_sniff_radio_obj.set_freq(self.host,"lanforge", freq=lf_sniff_radio_obj.freq)
|
|
print("Starting sniffing")
|
|
self.new_monitor.start_sniff(capname=curr_mon_name + "-" + date_time + ".pcap",
|
|
duration_sec=duration_to_sec)
|
|
print(f"Sniffer started will continue for {duration_to_sec} seconds")
|
|
# admin up on station
|
|
|
|
print("station profile got admin up")
|
|
self.station_profile.admin_up()
|
|
# self.new_monitor.set_flag()
|
|
# print(self.station_profile.station_names)
|
|
if self.wait_for_ip(self.station_profile.station_names):
|
|
self._pass("All stations got IPs")
|
|
else:
|
|
self._fail("Stations failed to get IPs")
|
|
print("Stations didn't received ip")
|
|
allure.attach(name="FAILED", body="Stations didn't connected to AP")
|
|
exit(1)
|
|
|
|
if self.enable_multicast_testing:
|
|
print("started multicast traffic")
|
|
self.multi_cast_profile.start_mc()
|
|
elif self.enable_unicast_testing:
|
|
print("started unicast traffic")
|
|
self.start_layer3()
|
|
|
|
# print station + MAC, AP
|
|
temp = []
|
|
for station in self.station_profile.station_names:
|
|
temp.append(self.name_to_eid(station)[2])
|
|
port_info = self.json_get("port/1/1/%s?fields=alias,ap,mac" % ','.join(temp))
|
|
print("port_info.........", port_info)
|
|
if port_info is not None:
|
|
if 'interfaces' in port_info:
|
|
for item in port_info['interfaces']:
|
|
for k, v in item.items():
|
|
print("sta_name %s" % v['alias'])
|
|
print("mac %s" % v['mac'])
|
|
print("ap %s\n" % v['ap'])
|
|
elif 'interface' in port_info:
|
|
print("sta_name %s" % port_info['interface']['alias'])
|
|
print("mac %s" % port_info['interface']['mac'])
|
|
print("ap %s\n" % port_info['interface']['ap'])
|
|
self.filter = "wlan.addr==" + port_info['interface']['mac'] + " || " + "wlan.addr==" + \
|
|
port_info['interface']['ap']
|
|
self.sta_mac = str(port_info['interface']['mac'])
|
|
self.ap_mac = str(port_info['interface']['ap'])
|
|
allure.attach(name="AP MAC", body=str(port_info['interface']['ap']))
|
|
allure.attach(name="Station MAC", body=str(port_info['interface']['mac']))
|
|
print("filter=", self.filter)
|
|
print("filter=", self.filter)
|
|
else:
|
|
print('interfaces and interface not in port_mgr_response')
|
|
allure.attach(name="FAILED", body=str("station data is not in response"))
|
|
exit(1)
|
|
temp_1 = []
|
|
temp_1.append(self.name_to_eid(self.upstream)[2])
|
|
upstream_info = self.json_get("port/1/1/%s?fields=alias,mac" % ','.join(temp_1))
|
|
print("upstream_info.........", upstream_info)
|
|
if upstream_info is not None:
|
|
if 'interfaces' in upstream_info:
|
|
for item in upstream_info['interfaces']:
|
|
for k, v in item.items():
|
|
print("upstream_name %s" % v['alias'])
|
|
print("mac %s" % v['mac'])
|
|
elif 'interface' in upstream_info:
|
|
print("sta_name %s" % upstream_info['interface']['alias'])
|
|
print("mac %s" % upstream_info['interface']['mac'])
|
|
self.upstream_mac = str(upstream_info['interface']['mac'])
|
|
allure.attach(name="Upstream Port MAC", body=str(upstream_info['interface']['mac']))
|
|
else:
|
|
print('interfaces and interface not in port_mgr_upstream_response')
|
|
exit(1)
|
|
exit(1)
|
|
|
|
while cur_time < end_time:
|
|
# DOUBLE CHECK
|
|
interval_time = cur_time + datetime.timedelta(minutes=1)
|
|
while cur_time < interval_time:
|
|
cur_time = datetime.datetime.now()
|
|
time.sleep(1)
|
|
|
|
# pulls report from lanforge to specified location in self.report_dir
|
|
