Network Troubleshooting



Similar documents
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Computer Networks I Laboratory Exercise 1

Sample Configuration Using the ip nat outside source static

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Lab - Mapping the Internet

Instructor Notes for Lab 3

Internetworking. Problem: There is more than one network (heterogeneity & scale)

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Network Pop Quiz 5 Brought to you by please visit our site!

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Application Performance Analysis and Troubleshooting

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

NETWORK LAYER/INTERNET PROTOCOLS

Troubleshooting Tools

Lecture Computer Networks

Operating Systems and Networks Sample Solution 1

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Infrastructure Measurement: Challenges and Tools

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

CCProxy. Server Installation

Technical Support Information Belkin internal use only

IMPLEMENTING VOICE OVER IP

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

Deploying in a Distributed Environment

Effect of Windows XP Firewall on Network Simulation and Testing

IP - The Internet Protocol

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

Avaya ExpertNet Lite Assessment Tool

Network Layer: Network Layer and IP Protocol

Traceroute The Internet s Diagnostic Tool

Final for ECE374 05/06/13 Solution!!

Homework 3 TCP/IP Network Monitoring and Management

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

Additional Information: A link to the conference website is available at:

CHAPTER 1 PRINCIPLES OF NETWORK MONITORING

Lab PC Network TCP/IP Configuration

BOB BuchanAN, The NETWORK JERNAL 1.1

Using IPM to Measure Network Performance

Performance Evaluation of Linux Bridge

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

PictureTel H.323 Videoconferencing Network Bandwidth Analysis

Layered Architectures and Applications

Computer Networks CS321

Sample Configuration Using the ip nat outside source list C

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

1 PC to WX64 direction connection with crossover cable or hub/switch

File transfer and login using IPv6, plus What to do when things don t work

REMOTE MONITORING MATRIX

NQA Technology White Paper

Hands On Activities: TCP/IP Network Monitoring and Management

IST 220 Honors Project. Subnets with Variable Length Subnet Masks

LAB THREE STATIC ROUTING

How To Understand and Configure Your Network for IntraVUE

Visualizations and Correlations in Troubleshooting

Internet Architecture and Philosophy

Policy Based Forwarding

Guideline for setting up a functional VPN

z/os V1R11 Communications Server system management and monitoring

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

The Internet and Its Uses

Network layer: Overview. Network layer functions IP Routing and forwarding

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Network Configuration Example

Configuring Static and Dynamic NAT Simultaneously

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Exam 1 Review Questions

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

MANAGING NETWORK COMPONENTS USING SNMP

Networking Systems (10102)

Question: 3 When using Application Intelligence, Server Time may be defined as.

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Firewall Stateful Inspection of ICMP

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Chapter 2 Lab 2-2, EIGRP Load Balancing

Internet Packets. Forwarding Datagrams

Ring Local Area Network. Ring LANs

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

IP Routing Configuring Static Routes

SSVP SIP School VoIP Professional Certification

Ethernet Service OAM. Standards and Functionality. Connectivity Fault Management (CFM) Fault Detection. White Paper

RARP: Reverse Address Resolution Protocol

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

WHITE PAPER September CA Nimsoft For Network Monitoring

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

First Midterm for ECE374 02/25/15 Solution!!

Network Layer: Address Mapping, Error Reporting, and Multicasting

1.0 Basic Principles of TCP/IP Network Communications

Network Simulation Traffic, Paths and Impairment

Transcription:

Network Troubleshooting by Othmar Kyas 18 Testing Network Performance An Agilent Technologies Publication Agilent Technologies

Testing 18 Network Performance It is a capital mistake to theorize before one has data. SIR ARTHUR CONAN DOYLE Unsatisfactory network performance is a major problem that occurs continually in data networks. Because the causes of this condition can vary widely, it is very important to supplement such terms as a slow network, a slow server, or long response times with objective measurements. The two crucial parameters to be determined are data throughput and response time. The first step in determining the network performance is to analyze the structure of the applications in use. Application architectures can be divided into three main categories: Peer-to-peer (Level 1) Client-server (Level 2) Client to primary application server and secondary data/application servers (Level 3) While no dedicated server is involved in peer-to-peer communication (for example, file transfer between two network nodes), a Level 3 application architecture involves not only the client and a primary application server, but also other servers that may function as database or application servers to the primary server. Typical Level 3 application architectures include application or Web servers with back-end connections to database servers. Response Time Measurements Once the application architecture and the network topology have been analyzed, the first step in determining and evaluating response times should be to calculate the theoretical communication delay. This figure can then be used to estimate the expected response times. Typical values for one-way transmission delays over WAN links are best obtained from the service provider or tested using a protocol analyzer. Typical values for Frame Relay links are between 30 and 60 ms. For ATM (STM-1), values of 6 µs/km and 2 ms/switch can be assumed. For a line length of 1,000 km with five ATM switches, this yields a transmission delay of 6.01 ms.

626 TESTING NETWORK PERFORMANCE 6 O F A B A @ E K = N @ A = O F A H6OI FA AC AB J A @ E K = N @ A = O F A H I A C =?? H @ E C J I J = @ = H @ I =?? H@ E C J I J= @ = H@ I - J D A H A J * = I A # $ # I - J D A H A J * = I A ' # I - J D A H A J * H = @! $ " I - J D A H A J * = I A. 2 # I - J D A H A J. 1 4 # I - J D A H A J * = I A # " I - J D A H A J * = I A 6 I - J D A H A J * = I A. * I - J D A H A J * = I A. I - J D A H A J * = I A 6 " # % I - J D A H A J * = I A 6 : # # $ I - J D A H A J * = I A. : " I - J D A H A J ) 7 1 # % I - J D A H A J 1 1 # I 6 O F E? = @ A = O.,, 1 `! I 5 M EJ? D A @ > EJ I - J D A H A J! I 5 M EJ? D A @ 6 A 4 E C! I 5 M EJ? D A @.,, 1 I 5 M EJ? D A @ * = I A 6 I 4 K J A H # ` I Figure 18.1 Transmission delays in LAN topologies The actual response time measurements are made, in the simplest case, using Internet Control Message Protocol (ICMP) ping packets. Ping uses the ICMP Echo command to send a packet to the destination and back again. In addition to the response time, the ping command also counts the number of intermediate stations (hops) through which the packet is routed. Each hop reduces the packet s Time to Live (TTL) counter by one. If the initial TTL value is known, subtracting the final TTL yields the number of hops along the path. Initial TTL values are: Windows 3.x/95 32 Windows 98/2000/NT 4.0 128 Routers 255 UNIX 64 or 255 C:\WINDOWS>ping 16.70.66.14 Pinging 16.70.66.14 with 32 bytes of data: Reply from 16.70.66.14: bytes=32 time=54 ms TTL=120 Reply from 16.70.66.14: bytes=32 time=51 ms TTL=120 Reply from 16.70.66.14: bytes=32 time=53 ms TTL=120 Reply from 16.70.66.14: bytes=32 time=54 ms TTL=120 Ping statistics for 16.70.66.14: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 51 ms, Maximum = 54 ms, Average = 53 ms Figure 18.2 Results of a response time test using the ping command

627 TESTING NETWORK PERFORMANCE Figure 18.2 shows the results of such a response time test. The measured response time varies within a relatively narrow range, from 51 to 54 ms. This means that the communication links involved in this example are not under excessive loads and are able to provide consistent response times. High variations in response time indicates that at least one network segment is under a heavy load. To determine the delay values for individual segments of the network connection, the tracert command (in UNIX: traceroute) can be used. The traceroute command performs a series of ICMP Echo requests, beginning with a TTL value of 1. Each request is repeated three times, then the TTL value is increased by one, and so on until the TTL is sufficient for the packet to reach its destination. The output of the traceroute command displays the response time for each of the three echo packets with each TTL value (see Figure 18.3). 1 <10 ms <10 ms 10 ms center1-west-wien.chello.at [10.34.14.1] 2 10 ms 10 ms <10 ms rt113.chello.at [212.17.99.113] 3 <10 ms 10 ms 10 ms vienna-bgp1-fe-2-0-0.aorta.com [212.17.99.117] 4 40 ms 10 ms 10 ms tk-uni-eb3-pos-9-0-0.aorta.com [212.17.99.41] 5 50 ms 60 ms 60 ms atvie202-ta.ebone.network [192.121.159.105] 6 60 ms 50 ms 61 ms demun701-tb-p0-3.ebone.network [195.158.226.153] 7 50 ms 60 ms 60 ms frpar601-tb-p0-2.ebone.network [195.158.226.150] 8 50 ms 60 ms 60 ms frpar205-tc-p9-0.ebone.network [195.158.228.157] 9 60 ms 80 ms 80 ms gblon303-tc-p1-0.ebone.network [195.158.228.150] 10 60 ms 70 ms 60 ms gblon304-tb-p2-0.ebone.network [195.158.225.30] 11 140 ms 140 ms 150 ms usnyk106-tc-p0-2.ebone.network [195.158.229.13] 12 151 ms 140 ms 140 ms uspen201-tb-p1-3.ebone.network [195.158.224.81] 13 150 ms 150 ms icm-bb11-pen-3-0.icp.network [198.67.133.137] 14 140 ms icm-bb10-pen-9-0.icp.network [198.67.133.33] 15 140 ms 141 ms icm-bb4-pen-0-0-0.icp.network [198.67.133.62] 16 140 ms 161 ms 140 ms sprint-nap.cerf.network [192.157.69.5] 17 140 ms 141 ms 180 ms pos6-2-155m.phl-bb2.cerf.network [134.24.46.113] 18 170 ms 161 ms 170 ms ser3-5-45m.chi-bb3.cerf.network [134.24.33.193] 19 201 ms pos0-0-622m.sfo-bb4.cerf.network [134.24.46.58] 20 210 ms 210 ms 200 ms pos7-0-622m.sfo-bb3.cerf.network [134.24.32.78] 21 220 ms 230 ms pos1-0-622m.sea-bb2.cerf.network [134.24.46.186] 22 220 ms 221 ms pos11-0-0-155m.sea-bb1.cerf.network [134.24.32.114] 23 220 ms 231 ms 220 ms boeing-gw.sea-bb1.cerf.network [134.24.108.78] 24 231 ms 220 ms 220 ms 144.116.14.1 25 231 ms 230 ms www1.boeing.com [12.13.226.23] 26 230 ms 230 ms www1.boeing.com [12.13.226.23] Figure 18.3 Results of a response time test using the TRACERT command

628 TESTING NETWORK PERFORMANCE The drawback of response time testing by the ping and traceroute methods is that the server s processing time is reflected along with the network transmission delay. The transmission delay caused by the network alone can be measured using two protocol analyzers or network probes. Response Time Measurements Using Two Protocol Analyzers Place one analyzer on either side of the network or network component to be measured. Then send a ping across the network (or component) under test. When the ping passes analyzer A, the analyzer records the arrival time A 1. When it passes analyzer B, this analyzer records arrival time B 1. When the echo response packet returns, it first passes analyzer B, which records arrival time B 2, then analyzer A, which records arrival time A 2. The latency of the device can now be calculated as ((A 2 A 1 ) (B 2 B 1 ))/2. 2 E C 6 ) 2 E C 6 * 6 ) 6 * 2 E C 4 A F O 2 E C 4 A F O @ A 2 H J? ) = O A H ) A J M H K @ A H 6 A I J 2 H J? ) = O A H * @ A 6 ) ` 6 ) ` 6 * ` 6 * A M = O, A = O Figure 18.4 Network transfer delay measurements using two protocol analyzers Throughput Measurements Like response time measurements, throughput tests should also be preceded by a calculation of the theoretical maximum frame rate and throughput. Note that the throughput over a connection path can never be higher than the throughput over the link with the lowest capacity. Actual throughput is best measured by means of an File Transfer Protocol (FTP) or Server Message Block Protocol (SMB) file transfer between two stations whose data traffic is being traced with a protocol analyzer. The packets transfered should be close to the maximum size of the transport network, called the

629 TESTING NETWORK PERFORMANCE Maximum Transfer Unit or MTU. The average throughput of forty or fifty successive packets can be measured to yield a distribution of the connection s throughput capacity over time. An important factor in analyzing throughput is the client system. Often the client s performance has a significant influence on the measured throughput. Use a protocol analyzer to measure the time between the server s last response packet and the client s next request packet to obtain an indication of the client s speed in processing the server s responses, which has an effect on throughput as well as response time. Figures 18.5a and 18.5b show the calculation of the theoretical maximum frame rate and throughput for the various Ethernet topologies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igure 18.5a Theoretical throughput rates for Ethernet network topologies

630 TESTING NETWORK PERFORMANCE 6 F C O 6 D A H A J E? = = N E K B H = A H = J A J D H K C D F / EC = > EJ- JD A H A J. H= A H= JA M EJD K JBH= A > K HI JE C * 7 JE E = JE M EJD > K HI JE C K. = N 5. * J H = I EI I E > = @ M E@ J D. BH= A I E A E > EJI 5 I JJE A 2 A C J D B F H A = > A 1 E JA H BH= A C = F K > A H B? I A? K JEL A BH= A I JH= I EJJA @ E > K HI J= BJA HBEHI JBH= A = N E K B H = A H = J A M E J D K J > K H I J E C > EJ I " ' $! ' " $ ' $ $ " B H = A I I = N E K J D H K C D F K J K I E C E E K B H = A I E > K H I J E C! " ' $ BH= A I I #! > EJI > EJ I K JE E = JE 7 JE E = JE M EJD > K HI JE C @ K HE C > K HI J K I E C E E K B H = A I E A $ # #! $ " ' $ # $ " ' $ ' K > A H BBH= A I @ K HE C > K HI JK I E C E E K B K '! # " ' $ % ' $ %@ K H E C ' B H = A > K = N E K B H = A H = J A M E J D > K H I J E C @ K H E C ' B H > EJ I % " # # $ B H = A I I / EC = > EJ - J D A H A= JN E K BH= A H= JA F A H@ EHA? JE M EJD E E K. K, K F A N > EJ I # " & & ' $ ' # $ B H " = A I I F E J J F E J = N E K J D H K C D F K J F A H @ E H A? J E M E J D E E " & & ' # BH= A I I N% # $ ' > EJI > E J I. K @ K F A N E J D H K C D F K J M E J D E E K B H = #! & > E J I 9 EJ D = B H = A I E A B # & > O J A I J D A = N E K B A =? D @ EHA? JE EI & % " M D E? D A G K = I ' & % K JD H K C D F K J B' & $ ' > EJ I 6 D A = N E K BK @ K J D H K C D F K J M EJ D = N E K B H = A I E A A G K = I ' % Figure 18.5b Theoretical throughput rates for Ethernet network topologies

Index p1 TESTING NETWORK PERFORMANCE Index of chapter 18 L Long response times 625 R Response time measurements 625 S Slow network 625 Slow server 625 T Throughput measurements 628 Throughput rates for Ethernet 629 TRACERT 627 Transmission delays 626