T2-6: Trace File Analysis - The Elephant Coming From Behind: Full Window, Window Update and TCP Keep-Alive s



Similar documents
Troubleshooting Tips and Tricks

Visualizations and Correlations in Troubleshooting

Question: 3 When using Application Intelligence, Server Time may be defined as.

Troubleshooting TCP/IP Networks with Wireshark

Expert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Mike Canney. Application Performance Analysis

Sample Network Analysis Report

COMP416 Lab (1) Wireshark I. 23 September 2013

Ethernet-based Storage Configuration

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

Mike Canney Principal Network Analyst getpackets.com

Application-Centric Analysis Helps Maximize the Value of Wireshark

Introduction to Wireshark Network Analysis

WHAT S ON MY NETWORK? A NETWORK MONITORING AND ANALYSIS TUTORIAL

Transport Layer Protocols

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Network Probe. Figure 1.1 Cacti Utilization Graph

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

DMZ Network Visibility with Wireshark June 15, 2010

CS268 Exam Solutions. 1) End-to-End (20 pts)

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Troubleshooting with Wireshark

Pig Laboratory. Additional documentation for the laboratory. Exercises and Rules. Tstat Data

Chapter 6 Congestion Control and Resource Allocation

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

TCP for Wireless Networks

Managing Application Delivery from the User s Perspective

Cover. Business-Oriented Network Management Solution. Whitepaper (UPM 4.1)

IP Office Technical Tip

TELE9752 Network Operations and Control Week 10p: Performance

Distinct. Network Monitor. User s Guide

TCP Adaptation for MPI on Long-and-Fat Networks

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Monitor network traffic in the Dashboard tab

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Upon completion of this course, you will be able to perform the following tasks:

Access Control: Firewalls (1)

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Network Traffic and Security Analysis

TCP in Wireless Mobile Networks

I3: Maximizing Packet Capture Performance. Andrew Brown

OSI Seven Layers Model Explained with Examples

TCP, Active Queue Management and QoS

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

TCP Performance Management for Dummies

Wireshark Certified Network Analyst Program

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Advanced Computer Networks Project 2: File Transfer Application

CMPE 150 Winter 2009

Solution of Exercise Sheet 5

Digital Audio and Video Data

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Network Friendliness of Mobility Management Protocols

CSE 123: Computer Networks

1. Whatdo you use? 2. Speed Tests?

Nalini Elkins Introduction to TCP/IP Diagnostics (Web-based Seminar)

2 TCP-like Design. Answer

Mobile Communications Chapter 9: Mobile Transport Layer

Per-Flow Queuing Allot's Approach to Bandwidth Management

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Multimedia Transport Protocols for WebRTC

24x7 Monitoring and Troubleshooting Distributed Application Performance

NetView for z/os V6.1 Packet Trace Analysis

and Outline Coordinator: .com University

CS514: Intermediate Course in Computer Systems

Cisco NetFlow Reporting Instruction Manual Version 1.0

The Shift to Wireless Data Communication

Announcements. Lab 2 now on web site

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Network Forensics Network Traffic Analysis

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Exercise 7 Network Forensics

Rolf Leutert. Network Expert & Trainer Leutert NetServices Switzerland. Analyzing WLAN Roaming Problems Leutert NetServices

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

Listening In. Passive Capture and Analysis of Oracle Network Traffic. Jonah H. Harris myyearbook.com

Application Performance and Security Testing

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Configuring Static and Dynamic NAT Simultaneously

QUIC. Quick UDP Internet Connections. Multiplexed Stream Transport over UDP. IETF-88 TSV Area Presentation

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

pc resource monitoring and performance advisor

Supporting VoIP in IEEE Distributed WLANs

A Resilient Transport Layer for Messaging Systems

TCP Window Size for WWAN Jim Panian Qualcomm

Chapter 5 Customizing Your Network Settings

SCADA Security Example

Network Simulation Traffic, Paths and Impairment

Cleaning Encrypted Traffic

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

First Midterm for ECE374 03/24/11 Solution!!