lf_rpt.pull_reports(hostname=self.host, port=22, username="lanforge", password="lanforge",
|
|
report_location="/home/lanforge/" + curr_mon_name + "-" + date_time + ".pcap",
|
|
report_dir=self.report_dir)
|
|
# allure.attach.file(source=self.report_dir + "/" + self.captured_file_name, name="pcap_file",
|
|
# attachment_type=allure.attachment_type.PCAP)
|
|
|
|
'''
|
|
def capture_live_pcap(self):
|
|
try:
|
|
self.live_pcap = ps.LiveCapture(interface=self.live_pcap_interface, output_file=self.output_file)
|
|
self.live_pcap.sniff(timeout=300)
|
|
except ValueError:
|
|
raise "Capture Error"
|
|
return self.live_pcap
|
|
|
|
def capture_remote_pcap(self):
|
|
try:
|
|
self.remote_pcap = ps.RemoteCapture(remote_host=self.remote_cap_host,
|
|
remote_interface=self.remote_cap_interface)
|
|
except ValueError:
|
|
raise "Host error"
|
|
return self.remote_pcap
|
|
'''
|
|
|
|
def verify_unicast_pcap(self, pcap_file, apply_filter=None):
|
|
self.pcap_file = self.report_dir + "/" + pcap_file
|
|
# self.ap_mac = "10:f9:20:fd:e2:0b"
|
|
# self.sta_mac = "a8:93:4a:df:b0:3b"
|
|
|
|
if apply_filter is not None:
|
|
self.apply_filter = apply_filter
|
|
try:
|
|
pcap = ps.FileCapture(input_file=self.pcap_file, display_filter=self.apply_filter)
|
|
except Exception as error:
|
|
raise error
|
|
check_unicast = False
|
|
traffic_awaiting = False
|
|
block_ack = False
|
|
data_packet = False
|
|
result_data = False
|
|
QOS_data_pkt_count = False
|
|
for pkt in pcap: # traversing through all packets one by one
|
|
# print(str(pkt.wlan.fc_type_subtype))
|
|
# print(str(pkt.wlan.fc_pwrmgt))
|
|
if str(pkt.wlan.fc_type_subtype) == "0x002c" and str(pkt.wlan.fc_pwrmgt) == '1':
|
|
check_unicast = True
|
|
continue
|
|
|
|
if check_unicast:
|
|
if str(pkt.wlan.fc_type_subtype) == "0x0008":
|
|
if "wlan.mgt" in pkt and str(pkt["wlan.mgt"].wlan_tim_partial_virtual_bitmap) != '00':
|
|
traffic_awaiting = True
|
|
# print(f"PASSED:Beacon with Traffic buffered is seen {pkt.number}")
|
|
# allure.attach(name="Beacon",body=str(f"PASSED:Beacon with Traffic buffered is seen {pkt.number}"))
|
|
# print("found", pkt.number)
|
|
continue
|
|
|
|
if traffic_awaiting:
|
|
if str(pkt.wlan.fc_type_subtype) == "0x002c" and str(pkt.wlan.fc_pwrmgt) == '0':
|
|
# print(f"PASSED:QOS Null Function frame with pwr mgt 0 is seen {pkt.number}")
|
|
# allure.attach(name="QOS Null Function",body=str(f"PASSED:QOS Null Function frame with pwr mgt 0 is seen {pkt.number}"))
|
|
data_packet = True
|
|
continue
|
|
|
|
if str(pkt.wlan.fc_type_subtype) == "0x002c" and str(pkt.wlan.fc_pwrmgt) == '1':
|
|
# print("WARNING:QOS Null function with pwr mgt bit 1 without QOS data being transmitted ")
|
|
check_unicast = False
|
|
traffic_awaiting = False
|
|
data_packet = False
|
|
continue
|
|
|
|
if str(pkt.wlan.fc_type_subtype) == "0x002c" and str(pkt.wlan.fc_pwrmgt) == '0':
|
|
# print("WARNING:QOS Null function with pwr mgt bit 0 without QOS data being transmitted ")
|
|
check_unicast = False
|
|
traffic_awaiting = False
|
|
data_packet = False
|
|
continue
|
|
|
|
if data_packet:
|
|
if str(pkt.wlan.fc_type_subtype) == "0x0028":
|
|
if str(pkt.wlan.ta) == self.ap_mac and str(pkt.wlan.da) == self.sta_mac:
|
|
QOS_data_pkt_count=True
|
|
if str(pkt.wlan.fc_moredata) == "1":
|
|
data_packet=True
|
|
elif str(pkt.wlan.fc_moredata) == "0":
|
|
check_unicast = False
|
|
traffic_awaiting = False
|
|
data_packet = False
|
|
continue
|
|
# print(f"PASSED:Unicast Packet Transmitted after client came from powersave {pkt.number}")
|
