SlideShare a Scribd company logo
1 of 29
© 2015, The Technology
Firm
www.thetechfirm.com
Baselining
Getting Started
From The: Throughput and Latency Class
Tony Fortunato,
Sr Network Performance Specialist
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Why Baseline??
 I’m surprised how many times I see people instructed to ‘create a baseline’ with no
real purpose or goal in mind.
 This makes your job difficult and may turn into one of those never ending requests.
 Here’s some examples of why you may want to create a baseline:
• Educational exercise;
• to learn more about your application or protocols
• Understand how your application behaves for future reference or tuning
• Measure application performance to properly predict network requirements
• Document impact of network or application changes
• To create an effective troubleshooting methodology
• Determine application behavior to properly configure network equipment
(security)
 Do not proceed without a without a clear goal or target!
 Same applies to general tool use!!
2
© 2015, The Technology Firm WWW.THETECHFIRM.COM 3
Bandwidth Exercise
Here’s the scenario:
 Copy a file to and from your server and record how long it takes.
• 12 MB file on a 10 Mb Ethernet
• 120 MB file on a 100 Mb Ethernet
• 1,200 MB file on a 1 Gb Ethernet
• 67.5 MB on 54 Mb WiFi
• Theoretically, all these scenarios should take approximately 10 seconds.
How did you do? What if it took you 11 vs 55 seconds?
• Basic formula is bits/8 x 10 seconds which is strictly theoritical
 How would you measure the network load you created during this test?
o Using SNMP from your switch port?
o Span or mirror your port to a Protocol Analyzer or other types of testers or probes?
o Use Microsoft’s Perfmon or other OS utilities (if available)?
o Does it matter if the server is local, remote?
o What about protocols?
o LAN vs WiFi
o Disk vs RAM
© 2015, The Technology Firm WWW.THETECHFIRM.COM 4
Common Baselines
• Baselining is often a forgotten art and most people don’t baseline for the following
reasons:
o When should I start?
o What should a baseline look like?
o What if someone actually reads it and wants more information?
o Why bother? Everything changes so fast around here.
o I don’t know how to baseline.
• Baselines should be:
o Clearly defined.
o For example PC bootup baseline, Login baseline, Application login Baseline, throughput
or Network Upgrade Baseline.
• As long as your goal is clear and the methodology is documented your baseline
is correct.
• If you have performed a baseline correctly, you will typically find problems to fix along
the way or settings to tune.
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Baselining Options
The first step to a successful baseline is to determine what you want to baseline.
Examples:
Network
• Record the load, protocol distribution and other network characteristics
Network Equipment
• Log equipment specific details such as temperature, port errors
Workstations
• Document protocols, application dependencies
Measurement point and methodology must be documented so you can properly
duplicate or retest
© 2015, The Technology Firm WWW.THETECHFIRM.COM 6
Synthetic Transaction Performance
• Several products on the market use “synthetic” transactions.
• Synthetic transactions are modeled after popular applications. i.e. ftp, Telnet, HTTP,
etc… These synthetic transactions are transmitted across a network to estimate
transaction response time.
• Results only as accurate as the synthetic transaction and test PC’s.
• In many cases multiple workstations can be simulated.
• The accuracy of the synthetic transaction versus performing the same transaction [I.e.
ftp] comes into question since the test nodes may not properly represent the
production nodes specifications or load.
• Ensure that these tests are not executed solely from RAM to include realistic disk
latency
© 2015, The Technology Firm WWW.THETECHFIRM.COM 7
Protocol Analyzer - Performance Measurement
• Data is gathered using existing traffic.
• Results are what is really happening on the wire.
• Does not require the introduction of additional traffic onto the wire.
• Takes into account production server/client loads, network configuration and any
undocumented variables.
• Analysis points must be selected carefully to provide accurate results.
• This approach is the most labor intensive and requires a high level of protocol
analysis understanding.
• Try to produce reports from your trace files to better explain and understand your
findings.
© 2015, The Technology Firm WWW.THETECHFIRM.COM 8
Network Configuration Example
Client Switch
Switch
Switch
Switch
Server
Where would you go for your capture packets?
B
D
CA X
© 2015, The Technology Firm WWW.THETECHFIRM.COM 9
Review
