Internet Bandwidth Measurement Techniques Muhammad Ali Dec 17 th 2005.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Networks and TCP/IP Part 2. PORTS Ports – What and Why are They?  Typically: Computers usually have only one network access point to the internet 
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
University of Helwan / Egypt, Sept 18 – Oct 3, 2010
Internet Control Message Protocol (ICMP)
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Mapping a Network by Latency (and other things) Client connecting to , UDP port.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
1 Application Presentation Session Transport Network Datalink Physical OSI model Application IPv4, IPv6 Device Driver Hardware TCPUDP Internet.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
Bandwidth Estimation: Metrics Mesurement Techniques and Tools By Ravi Prasad, Constantinos Dovrolis, Margaret Murray and Kc Claffy IEEE Network, Nov/Dec.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
CPSC 441 TUTORIAL – MARCH 7, 2012 TA: MARYAM ELAHI NETWORK TOOLS.
Network Simulation Internet Technologies and Applications.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 Version 3.1 Module 4 Learning About Other Devices.
Reading Report 14 Yin Chen 14 Apr 2004 Reference: Internet Service Performance: Data Analysis and Visualization, Cross-Industry Working Team, July, 2000.
Videoconferencing: Network Tools & Troubleshooting Dave Devereaux-Weber University of Wisconsin-Madison Internet2 Commons Site Coordinator Training September.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
Networking Feb. 6, 2008 by Larry Finger. Networking Hardware Glossary RJ45 – Official name for 8-pin connector Cat 5, 5E or 6 - Cable suitable for “high”-speed.
KEK Network Qi Fazhi KEK SW L2/L3 Switch for outside connections Central L2/L3 Switch A Netscreen Firewall Super Sinet Router 10GbE 2 x GbE IDS.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Optical Core Networks Management protocols
1 Internet Monitoring & Tools Les Cottrell – SLAC Presented at the HEP Networking, Grids and Digital Divide meeting Daegu, Korea May 23-27, 2005 Partially.
Herramientas para diagnósticos. Ping USO: Ping nombre.dominio o dirección IP Options: -t Ping the specifed host until interrupted. -a Resolve addresses.
ICMP : Internet Control Message Protocol. Introduction ICMP is often considered part of the IP layer. It communicates error messages and other conditions.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
1 Internet Monitoring Les Cottrell – SLAC Presented at NUST Institute of Information Technology (NIIT) Rawalpindi, Pakistan, March 15, 2005 Partially funded.
© 2002, Cisco Systems, Inc. All rights reserved..
IP Forwarding.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
IP Network Performance Measurements Bruce Morgan AARNet Pty Ltd.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP: A helper protocol to IP The Internet Control Message Protocol (ICMP) is the protocol used for error.
1 Internet Tool Practice 한두균 송정환
1 Network Measurements Les Cottrell – SLAC Lecture # 4 presented at the 26 th International Nathiagali Summer College on Physics and Contemporary Needs,
ECE 526 – Network Processing Systems Design Network Processing Functions Chapter 6&9: D. E. Comer.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
11 Network Measurements Les Cottrell – SLAC Lecture # 3 presented at the Workshop on Scientific Information in the Digital Age: Access and Dissemination.
IP Telephone Lab 1 Connectivity Test IP Telephone Lab 2 Outline Ping & ICMP Fast Ping (fping) & AutoStatus One-Way Ping.
1 Capacity Dimensioning Based on Traffic Measurement in the Internet Kazumine Osaka University Shingo Ata (Osaka City Univ.)
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
Linux Operations and Administration Chapter Eight Network Communications.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
LSNDI RMRA 1 Design and troubleshooting M Clements.
© Jörg Liebeherr (modified by M. Veeraraghavan) 1 ICMP The PING Tool Traceroute program IGMP.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Connect communicate collaborate Performance Metrics & Basic Tools Robert Stoy, DFN EGI TF, Madrid September 2013.
WTG – Wireless Traffic Generator Presented by: Lilach Givaty Supervised by: Dr. Yehuda Ben-Shimol, Shlomi Atias.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
This teaching material is a part of e-Photon/ONe Master study in Optical Communications and Networks Course and module: Author(s):
iperf a gnu tool for IP networks
Network Tools and Utilities
588 Section 3 Neil Spring April 20, 1999.
Internet Monitoring Les Cottrell – SLAC
Internet Control Message Protocol
Presentation transcript:

Internet Bandwidth Measurement Techniques Muhammad Ali Dec 17 th 2005

Passive vs. Active Monitoring Active injects traffic on demand Passive watches things as they happen –Network device records information Packets, bytes, errors … kept in MIBs retrieved by SNMP –Devices (e.g. probe) capture/watch packets as they pass Router, switch, sniffer, host in promiscuous (tcpdump) Complementary to one another: –Passive: does not inject extra traffic, measures real traffic Polling to gather data generates traffic, also gathers large amounts of data –Active: provides explicit control on the generation of packets for measurement scenarios testing what you want, when you need it. Injects extra artificial traffic Can do both, e.g. start active measurement and look at passively

