SlideShare a Scribd company logo
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage1
Network analysis Using Wireshark
Lesson 12:
Bandwidth, Delay & Jitter Issues
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 2
• By the end of this lesson, the participant will be able to:
▫ Perform bandwidth and throughput tests
▫ Measure applications throughput
▫ Understand the impact of delay and jitter on network applications
Lesson Objectives
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 3
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage4
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
Chapter Content
“Discipline is the bridge between goals
and accomplishment.”
Jim Rohn
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 5
• How to measure bandwidth / throughput
▫ Per Line/Port
▫ Per user
▫ Per connection
The Problem – Who is Loading the Line
Line/Port
User
Connection
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 6
• Tools to be used:
▫ Wireshark with Port mirror to port under test
▫ SNMP software monitoring Switch/Router
• Wireshark tool:
▫ Statistics tools
▫ IO Graphs
Line/Port Bandwidth Measurement
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 7
What Is the Bandwidth Distribution
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 8
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
Chapter Content
“Live as if you were to die tomorrow.
Learn as if you were to live forever.”
― Mahatma Gandhi
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 9
Per Network / Session Filtering
• In UDP
▫ Lost packets are not recovered
▫ In some cases, the protocol recovers them
• In TCP
▫ A lost packet will be retransmitted but..
▫ Retransmission can be due to packet loss or:
 Slow client or server
 Delays on the line
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 10
• Ping the destination (-t)
▫ If we don’t get some replies – increase time wait with –w option
▫ For example: ping –t –w 5000 8.8.8.8
• Check in communications devices and look for CS/CRC errors
▫ Errors: cause the switch/router to drop packets
▫ CPU load: cause switch/router to delay and then drop packets
▫ Traffic policing and WRED: can cause packet losses
• Check capture file:
▫ TCP Retransmissions
▫ Applications that runs over UDP send packets repeatatly
Indications for Packet Losses
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 11
Ethernet Frame Losses
First indication
– the Expert
System
Example
12-1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 12
Digging in gives us…
Example
12-1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 13
Exercise 12-2:
Errors and their influence on thrughput
• In the attached file (Exercise 12-1), were does the
errors come from?
• Are they critical? Are they real?
• What can they cause?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 14
• Response to a packet loss is retransmission.
• Retransmission can be due to:
▫ Packet loss
▫ Line delay
▫ Slow end-devices
• We verify a packet loss by elimination:
▫ If it is low and stable delay and ..
▫ There are no TCP window issues and ..
▫ Then it might be packet losses
▫ Go and check network devices
TCP – Is it a Packet Loss?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 15
• IP Identification field (ID) is used to identify the packet,
especially for the case of fragmentation.
• ID can be implemented as (depends on the TCP/IP stack,
RFC 4413):
▫ Sequential jump
▫ Random
▫ Sequential
• In the case of sequential or sequential-jump it gives us
another indication for lost packets.
Another Method..
Looking at the IP Packets IDs
Sequential jump
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 16
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
Chapter Content
“Success is not final, failure is not fatal: it is
the courage to continue that counts.”
― Winston S. Churchill
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 17
Previous segment lost and
Out-of-Order Segments events
Example
12-2
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 18
Chapter Content
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
“Live as if you were to die tomorrow.
Learn as if you were to live forever.”
― Mahatma Gandhi
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 19
Duplicate ACKs and Fast Retransmissions
Example 12-3
• Duplicate ACKs are sent when the receiver sees a gap in the
packets it receives.
• Fast retransmissions use a counter for duplicate ACKs to trigger
a retransmission faster than by Retransmission TimeOut (RTO).
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 20
What happened?
Example
12-3
• We look at the TCP window
size (in the transfer
direction)
▫ No significant changes so..
▫ It is OK
• We look at the TCP
throughput graph (in the
transfer direction)
▫ There are strong
degradations during 3 time
periods
▫ Something is wrong
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 21
• Looks like:
▫ There are no delay variations
▫ No TCP window changes
▫ Degradation in performance is inspected
• Looks like some packet losses
• But:
▫ It is a connection to a server on the Internet
▫ Some packet losses can happen
• And when we look at the IO graph for this connection…
And the answer is….
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 22
Oooops…
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 23
Delay/Jitter and TCP
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 24
Exercise 12-3:
Duplicate ACKs influence on throughput
• In the attached file (Exercise 12-3), what can be the
reason for the DupAKCs?
• What is the meaning of the red lines in the TCP Stream
Graphs (tcptrace) graph?
• What can be the reason for so many DupACKs?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 25
Chapter Content
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
“Courage is what it takes to stand up and
speak; courage is also what it takes to sit
down and listen.”
Winston Churchill
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 26
Flow & Congestion Control - Reminder
• Flow control:
▫ Controls the amount of data sent
by the sender.
▫ Achieved by a "window”
mechanism
• Congestion control:
▫ Try to get to the maximum
throughput of the
communication line
time
CWND
Min = MSS
MAX = RWINRetransmission Retransmission Retransmission
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 27
Exercise 12-4:
Network traffic
• In the attached file (Exercise 12-3), the network
becomes very slow. What is the reason for it?
• What is the bandwidth of the Internet connection?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 28
Chapter Content
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
“Live as if you were to die tomorrow.
Learn as if you were to live forever.”
― Mahatma Gandhi
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 29
FTP Download over Slow Cellular Link
Example
12-4
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 30
FTP Download over Slow Cellular Link
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 31
Chapter Content
Measuring total bandwidth on a communication link
Packet loss and recovery - UDP and TCP
Previous segment lost and Out-of-Order Segments events
Duplicate ACKs and Fast Retransmissions
TCP Retransmissions and their impact on network performance
Delay/jitter influence on TCP behaviour
Zero window, Window changes and other window problems
“The best argument against democracy is
a five-minute conversation with the
average voter.”
Winston Churchill
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 32
Exercise #5:
Zero Window influence on throughput
• In the attached file (Exercise 12-5), what is the reason
for the network slow-down in shown?
• What is the problem?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 33
Summary
• In this lesson we talked about:
▫ How to measure network bandwidth and applications throughput
with Wireshark
▫ How to measure delay and jitter, and their influence on
applications performance
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 34
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:

More Related Content

What's hot

Inside neutron 2
Inside neutron 2Inside neutron 2
Inside neutron 2
Robin Gong
 

What's hot (20)

Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisNetwork analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
Inside neutron 2
Inside neutron 2Inside neutron 2
Inside neutron 2
 
SDN Architecture & Ecosystem
SDN Architecture & EcosystemSDN Architecture & Ecosystem
SDN Architecture & Ecosystem
 
Heroku 101 py con 2015 - David Gouldin
Heroku 101   py con 2015 - David GouldinHeroku 101   py con 2015 - David Gouldin
Heroku 101 py con 2015 - David Gouldin
 
Software defined networks and openflow protocol
Software defined networks and openflow protocolSoftware defined networks and openflow protocol
Software defined networks and openflow protocol
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Day 3.1 basic routing
Day 3.1 basic routing Day 3.1 basic routing
Day 3.1 basic routing
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
31, Get more from your IPv4 resources
31, Get more from your IPv4 resources31, Get more from your IPv4 resources
31, Get more from your IPv4 resources
 
Rtsp
RtspRtsp
Rtsp
 
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 

Similar to Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues

EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
Jeong, Wookjae
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Prince Mishra
 

Similar to Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues (20)

lesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics toolslesson 7- Network analysis Using Wireshark - advanced statistics tools
lesson 7- Network analysis Using Wireshark - advanced statistics tools
 
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
Network Analysis Using Wireshark Chapter 09 ethernet and lan switchingNetwork Analysis Using Wireshark Chapter 09 ethernet and lan switching
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
 
Network analysis Using Wireshark Lesson 3: locating wireshark
Network analysis Using Wireshark Lesson 3: locating wiresharkNetwork analysis Using Wireshark Lesson 3: locating wireshark
Network analysis Using Wireshark Lesson 3: locating wireshark
 
