Files
platform-external-webrtc/rtc_tools/network_tester
Danil Chapovalov 431abd989b Replace rtc::Optional with absl::optional in test and rtc_tools
This is a no-op change because rtc::Optional is an alias to absl::optional

This CL generated by running script with parameters 'test rtc_tools'

find $@ -type f \( -name \*.h -o -name \*.cc \) \
-exec sed -i 's|rtc::Optional|absl::optional|g' {} \+ \
-exec sed -i 's|rtc::nullopt|absl::nullopt|g' {} \+ \
-exec sed -i 's|#include "api/optional.h"|#include "absl/types/optional.h"|' {} \+

find $@ -type f -name BUILD.gn \
-exec sed -r -i 's|"(../)*api:optional"|"//third_party/abseil-cpp/absl/types:optional"|' {} \+;

git cl format

Bug: webrtc:9078
Change-Id: Ibb43c737f4c45fe300736382b0dd2d8ab32c6377
Reviewed-on: https://webrtc-review.googlesource.com/83944
Reviewed-by: Patrik Höglund <phoglund@webrtc.org>
Commit-Queue: Danil Chapovalov <danilchap@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#23642}
2018-06-18 13:15:23 +00:00
..

This file explains how to run the network tester and how to analyze the results.

create config files
===================
use create_network_tester_config.py  to create config files.
you can add or change the AddConfig call in the main function to create a
the desired network config.

run network_tester_server
=========================
place the network config file next to the server binary and name it
"server_config.dat".

the network_tester_server should run on a server with a public IP address.

the log file of network_tester_server will be created next to the binary with
the name "server_packet_log.dat"


run NetworkTesterMobile (apk)
=============================
change the IP and the port in the jni.cpp file and set it to the port and IP
you run the network_tester_server on.

place the network config file as "/mnt/sdcard/network_tester_client_config.dat"
on the tester android phone.

The log file of network_tester_server will be created at
"/mnt/sdcard/network_tester_client_packet_log.dat"


analyze the results
====================
run "python parse_packet_log.py -f <log_file_to_parse>" to analyze the
log results.