• There is no single correct means of measuring network performance.
• Not only must the proper tool be selected for the job, but the proper methodology
must be used along with the tool.
• In some cases you may want to try to document “in what direction is the main
source of latency?”
• Document your methodology as well as your findings to promote consistency.
• Always re-measure after any changes.
• In many cases, you should take more than one measurement.
• i.e. I try to take 5, drop the high, low and average the three.
• Automating or documenting tasks will ensure each test is performed identically.
© 2015, The Technology Firm WWW.THETECHFIRM.COM 10
Where Do You Start?
• When you baseline or troubleshoot where do you start?
• It is quite common for a help desk person to ping a server with the application that a
client may be complaining about.
• Is a ping the same as running the application?
• Do you dismiss the issue as a local issue since no one else has complained … YET!!!
• Do you start troubleshooting near the server, on the Gig backbone, or near the client?
• I typically start investigating problems and baselines from the clients’ perspective.
© 2015, The Technology Firm WWW.THETECHFIRM.COM 11
Application Analysis Steps
• Baseline the application.
• Review the trace files.
• If required, predict the application performance.
• Measure and compare the application performance in production.
• Troubleshoot the application if necessary.
© 2015, The Technology Firm WWW.THETECHFIRM.COM 12
Baseline the Application
• The purpose of this step is to collect all of the traffic that crosses the network from the
start of the application to the end of the application. This traffic will be divided up into
individual tasks for analysis.
• It is imperative that every step and the EXACT configuration and location of all
equipment is documented properly.
• This step directly impacts the remaining process, so be thorough.
• Sample of items to document:
o Segment Name.
o Switch Identifier, Slot and Card.
o Note if mirror ports or hubs are used.
o Time/Date.
o Source Station IP, MAC Address, Protocols loaded, Operating System Version, Application
Version.
o Script of what the operator will do in detail. Screen shots are optimal.
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Data Collection And Intercept options
Capturing the data can be done many different ways, but again, the methodology and tool
must be documented.
You can use the following methods to create a baseline:
Netflow, sflow, etc..
SNMP
Server or pc specific stats
Packet capture application installed
• On server
• On client
• On device on network path
Packet intercept options
• Span, or similar commands
• Hub – 10/100 HD connections
• TAP
© 2015, The Technology Firm WWW.THETECHFIRM.COM
• Set up Analyzer to capture all traffic to and from the test workstation.
• The Hub configuration is only applicable for Half-Duplex configurations and when you
want to observe application behavior or protocols
• Full Duplex configurations require a full-duplex tap or mirror/span port.
14
HUB
SwitchTest Workstation
Protocol Analyzer
Capturing the Application Traffic – HUB Example
SERVER
© 2015, The Technology Firm WWW.THETECHFIRM.COM
• Setup a filter to capture all traffic to and from the MAC address of the workstation.
• Why the MAC?
Filter On Specific Relevant Data
© 2015, The Technology Firm WWW.THETECHFIRM.COM
• Create a worksheet that outlines a script of tasks to be performed.
• This will ensure consistency.
• Provide columns for starting and ending frame numbers.
16
Create a Script
Description Start
Frame
End
Frame
Launch Application via Icon [app.exe].
Enter Login Name [Joe Smith]
Enter Login Password [don’t document]
Select Account Query from Main Screen
Query Account 1234
Wireshark
© 2015, The Technology Firm WWW.THETECHFIRM.COM 17
Record Frame Numbers
• Before each task is performed, note the frame number on the analyzer.
• After the task is complete note the frame number.
• Creating a packet bookmark – like a ping between tasks is always helpful
• Repeat this process for all items on your script.
• Make sure the person running the application waits for your signal before they
move on to the next task.
• After the testing is complete, go through the capture file with the worksheet.
• Try to resist the impulse to start analyzing data since it will distract you.
Description Start Frame End Frame
Launch Application via Icon [app.exe]. 1 111
Enter Login Name [Joe Smith] 112 121
Enter Login Password [don’t document] 122 144
Select Account Query from Main Screen 145 222
Query Account 1234 223 332
© 2015, The Technology Firm WWW.THETECHFIRM.COM 18
Reporting Your Results
• Now that you have gathered and calculated the traffic per task, prepare a chart with
