Expert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark



Similar documents
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Troubleshooting Tips and Tricks

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A

Application Performance Analysis and Troubleshooting

Question: 3 When using Application Intelligence, Server Time may be defined as.

A SENSIBLE GUIDE TO LATENCY MANAGEMENT

Key Components of WAN Optimization Controller Functionality

Solving complex performance problems in TCP/IP and SNA environments.

The OSI Model: Understanding the Seven Layers of Computer Networks

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

VMWARE WHITE PAPER 1

Transport Layer Protocols

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Ten top problems network techs encounter

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Using TrueSpeed VNF to Test TCP Throughput in a Call Center Environment

QoS:What Is It? Why Do We Need It?

Any-to-any switching with aggregation and filtering reduces monitoring costs

Diagnosing the cause of poor application performance

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

This sequence diagram was generated with EventStudio System Designer (

Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services

Cisco Application Networking for Citrix Presentation Server

Sample Network Analysis Report

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Computer Networks. Chapter 5 Transport Protocols

Measure wireless network performance using testing tool iperf

Application-Centric Analysis Helps Maximize the Value of Wireshark

Mike Canney Principal Network Analyst getpackets.com

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Allocating Network Bandwidth to Match Business Priorities

Troubleshooting TCP/IP Networks with Wireshark

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Per-Flow Queuing Allot's Approach to Bandwidth Management

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Low-rate TCP-targeted Denial of Service Attack Defense

Solving the Big Dilemma of Big Data

High Performance VPN Solutions Over Satellite Networks

Network Probe. Figure 1.1 Cacti Utilization Graph

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

MANAGING NETWORK COMPONENTS USING SNMP

Computer Networks - CS132/EECS148 - Spring

IP SAN Best Practices

First Midterm for ECE374 03/24/11 Solution!!

TCP in Wireless Mobile Networks

MOBILITY AND MOBILE NETWORK OPTIMIZATION

The Problem with TCP. Overcoming TCP s Drawbacks

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

SwiftBroadband and IP data connections

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

First Midterm for ECE374 02/25/15 Solution!!

High-Speed TCP Performance Characterization under Various Operating Systems

Mike Canney. Application Performance Analysis

How To Solve A Network Communication Problem

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

Network Simulation Traffic, Paths and Impairment

HyperIP : VERITAS Replication Application Note

LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Visualizations and Correlations in Troubleshooting

Network Instruments white paper

Lab VI Capturing and monitoring the network traffic

LESSON Networking Fundamentals. Understand TCP/IP

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Troubleshooting VoIP and Streaming Video Problems

Using the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Data Networks Summer 2007 Homework #3

T2-6: Trace File Analysis - The Elephant Coming From Behind: Full Window, Window Update and TCP Keep-Alive s

IP SAN BEST PRACTICES

Bandwidth Aggregation, Teaming and Bonding

Analyzing Full-Duplex Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

NEWWAVE COMMUNICATIONS BROADBAND INTERNET SERVICE DISCLOSURES. Updated October 2012

Speeding Up File Transfers in Windows 7

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

White Paper: Troubleshooting Remote Site Networks Best Practices

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Frequently Asked Questions

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Study of Network Performance Monitoring Tools-SNMP

How Does Ping Really Work?

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

BASIC ANALYSIS OF TCP/IP NETWORKS

The OSI and TCP/IP Models. Lesson 2

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lesson 5-2: Network Maintenance and Management

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Transcription:

Expert Reference Series of White Papers Troubleshooting Slow Networks with Wireshark 1-800-COURSES www.globalknowledge.com