Routing in packet-switching networks

Monitoring Remote Access VPN Services

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Real World Example: Using SharePoint Out-ofthe-Box Tools to Create a Goals Tracking System. Jennifer Mason

Transcription:

T2-6: Trace File Analysis - The Elephant Coming From Behind: Full Window, Window Update and TCP Keep-Alive s Laura Chappell Founder Wireshark University Betty DuBois Principal Consultant DuBois Training & Consulting, LLC SHARKFEST '08 Foothill College March 31 - April 2, 2008 SHARKFEST '08 Foothill College March 31 - April 2, 2008

Agenda Using Wireshark to isolate a TCP Window issue Expert Info Errors Warnings Notes Zero Window Window Update Keep Alive Window Full Chat Time Column Delta Delta Displayed SHARKFEST '08 Foothill College March 31 - April 2, 2008

Best Practices for Protocol Analysis Onsite v. offsite analysis Create a baseline when performance is acceptable Analyze application traffic before deployment (capacity planning) Troubleshooting Tips: Who complained? Begin as close to the user as possible Name captures appropriately (sue1, sue2, sue3mac, etc.) Move analyzer as needed or use multiple analyzers and agents Time-sync if using multiple analyzers Have taps/hubs in place for when the need arises Focus on the time column (delta time setting) Consider command-line capture (nmcap/tshark) Security Tips: Baseline protocols, applications, traffic patterns Examine summary and protocol information for anomalies Look for signatures in questionable traffic Snort website has many signatures in the rule sets

Expert Info Errors Error (red):: serious problem, e.g. [Malformed Packet] Malformed: : malformed packet or dissector has a bug, dissection of this packet aborted Expert Errors do NOT always mean a network or communication error, they may indication a dissector errors

Expert Info Warnings Warn (yellow):: warning, e.g. application returned an "unusual" error code like a connection problem Are the fast retransmissions the issue? Calculate percentage of retransmitted vs. normal packets. Over 1% error ratio merits further investigation. That is not the case here. Attend Session T2-8 for further info on Retransmissions and Fast Retransmissions

Expert Info Notes Note (cyan):: notable things, e.g. an application returned an "usual" error code like HTTP 404 Zero window Window update Keep-Alive Duplicate ACK (Covered in Session T2-8)

Expert Info Notes Zero Window The key to determining when a Zero Window is truly an issue, is how long does it stay at zero before updating. The example below shows a host processing its data and updating the TCP window very quickly. tcp-window-good.pcap

Expert Info Notes Window Update Wireshark creates an Expert Note whenever the TCP window size increases. Warning: Wireshark does NOT create the Note when the window size is decreasing.

Expert Info Notes Keep-Alive Normal Keep-Alive s should be sent at regular intervals when no data is being transferred to keep the session alive. In this trace, what do you notice about the Delta times?

Timings Using the Time columns makes isolating faults much more efficient. Delta previous packet may not be seen Delta Displayed only care about seen packets

Receiver Congestion SEQ 3000 1460 bytes of data SEQ 2000 0 bytes of data; ACK 4460, Win=5840 SEQ 4460 1460 bytes of data SEQ 5920 1460 bytes of data 1460 SEQ 7380 1460 bytes of data 1460 SEQ 2000 0 bytes of data; ACK 5920, Win=4380 SEQ 2000 0 bytes of data; ACK 7380, Win=2920 1460 1460 SEQ 8840 1460 bytes of data SEQ 10300 1460 bytes of data SEQ 2000 0 bytes of data; ACK 8840, Win=1460 SEQ 2000 0 bytes of data; ACK 8840, Win=0

Lab: Congestion File: download-bad.cap Select View > Time Display Format > Seconds Since Previous Displayed Packet Sort the packets on the Time column What is the cause of the highest delays in this trace file? Re-sort by the number column Which packet filled the receive buffer? What was the total delay time caused by receiver congestion? Was packet loss and high latency the biggest problem in this trace file?

What s Next? Laura s Lab Kit v9 In show bags as well as ISO image: www.novell.com/connectionmagazine/laurachappell.html Wireshark University: www.wiresharku.com Laura s Blog: laurachappell.blogspot.com/