your findings.
• The only other variable to include is how many clients will be using this application.
• This is important because you may be asked to predict load based on a number of
clients that will be accessing this application.
Description Start Frame End Frame Bytes
Launch Application via Icon [app.exe]. 1 111 120,000
Enter Login Name [Joe Smith] 112 121 10,000
Enter Login Password [don’t document] 122 144 10,120
Select Account Query from Main Screen 145 222 60,000
Query Account 1234 223 332 132,022
© 2015, The Technology Firm WWW.THETECHFIRM.COM 19
Trace File Review
• Analyze each task associated with the application to determine the processing
time consumed by the client and each of its dependencies.
• Note if any additional servers, protocols or nodes are required to complete any tasks.
• You may want to graphically display these results.
Application X
0
10000
20000
30000
40000
50000
60000
70000
3:32:17
3:33:26
3:33:37
3:33:48
3:33:59
3:34:10
3:34:21
3:34:32
3:34:43
3:35:47
3:36:00
3:36:11
3:36:25
3:36:37
3:36:48
3:37:01
Time
Bits/Sec
Login Query
Excel Chart
© 2015, The Technology Firm WWW.THETECHFIRM.COM 20
Reporting Your Results
• Sample chart comparing various protocols and applications copying the same file.
File Copy Comparison
-
1,000,000
2,000,000
3,000,000
4,000,000
5,000,000
6,000,000
7,000,000
8,000,000
9,000,000
10,000,000
1 2 3 4 5 6 7 8 9 10 11 12
Seconds
bits
smb ip copy smb ipx copy smb nb copy http copy ftp copy
© 2015, The Technology Firm WWW.THETECHFIRM.COM 21
Bootup Configuration Baseline
Goal:
• To record the behavior of a PC 'on the wire' when it is powered on. The client does
not to be present since no login is required.
• Any dependencies, protocols and load will be documented.
Methodology:
• Place your protocol analyzer either on the same hub as the workstation or configure
some form of port monitoring.
• Be careful if you set up a MAC/DLC filter based on the target workstation's hardware
address. You may miss some packets, like some DHCP replies.. If DHCP is used
and you wish to use a MAC filter, include the bootp/DHCP protocol.
• After powering the workstation on ensure that all background services are loaded by
simply observing the hard drive light. When the hard drive light 'settles down', and the
frame counters stop, you're done.
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Simple Baseline Example
 Simply go to a folder that is located on your network drive and search for something
common. This was a baseline that I did for a client who complained about
performance when they searched for documents.
 In my example, I started a capture and navigated to my articles archive and searched
for the word Cisco.
 The goal of this exercise was to record which protocols are used and how much traffic
is generated.
 This type of test allows us to understand how remote users may experience this same
task which they perform regularly.
22
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Test Configuration
23
Search
Articles on O:
drive folder
for the word
Cisco
Capture filter with
server MAC address
10.44.10.94
10.44.10.171
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Sample Results
24
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Protocol Breakdown
25
Note TCP port 445 was used for this test
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Document Reported Issues
26
Nothing wrong with an opinion as long as you remember that’s all it is
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Packet Slicing
 Since we are not examining the payload, we can packet slice, or only save the first
128 Bytes
 Slicing the trace file makes the file size much smaller which allows Wireshark, or
other tools to process it much quicker.
 This will provide all the addressing and enough of the protocol for this exercise
 I don’t know of a way to slice a trace file from within Wireshark after I’ve captured it
and simply use the editcap utility that Wireshark provides
 "Program FilesWiresharkeditcap.exe" -s 128 "search for cisco for mapped
drive.pcapng" "search for cisco for mapped drive sliced.pcapng"
 In this example, the trace file went from approximately 600 MB to 98 MB
27
© 2015, The Technology Firm WWW.THETECHFIRM.COM
Conclusions, Questions, or Recommendations
 Can a different protocol be used instead of SMB
 Do the results change if you chose a subfolder and perform a similar search
 What effect does IPV6 have
 Since this department does this operation often, can they create an application to
make this more efficient
 Would remote clients require internet access with significant symmetrical bandwidth
28
© 2015, The Technology
Firm
www.thetechfirm.com
Baselining
Getting Started
Thanks for watching
Tony Fortunato,
Sr Network Performance Specialist

More Related Content

What's hot

Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark AnalysisYoss Cohen
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005FNian
 
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"GlobalLogic Ukraine
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li Inmhaviv
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Jisc
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Smart bin internet of thing (IoT) project using LoRaWAN
Smart bin internet of thing (IoT) project using LoRaWANSmart bin internet of thing (IoT) project using LoRaWAN
Smart bin internet of thing (IoT) project using LoRaWANJisc
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Yoram Orzach
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Jisc
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...Adam Dunkels
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and CaliforniumJulien Vermillard
 

What's hot (20)

Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005
 
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
Embedded Webinar #17 "Low-level Network Testing in Embedded Devices Development"
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Smart bin internet of thing (IoT) project using LoRaWAN
Smart bin internet of thing (IoT) project using LoRaWANSmart bin internet of thing (IoT) project using LoRaWAN
Smart bin internet of thing (IoT) project using LoRaWAN
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Itep
ItepItep
Itep
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and Californium
 
Wireshark
WiresharkWireshark
Wireshark
 

Viewers also liked

2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcastTony Fortunato
 
Debugging with Fiddler
Debugging with FiddlerDebugging with Fiddler
Debugging with FiddlerIdo Flatow
 
Testing Microservices with a Citrus twist
Testing Microservices with a Citrus twistTesting Microservices with a Citrus twist
Testing Microservices with a Citrus twistchristophd
 
Capybara testing
Capybara testingCapybara testing
Capybara testingFutureworkz
 
Testing Java EE apps with Arquillian
Testing Java EE apps with ArquillianTesting Java EE apps with Arquillian
Testing Java EE apps with ArquillianIvan Ivanov
 
Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Helder De Oliveira
 
Lunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraLunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraMarc Seeger
 
Arquillian & Citrus
Arquillian & CitrusArquillian & Citrus
Arquillian & Citruschristophd
 
Automated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choiceAutomated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choicetoddbr
 
Pruebas funcionales de Software
Pruebas funcionales de SoftwarePruebas funcionales de Software
Pruebas funcionales de SoftwareBrian Pando
 
Microsoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryMicrosoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryOlav Tvedt
 
Power shell for newbies getting started powershell 4
Power shell for newbies getting started powershell 4Power shell for newbies getting started powershell 4
Power shell for newbies getting started powershell 4Zafar Ali Khan
 
Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Brian Sam-Bodden
 
Integration with Docker and .NET Core
Integration with Docker and .NET CoreIntegration with Docker and .NET Core
Integration with Docker and .NET CoreSriram Hariharan
 
Three Uses Of JIRA Beyond Bug Tracking
Three Uses Of JIRA Beyond Bug TrackingThree Uses Of JIRA Beyond Bug Tracking
Three Uses Of JIRA Beyond Bug TrackingAtlassian
 
TestLink introduction
TestLink introductionTestLink introduction
TestLink introductionDavid Ionut
 

Viewers also liked (17)

2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast2015 03 06 lmtv wtf http webcast
2015 03 06 lmtv wtf http webcast
 
Debugging with Fiddler
Debugging with FiddlerDebugging with Fiddler
Debugging with Fiddler
 
Testing Microservices with a Citrus twist
Testing Microservices with a Citrus twistTesting Microservices with a Citrus twist
Testing Microservices with a Citrus twist
 
Capybara testing
Capybara testingCapybara testing
Capybara testing
 
Testing Java EE apps with Arquillian
Testing Java EE apps with ArquillianTesting Java EE apps with Arquillian
Testing Java EE apps with Arquillian
 
Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)Bdd (Behavior Driven Development)
Bdd (Behavior Driven Development)
 
Lunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and CapybaraLunch and learn: Cucumber and Capybara
Lunch and learn: Cucumber and Capybara
 
Workshop calabash appium
Workshop calabash appiumWorkshop calabash appium
Workshop calabash appium
 
Arquillian & Citrus
Arquillian & CitrusArquillian & Citrus
Arquillian & Citrus
 
Automated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choiceAutomated Acceptance Tests & Tool choice
Automated Acceptance Tests & Tool choice
 
Pruebas funcionales de Software
Pruebas funcionales de SoftwarePruebas funcionales de Software
Pruebas funcionales de Software
 
Microsoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directoryMicrosoft Windows 10 Bootcamp - Active directory
Microsoft Windows 10 Bootcamp - Active directory
 
Power shell for newbies getting started powershell 4
Power shell for newbies getting started powershell 4Power shell for newbies getting started powershell 4
Power shell for newbies getting started powershell 4
 
Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013Rspec and Capybara Intro Tutorial at RailsConf 2013
Rspec and Capybara Intro Tutorial at RailsConf 2013
 
Integration with Docker and .NET Core
Integration with Docker and .NET CoreIntegration with Docker and .NET Core
Integration with Docker and .NET Core
 
Three Uses Of JIRA Beyond Bug Tracking
Three Uses Of JIRA Beyond Bug TrackingThree Uses Of JIRA Beyond Bug Tracking
Three Uses Of JIRA Beyond Bug Tracking
 
TestLink introduction
TestLink introductionTestLink introduction
TestLink introduction
 

Similar to 2015 02 24 lmtv baselining

Integration strategies best practices- Mulesoft meetup April 2018
Integration strategies   best practices- Mulesoft meetup April 2018Integration strategies   best practices- Mulesoft meetup April 2018
Integration strategies best practices- Mulesoft meetup April 2018Rohan Rasane
 
Hybrid Automation Framework Developement
Hybrid Automation Framework DevelopementHybrid Automation Framework Developement
Hybrid Automation Framework DevelopementGlasdon Falcao
 
Machine Data Is EVERYWHERE: Use It for Testing
Machine Data Is EVERYWHERE: Use It for TestingMachine Data Is EVERYWHERE: Use It for Testing
Machine Data Is EVERYWHERE: Use It for TestingTechWell
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Jim Kaplan CIA CFE
 
Anupam_Chaubey_QA_Resume_1Sep
Anupam_Chaubey_QA_Resume_1SepAnupam_Chaubey_QA_Resume_1Sep
Anupam_Chaubey_QA_Resume_1Sepanupam chaubey
 
Load testing with Visual Studio and Azure - Andrew Siemer
Load testing with Visual Studio and Azure - Andrew SiemerLoad testing with Visual Studio and Azure - Andrew Siemer
Load testing with Visual Studio and Azure - Andrew SiemerAndrew Siemer
 
Praxistaugliche notes strategien 4 cloud
Praxistaugliche notes strategien 4 cloudPraxistaugliche notes strategien 4 cloud
Praxistaugliche notes strategien 4 cloudRoman Weber
 
Introduction to performance testing
Introduction to performance testingIntroduction to performance testing
Introduction to performance testingRichard Bishop
 
A Three-Tier Load Testing Program Saved Our Bacon
A Three-Tier Load Testing Program Saved Our BaconA Three-Tier Load Testing Program Saved Our Bacon
A Three-Tier Load Testing Program Saved Our BaconTechWell
 
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...Startupfest
 
Java/Hybris performance monitoring and optimization
Java/Hybris performance monitoring and optimizationJava/Hybris performance monitoring and optimization
Java/Hybris performance monitoring and optimizationEPAM Lviv
 
Observability - Stockholm Splunk UG Jan 19 2023.pptx
Observability - Stockholm Splunk UG Jan 19 2023.pptxObservability - Stockholm Splunk UG Jan 19 2023.pptx
Observability - Stockholm Splunk UG Jan 19 2023.pptxMagnus Johansson
 
Continuous Performance Testing: The New Standard
Continuous Performance Testing: The New StandardContinuous Performance Testing: The New Standard
Continuous Performance Testing: The New StandardTechWell
 

Similar to 2015 02 24 lmtv baselining (20)

Integration strategies best practices- Mulesoft meetup April 2018
Integration strategies   best practices- Mulesoft meetup April 2018Integration strategies   best practices- Mulesoft meetup April 2018
Integration strategies best practices- Mulesoft meetup April 2018
 
Hybrid Automation Framework Developement
Hybrid Automation Framework DevelopementHybrid Automation Framework Developement
Hybrid Automation Framework Developement
 
LMTV Routing Audit
LMTV Routing AuditLMTV Routing Audit
LMTV Routing Audit
 
TechTalk: Report Bugs Like a Boss
TechTalk: Report Bugs Like a BossTechTalk: Report Bugs Like a Boss
TechTalk: Report Bugs Like a Boss
 
Machine Data Is EVERYWHERE: Use It for Testing
Machine Data Is EVERYWHERE: Use It for TestingMachine Data Is EVERYWHERE: Use It for Testing
Machine Data Is EVERYWHERE: Use It for Testing
 
Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices Cybersecurity controlling ports and network devices
Cybersecurity controlling ports and network devices
 
Anupam_Chaubey_QA_Resume_1Sep
Anupam_Chaubey_QA_Resume_1SepAnupam_Chaubey_QA_Resume_1Sep
Anupam_Chaubey_QA_Resume_1Sep
 
Load testing with Visual Studio and Azure - Andrew Siemer
Load testing with Visual Studio and Azure - Andrew SiemerLoad testing with Visual Studio and Azure - Andrew Siemer
Load testing with Visual Studio and Azure - Andrew Siemer
 
Neev Load Testing Services
Neev Load Testing ServicesNeev Load Testing Services
Neev Load Testing Services
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Praxistaugliche notes strategien 4 cloud
Praxistaugliche notes strategien 4 cloudPraxistaugliche notes strategien 4 cloud
Praxistaugliche notes strategien 4 cloud
 
Introduction to performance testing
Introduction to performance testingIntroduction to performance testing
Introduction to performance testing
 
A Three-Tier Load Testing Program Saved Our Bacon
A Three-Tier Load Testing Program Saved Our BaconA Three-Tier Load Testing Program Saved Our Bacon
A Three-Tier Load Testing Program Saved Our Bacon
 
JMeter
JMeterJMeter
JMeter
 
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
 
Java/Hybris performance monitoring and optimization
Java/Hybris performance monitoring and optimizationJava/Hybris performance monitoring and optimization
Java/Hybris performance monitoring and optimization
 
Fundamentals Performance Testing
Fundamentals Performance TestingFundamentals Performance Testing
Fundamentals Performance Testing
 
Training - What is Performance ?
Training  - What is Performance ?Training  - What is Performance ?
Training - What is Performance ?
 
Observability - Stockholm Splunk UG Jan 19 2023.pptx
Observability - Stockholm Splunk UG Jan 19 2023.pptxObservability - Stockholm Splunk UG Jan 19 2023.pptx
Observability - Stockholm Splunk UG Jan 19 2023.pptx
 
Continuous Performance Testing: The New Standard
Continuous Performance Testing: The New StandardContinuous Performance Testing: The New Standard
Continuous Performance Testing: The New Standard
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

2015 02 24 lmtv baselining

  • 1. © 2015, The Technology Firm www.thetechfirm.com Baselining Getting Started From The: Throughput and Latency Class Tony Fortunato, Sr Network Performance Specialist
  • 2. © 2015, The Technology Firm WWW.THETECHFIRM.COM Why Baseline??  I’m surprised how many times I see people instructed to ‘create a baseline’ with no real purpose or goal in mind.  This makes your job difficult and may turn into one of those never ending requests.  Here’s some examples of why you may want to create a baseline: • Educational exercise; • to learn more about your application or protocols • Understand how your application behaves for future reference or tuning • Measure application performance to properly predict network requirements • Document impact of network or application changes • To create an effective troubleshooting methodology • Determine application behavior to properly configure network equipment (security)  Do not proceed without a without a clear goal or target!  Same applies to general tool use!! 2
  • 3. © 2015, The Technology Firm WWW.THETECHFIRM.COM 3 Bandwidth Exercise Here’s the scenario:  Copy a file to and from your server and record how long it takes. • 12 MB file on a 10 Mb Ethernet • 120 MB file on a 100 Mb Ethernet • 1,200 MB file on a 1 Gb Ethernet • 67.5 MB on 54 Mb WiFi • Theoretically, all these scenarios should take approximately 10 seconds. How did you do? What if it took you 11 vs 55 seconds? • Basic formula is bits/8 x 10 seconds which is strictly theoritical  How would you measure the network load you created during this test? o Using SNMP from your switch port? o Span or mirror your port to a Protocol Analyzer or other types of testers or probes? o Use Microsoft’s Perfmon or other OS utilities (if available)? o Does it matter if the server is local, remote? o What about protocols? o LAN vs WiFi o Disk vs RAM
  • 4. © 2015, The Technology Firm WWW.THETECHFIRM.COM 4 Common Baselines • Baselining is often a forgotten art and most people don’t baseline for the following reasons: o When should I start? o What should a baseline look like? o What if someone actually reads it and wants more information? o Why bother? Everything changes so fast around here. o I don’t know how to baseline. • Baselines should be: o Clearly defined. o For example PC bootup baseline, Login baseline, Application login Baseline, throughput or Network Upgrade Baseline. • As long as your goal is clear and the methodology is documented your baseline is correct. • If you have performed a baseline correctly, you will typically find problems to fix along the way or settings to tune.
  • 5. © 2015, The Technology Firm WWW.THETECHFIRM.COM Baselining Options The first step to a successful baseline is to determine what you want to baseline. Examples: Network • Record the load, protocol distribution and other network characteristics Network Equipment • Log equipment specific details such as temperature, port errors Workstations • Document protocols, application dependencies Measurement point and methodology must be documented so you can properly duplicate or retest
  • 6. © 2015, The Technology Firm WWW.THETECHFIRM.COM 6 Synthetic Transaction Performance • Several products on the market use “synthetic” transactions. • Synthetic transactions are modeled after popular applications. i.e. ftp, Telnet, HTTP, etc… These synthetic transactions are transmitted across a network to estimate transaction response time. • Results only as accurate as the synthetic transaction and test PC’s. • In many cases multiple workstations can be simulated. • The accuracy of the synthetic transaction versus performing the same transaction [I.e. ftp] comes into question since the test nodes may not properly represent the production nodes specifications or load. • Ensure that these tests are not executed solely from RAM to include realistic disk latency
  • 7. © 2015, The Technology Firm WWW.THETECHFIRM.COM 7 Protocol Analyzer - Performance Measurement • Data is gathered using existing traffic. • Results are what is really happening on the wire. • Does not require the introduction of additional traffic onto the wire. • Takes into account production server/client loads, network configuration and any undocumented variables. • Analysis points must be selected carefully to provide accurate results. • This approach is the most labor intensive and requires a high level of protocol analysis understanding. • Try to produce reports from your trace files to better explain and understand your findings.
