Troubleshooting with Wireshark - Find Delays in TCP Conversations

Поділитися
Вставка
  • Опубліковано 8 лис 2024

КОМЕНТАРІ • 39

  • @vikaspotadar
    @vikaspotadar 5 місяців тому

    Chris deserves more subscribers. Contents are great and explained well.

  • @zaboomafia
    @zaboomafia 5 років тому +4

    Thanks Chris! We were able to fix a problem with our database connection from our client. We essentially needed to increase the keep alive interval.

    • @ChrisGreer
      @ChrisGreer  5 років тому +1

      That's awesome James! Exactly the reason why this channel is here. Happy to hear it helped you.

  • @hennessy6996
    @hennessy6996 2 роки тому

    This was a nice subtle vid to remind people on timestamp importance. Thanks, very much appreciated.

  • @peterchuk1923
    @peterchuk1923 Рік тому

    Well explained, important information for super users questioning ICT about networking traffic congestion.

  • @brosjay94
    @brosjay94 Рік тому

    Great video. I keep understanding some more everything I watch this

  • @williammurray588
    @williammurray588 6 років тому +1

    Excellent short and very useful courses. Nice Job

  • @1einszweidrei
    @1einszweidrei 3 місяці тому

    Excepcional content, Chris!

  • @PaulMansfield
    @PaulMansfield 3 роки тому

    very useful video. I didn't know you could add the tcp time-since-previous-frame as a column!

  • @amirahmed1404
    @amirahmed1404 4 роки тому +1

    Great 👍 explanation as always. Thank you Chris.

  • @kaus2005007
    @kaus2005007 Рік тому

    Excellent Chris

  • @maitongm
    @maitongm 3 роки тому

    again, very useful!!

  • @Phantasia.Official
    @Phantasia.Official 5 років тому

    This explanation was very useful, thank you.

    • @ChrisGreer
      @ChrisGreer  5 років тому

      Thank you for the comment!

  • @hangeroo2439
    @hangeroo2439 7 років тому +2

    Thanks for yet another informative video, Chris. Keep 'em coming!
    I was wondering if I can ask you for some wireshark insight. I am trying to resolve an issue at a school district where they are having issues administering graphics-intensive tests to their students utilizing chromebooks (they would get delays, processing circle, etc.). I had someone look at the wireshark trace and he said, "I see a few TCP packets out of Sync, some with zero length, some spurious-retransimissions, and loads of “TCP segment of a reassembled PDU”. To me this points out to a device in the network, that’s sitting between the internet and the customer’s network (be it a firewall, proxy server, or any security appliance), which is capturing (Analysing?) every packet transiting, but not coping with the sheer traffic, which is introducing instability in the network."
    Would you agree with what he assessment? I am curious what percentage of out of synch packets, zero length, spurious-retransmissions, etc., would point to it being any of those devices or how would I look for which particular device is causing the problem. The district did mention they had jitter on their firewall and are taking a long time to get information back from Cisco. I asked them a while back if they had a proxy server and they said no. I then asked if maybe their ISP had a proxy server set up and asked them to have the ISP trace the traffic. They never said definitively that there was not a proxy server on the ISP side, but did mention something about traffic shaping from there.
    Just wondering if you can point me in the right direction so I can help them fix the problem of the stress they deal with while students are testing.

    • @ChrisGreer
      @ChrisGreer  7 років тому

      Hey Hang eroo - Sure, of course, Please contact me on my website www.packetpioneer.com or email me direct - packetpioneer@gmail.com - thanks!

  • @nileshpardeshi6279
    @nileshpardeshi6279 2 роки тому

    Very helpful 👌 thanks

  • @yuriw777
    @yuriw777 7 років тому

    Great video thx! If I want to look for a string used in google search or any browser form submit, how would you do it?

  • @upelister
    @upelister 2 роки тому

    Thank you.

  • @IaCnetLabs
    @IaCnetLabs 2 роки тому

    Great video, thanks!
    I'm willing to check what if the client is sending PSH flagged packet after 35 secs from the previous packet. Is this something that I need to check on the client side? In my case, App server (app01) is contantly talking to a DB Server (db01), and randomly delaying the response by 34 seconds, and after 34 seconds, the app01 is sending PSH,ACK to db01 and resuming the connection.
    I'm a bit confused where should I look for the problem. Is it app01 that's having problem or running low on resource or getting highly consumed, OR its the db01. Any suggestion would be highly appreciated. Thank you!

  • @Eskimoz
    @Eskimoz 4 роки тому

    L'angle est très bon c'est parfait !

  • @MariaSanchez-lb4kp
    @MariaSanchez-lb4kp 7 років тому

    Thank you! YOur video helped!

  • @antonfernando8409
    @antonfernando8409 8 місяців тому

    very cool.

  • @balajimohanakrishnan743
    @balajimohanakrishnan743 6 років тому

    Hi Chris, How did you create the Delta Column?

    • @ChrisGreer
      @ChrisGreer  6 років тому

      Hello Balaji - You can see how in this video - ua-cam.com/video/FHO8SdKighY/v-deo.html

    • @balajimohanakrishnan743
      @balajimohanakrishnan743 6 років тому

      Thanks Chris!

  • @tanuavi98
    @tanuavi98 9 місяців тому

    how to get time since previous frame column?

  • @ishitashakya7767
    @ishitashakya7767 3 роки тому

    How come only after coversation filter delta value and time since previous frame value got same .....

    • @ChrisGreer
      @ChrisGreer  3 роки тому +1

      Hello! That is because before filtering there are multiple TCP conversations in parallel. Time since previous TCP frame is in context of the TCP conversation, but delta time shows all protocols regardless.

  • @ruimeireles1695
    @ruimeireles1695 6 років тому

    I'm using Wireshark version 2.2.1 on Mac, and I don't have the "time since previous frame" shown in the TCP header. Is that something I need to enable?

    • @ruimeireles1695
      @ruimeireles1695 6 років тому

      Ok, I found out. You need to right click on the TCP line, go to the protocol options and enable Timestamps.

    • @ChrisGreer
      @ChrisGreer  6 років тому

      Yes - you may need to enable the "TCP timestamps" in TCP preferences. Just right click any TCP packet on the TCP header itself in the detail view, select protocol preferences, and then you should be able to select "Calculate Conversation Timestamps"

  • @Thad811
    @Thad811 6 років тому +1

    Curious as to why use the "Time since previous frame..." as opposed to just using the Delta time?

    • @ChrisGreer
      @ChrisGreer  6 років тому +2

      As soon as you have more than one TCP connection in parallel in a trace file, your delta times won't give you the true delay in context to the conversation. So the time since previous frame gives you the in-context delay that you can locate delays with. Give it a shot on a larger trace file and you'll see the difference.
      Thanks for the comment!

    • @Thad811
      @Thad811 6 років тому

      Thank you!