Visualizations and Correlations in Troubleshooting
|
|
|
- Helena Waters
- 9 years ago
- Views:
Transcription
1 Visualizations and Correlations in Troubleshooting Kevin Burns Comcast 1
2 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional Area Networks Metro Ethernet Services National Data Center Digital Voice Services (CDV) Domain Name / DHCP Services Product Engineering / Development Home Services (TV, Internet, Security) Business / Commercial Services (L2VPN, MPLS, etc) 2
3 How Do It Know??? HINT: It don t. Computers only know as much as YOU do. We can only apply what WE know. How do we get from I don t know to solving the problem?? \_(ツ)_/ 3
4 Why am I talking about Visualization? Troubleshooting is more of an art than a science. This presentation is about how I describe my own art. Everyone will develop their own art (ie: methodologies). Nobody can teach you this. They can only help you learn to how to incorporate ideas and techniques into your own art. A lot can be gained from looking at different types of thinking and methods to incorporate into your own set of tools and techniques. Visualizing problems is the most common process people are involved in during a troubleshooting effort. To be a successful problem solver you need to understand how the components of visualization fit together. 4
5 Understanding Visualization Components In order to visualize a problem we must: Be able to recognize how a problem manifests itself to it s users, engineers and inside of packet captures. Categorize the problem based on it s manifestation behavior to users and protocol interactions Determine what technical indicators exist that allow us to correlate information to visualize the problem. Understand the impact of various technical indicators. The goal of visualization is to determine how a problem manifests itself and correlate it s technical indicators to produce a diagnosis. Visualization is about seeing and recognizing patterns on several different levels. Problem solving is about utilizing visualization techniques to resolve an issue. 5
6 Components of Visualization Problem Manifestation The outward or perceptible indication of a problem. Determine how the problem manifests inside of a packet capture. Categorize of the problem and it s behavior. Technical Indicators Characteristics of a problem s manifestation. Identify a problem s technical indicators Correlation Correlation of various technical indicators. Correlate technical indicators with a problem s manifestation Look for repeatable patterns. Diagnosis The foundation of a definitive diagnosis is based on correlation of a problem s manifestation and it s technical indicators. 6
7 Problem Solving Cycle Technical Indicators Problem Manifestation INFORMATION Correlation You will iterate around this cycle many times as new information is gathered. Diagnosis 7
8 Problem Manifestation How is it known the problem exists? How is the problem viewed? By users By engineers By management In packets What technical indicators does the problem manifest itself through? Retransmissions Time-outs, Delays Application Messages What tools can help you uncover more methods of how the problem manifests itself? What techniques can you use to look for patterns? Often different perspectives (at first) Understand how different technical indicators relate to impact!! 8
9 Problem Categorization by OSI Model Problems will manifest themselves in one or more layers of the OSI Model. Problems are almost always isolated to a single layer. The first and most important step in troubleshooting is to determine what layer of the OSI model the problem lives in. If you don t want to understand the OSI model at least understand the protocol dependancies you are dealing with OSI teaches us about dependancies, that is why it s useful. Application Presentation Session Transport Network Data Link Physical 9
10 Problem Categorization by Type Loss of Connectivity Complete and total loss of end to end connectivity at one or more layers. Application failures, TCP Resets, Ping failures Intermittent Connectivity Inconsistent end to end connectivity at one or more layers. Dropped packets, sessions Degraded Performance End to end connectivity is good but performance over the connection is suffering Low Throughput, Latency impact Unknown Technical indicators are unknown (concentrate on changes in state). 10
11 Case Study: Manifestation of Server Delay Application Remedy Ticketing System Symptoms User experiencing minute long delays when performing lookups. Network path appears to be clean. No loss or latency. Manifestation Problem manifests as delay Delay is obvious in the packets 11
12 Case Study: Manifestation of Server Delay What do you see as the manifestation of the problem? Does it correlate with the user experience? 12