  • 8. © 2015, The Technology Firm WWW.THETECHFIRM.COM 8 Network Configuration Example Client Switch Switch Switch Switch Server Where would you go for your capture packets? B D CA X
  • 9. © 2015, The Technology Firm WWW.THETECHFIRM.COM 9 Review • There is no single correct means of measuring network performance. • Not only must the proper tool be selected for the job, but the proper methodology must be used along with the tool. • In some cases you may want to try to document “in what direction is the main source of latency?” • Document your methodology as well as your findings to promote consistency. • Always re-measure after any changes. • In many cases, you should take more than one measurement. • i.e. I try to take 5, drop the high, low and average the three. • Automating or documenting tasks will ensure each test is performed identically.
  • 10. © 2015, The Technology Firm WWW.THETECHFIRM.COM 10 Where Do You Start? • When you baseline or troubleshoot where do you start? • It is quite common for a help desk person to ping a server with the application that a client may be complaining about. • Is a ping the same as running the application? • Do you dismiss the issue as a local issue since no one else has complained … YET!!! • Do you start troubleshooting near the server, on the Gig backbone, or near the client? • I typically start investigating problems and baselines from the clients’ perspective.
  • 11. © 2015, The Technology Firm WWW.THETECHFIRM.COM 11 Application Analysis Steps • Baseline the application. • Review the trace files. • If required, predict the application performance. • Measure and compare the application performance in production. • Troubleshoot the application if necessary.
  • 12. © 2015, The Technology Firm WWW.THETECHFIRM.COM 12 Baseline the Application • The purpose of this step is to collect all of the traffic that crosses the network from the start of the application to the end of the application. This traffic will be divided up into individual tasks for analysis. • It is imperative that every step and the EXACT configuration and location of all equipment is documented properly. • This step directly impacts the remaining process, so be thorough. • Sample of items to document: o Segment Name. o Switch Identifier, Slot and Card. o Note if mirror ports or hubs are used. o Time/Date. o Source Station IP, MAC Address, Protocols loaded, Operating System Version, Application Version. o Script of what the operator will do in detail. Screen shots are optimal.
  • 13. © 2015, The Technology Firm WWW.THETECHFIRM.COM Data Collection And Intercept options Capturing the data can be done many different ways, but again, the methodology and tool must be documented. You can use the following methods to create a baseline: Netflow, sflow, etc.. SNMP Server or pc specific stats Packet capture application installed • On server • On client • On device on network path Packet intercept options • Span, or similar commands • Hub – 10/100 HD connections • TAP
  • 14. © 2015, The Technology Firm WWW.THETECHFIRM.COM • Set up Analyzer to capture all traffic to and from the test workstation. • The Hub configuration is only applicable for Half-Duplex configurations and when you want to observe application behavior or protocols • Full Duplex configurations require a full-duplex tap or mirror/span port. 14 HUB SwitchTest Workstation Protocol Analyzer Capturing the Application Traffic – HUB Example SERVER
  • 15. © 2015, The Technology Firm WWW.THETECHFIRM.COM • Setup a filter to capture all traffic to and from the MAC address of the workstation. • Why the MAC? Filter On Specific Relevant Data
  • 16. © 2015, The Technology Firm WWW.THETECHFIRM.COM • Create a worksheet that outlines a script of tasks to be performed. • This will ensure consistency. • Provide columns for starting and ending frame numbers. 16 Create a Script Description Start Frame End Frame Launch Application via Icon [app.exe]. Enter Login Name [Joe Smith] Enter Login Password [don’t document] Select Account Query from Main Screen Query Account 1234 Wireshark
  • 17. © 2015, The Technology Firm WWW.THETECHFIRM.COM 17 Record Frame Numbers • Before each task is performed, note the frame number on the analyzer. • After the task is complete note the frame number. • Creating a packet bookmark – like a ping between tasks is always helpful • Repeat this process for all items on your script. • Make sure the person running the application waits for your signal before they move on to the next task. • After the testing is complete, go through the capture file with the worksheet. • Try to resist the impulse to start analyzing data since it will distract you. Description Start Frame End Frame Launch Application via Icon [app.exe]. 1 111 Enter Login Name [Joe Smith] 112 121 Enter Login Password [don’t document] 122 144 Select Account Query from Main Screen 145 222 Query Account 1234 223 332
