RE: [OT ? ] getting stats out of network capture

2008-07-25 Thread Bob McConnell
On Behalf Of Norberto Meijome

On Thu, 24 Jul 2008 17:42:04 -0700
Chuck Swiger [EMAIL PROTECTED] wrote:
 
 Try something like this on the webserver or client machine:
 
 # tcpdump -ttt -q -n -A tcp port 80
 
 Excellent, thanks Chuck.
 I haven't got access to the server, and the client has to
 run on a win32 ... so i'll figure out how to tcpdump on w32
 or howto in wireshark gui.

On MS-Windows, the easiest option is to download and install Wireshark
1.0, which will also install Winpcap. It gives you the option of
installing Winpcap as a system service, which enables it for all users,
even the non-admin types.

When you use it, if possible, always tie it to the NIC, not the NDIS
layer. A lot of traffic is sidetracked before it gets to NDIS. In some
cases where the NIC is not supported, we have found that the only
traffic Wireshark can capture is what is left after every other process
has received theirs.

Bob McConnell
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [OT ? ] getting stats out of network capture

2008-07-24 Thread Chuck Swiger

Hi--

On Jul 24, 2008, at 5:12 PM, Norberto Meijome wrote:
I'm interested in knowing the application level RTT for a HTTP  
application -
ie, not from SYN , SYN/ACK ... FIN , FIN/ACK , but from the POST  
(http.request

in wireshark) by an  app on my side to the response by the server
(http.response). I have no access to either app's code.


Try something like this on the webserver or client machine:

# tcpdump -ttt -q -n -A tcp port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol  
decode

listening on fxp0, link-type EN10MB (Ethernet), capture size 96 bytes
00 IP 17.227.140.124.49729  199.103.21.227.80: tcp 488
[EMAIL PROTECTED]/.%|.g...A.P.4`...8c.
9.,GET /server-status HTTP/1.1
H
001348 IP 199.103.21.227.80  17.227.140.124.49729: tcp 1448
[EMAIL PROTECTED]@g.|.P.A..8.4b.J..
9.,HTTP/1.1 200 OK

...which indicates a delay of 1.348 ms from the HTTP GET to the HTTP  
200 response.  This is using the following delta timestamp mode;


   -ttt   Print a delta (in micro-seconds) between  current  and   
previous

  line on each dump line.)

If you use tcpdump -w to save the packets captured to a file for  
analysis, you can feed it to net/tcpflow port to reconstruct this into  
individual flows, which will make it easier to figure out if your  
traffic starts getting interleaved.


Regards,
--
-Chuck

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [OT ? ] getting stats out of network capture

2008-07-24 Thread Norberto Meijome
On Thu, 24 Jul 2008 17:42:04 -0700
Chuck Swiger [EMAIL PROTECTED] wrote:

 Try something like this on the webserver or client machine:
 
 # tcpdump -ttt -q -n -A tcp port 80

Excellent, thanks Chuck.
I haven't got access to the server, and the client has to run on a win32 ... so 
i'll figure out how to tcpdump on w32 or howto in wireshark gui.

thanks again!
B

_
{Beto|Norberto|Numard} Meijome

You can discover what your enemy fears most by observing the means he uses to 
frighten you.
   Eric Hoffer (1902 - 1983)

I speak for myself, not my employer. Contents may be hot. Slippery when wet. 
Reading disclaimers makes you go blind. Writing them is worse. You have been 
Warned.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]