13 Client to Server Visualization Why is there a 79 second pause between the client request and server response? Take note of the TCP Delayed ACK as well. Visualization Techniques: Protocol Decode (forced to RPC) TCP SEQ+LEN=ACK Application Transaction ID Column Technical Indicators: TCP ACK TCP Delayed ACK Application Delay 13
14 Server to Backend DB Visualization Technical Indicators: Delay TCP SEQ+LEN=ACK Application Request/Response Behavior Why does the Remedy Server stop talking to the Database for 59 seconds after ACKing all responses??? 14
15 Correlation of Client/Server Visualizations Client Remedy Server Database Server Sport: EPH Dport: 1605 RPC Call Client IP: Server IP: Dport: EPH Sport: 1605 TCP ACK Client IP: Server IP: ms Sport: EPH Dport: 1521 DB REQUEST Client IP: Server IP: Sport: 1521 Dport: EPH DB RESPONSE Client IP: Server IP: sec Sport: EPH Dport: 1521 DB REQUEST 79 sec Client IP: Server IP: Dport: EPH Sport: 1605 RPC REPLY Client IP: Server IP: Sport: 1521 Dport: EPH DB RESPONSE Client IP: Server IP:
16 What are Technical Indicators? Assuming the correct packets have been captured, the problem will always exist inside of the packets. Technical Indicators are feedback mechanisms found in packet communications. (sometimes you really have to dig for them) They are not symptoms. I tend to avoid using the word symptom as people tend to associate it with being the cause. Problems will exist inside of packets in several ways Explicit packet feedback mechanisms Implicit packet feedback mechanisms Extrapolated Data and Measurements Behavior and Relationship Based (Correlation) 16
17 Feedback Mechanisms Asssuming the correct packets have been captured, the problem will always exist inside of the packets. Problems will exist inside of packets in several ways Explicit packet feedback mechanisms: TCP (FIN, RST) Application Messages ICMP return types/codes. Implicit packet feedback mechanisms: Timing Behavior Other Correlative Factors Extrapolated Data and Measurements Latency Throughtput Examples, Behavior, Relationships Complexity Increases 17
18 Explicit Feedback Mechanisms Application Gives Up! Technical Indicators: Explicit: Application Feedback Implicit: Timing (Delay) Why is TCP waiting 3 seconds to retransmit the first lost segment? 18
19 Implicit Feedback Mechanisms Technical Indicators: Why did.32 not Fast Retransmit after receiving 3 duplicate ACKs? Explicit: TCP Retransmission Implicit: Timing (Delay) Why did.32 wait 200ms before retransmitting the Behavior (not Fast Retransmitting) lost segment? 19
20 Extrapolated Data & Measurements Technical Indicators: Lost Packets and TCP Retransmissions Packet Loss = (.3%) 20
21 Finding Round Trip Latency Technical Indicators: Timing (Round Trip Time) Round Trip Latency = 49ms Sorting by Delta Time lets us see the round trip latency!! 21
22 Throughput Measurement Maximum throughput with a TCP window of 64 KByte and RTT of 49.0 ms <= Mbit/sec. Throughput is at 70% of theoretical max using 64K Buffers Window scaling is enabled. Shouldn t it have more TCP tx buffers to use? 22
23 Useful Technical Indicators Timing Based Delta Time Latency / Delay measurements Relative Time Throughput and Response Times Absolute Time Correlation to log files TCP Based SYN, FIN, Reset Retransmissions & Out of Order Packets ACKs: Dup, Triple, Delayed, SACK Windowing: Window Size & Window Full Messages Application Based Transaction ID s Control Messages Open, Close, Abort Measurements Service Response Time Latency & Throughput Other Delay 23
24 Measurement Techniques Standard Columns Delta Time: Sorting to find latency Relative Time: Find request/response delays Custom Columns IP: ip.ttl, ip.id TCP: tcp.seq, tcp.ack, tcp.len, tcp.options.sack Application Specific (transaction/message IDs) Service Response Times Use to find application delays Expert Best used to look for TCP behavior (reactions to conditions on the wire) 24
25 Protocol Layer Techniques IP Based Use TTL column to visualize packet flow through routers Use IPID column to visualize packet loss. ICMP Based Destination Unreachable (Fragmentation, TTL, ACL s, Host) TCP Based Out of Order Packets: Look for SACKs in opposite direction. Indicates possible packet loss or network queuing or asynchronous routing issues. ACK: Useful to prove a request arrived at a destination Dup ACKs: Triple Dup ACKs indicate host not using Fast Retransmit algorithm. Delayed ACKs: Indicates TCP waiting for an application. Windowing: Full windows may indicate application problems or lack of TCP buffering (scaling needed). 25
26 Case Study: Assisting the Manifestation Process Application Radius authentication was suffering due to perceived packet loss Symptoms WIFI clients were unable to authenticate through a specific site/router Network path appears to be clean. No obvious loss or latency. Manifestation Problem manifests as loss of connectivity Location of problem local to a single site. 26
27 Case Study: Radius Authentication Failures How do we find and visualize packet loss? 27
28 Case Study: Visualize Sessions Technical Indicator Number of packets in each session. Technique Use Columns to Visualize Sessions 28
29 Case Study: Filter to Single Session Notice the 2 second delays manifest themselves after packets are filtered down to a single session! 29
30 Case Study: Visualization of Packet Loss IPID=53855 routed successfully (TTL -1 ) Technique Use IP ID and TTL to track packet flow through a router TTLs allow us to see packet loss inside of the router. IPID=56388 is never shown with TTL=254 30
31 Case Study: Correlating for Visibility 2 sec application recovery Recovery packet dropped Technique Correlation of data from different columns in Wireshark allows us to visualize the packet loss inside the router and the attempts by the application to recover from it. 31
32 Extrapolation Techniques Application Based Always attempt to decode the application layer. Look for hints in the packet hex bytes that may indicate what the protocol is. Look for explicit messages that indicate application behavior or reactions to conditions on the wire. Find protocol fields that allow you to track requests and responses. Associate application messages and behavior to reactions and recovery mechanisms in the transport layer (ie: TCP). 32
33 Case Study: Manifestation of Server Delay Application Performance degredation with database transactions. Symptoms Transactions which should take less than one second are taking up to (5) seconds causing the application to disconnect. Network path appears to be clean. No obvious loss or latency. Manifestation Problem manifests as delay Location of Delay uncertain. 33
34 Case Study: Slow Database Transactions Technical Indicators: Expert shows no obvious or relevant indicators found. 34
35 Case Study: Slow Database Transactions Technique Look in Hex Data for a hint on what the protocol may be. 35
36 Case Study: Slow Database Transactions Technical Indicators (after protocol forcing to LDAP) LDAP Bind Time is very slow. 36
37 Case Study: Slow Database Transactions Why does it take the LDAP server nearly 5 seconds to respond to the Bind request?? 37
38 Case Study: Manifestation of Client Delay Application UNIX servers and VMs. Symptoms UNIX admins are reporting very slow response times running SUDO level commands. Network path appears to be clean. No obvious loss or latency. Manifestation Problem manifests as delay Location of Delay uncertain. 38
39 Case Study: Sudo Command Slow 39
40 Case Study: Sudo Command Slow Technical Indicators Large delay seen in delta time Sorting by Delta Time manifests obvious delays! 40
41 Case Study: Sudo Command Slow Technical Indicators LDAP Unbind Time is very slow. Client waits 97 seconds before unbinding the LDAP connection. 41
42 What is Correlation? The goal of correlation is to map the problem s method of manifestation to what is happening in the packets!! The process of correlating technical indicators must be understood, you cannot automate anything you have never done manually. You need to understand the protocols and the tools, know how Wireshark thinks!!! The Network is Slow! Technical Indicators Problem Manifestation INFO Correlation Diagnosis 42
43 Correlation Best Practices The correlation process starts by understanding how a problem manifests itself. Get as much information from the users and technical staff as possible. Ask how it is known the problem actually exists. Always analyze from the client s perspective first. Look for small patterns that can represent the problem as a whole. A complex problem can often be represented by 10 packets or less. Visualize and understand requests and responses. Be the app!! You cannot automate this part unless you understand how to do it manually. Understand the relationship between different technical indicators. Use visualization techniques for large amounts of packets. Graphs, expert, column sorting. 43
44 Packet Based Correlations Technical Indicators TCP Reset Delay (delta time) TCP Reset correlates to a 1 second time out! 44
45 Behavior Based Correlations Technical Indicators TCP SEQ-ACK-LEN Relative Time TCP columns allow us to prove all keepalives were received yet the application still times out after 10 seconds and closes the connection. 45
46 Data Extrapolation Revisited 7Mb/sec with.3% packet loss 46
47 Measurement Based Correlations Correlation of Bytes in Flight and Receiver Window Size indicates inefficient use of available receiver buffers but why? 47
48 Measurement Based Correlations Can you spot the correlation that visualizes the problem? 48
49 Correlation Techniques Know where the analyzer is Use TTL value to determine the location of packet collection Identify Client and Server Always analyze from the perspective of the client first Identify Requests and Responses Important to be able to measure transaction times and understand application behavior. Associate Packets to Process Look for manifestation behavior in the packets Utilize hex data to learn more about the application Look for obvious timing indicators that can be correlated with behavior. Common timers are: 1, 2, 5, 10, 30,60,120 (seconds) Reduce the scope of the problem to as few packets as possible. Concentrate on single sessions. 49
50 Useful Visualizations 50
51 TCP Sequence and Acknowledgements Sender (Sequence + Length) = Receiver ACK Number SEQ(1) + LEN(8) = ACK(9) TCP sequence, acknowledgement, and length fields are invaluable at proving a packet arrived at a destination. 51
52 TCP Session Visualization 52
53 TCP Selective Acknowledgements Filtering on TCP Selective Acknowledgement packets allows us to see the manifestation of unidirectional packet loss 53
54 IP Identification Field Filtering on a single direction and sorting by the IP ID field allows us to visualize unidirectional packet loss. 54
55 Validation using IP Identification Wireshark is confused by duplicate packets and thinks there are DUP ACKs and Retransmissions occurring. IP ID field allows us to see the duplicate IP packets. 55
56 Case Study: Bad TCP Stack Application Web Server admins complaining about drop in throughput due to packet loss Symptoms Throughput was perceived as being overly impacted due to packet loss Network path tested out as clean. No obvious loss or latency. Extremely minor levels of packet loss were seen (<.1%) Manifestation Problem manifests as performance degradation Issues appeared to be localized to a single hosting site 56
57 Case Study: Bad TCP Stack Round Trip Time is roughly 52-60ms Web Server does not support TCP Selective Acknowledgements 57
58 Case Study: Bad TCP Stack (Expert) 58
59 Case Study: Web Server Bad RTO 262ms before retransmitting the lost segment?? 59
60 Case Study: Bad Web Server Performance Web Server does not appear to react very well to any level of packet loss 60
61 How should TCP recover from packet loss? TCP should enable and use SACK to send/receive better feedback about performance. Retransmissions should occur as close to the RTT as possible. 61
62 Good TCP Recovery vs Bad TCP Recovery Good Web Server transmits bytes at RTT (44ms) during recovery Bad Web Server only transmits 7678 bytes at RTT (60ms) during recovery 62
63 Good TCP Recovery Visualization (I/O Graph) RTT is barely visible in the delta time since recovery ramps up quickly. 63
64 Bad TCP Recovery Visualization (I/O Graph) RTT is very visible during a very inefficient recovery. 64
65 Bad TCP Stack Recovering with Slow Start Bad TCP stack using slow start instead of congestion control after packet loss. 65
66 Thank You!! Questions? (feel free to me at 66
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data
Pig Laboratory This laboratory is dedicated to Hadoop Pig and consists of a series of exercises: some of them somewhat mimic those in the MapReduce laboratory, others are inspired by "real-world" problems.
Network Probe. Figure 1.1 Cacti Utilization Graph
Network Probe Description The MCNC Client Network Engineering group will install several open source network performance management tools on a computer provided by the LEA or charter school to build a
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Chapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
Mike Canney. Application Performance Analysis
Mike Canney Application Performance Analysis 1 Welcome to Sharkfest 12 contact Mike Canney, Principal Network Analyst, Tektivity, Inc. [email protected] 319-365-3336 www.getpackets.com 2 Agenda agenda
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Mike Canney Principal Network Analyst getpackets.com
Mike Canney Principal Network Analyst getpackets.com 1 My contact info contact Mike Canney, Principal Network Analyst, getpackets.com [email protected] 319.389.1137 2 Capture Strategies capture Capture
T2-6: Trace File Analysis - The Elephant Coming From Behind: Full Window, Window Update and TCP Keep-Alive s
T2-6: Trace File Analysis - The Elephant Coming From Behind: Full Window, Window Update and TCP Keep-Alive s Laura Chappell Founder Wireshark University Betty DuBois Principal Consultant DuBois Training
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
Measuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Networking part 3: the transport layer
Networking part 3: the transport layer Juliusz Chroboczek Université de Paris-Diderot (Paris 7) September 2011 Summary of the previous episodes Episode 1: switching, packet switching and the Internet.