Troubleshooting Slow Networks with Wireshark Laura Chappell, Founder, Wireshark University and Chappell University Introduction Your phone begins ringing before you find a suitable spot to put down your first comforting cup of coffee in the morning. Users are complaining that the network is slow web browsing sessions are painfully sluggish and email takes forever to download. They state that they simply can t work this way. The problem appears to be widespread as your coffee cools faster than the users tempers. A lack of error messages or network alarms makes the problem more elusive and guarantees you ll be hunting down the problem well through lunchtime at least. Could the problem be related to the infrastructure devices? Is a rogue switch dropping packets periodically? What about the servers? Could the email server finally be giving in to the pressure of handling all those email chain letters the users pass amongst themselves? What is the chance that the users systems have been compromised with a virus or bot that is spreading stealthily through the shadows of the network like the plague? In this white paper, we examine how to use Wireshark, the world s most popular open-source network analyzer, to troubleshoot some of the top causes of poor network performance, including High latency Packet loss Inefficient window sizes Intercepting devices Application dependencies First, we ll look at Wireshark and examine methods used to see network communications. Wireshark: The Open-Source Network Savior Wireshark, formerly Ethereal, is the world s most popular open-source network analyzer and the ideal first-responder tool on a troubled network. Wireshark enables you to see the network communications and definitively point to where the problem lies. Although it cannot tell you why the problem exists, Wireshark reduces the troubleshooting time and effort drastically by providing a definitive answer to the location of the problem removing the guesswork that typically consumes the IT professional s time while users impatiently wait for their network services to be restored. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 2

A system loaded with Wireshark is connected to the network using one of the methods defined below. Network traffic is captured and decoded by Wireshark s dissectors, predefined code that breaks apart the packets into their fields and field contents. Wireshark also contains an Expert system that identifies possible problems in network communications, thereby shortening the problem isolation process further. For more information on Wireshark, visit www.wireshark.org. The Naked Network The first step in analyzing network performance is to capture the network traffic. Ideally, you ll capture the traffic to and from a complaining host system from a location as close to that user as possible. You want to experience the slow performance from their perspective and their location on the network. There are four basic options available to capture network traffic. Load Wireshark directly on one of the host systems. Insert a network hub between a host and a switch (half-duplex). Insert a network tap between a host and a switch (full-duplex). Span the switch port of a user to an analyzer port. Loading Wireshark on the User s System This option makes my skin crawl a bit. I detest the idea of being so invasive and have nightmares imagining the users running Wireshark on their systems with little or no knowledge of network communications. This would be my least-favorite recommendation. Hubbing Out This is a great option for half-duplex networks. Simply remove the cable from the user s system and connect it to a hub. With another cable, connect the user s system and your analyzer to the hub as shown in the diagram below. Hubs are stupid they only know 1s and 0s, and forward all bits down all active ports. All traffic to or from your user s system will be copied to your analyzer as well. Tapping Out Hubs work great on half-duplex networks, but most of us have migrated to full-duplex networks. Hubs can t handle these full duplex communications; this is the job for a full-duplex tap. The connection process would be the same as shown in Figure 1, provided you have an aggregating full-duplex tap. An aggregating tap combines both transmit and receive channel information between the user and the switch into a single data stream to the analyzer system. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 3

Figure 1: Use full-duplex taps to listen in on all traffic to and from the user s system on a full-duplex network. Spanning Spanning requires reconfiguration of the switch that the user s system connects to. A switch that is configured with a spanned port sends a copy of all traffic to/from that spanned port down another port the port that the analyzer is connected to. This method of tapping-in is ideal for listening to traffic to/from a server as you are unlikely to break the server s network connection to install a hub or tap. High Latency: Somebody s Dragging their Feet Latency is a measurement of travel time from one host to another or the roundtrip between hosts. Although packets on a 100Mbps network always travel at a rate of 100Mbps, latency is introduced by distance and interconnecting devices that process packets. Slow travel from one endpoint to another is defined as high latency. High latency has a tremendously negative effect on network communications. As an example, in Figure 2, we examine the roundtrip time of a file download process on a high-latency path. At times, the roundtrip latency time reaches 1 second, which is completely unacceptable. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 4