  • 18. © 2015, The Technology Firm WWW.THETECHFIRM.COM 18 Reporting Your Results • Now that you have gathered and calculated the traffic per task, prepare a chart with your findings. • The only other variable to include is how many clients will be using this application. • This is important because you may be asked to predict load based on a number of clients that will be accessing this application. Description Start Frame End Frame Bytes Launch Application via Icon [app.exe]. 1 111 120,000 Enter Login Name [Joe Smith] 112 121 10,000 Enter Login Password [don’t document] 122 144 10,120 Select Account Query from Main Screen 145 222 60,000 Query Account 1234 223 332 132,022
  • 19. © 2015, The Technology Firm WWW.THETECHFIRM.COM 19 Trace File Review • Analyze each task associated with the application to determine the processing time consumed by the client and each of its dependencies. • Note if any additional servers, protocols or nodes are required to complete any tasks. • You may want to graphically display these results. Application X 0 10000 20000 30000 40000 50000 60000 70000 3:32:17 3:33:26 3:33:37 3:33:48 3:33:59 3:34:10 3:34:21 3:34:32 3:34:43 3:35:47 3:36:00 3:36:11 3:36:25 3:36:37 3:36:48 3:37:01 Time Bits/Sec Login Query Excel Chart
  • 20. © 2015, The Technology Firm WWW.THETECHFIRM.COM 20 Reporting Your Results • Sample chart comparing various protocols and applications copying the same file. File Copy Comparison - 1,000,000 2,000,000 3,000,000 4,000,000 5,000,000 6,000,000 7,000,000 8,000,000 9,000,000 10,000,000 1 2 3 4 5 6 7 8 9 10 11 12 Seconds bits smb ip copy smb ipx copy smb nb copy http copy ftp copy
  • 21. © 2015, The Technology Firm WWW.THETECHFIRM.COM 21 Bootup Configuration Baseline Goal: • To record the behavior of a PC 'on the wire' when it is powered on. The client does not to be present since no login is required. • Any dependencies, protocols and load will be documented. Methodology: • Place your protocol analyzer either on the same hub as the workstation or configure some form of port monitoring. • Be careful if you set up a MAC/DLC filter based on the target workstation's hardware address. You may miss some packets, like some DHCP replies.. If DHCP is used and you wish to use a MAC filter, include the bootp/DHCP protocol. • After powering the workstation on ensure that all background services are loaded by simply observing the hard drive light. When the hard drive light 'settles down', and the frame counters stop, you're done.
  • 22. © 2015, The Technology Firm WWW.THETECHFIRM.COM Simple Baseline Example  Simply go to a folder that is located on your network drive and search for something common. This was a baseline that I did for a client who complained about performance when they searched for documents.  In my example, I started a capture and navigated to my articles archive and searched for the word Cisco.  The goal of this exercise was to record which protocols are used and how much traffic is generated.  This type of test allows us to understand how remote users may experience this same task which they perform regularly. 22
  • 23. © 2015, The Technology Firm WWW.THETECHFIRM.COM Test Configuration 23 Search Articles on O: drive folder for the word Cisco Capture filter with server MAC address 10.44.10.94 10.44.10.171
  • 24. © 2015, The Technology Firm WWW.THETECHFIRM.COM Sample Results 24
  • 25. © 2015, The Technology Firm WWW.THETECHFIRM.COM Protocol Breakdown 25 Note TCP port 445 was used for this test
  • 26. © 2015, The Technology Firm WWW.THETECHFIRM.COM Document Reported Issues 26 Nothing wrong with an opinion as long as you remember that’s all it is
  • 27. © 2015, The Technology Firm WWW.THETECHFIRM.COM Packet Slicing  Since we are not examining the payload, we can packet slice, or only save the first 128 Bytes  Slicing the trace file makes the file size much smaller which allows Wireshark, or other tools to process it much quicker.  This will provide all the addressing and enough of the protocol for this exercise  I don’t know of a way to slice a trace file from within Wireshark after I’ve captured it and simply use the editcap utility that Wireshark provides  "Program FilesWiresharkeditcap.exe" -s 128 "search for cisco for mapped drive.pcapng" "search for cisco for mapped drive sliced.pcapng"  In this example, the trace file went from approximately 600 MB to 98 MB 27
  • 28. © 2015, The Technology Firm WWW.THETECHFIRM.COM Conclusions, Questions, or Recommendations  Can a different protocol be used instead of SMB  Do the results change if you chose a subfolder and perform a similar search  What effect does IPV6 have  Since this department does this operation often, can they create an application to make this more efficient  Would remote clients require internet access with significant symmetrical bandwidth 28
  • 29. © 2015, The Technology Firm www.thetechfirm.com Baselining Getting Started Thanks for watching Tony Fortunato, Sr Network Performance Specialist

Editor's Notes

  1. Here’s an example: We line up and run the 100 meter dash. We will all have different times So does that mean if you got a slower time, there is something wrong with you?