This shows you the differences between two versions of the page.
| network_stuff:wireshark:ws_analysis [2024/05/01 09:14] – created jotasandoku | network_stuff:wireshark:ws_analysis [2024/05/01 09:15] (current) – jotasandoku | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| issues in HTTPS API transactions: | issues in HTTPS API transactions: | ||
| - | ### 4. Time Analysis: | + | ### 1. Time Analysis: |
| - **Measure Delta Times**: Use Wireshark' | - **Measure Delta Times**: Use Wireshark' | ||
| - **Detailed RTT Analysis**: Calculate the RTT for different phases of the connection. Pay particular attention to the RTT during the initial handshake and when the connection is fully established. Look for variations in RTT at different times which could indicate fluctuating network conditions. | - **Detailed RTT Analysis**: Calculate the RTT for different phases of the connection. Pay particular attention to the RTT during the initial handshake and when the connection is fully established. Look for variations in RTT at different times which could indicate fluctuating network conditions. | ||
| - **Identify Packet Timing Anomalies**: | - **Identify Packet Timing Anomalies**: | ||
| - | ### 5. Flow Control and Window Size Analysis: | + | ### 2. Flow Control and Window Size Analysis: |
| - **TCP Window Size Analysis**: Continuously monitor the TCP window size throughout the communication. Note changes in the window size in response to network conditions. | - **TCP Window Size Analysis**: Continuously monitor the TCP window size throughout the communication. Note changes in the window size in response to network conditions. | ||
| - **Advertised Window Size**: Focus on the advertised window size from the receiver, which tells the sender how much data can be sent before requiring an acknowledgment. A consistently small advertised window could be a bottleneck. | - **Advertised Window Size**: Focus on the advertised window size from the receiver, which tells the sender how much data can be sent before requiring an acknowledgment. A consistently small advertised window could be a bottleneck. | ||
| Line 12: | Line 12: | ||
| - **Zero Window Events**: Pay special attention to any zero window announcements, | - **Zero Window Events**: Pay special attention to any zero window announcements, | ||
| - | ### 6. Application Layer Review: | + | ### 3. Application Layer Review: |
| - **API Call Analysis**: For each HTTPS request and response, check the sequence and acknowledge numbers to ensure all data is transmitted and acknowledged in order. Discrepancies might indicate packet reordering or loss. | - **API Call Analysis**: For each HTTPS request and response, check the sequence and acknowledge numbers to ensure all data is transmitted and acknowledged in order. Discrepancies might indicate packet reordering or loss. | ||
| - **SSL/TLS Handshake Delays**: Analyze the time taken to complete SSL/TLS handshakes. Repeated or lengthy handshakes can significantly affect performance and should be investigated, | - **SSL/TLS Handshake Delays**: Analyze the time taken to complete SSL/TLS handshakes. Repeated or lengthy handshakes can significantly affect performance and should be investigated, | ||
| - **Content Size and Frequency**: | - **Content Size and Frequency**: | ||
| - | ### 7. Compare Source and Destination: | + | ### 4. Compare Source and Destination: |
| - **Timestamp and Event Alignment**: | - **Timestamp and Event Alignment**: | ||
| - **Analyze Packet Flow Consistency**: | - **Analyze Packet Flow Consistency**: | ||
| - **Investigate Path Asymmetry**: | - **Investigate Path Asymmetry**: | ||
| - | ### 8. Performance Counters: | + | ### 5. Performance Counters: |
| - **Network Interface Metrics**: Examine metrics such as bandwidth usage, packet errors, and drop rates on both sender and receiver ends. High rates can point to physical network issues or configuration errors. | - **Network Interface Metrics**: Examine metrics such as bandwidth usage, packet errors, and drop rates on both sender and receiver ends. High rates can point to physical network issues or configuration errors. | ||
| - **Resource Utilization Trends**: Correlate times of high latency with spikes in CPU, memory, or disk usage. This can indicate whether the server' | - **Resource Utilization Trends**: Correlate times of high latency with spikes in CPU, memory, or disk usage. This can indicate whether the server' | ||
| - **System and Application Logs**: Review system logs for any errors or warnings that coincide with times of high latency. Application logs might also reveal inefficient handling or processing delays. | - **System and Application Logs**: Review system logs for any errors or warnings that coincide with times of high latency. Application logs might also reveal inefficient handling or processing delays. | ||
| - | --++ | + | ---- |
| - | SACK | + | |
| + | Specifics for SACK: | ||
| - | ### 4. Time Analysis: | + | |
| + | ### 1. Time Analysis: | ||
| - **Incorporate SACK into RTT Calculations**: | - **Incorporate SACK into RTT Calculations**: | ||
| - | ### 5. Flow Control and Window Size Analysis: | + | ### 2. Flow Control and Window Size Analysis: |
| - **SACK Analysis for Flow Control**: Analyze instances where SACK is used to determine its impact on flow control. SACK allows the receiver to inform the sender about all segments that have arrived successfully, | - **SACK Analysis for Flow Control**: Analyze instances where SACK is used to determine its impact on flow control. SACK allows the receiver to inform the sender about all segments that have arrived successfully, | ||
| - **Window Size Adjustments with SACK**: Observe how the window size is managed in conjunction with SACK. Effective use of SACK should minimize the need for drastic window size reductions due to packet loss, as only the missing segments are retransmitted. | - **Window Size Adjustments with SACK**: Observe how the window size is managed in conjunction with SACK. Effective use of SACK should minimize the need for drastic window size reductions due to packet loss, as only the missing segments are retransmitted. | ||
| - | ### 6. Application Layer Review: | + | ### 3. Application Layer Review: |
| - **Impact of SACK on Application Performance**: | - **Impact of SACK on Application Performance**: | ||
| - **Consistency and Efficiency of SACK Implementations**: | - **Consistency and Efficiency of SACK Implementations**: | ||
| - | ### 7. Compare Source and Destination: | + | ### 4. Compare Source and Destination: |
| - **SACK Operations Across Captures**: Compare the SACK operations as seen in the pcap files from both the source and destination. This can help identify if packet losses are being signaled and handled efficiently in both directions. | - **SACK Operations Across Captures**: Compare the SACK operations as seen in the pcap files from both the source and destination. This can help identify if packet losses are being signaled and handled efficiently in both directions. | ||
| - **Identify Discrepancies in Packet Recovery**: Look for discrepancies in how packet recovery is handled between the source and destination. Effective use of SACK should show a minimized number of retransmissions for the same loss. | - **Identify Discrepancies in Packet Recovery**: Look for discrepancies in how packet recovery is handled between the source and destination. Effective use of SACK should show a minimized number of retransmissions for the same loss. | ||
| - | ### 8. Performance Counters: | + | ### 5. Performance Counters: |
| - **Correlate SACK with Network Performance Metrics**: Look for correlations between the use of SACK and network performance metrics such as throughput and error rates. Effective use of SACK should ideally correlate with lower retransmission rates and higher throughput, especially in congested networks. | - **Correlate SACK with Network Performance Metrics**: Look for correlations between the use of SACK and network performance metrics such as throughput and error rates. Effective use of SACK should ideally correlate with lower retransmission rates and higher throughput, especially in congested networks. | ||