Figure 2: Use Wireshark s Statistics > TCP Stream Graph > Round Trip Time Graph to determine the current roundtrip latency for a file download. We use Wireshark to determine the roundtrip time on a path to determine if this is the reason for poor network performance for Transmission Control Protocol (TCP) communications. TCP is used for web browsing, email receipt and transmission, file transfer protocol, and many other popular applications. In many situations, especially when hosts are using Windows XP, the operating system can be adjusted to work more efficiently on high-latency paths. Packet Loss: Losing Data in Bits and Pieces Packet loss is one of the most common problems I see on networks. When a user accesses a web site and begins to download the elements of the site, lost packets trigger retransmissions, increasing the overhead required to download the site elements and delaying the total download process. In addition, when an application uses TCP, the effect of lost packets is especially detrimental. Each time a TCP connection senses a lost packet, the throughput rate automatically throttles back dramatically to account for Copyright 2009 Global Knowledge Training LLC. All rights reserved. 5

network problems. Slowly, it recovers to a more acceptable rate until the next packet is lost again, causing a drastic cut-back in data throughput. Packet loss has a tremendously negative effect on large file downloads that should otherwise stream across a network smoothly. What does packet loss look like? It depends. If the application is running over TCP, packet loss has two different looks. In one case, the receiver tracks packets based on their sequence numbers and notices a packet is missing. The client requests the missing packet three times (duplicate acknowledgments) which triggers a retransmission. If the sender times-out when it notices the receiver has not acknowledged receipt of a data packet, the sender retransmits the data packet. In Figure 3, Wireshark indicates that packet loss has occurred and duplicate acknowledgments trigger the retransmission. A high number of duplicate acknowledgments indicates that a network has experienced packet loss and is also facing high latency. Figure 3: Wireshark indicates that packet loss has occurred by color coding the problematic traffic. Locating the exact point of packet loss is imperative in improving network performance. When packet loss is experienced, we move the Wireshark along the path until we can no longer see packet loss. At this point, we are upstream from the packet loss point, and we know where to concentrate our troubleshooting efforts. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 6

Inefficient Window Sizes: Peering Through Small Windows There are several windows in TCP/IP networking besides the Microsoft operating system. Sliding window Receiver window Congestion window As a set, these windows define the TCP-based communication performance on the network. First, let s define each of these windows and their individual effect on network throughput. The Sliding Window The sliding window is a process used to send the next TCP segments onto the network as data is acknowledged. The sliding window expands as the sender receives acknowledgments for previously transmitted segments. Larger amounts of data can be sent on the network as long as there are no dropped packets on the network. When packet loss occurs, the sliding window shrinks under the assumption that the network cannot handle the larger amount of data on the wire. The Receiver Window (rwin) The receiver window is a buffer space in the TCP stack. When data is received, it is held in this buffer space until an application picks up the data. When an application does not keep up with the receive rate, the receiver window fills and may eventually lead to a zero window condition. When a receiver advertises a zero window condition, all data transmission to the host must stop. Throughput drops to zero. A process called Window Scaling (RFC 1323) enables a host to scale the receiver window to a larger value and reduce the chance of a zero window condition occurring. Figure 4, below, depicts a zero window condition that caused a 32-second delay in network communications. The Congestion Window (cwnd) The congestion window defines the actual amount of data that the network can support. It is defined by the sender s packet transmission rate, the network packet loss rate, and the receiver s window size. During a healthy network communication, the congestion window increases consistently until the transfer completes or it hits a ceiling defined by the network health, the sender s transmit capabilities, or the receiver s window size. Each new connection begins the process of window size negotiation anew. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 7

Figure 4: It took over 32 seconds to resolve the zero window condition, denoted by Wireshark s Expert system. Intercepting Devices: When Network Traffic Cops Go Bad Network Traffic Cops are interconnecting devices, such as switches, routers, and firewalls that make forwarding decisions. When packet loss occurs, it is best to look at these devices as the possible cause. These interconnecting devices can also add latency to the path. For example, if traffic prioritization is in use, we can see additional latency injected into a stream that meets a low priority level. Application Dependencies: Choose Your Application Friends Carefully Some applications have dependencies on other applications, processes or communications with other hosts. For example, if your database application relies on connecting to numerous servers to pull database elements, slow performance to those other servers can affect the local application s load time. As a simple example, we can look at a web browsing session in which the target server references numerous other websites. In order to load the main page of the site, www.espn.com, for example, you must access 16 hosts that provide advertisements and content for the main www.espn.com page. Figure 5 shows the list of hosts that you must contact when you load the www.espn.com home page. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 8

Figure 5: Wireshark s HTTP Load Distribution window lists all servers referenced by the www.espn.com home page. In addition, poorly-written applications can affect the performance on both the sending side and the receiving side. No matter how healthy and free of dropped packets the network is, an application may not take advantage of the network s capabilities, because it has its own throttling mechanisms limiting the amount of data that it sends. On the receiving side of the connection, an application that does not pull data out of the receive buffer in a timely manner can lead to a limited or zero window condition. In the case of poorly performing applications, consider researching the possibility that the application can be tuned for better performance. Copyright 2009 Global Knowledge Training LLC. All rights reserved. 9

First Steps to a Healthier Network Most networks can be tuned for better performance through a series of tasks. Learn to use Wireshark as a first-responder task to identify the cause of poor performance quickly and efficiently. Determine the source of latency on the network path and, if possible, reduce the latency to an acceptable value. Identify the location of packet loss and resolve the problem. Examine the window size in use on data transfers and consider optimizing the receiver window size, if possible. Examine the performance of intercepting devices to determine if they are adding latency or dropping packets. Optimize applications to send larger amounts of data and pull data out of the receiver window, if possible. We ve discussed the primary causes of network performance problems, but one cause lack of insight into network communications behavior cannot be overlooked. After 20 years of analyzing network traffic and teaching traffic interpretation and problem resolution, it is clear that network analysis is a skill that every IT professional should possess. Wireshark offers an insight into networks in a similar way that X-rays and CAT scans offer an insight into the human body for accurate and timely diagnoses. And, just like those indispensable technologies in the medical field, Wireshark has become an essential tool to locate and diagnose the cause of network problems in the most efficient and cost-effective method possible. Note: This white paper was developed as a follow-up to the Global Knowledge webinar by the same name. Visit our Knowledge Center at www.globalknowledge.com/knowledgecenter to view the related webinar. Learn More Learn more about how you can improve productivity, enhance efficiency, and sharpen your competitive edge. Check out the following Global Knowledge courses: Analyzing TCP/IP Networks with Wireshark Troubleshooting and Securing TCP/IP Networks with Wireshark TCP/IP Networking For more information or to register, visit www.globalknowledge.com or call 1-800-COURSES to speak with a sales representative. Our courses and enhanced, hands-on labs offer practical skills and tips that you can immediately put to use. Our expert instructors draw upon their experiences to help you understand key concepts and how to apply them to Copyright 2009 Global Knowledge Training LLC. All rights reserved. 10

your specific work situation. Choose from our more than 700 courses, delivered through Classrooms, e-learning, and On-site sessions, to meet your IT and management training needs. About the Author Laura Chappell is the Founder of Wireshark University and Chappell University, and has been researching, writing, and lecturing on network analysis for over 20 years. Laura designed and created Wireshark University in cooperation with Gerald Combs, the creator of Ethereal/Wireshark. In March 2009, the Wireshark Certification Program was released to validate a candidate s knowledge of Wireshark functionality, TCP/IP troubleshooting, and network forensics/security. Wireshark University (www.wiresharku.com) Chappell University (www.chappellu.com) Copyright 2009 Global Knowledge Training LLC. All rights reserved. 11