Connect communicate collaborate Performance Metrics & Basic Tools Robert Stoy, DFN EGI TF, Madrid September 2013.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

Networks and TCP/IP Part 2. PORTS Ports – What and Why are They?  Typically: Computers usually have only one network access point to the internet 
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH.
NCAR perfSONAR Pete Siemsen September 19, Hardware and software Dedicated server with 2 10G ports –Only one is connected – Outside UCAR firewall.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Mapping a Network by Latency (and other things) Client connecting to , UDP port.
Internet Bandwidth Measurement Techniques Muhammad Ali Dec 17 th 2005.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
All rights reserved © 2006, Alcatel Accelerating TCP Traffic on Broadband Access Networks  Ing-Jyh Tsang 
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
CPSC 441 TUTORIAL – MARCH 7, 2012 TA: MARYAM ELAHI NETWORK TOOLS.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Videoconferencing: Network Tools & Troubleshooting Dave Devereaux-Weber University of Wisconsin-Madison Internet2 Commons Site Coordinator Training September.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
1 Transport Layer Computer Networks. 2 Where are we?
Internet Control Message Protocol (ICMP)
2007/01/031 Bandwidth Test Controller Speaker : Po-Chou Chen Cheng-Lin Tsai Advisor : Quincy Wu Date : 2008/01/03.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Exploring the Packet Delivery Process Chapter
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
1 Internet Tool Practice 한두균 송정환
ECE 526 – Network Processing Systems Design Network Processing Functions Chapter 6&9: D. E. Comer.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Chapter 2 Applications and Layered Architectures Sockets.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
NEES Cyberinfrastructure Center at the San Diego Supercomputer Center, UCSD George E. Brown, Jr. Network for Earthquake Engineering Simulation Analyzing.
Network Performance.
Networks ∙ Services ∙ People Richard-Hughes Jones eduPERT Training Session, Porto A Hands-On Session udpmon for Network Troubleshooting 18/06/2015.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
WTG – Wireless Traffic Generator Presented by: Lilach Givaty Supervised by: Dr. Yehuda Ben-Shimol, Shlomi Atias.
iperf a gnu tool for IP networks
Lecture#6:Connectivity Verification
Connectivity Verification
Network Commands 2 Linux Ubuntu A.S.
Network Tools and Utilities
ICMP ICMP = Internet Control Message Protocol Layer 3
8 Network Layer Part V Computer Networks Tutun Juhana
Part1: Ipconfig ping command Tracert command Getmac command
Lecture#7:Connectivity Verification
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Lecture#6:Connectivity Verification
A tool for locating QoS failures on an Internet path
Internet Control Message Protocol
Internet Control Message Protocol
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

connect communicate collaborate Performance Metrics & Basic Tools Robert Stoy, DFN EGI TF, Madrid September 2013

connect communicate collaborate 2 Basic network performance metrics  Packet Loss  One Way Delay / OWD Variation  Path-MTU  TCP throughput

connect communicate collaborate 3 Basic Tools  Two-Way Delay (Round Trip Time) : Ping  High Packet Loss ( > 1 %) : Ping  Path Finding : Traceroute  Path-MTU : Ping, Iperf  TCP Throughput, UDP Packet Loss : Iperf (or Nuttcp)  Central control of Iperf (or Nuttcp) : BWCTL

connect communicate collaborate 4 Delay : Ping (1)  How it works  Source host A sends ICMP echo-request packets to a target, waits for a given time, default 1 second.  Target host B replies with ICMP echo-reply packet  Measurements using multiple packets provide statistics on RTT (min,mean,max) and Packet Loss (%)  Round Trip Time of packets: = Packet processing time in hosts A and B, + round trip time (RTT) on nework path on both directions A->B, B->A.  Lost Packets: Packets that do not arrive after timeout parameter

connect communicate collaborate 5 Delay : Ping (2)  Command Line Switch, Examples  Typical sequence in order to measure  RTT and Loss statistics and pattern on path ping -c 100 -i 0.3 -s 1492 deneb PING host.mydomain.de ( ) 1492(1520) bytes of data bytes from host.mydomain.de ( ): icmp_req=1 ttl=245 time=22.6 ms 1500 bytes from host.mydomain.de ( ): icmp_req=2 ttl=245 time=22.5 ms 1500 bytes from host.mydomain.de ( ): icmp_req=3 ttl=245 time=22.6 ms bytes from host.mydomain.de ( ): icmp_req=99 ttl=246 time=21.5 ms 1480 bytes from host.mydomain.de ( ): icmp_req=100 ttl=246 time=21.5 ms --- host.mydomain.de ping statistics packets transmitted, 100 received, 0% packet loss, time 29778ms rtt min/avg/max/mdev = /21.877/22.648/0.515 ms Number of packets to send Waiting time [seconds| Packet size (Payload)

connect communicate collaborate 6 Delay : Ping (3)  Flood ping  get fast results on packet loss  requires root privileges ping -c 100 -f -s 1492 deneb PING host.mydomain.de ( ) 1492(1520) bytes of data. --- host.mydomain.de ping statistics packets transmitted, 100 received, 0% packet loss, time 1107ms rtt min/avg/max/mdev = /22.633/22.698/0.204 ms, pipe 3, ipg/ewma / ms Number of packets to send Flood mode (don‘t wait) Packet Payload size [Byte]

connect communicate collaborate 7 Delay : Ping, Usability  Fast check of connectivity  If remote endsystem is maintained on stable, low load level:  Detects packet loss on path from 1% upwards  Delay changes indicate path changes  Delay variation indicate load on the path  Scheduled measurements get statistics to be correlated over time with other statistics: path changes load on network links

connect communicate collaborate 8 Delay, Loss : Ping, Statistics Graph  Scheduled pings Output as graph

connect communicate collaborate 9 Path Finding : Traceroute, How it works  Source host sends UDP or ICMP Packets with increasing TTL values, starting at 1, to destination host.  Routers on network do:  count TTL value down by 1 if packet comes in if TTL value > 0 : packet is forwarded, if TTL value = 0 :discard packet, and send back to source host a ICMP time-to-live-exceed packet.  Traceroute program on source hosts analyses packets coming back, and displays result.

connect communicate collaborate 10 Path Finding : Traceroute, How it works traceroute host.mydomain.de traceroute to host.mydomain.de ( ), 30 hops max, 60 byte packets 1 kr-sgs1.sgs.dfn.de ( ) ms ms ms 2 xr-fzk1-ge x-win.dfn.de ( ) ms ms ms 3 xr-stu1-te2-3.x-win.dfn.de ( ) ms ms ms 4 xr-gar1-te2-4.x-win.dfn.de ( ) ms * * 5 xr-aug1-te1-1.x-win.dfn.de ( ) ms ms ms 6 cr-erl1-te x-win.dfn.de ( ) ms ms ms 7 cr-tub1-hundredgige x-win.dfn.de ( ) ms ms ms 8 xr-tub2-vlan50.x-win.dfn.de ( ) ms ms ms 9 xr-hub1-ge x-win.dfn.de ( ) ms ms ms 10 kr-dfnbln5-0.x-win.dfn.de ( ) ms ms ms 11 host.mydomain.de ( ) ms ms ms  Sender-Default: 3 packets on each TTL value  Result:  List of Routers along the path  Round Trip Time between source host and router, 3 values on each hop

connect communicate collaborate 11 Path Finding : Traceroute, Points to consider (I)  Path is shown only between Layer 3 devices, -> Path changes on lower layers not visible in hop list.  Path is shown only in one direction. -> traceroute required from both end systems  Measurement Timestamp not in output, but required -> do a ‘unix date’ separately.

connect communicate collaborate 12 Path Finding : Traceroute, Points to consider (II)  Network providers support traceroute, but keep in mind: Processing load and -time on routers is higher as with answering to pings (because of ICMP time-to-live-exeed generation) Usually routers treat TTL=0 packets with low priority Router protection mechanisms could prevent generation of ICMP time-to-live-exceed packets. => * in traceroute output could occur although there’s no problem on forwarding path => RTT could show high values, although delay on path is lower.  Firewall administrators an WAN/LAN Borders sometimes prevent traceroute

connect communicate collaborate 13 TCP Throughput : Iperf How it works  Data Transfer between memory on local and remote host through end systems TCP/IP-Stack and network  One program, two roles : Server (Receiver) & Client (Sender)  Two modes: TCP, UDP  Best practise:  Interactive session on both sides  Take result from Server (Receiver)

connect communicate collaborate 14 TCP Throughput : Iperf Example TCP-Mode iperf -s -B m -i Server listening on TCP port 5001 Binding to local address TCP window size: 128 KByte (default) [ 4] local port 5001 connected with port 5001 [ ID] Interval Transfer Bandwidth [ 4] sec 72.8 MBytes 611 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 936 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 112 MBytes 937 Mbits/sec [ 4] sec 1.06 GBytes 904 Mbits/sec [ 4] MSS size 1448 bytes (MTU 1500 bytes, ethernet) iperf -B c m -i 1 -t Client connecting to , TCP port 5001 Binding to local address TCP window size: 128 KByte (default) [ 3] local port 5001 connected with port 5001 [ ID] Interval Transfer Bandwidth [ 3] sec 81.4 MBytes 683 Mbits/sec [ 3] sec 114 MBytes 956 Mbits/sec [ 3] sec 111 MBytes 930 Mbits/sec [ 3] sec 111 MBytes 934 Mbits/sec [ 3] sec 111 MBytes 933 Mbits/sec [ 3] sec 111 MBytes 932 Mbits/sec [ 3] sec 113 MBytes 949 Mbits/sec [ 3] sec 115 MBytes 963 Mbits/sec [ 3] sec 111 MBytes 932 Mbits/sec [ 3] sec 111 MBytes 933 Mbits/sec [ 3] sec 1.06 GBytes 911 Mbits/sec [ 3] MSS size 1448 bytes (MTU 1500 bytes, ethernet)

connect communicate collaborate 15 TCP Throughput : Iperf Example UDP-Mode iperf -u -s -B i Server listening on UDP port 5001 Binding to local address Receiving 1470 byte datagrams UDP buffer size: 160 KByte (default) [ 3] local port 5001 connected with port 5001 [ ID] Interval Transfer Bandwidth Jitter Lost/Total Datagrams [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 12.0 MBytes 101 Mbits/sec ms 0/ 8547 (0%) [ 3] sec 120 MBytes 101 Mbits/sec ms 0/85470 (0%) [ 3] sec 1 datagrams received out-of-order iperf -u -B c i 1 -t 10 -b 100M Client connecting to , UDP port 5001 Binding to local address Sending 1470 byte datagrams UDP buffer size: 160 KByte (default) [ 3] local port 5001 connected with port 5001 [ ID] Interval Transfer Bandwidth [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 12.0 MBytes 101 Mbits/sec [ 3] sec 120 MBytes 101 Mbits/sec [ 3] Sent datagrams [ 3] Server Report: [ 3] sec 120 MBytes 101 Mbits/sec ms 0/85470 (0%) [ 3] sec 1 datagrams received out-of-order

connect communicate collaborate 16 Iperf : Points to consider  UDP measurements:  Dangerous: Could cause packet loss on other data streams on the network  Use only in controlled environment keep as much as local, typical: Check a link between routers only small data rates only short duration  Recommended Version: Iperf v  Linux: Packages for Debian and Redhat based distributions

connect communicate collaborate 17 BWCTL, Centrally Controlled Iperf Measurements (I) bwctl-client bwctl-server with user access-ctrl bwctl-server with user access-ctrl bwctl-server with user access-ctrl Client Server architecture, allows control on Iperf Measurements Protocol relies on NTP synchronised servers and clients Allows enforcement of client user access control Max. number of simultaneous measurement flows Limits on measurement parameters per user group Servers are started once with configured usage policy Logging on servers supported by posthook script interface On demand measurement, simply from a client CLI

connect communicate collaborate 18 BWCTL, Centrally Controlled Iperf Measurements (II) bwctl-client bwctl-server with user access-ctrl bwctl-server with user access-ctrl :~$ /bwctl -A A AESKEY stoy /etc/bwctl/bwctld.keys -T iperf -l 128k -i 1 -t 10 -s mp-tub -c mp-stu bwctl: 18 seconds until test results available RECEIVER START bwctl: exec_line: /usr/bin/iperf -B mp-stu -s -f b -l m -p t 10 -i 1 bwctl: start_tool: Server listening on TCP port 5004 Binding to local address mp-stu TCP window size: Byte (default) [ 15] local mp-stu port 5004 connected with mp-tub port 5004 [ ID] Interval Transfer Bandwidth [ 15] sec Bytes bits/sec [ 15] sec Bytes bits/sec [ 15] sec Bytes bits/sec [ 15] sec Bytes bits/sec … [ 15] sec Bytes bits/sec [ 15] sec Bytes bits/sec [ 15] sec Bytes bits/sec [ 15] MSS size 1448 bytes (MTU 1500 bytes, ethernet) bwctl: stop_exec: RECEIVER END

connect communicate collaborate 19 BWCTL, Centrally Controlled Iperf Measurements (III)  Further option: control of Nuttcp-Measurements Supports output of CPU load on measurement node  Deployment Linux: Server and Client Packages for Debian and RedHat based Systems available Source Code and Internet2  Room for improvement Results are sent to the client, but not stored, -> no history Used network path not known, traceroute feature is missing User authentication and authorisation not really strong No graphical output => Evolution towards PerfSonar