|
# allure.attach(name="PASSED", body=str(
|
|
# f"Unicast Packet Transmitted after client came from powersave,packet Number {pkt.number}"))
|
|
# break
|
|
|
|
elif str(pkt.wlan.fc_type_subtype) == "0x0028":
|
|
if str(pkt.wlan.ta) == self.ap_mac and str(pkt.wlan.da) == self.sta_mac:
|
|
QOS_data_pkt_count=True
|
|
print(f"FAILED:Unexpected unicast data packet in {pkt.number}")
|
|
result_data = True
|
|
# pass
|
|
# print(f"FAILED:Unexpected unicast data packet in {pkt.number}")
|
|
allure.attach(name="FAILED",
|
|
body=str(f"Unexpected unicast data packet in capture, packet number {pkt.number}"))
|
|
|
|
if not QOS_data_pkt_count:
|
|
result_data=True
|
|
allure.attach(name="FAILED",body="QOS Data packets sent by the AP are not found in the capture for unicast traffic validation")
|
|
|
|
allure.attach.file(source=self.pcap_file, name="pcap_file", attachment_type=allure.attachment_type.PCAP)
|
|
return result_data
|
|
|
|
def start_station_profile(self):
|
|
self.station_profile.admin_up()
|
|
|
|
def stop_station_profile(self):
|
|
self.station_profile.admin_down()
|
|
|
|
def stop_monitor(self):
|
|
# switch off new monitor
|
|
self.new_monitor.admin_down()
|
|
|
|
def start_layer3(self):
|
|
# self.cx_prof_upload.start_cx()
|
|
self.cx_prof_download.start_cx()
|
|
|
|
def stop_layer3(self):
|
|
# self.cx_prof_upload.stop_cx()
|
|
self.cx_prof_download.stop_cx()
|
|
|
|
def cleanup_station_profile(self):
|
|
self.station_profile.cleanup(desired_stations=self.sta_list)
|
|
|
|
def cleanup_layer3(self):
|
|
self.cx_prof_download.cleanup()
|
|
self.cx_prof_upload.cleanup()
|
|
|
|
def cleanup_monitor(self):
|
|
self.new_monitor.cleanup()
|
|
|
|
def unicast_download_testing(self,cleanup=True):
|
|
self.enable_unicast_testing = True
|
|
self.station_profile.cleanup(desired_stations=self.sta_list)
|
|
self.station_profile.local_realm.remove_all_cxs(remove_all_endpoints=True)
|
|
self.build_station_profile() # function to build station profile
|
|
channel_info = self.get_channel()
|
|
self.build_monitor(channel_info) # function to create monitor
|
|
self.build_layer3_download() # function to build unicast download traffic
|
|
|
|
self.start(channel_info) # function to start sniff by admin up station followed by /
|
|
# starting the unicast traffic with desired pdu size for some duration
|
|
if cleanup:
|
|
self.unicast_testing_stop_and_cleanup()
|
|
|
|
def unicast_testing_stop_and_cleanup(self):
|
|
self.new_monitor.admin_down()
|
|
self.cx_prof_download.stop_cx()
|
|
self.station_profile.admin_down()
|
|
|
|
self.new_monitor.cleanup()
|
|
self.cx_prof_download.cleanup()
|
|
self.station_profile.cleanup(desired_stations=self.sta_list)
|
|
|
|
|
|
def main():
|
|
# Realm.create_basic_argparse defined in lanforge-scripts/py-json/LANforge/lfcli_base.py
|
|
parser = Realm.create_basic_argparse(
|
|
prog='lf_power_save_test_cases_cisco.py',
|
|
formatter_class=argparse.RawTextHelpFormatter,
|
|
epilog='''\
|
|
lf_power_save_test_cases_cisco.py
|
|
|
|
''',
|
|
description='''\
|
|
Example of creating traffic on an l3 connection
|
|
''')
|
|
|
|
parser.add_argument('--monitor_radio', help="--monitor_radio radio to be used in monitor creation",
|
|
default="wiphy1")
|
|
parser.add_argument('--report_path', help="desired path to save your pcap file fetched from lanforge through ssh",
|
|
default="/home/mahesh/Desktop/lanforge-scripts/lanforge-scripts/py-scripts")
|
|
parser.add_argument('--mcast_min_rate', help="value for multicast minimum rate in kbps", type=int, default=9000)
|
|
parser.add_argument('--mcast_max_rate', help="value for multicast maximum rate in kbps", type=int, default=128000)
|
|
|
|
parser.add_argument('--side_a_unicast_min_rate', help="value for multicast maximum rate in kbps", type=int,
|
|
default=9000)
|
|
parser.add_argument('--side_b_unicast_min_rate', help="value for multicast maximum rate in kbps", type=int,
|
|
default=9000)
|
|
parser.add_argument('--side_a_unicast_max_rate', help="value for multicast maximum rate in kbps", type=int,
|
|
default=128000)
|
|
parser.add_argument('--side_b_unicast_max_rate', help="value for multicast maximum rate in kbps", type=int,
|
|
default=128000)
|
|
parser.add_argument('--test_duration', help='duration of the test eg: 30s, 2m, 4h', default="5m")
|
|
|
|
parser.add_argument('--pdu_size', help="pdu size in bytes", type=int, default=1400)
|
|
|
|
args = parser.parse_args()
|
|
|
|
lfjson_host = args.mgr
|
|
lfjson_port = 8080
|
|
station_list = LFUtils.portNameSeries(prefix_="sta", start_id_=0, end_id_=0, padding_number_=10000)
|
|
ip_powersave_test = UnicastPowersaveTraffic(lfjson_host, lfjson_port, ssid=args.ssid,
|
|
security=args.security,
|
|
password=args.passwd, station_list=station_list,
|
|
min_rate_multi_cast=args.mcast_min_rate,
|
|
max_rate_multi_cast=args.mcast_max_rate,
|
|
side_a_unicast_min_rate=args.side_a_unicast_min_rate,
|
|
side_b_unicast_min_rate=args.side_b_unicast_min_rate,
|
|
side_a_unicast_max_rate=args.side_a_unicast_max_rate,
|
|
side_b_unicast_max_rate=args.side_b_unicast_max_rate,
|
|
pdu_size=args.pdu_size,
|
|
station_radio=args.radio,
|
|
upstream=args.upstream_port,
|
|
monitor_radio=args.monitor_radio,
|
|
test_duration=args.test_duration,
|
|
interface_to_capture=None,
|
|
_debug_on=args.debug, remote_host_cap_ip=None,
|
|
remote_host_cap_interface=None,
|
|
report_path=args.report_path,
|
|
output_file_for_cap="/home/lanforge",
|
|
_exit_on_error=True, _exit_on_fail=True)
|
|
|
|
#ip_powersave_test.unicast_download_testing() # function to run unicast test
|
|
|
|
#captured_file_name, local_dir, filter = ip_powersave_test.get_captured_file_and_location() # function returns captured_file_name along \
|
|
# with location of local directory where the \
|
|
# captured file is pulled
|
|
|
|
# below function should be executed along with multicast_testing or unicast_testing if we wish to disect captured file.
|
|
#ip_powersave_test.verify_unicast_pcap(local_dir + '/' + captured_file_name,
|
|
# apply_filter=filter)
|
|
|
|
# below function can be run solely without calling above functions to disect multicast packets \
|
|
# if we have ready packet captured file to test dtim_multicast
|
|
|
|
# ip_powersave_test.verify_dtim_multicast_pcap("/home/mahesh/Documents/moni0-2022-02-17-170018.pcap",
|
|
# apply_filter="wlan.addr==04:f0:21:94:1e:4d || wlan.addr==3C:37:86:13:81:60")
|
|
|
|
# ''' UNICAST TEST FUNCTIONS'''
|
|
# ip_powersave_test.verify_unicast_pcap(
|
|
# "/home/mahesh/Desktop/powersave_unicast_sta_wiphy1_sniff_wiphy3_AX210_tb1_36.pcapng",
|
|
# apply_filter="wlan.addr == 04:f0:21:ad:82:8f || wlan.addr == 68:7d:b4:60:04:be")
|
|
|
|
ip_powersave_test.verify_unicast_pcap(
|
|
"unicast_test_1.pcapng",
|
|
apply_filter="wlan.addr==10:f9:20:fd:e2:0b||wlan.addr==a8:93:4a:df:b0:3b")
|
|
|
|
# wlan.fc.type_subtype != 5 to avoid probe responses which is not having TIM which might gonna break script
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|