Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Tcpdump Traceroute Ping. A packet tracing tool  Works on various host platforms  Captures packets going through a certain network interface  Shows.
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Measurement in the Internet. Outline Internet topology Bandwidth estimation Tomography Workload characterization Routing dynamics.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
1 ICMP – Using Ping and Trace CCNA Semester
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Defining the IP Packet Delivery Process INTRO v2.0—4-1.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
1 Version 3.1 Module 4 Learning About Other Devices.
CS 6401 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
Network Administration
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Internet Control Message Protocol (ICMP)
Problem Statement Map of OSU Routers Gopi Krishna Tummala Rupam Kundu Graduate Students The Ohio State University.
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
KIS – Cvičenie #5 IP konfigurácia v prostredí OS Windows Marián Beszédeš, B506
© 2002, Cisco Systems, Inc. All rights reserved..
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
PC1 LAN GW SP RTR1 SP RTR2 DST 4 * 25 ms 21 ms dst [ ] 4. A third packet is sent with TTL=3, which decrements at each hop, and expires after RTR2,
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Internet Control Message Protocol (ICMP) Chapter 7.
ICMPv6 Error Message Types Informational Message Types.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Bandwidth estimation: metrics, measurement techniques, and tools Presenter: Yuhang Wang.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
Lecture#6:Connectivity Verification
Traceroute traceroute is a Unix utility designed by Van Jacobson in 1987 The Windows equivalent is called tracert The Linux equivalent is called tracepath.
Connectivity Verification
Ping and traceroute.
Network Tools and Utilities
21-2 ICMP(Internet control message protocol)
ICMP ICMP = Internet Control Message Protocol Layer 3
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
8 Network Layer Part V Computer Networks Tutun Juhana
Part1: Ipconfig ping command Tracert command Getmac command
Lecture#7:Connectivity Verification
Chapter 2: Static Routing
Ping Hackathon 2018.
ICMP – Using Ping and Trace
Chapter 2: Static Routing
ITL Simple Diagnostic Tools
Internet Control Message Protocol Version 4 (ICMPv4)
Lecture#6:Connectivity Verification
Internet Control Message Protocol
Internet Control Message Protocol
TCP/IP Protocol Suite 1 Chapter 9 Upon completion you will be able to: Internet Control Message Protocol Be familiar with the ICMP message format Know.
Presentation transcript:

Network Measurement Bandwidth Analysis

Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously. Bottlenecks are not always obvious. Bottlenecks are not always obvious. Measuring bandwidth may become more essential for service providers as congestion increases. Measuring bandwidth may become more essential for service providers as congestion increases. Measuring bandwidth enables us to improve current systems as well as diagnosis network problems. Measuring bandwidth enables us to improve current systems as well as diagnosis network problems. Measuring bandwidth may be the key to observing what is wrong with current protocol standards. In effect, measurement is a tool for research in general. Measuring bandwidth may be the key to observing what is wrong with current protocol standards. In effect, measurement is a tool for research in general.

How we measure bandwidth It’s really more complicated than a connection speed. It’s really more complicated than a connection speed. We might want to look at capacity or we might be looking at throughput or bandwidth congestion. We might want to look at capacity or we might be looking at throughput or bandwidth congestion. We can observe packet loss, propagation delay, link capacity, but some of this results in educated “guess work.” We can observe packet loss, propagation delay, link capacity, but some of this results in educated “guess work.” There are many theories and applications intended to measure bandwidth and network statistics. There are many theories and applications intended to measure bandwidth and network statistics. For our purposes we will look at the three most common utilities used: traceroute, ping, and pathchar. For our purposes we will look at the three most common utilities used: traceroute, ping, and pathchar. It really depends on what you are after! It really depends on what you are after!

traceroute Written by Van Jacobsen in 1988 to solve persistent network problems. Written by Van Jacobsen in 1988 to solve persistent network problems. Traceroute counts hops : roughly tracing the path of an IP packet from the client to the destination. Traceroute counts hops : roughly tracing the path of an IP packet from the client to the destination. Traceroute does this by sending UDP packets with an extremely short TTL. Traceroute does this by sending UDP packets with an extremely short TTL. If all routing nodes in the path are working properly, an ICMP (Internet Connection Message Protocol) Time Exceeded message is sent (RFC 792). If all routing nodes in the path are working properly, an ICMP (Internet Connection Message Protocol) Time Exceeded message is sent (RFC 792).

traceroute Traceroute utilizes the information encapsulated in the ICMP message to determine the source (the router that sent the packet). Traceroute utilizes the information encapsulated in the ICMP message to determine the source (the router that sent the packet). We continue sending packets until we get an ICMP “host unreachable message” (this implies that we have reached the destination) or until the max number of hops has been reached. We continue sending packets until we get an ICMP “host unreachable message” (this implies that we have reached the destination) or until the max number of hops has been reached.

traceroute disadvantages Traceroute is a simple tool that is based on a few key ideas: 1. All packets will be sent on the same paths (going). 2. Consistent Routing (all packets will be routed back the same way). 3. TCP/IP implementations supporting ICMP. In reality, poor TCP/IP implmentation means that Traceroute is not dependable. Using three different Traceroute implementations, to the same IP address, resulted in three different routes.

ping One of the most widely distributed analysis tools. First released in One of the most widely distributed analysis tools. First released in The UNIX version of ping is slightly more robust, allowing us to specify the testing data and modify the patterns. The UNIX version of ping is slightly more robust, allowing us to specify the testing data and modify the patterns. ping, works by sending a single packet and waiting for the ICMP Echo response. ping, works by sending a single packet and waiting for the ICMP Echo response.

ping ping puts its own Round Trip Time value on each packet so we are not left at the mercies of the router (as in traceroute). ping puts its own Round Trip Time value on each packet so we are not left at the mercies of the router (as in traceroute). ping also provides us with a diagnostic of ICMP messages, usually buried by the system. ping also provides us with a diagnostic of ICMP messages, usually buried by the system. ping is clearly a much different tool from traceroute, but it’s simplicity makes it more reliable. ping is clearly a much different tool from traceroute, but it’s simplicity makes it more reliable. ping is only useful for estimating bandwidth under certain conditions. ping is only useful for estimating bandwidth under certain conditions.

Pathchar Also written by Van Jacobson, in Also written by Van Jacobson, in pathchar attempts to improve upon traceroute by adding mathematical analysis to the problems that occur in propagation. pathchar attempts to improve upon traceroute by adding mathematical analysis to the problems that occur in propagation. Working in the same basic manner as traceroute, pathchar sends out packets and waits for the response. Only instead of one set of packets, it sends out several. Working in the same basic manner as traceroute, pathchar sends out packets and waits for the response. Only instead of one set of packets, it sends out several. The difference being the analysis of the returned data. The difference being the analysis of the returned data. pathchar attempts to account for: pathchar attempts to account for: - loss rate - link capacity - propagation and queing delay (Grossglauser, pg40)

pathchar Taking into account the rtt from two nodes, say n and n – 1 we generate the following formula using Van Jacobson’s specifications: But he assumes three things: The error message is small enough to ignore (toss error_size/bandwidth out) The error message is small enough to ignore (toss error_size/bandwidth out) The forward time is not big enough to worry about. The forward time is not big enough to worry about. If enough transmission groups are sent at least one will not have any queuing delays. If enough transmission groups are sent at least one will not have any queuing delays. And so, we get:

pathchar In practice pathchar is not the easiest tool to use. It can be difficult to implement and its output is often chaotic. In practice pathchar is not the easiest tool to use. It can be difficult to implement and its output is often chaotic. A better implementation of pathchar was made by Bruce Mah, called pchar A better implementation of pathchar was made by Bruce Mah, called pchar Here is an example of a particular node in a trace. Here is an example of a particular node in a trace.

What we learn from pathchar Pathchar’s focus is on the statistics of data loss and the analysis of delay. Pathchar’s focus is on the statistics of data loss and the analysis of delay. Instead of capacity, we can look at data loss and latency. Instead of capacity, we can look at data loss and latency. Using pathchar and traceroute, one is more likely to track down the source of delay than to estimate bandwidth in the sense of capacity. Using pathchar and traceroute, one is more likely to track down the source of delay than to estimate bandwidth in the sense of capacity. In a commercial sense, we can utilize this information to see where end users are running into difficulty. In a commercial sense, we can utilize this information to see where end users are running into difficulty. In private application weak network components can be sorted out. In private application weak network components can be sorted out. For our purposes, bandwidth congestion allows us to think intelligibly about improving network protocols and gives us some real world metric to diagnosis real world problems. For our purposes, bandwidth congestion allows us to think intelligibly about improving network protocols and gives us some real world metric to diagnosis real world problems.

Conclusion There are two things we can conclude from this: There are two things we can conclude from this: ICMP may need to be rewritten to facilitate better tools. ICMP may need to be rewritten to facilitate better tools. Bandwidth Analysis is at it’s heart a simple idea. Bandwidth Analysis is at it’s heart a simple idea.

Sources Downey, Alan B. “Using pathchar to estimate Internet length characteristics.” Jacobson, Van. “pathchar – A Tool to Infer Characteristics of Internet Paths.” ftp://ftp.ee.lbl.gov/pathchar/msri-talk.pdf. April 21, ftp://ftp.ee.lbl.gov/pathchar/msri-talk.pdf Postel, J. “RFC 792 Internet Control Message Protocol.” September,