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
CS551 End-to-End Internet Packet Dynamics [Paxson99b]
CS551 End-to-End Internet Packet Dynamics [Paxson99b] Bill Cheng http://merlot.usc.edu/cs551-f12 1 End-to-end Packet Dynamics How do you measure Internet performance? Why do people want to know? Are ISPs
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Successful DB2 NETLOGON in LAB (Sniffer on LAB HUB)
Troubleshooting Analysis for Windows 2000 Active Directory Authentication Problem Overview Servers DB1 & DB2 are configured with clustering (DB1 is active and DB2 is backup). The PDC (server NT9) is connected
Non-intrusive, complete network protocol decoding with plain mnemonics in English
The Triple Play Analysis Suite - DATA The Triple Play Analysis Suite - Data are meant for emulating the client s application such as FTP downloading or Web Browser testing at the termination point of DSL
Sample Network Analysis Report
Sample Network Analysis Report Report Information Report created on 1/9/2014 9:35:19 PM. Analyst Information Name Sample Analysis Report E-mail Address [email protected] Phone Number 408-378-7841 Client
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Transport layer protocols for ad hoc networks
Transport layer protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: [email protected] http://www.cs.tut.fi/kurssit/tlt-2616/ Which transport layer protocol? Classification of transport
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Troubleshooting Tips and Tricks
Troubleshooting Tips and Tricks for TCP/IP Networks June 16, 2011 Laura Chappell Founder Chappell University/Wireshark University [email protected] SHARKFEST 11 Stanford University June 13 16, 2011 The
First Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
Congestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Understanding and Configuring NAT Tech Note PAN-OS 4.1
Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES
TFTP - Trivial File TFTP Transfer Protocol TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES Peter R. Egli INDIGOO.COM 1/10 Contents
IP Office Technical Tip
IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience
High Speed Internet Access Using Satellite-Based DVB Networks
High Speed Internet Access Using Satellite-Based DVB Networks Nihal K. G. Samaraweera and Godred Fairhurst Electronics Research Group, Department of Engineering University of Aberdeen, Aberdeen, AB24 3UE,
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
How To Understand The Internet From A Telephone To A Computer (For A Computer)
Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
2 TCP-like Design. Answer
Homework 3 1 DNS Suppose you have a Host C, a local name server L, and authoritative name servers A root, A com, and A google.com, where the naming convention A x means that the name server knows about
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks
TCP/IP Optimization for Wide Area Storage Networks Dr. Joseph L White Juniper Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
isco Troubleshooting Input Queue Drops and Output Queue D
isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco
MEASURING WIRELESS NETWORK CONNECTION QUALITY
Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series
TCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents Chapter 1 ARP Configuration Commands... 1-1 1.1 ARP Configuration Commands... 1-1 1.1.1 arp static... 1-1 1.1.2 arp timer aging... 1-2 1.1.3 debugging arp packet...
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
THE UNIVERSITY OF AUCKLAND
COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.
Application-Centric Analysis Helps Maximize the Value of Wireshark
Application-Centric Analysis Helps Maximize the Value of Wireshark The cost of freeware Protocol analysis has long been viewed as the last line of defense when it comes to resolving nagging network and
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING
CHAPTER 1 PRINCIPLES OF NETWORK MONITORING Jawwad Shamsi and Monica Brocmeyer Department of Computer Science, Wayne State University 5143 Cass Avenue, 431 State Hall, Detroit, MI 48202, USA E-mail:{ jshamsi,
netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description [email protected] http://www.kaksonetworks.it/ A lab showing
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