Network Analysis Using Wireshark Chapter 08 the expert system
Network Analysis Using Wireshark Chapter 08 the expert systemNetwork Analysis Using Wireshark Chapter 08 the expert system
Network Analysis Using Wireshark Chapter 08 the expert system
 
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
 
Network Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersNetwork Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filters
 
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
Network Analysis Using Wireshark -Chapter 6- basic statistics toolsNetwork Analysis Using Wireshark -Chapter 6- basic statistics tools
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
 
EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
EYWA (Elastic load-balancing & high-availabilitY Wired virtual network Archit...
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case Studies
 
BEng Final Presentation
BEng Final PresentationBEng Final Presentation
BEng Final Presentation
 
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiOpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
 
Program dinamik jaringan
Program dinamik   jaringanProgram dinamik   jaringan
Program dinamik jaringan
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Distributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop GridDistributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop Grid
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 

More from Yoram Orzach

Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
Yoram Orzach
 

More from Yoram Orzach (17)

Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar
 
Ch 05 --- nfv basics
Ch 05 --- nfv basicsCh 05 --- nfv basics
Ch 05 --- nfv basics
 
Ch 04 --- sdn deployment models
Ch 04 --- sdn deployment modelsCh 04 --- sdn deployment models
Ch 04 --- sdn deployment models
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocols
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architecture
 
Ch 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvCh 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfv
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Ch 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisCh 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP Analysis
 
Ch 08 -- Ethernet & LAN Switching Troubleshooting
Ch 08 -- Ethernet & LAN Switching TroubleshootingCh 08 -- Ethernet & LAN Switching Troubleshooting
Ch 08 -- Ethernet & LAN Switching Troubleshooting
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
 
Ch 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter IssuesCh 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter Issues
 
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsWireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics tools
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filters
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 

Recently uploaded

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 

Recently uploaded (12)

Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 

Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues

  • 1. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage1 Network analysis Using Wireshark Lesson 12: Bandwidth, Delay & Jitter Issues
  • 2. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 2 • By the end of this lesson, the participant will be able to: ▫ Perform bandwidth and throughput tests ▫ Measure applications throughput ▫ Understand the impact of delay and jitter on network applications Lesson Objectives
  • 3. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 3 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to:
  • 4. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage4 Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems Chapter Content “Discipline is the bridge between goals and accomplishment.” Jim Rohn
  • 5. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 5 • How to measure bandwidth / throughput ▫ Per Line/Port ▫ Per user ▫ Per connection The Problem – Who is Loading the Line Line/Port User Connection
  • 6. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 6 • Tools to be used: ▫ Wireshark with Port mirror to port under test ▫ SNMP software monitoring Switch/Router • Wireshark tool: ▫ Statistics tools ▫ IO Graphs Line/Port Bandwidth Measurement
  • 7. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 7 What Is the Bandwidth Distribution
  • 8. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 8 Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems Chapter Content “Live as if you were to die tomorrow. Learn as if you were to live forever.” ― Mahatma Gandhi
  • 9. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 9 Per Network / Session Filtering • In UDP ▫ Lost packets are not recovered ▫ In some cases, the protocol recovers them • In TCP ▫ A lost packet will be retransmitted but.. ▫ Retransmission can be due to packet loss or:  Slow client or server  Delays on the line
  • 10. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 10 • Ping the destination (-t) ▫ If we don’t get some replies – increase time wait with –w option ▫ For example: ping –t –w 5000 8.8.8.8 • Check in communications devices and look for CS/CRC errors ▫ Errors: cause the switch/router to drop packets ▫ CPU load: cause switch/router to delay and then drop packets ▫ Traffic policing and WRED: can cause packet losses • Check capture file: ▫ TCP Retransmissions ▫ Applications that runs over UDP send packets repeatatly Indications for Packet Losses
  • 11. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 11 Ethernet Frame Losses First indication – the Expert System Example 12-1
  • 12. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 12 Digging in gives us… Example 12-1
  • 13. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 13 Exercise 12-2: Errors and their influence on thrughput • In the attached file (Exercise 12-1), were does the errors come from? • Are they critical? Are they real? • What can they cause?
  • 14. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 14 • Response to a packet loss is retransmission. • Retransmission can be due to: ▫ Packet loss ▫ Line delay ▫ Slow end-devices • We verify a packet loss by elimination: ▫ If it is low and stable delay and .. ▫ There are no TCP window issues and .. ▫ Then it might be packet losses ▫ Go and check network devices TCP – Is it a Packet Loss?
  • 15. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 15 • IP Identification field (ID) is used to identify the packet, especially for the case of fragmentation. • ID can be implemented as (depends on the TCP/IP stack, RFC 4413): ▫ Sequential jump ▫ Random ▫ Sequential • In the case of sequential or sequential-jump it gives us another indication for lost packets. Another Method.. Looking at the IP Packets IDs Sequential jump
  • 16. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 16 Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems Chapter Content “Success is not final, failure is not fatal: it is the courage to continue that counts.” ― Winston S. Churchill
  • 17. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 17 Previous segment lost and Out-of-Order Segments events Example 12-2
  • 18. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 18 Chapter Content Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems “Live as if you were to die tomorrow. Learn as if you were to live forever.” ― Mahatma Gandhi
  • 19. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 19 Duplicate ACKs and Fast Retransmissions Example 12-3 • Duplicate ACKs are sent when the receiver sees a gap in the packets it receives. • Fast retransmissions use a counter for duplicate ACKs to trigger a retransmission faster than by Retransmission TimeOut (RTO).
  • 20. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 20 What happened? Example 12-3 • We look at the TCP window size (in the transfer direction) ▫ No significant changes so.. ▫ It is OK • We look at the TCP throughput graph (in the transfer direction) ▫ There are strong degradations during 3 time periods ▫ Something is wrong
  • 21. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 21 • Looks like: ▫ There are no delay variations ▫ No TCP window changes ▫ Degradation in performance is inspected • Looks like some packet losses • But: ▫ It is a connection to a server on the Internet ▫ Some packet losses can happen • And when we look at the IO graph for this connection… And the answer is….
  • 22. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 22 Oooops…
  • 23. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 23 Delay/Jitter and TCP
  • 24. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 24 Exercise 12-3: Duplicate ACKs influence on throughput • In the attached file (Exercise 12-3), what can be the reason for the DupAKCs? • What is the meaning of the red lines in the TCP Stream Graphs (tcptrace) graph? • What can be the reason for so many DupACKs?
  • 25. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 25 Chapter Content Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems “Courage is what it takes to stand up and speak; courage is also what it takes to sit down and listen.” Winston Churchill
  • 26. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 26 Flow & Congestion Control - Reminder • Flow control: ▫ Controls the amount of data sent by the sender. ▫ Achieved by a "window” mechanism • Congestion control: ▫ Try to get to the maximum throughput of the communication line time CWND Min = MSS MAX = RWINRetransmission Retransmission Retransmission
  • 27. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 27 Exercise 12-4: Network traffic • In the attached file (Exercise 12-3), the network becomes very slow. What is the reason for it? • What is the bandwidth of the Internet connection?
  • 28. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 28 Chapter Content Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems “Live as if you were to die tomorrow. Learn as if you were to live forever.” ― Mahatma Gandhi
  • 29. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 29 FTP Download over Slow Cellular Link Example 12-4
  • 30. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 30 FTP Download over Slow Cellular Link
  • 31. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 31 Chapter Content Measuring total bandwidth on a communication link Packet loss and recovery - UDP and TCP Previous segment lost and Out-of-Order Segments events Duplicate ACKs and Fast Retransmissions TCP Retransmissions and their impact on network performance Delay/jitter influence on TCP behaviour Zero window, Window changes and other window problems “The best argument against democracy is a five-minute conversation with the average voter.” Winston Churchill
  • 32. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 32 Exercise #5: Zero Window influence on throughput • In the attached file (Exercise 12-5), what is the reason for the network slow-down in shown? • What is the problem?
  • 33. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 33 Summary • In this lesson we talked about: ▫ How to measure network bandwidth and applications throughput with Wireshark ▫ How to measure delay and jitter, and their influence on applications performance
  • 34. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 34 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to: