Customer Cases
Pricing

How to Enhance Performance Tests with Custom Network Scenarios

LEARN HOW TO CREATE CUSTOM NETWORK SCENARIOS TO ENHANCE YOUR PERFORMANCE TESTING AND IMPROVE YOUR APPLICATION'S USER EXPERIENCE

Why Customize Network Scenes?

Customizing network scenes allows you to simulate different network conditions, such as latency, delay jitter, packet loss, bandwidth limitations, and more. By testing your application under these varied conditions, you can identify potential performance issues and optimize your application accordingly.

Two Ways to Customize Network Scenarios

PerfDog offers two methods to set up customized network scenarios:

1. Scene Template: This method automatically generates corresponding parameters based on the selected region and scene.

2. Custom Template: This method requires manual input of each network parameter.

Scene Template

The scene template consists of two sections

1. Region and Network Type: After selecting the desired region and network type, PerfDog provides information on delay and packet loss rate. This data simulates network conditions between different regions.

2. Scene: Each scene corresponds to different weak network parameters, simulating specific network environments.

Custom Template

The custom template allows you to manually control various network parameters:

1. Network Bandwidth: This parameter controls the upstream and downstream network speed and the length of the statistical IP packet. The unit used is kilobits per second, equivalent to 125 bytes per second.

2. Network Delay: This parameter adds a fixed delay to upstream and downstream IP packets, measured in milliseconds.

3. Delay Jitter: This parameter allows you to set two variables for uplink and downlink, namely delay and probability. The probability parameter determines the likelihood of the delay taking effect, while the delay parameter increases the maximum value of delay.

4. Random Packet Loss: This parameter sets the probability of random discarding of upstream and downstream IP packets.

5. Weak Network Type: This parameter includes "complete packet loss" and "Burst," two different weak network models. You can specify the release duration and weak network duration, which determine when the weak network model takes effect.

6. Protocol Control: This parameter ensures that only the IP packets of the selected protocol will be affected by the weak network parameters, while the rest will be forwarded directly.

7. Weak Network IP: This parameter allows you to specify that only IP packets sent to or from the filled-in IP will be affected by the weak network parameters, while packets from other sources will be forwarded directly.

PD网络测试推广
Latest Posts
1WeTest at GDC 2026: AI Automated Testing Ushers in a New Era of Game Quality WeTest at GDC 2026 showcases a revolutionary AI Automated Testing Solution that transforms game quality assurance. Learn how WeTest's AI Test Agent Platform enables scalable quality production through computing power, delivering controllable, reproducible, and intelligent testing capabilities.
2Precision Testing in Practice: A Fund Team's Journey from Experience-Based to Data-Driven Quality Assurance Learn how Shenwanhongyuan Securities implemented precision testing to reduce regression testing by 67%. This technical guide covers JaCoCo implementation, method-level code mapping, and intelligent test case recommendation for financial services applications.
3How to Do Performance Test Monitoring: Key Metrics & Tuning Tips Learn how to do performance test monitoring effectively. Discover key metrics (RT, TPS, IOPS), identify CPU/memory/database bottlenecks, and follow step-by-step tuning tips for stable, efficient systems.
4The Ultimate Guide to AI Agent Performance Testing Learn comprehensive AI Agent performance testing strategies, environment setup, tool selection, and optimization techniques. Master how to ensure stability and efficiency in production.
5LLM Security Testing in ToB Scenarios: A Practical Guide & Framework Explore the unique security risks of LLMs in ToB scenarios, including prompt injection and system prompt leakage. Learn about the 'llm-safe-test' framework and how to automate safety judgment for enterprise AI applications.