Passive tools SNMP Hardware probes e.g. Sniffer, NetScout, can be stand-alone or remotely access from a central management station Software probes: snoop, tcpdump, require promiscous access to NIC card, i.e. root/sudo access Flow measurement: netramet, OCxMon/CoralReef, Netflow

Some Active Measurement Tools Ping connectivity, RTT & loss –flavors of ping, fping, Linux vs Solaris ping Alternative synack, but can look like DoS attack Sting: measures one way loss Traceroute Combining ping & traceroute, –traceping, pingroute Pathchar, pchar, pipechar, bprobe, abing etc. Iperf, netperf, ttcp, FTP …

Ping ICMP client/server application built on IP –Client send ICMP echo request, server sends reply –Server usually in kernel, so reliable & fast User can specify number of data bytes. Client puts timestamp in data bytes. Compares timestamp with time when echo comes back to get RTT Many flavors (e.g. fping) and options –packet length, number of tries, timeout, separation … Ping localhost ( ) first, then gateway IP address etc.

Ping example syrup:/home$ ping -c 6 -s 64 thumper.bellcore.com PING thumper.bellcore.com ( ): 64 data bytes 72 bytes from : icmp_seq=0 ttl=240 time=641.8 ms 72 bytes from : icmp_seq=2 ttl=240 time= ms 72 bytes from : icmp_seq=3 ttl=240 time= ms 72 bytes from : icmp_seq=4 ttl=240 time=758.5 ms 72 bytes from : icmp_seq=5 ttl=240 time=482.1 ms --- thumper.bellcore.com ping statistics packets transmitted, 5 packets received, 16% packet loss round-trip min/avg/max = 482.1/880.5/ ms Repeat count Packet sizeRemote host RTT Missing seq # Summary

Traceroute UDP/ICMP tool to show route packets take from local to remote host -q 1 -m 20 lhr.comsats.net.pk traceroute to lhr.comsats.net.pk ( ), 20 hops max, 40 byte packets 1 RTR-CORE1.SLAC.Stanford.EDU ( ) ms 2 RTR-MSFC-DMZ.SLAC.Stanford.EDU ( ) ms 3 ESNET-A-GATEWAY.SLAC.Stanford.EDU ( ) ms 4 snv-slac.es.net ( ) ms 5 nyc-snv.es.net ( ) ms 6 nynap-nyc.es.net ( ) ms 7 gin-nyy-bbl.teleglobe.net ( ) ms 8 if bb5.NewYork.Teleglobe.net ( ) ms 9 if bb6.NewYork.Teleglobe.net ( ) ms ( ) ms ( ) ms 12 islamabad-gw2.comsats.net.pk ( ) ms 13 * 14 lhr.comsats.net.pk ( ) ms Probes/hop Max hops Remote host No response: Lost packet or router ignores

Pingroute Run traceroute, then ping each router n times –helps identify where in route the problems start to occur Routers may not respond to pings, or may treat pings directed at them, differently to other packets

Path characterization Pathchar –sends multiple packets of varying sizes to each router along route –measures minimum response time –plot min RTT vs packet size to get bandwidth –calculate differences to get individual hop characteristics –measures for each hop: BW, queuing, delay/hop –can take a long time Pipechar/abing –Also sends back-to-back packets and measures separation on return –Much faster –Finds bottleneck Min spacing At bottleneck Bottleneck Spacing preserved On higher speed links

Network throughput Iperf –Client generates & sends UDP or TCP packets –Server receives receives packets –Can select port, maximum window size, port, duration, Mbytes to send etc. –Client/server communicate packets seen etc. –Reports on throughput Requires sever to be installed at remote site, i.e. friendly administrators or logon account and password

Iperf example -p w 512K -P 3 -c sunstats.cern.ch Client connecting to sunstats.cern.ch, TCP port 5008 TCP window size: 512 KByte [ 6] local port connected with port 5008 [ 5] local port connected with port 5008 [ 4] local port connected with port 5008 [ ID] Interval Transfer Bandwidth [ 4] sec 19.6 MBytes 15.3 Mbits/sec [ 5] sec 19.6 MBytes 15.3 Mbits/sec [ 6] sec 19.7 MBytes 15.3 Mbits/sec Total throughput =3*15.3Mbits/s = 45.9Mbits/s TCP port 5006 Max window size 3 parallel streams Remote host

References N. Hu, P. Steenkiste, “Evaluation and Characterization of Available Bandwidth Probing Techniques”. Les Cottrell, “Internet Monitoring”, presented at, NIIT, March 15, 2005.