IPerf is a tool to measure network throughput.
Maximum TCP throughput – the user experiences “low bandwidth” when up/downloading
Maximum TCP throughput calculations:
There are several important things what you should know before reading this.
Please check TCP/IP fundamentals at http://www.tcpipguide.com/free/index.htm
Common window sizes:
Standard 64KB
Windows XP 17.5KB
FTP 8KB
SCP 64KB
SMB 16K/4K
TCP throughput:
http://wand.net.nz/~perry/max_
http://www.babinszki.com/
Data throughput in TCP based on TCP window size and latency:
FTP TCP window 8KB -> 65356bit
RTT=60ms=0.06s
Maximum TCP transfer = 65356bit/0.06s=1.038Mbps
General TCP window 64KB -> 524288bit
RTT=60ms=0.06s
Maximum TCP transfer = 524288bit/0.06s=8738133,33bps = 8.533.33Mbps
DataMover TCP window 256KB -> 2097152bit
RTT=60ms=0.06s
Maximum TCP transfer = 2097152bit/0.06s=33.33Mbps
Throughput can never exceed window size divided by round-trip time.
window = 17520byte = 140160
rtt 60ms = 0.06s
Max link throughput (based on window and rtt) = 140160bit/0.06s=2336000 = 2281,25kbps
The capacity of a pipe is its bandwidth multiplied by round-trip time.
BW = 2Mbps = 2097152bps
rtt = 60ms = 0.06s
Max link capacity (based on BW and rtt) = 125829,12bit = 15728,64byte
Formula to calculate the optimal TCP window size:
Bandwidth-in-bits-per-second * Round-trip-latency-in-seconds = TCP window size in bits / 8 = TCP window size in bytes
BW = 2Mbps = 2097152bps
rtt = 60ms = 0.06s
2097152bps * 0.06s = 125829,12bit = 15728,64byte — ideal window size
Formula to calculate Maximum Latency for a desired throughput
TCP-window-size-bits / Desired-throughput-in-bits-
TCP window size = 17520byte = 140160bit
desired BW = 2Mbps = 2097152bps
140160bit / 2097152bps = ~0.067ms is the max RTT for the desired 2M throughput
Please consider that these values are IP packets, not frames (or Layer2 bandwidths) or the packets’ data transers.
Layer2 overheads will “decrease” the link capacity: http://sd.wareonearth.com/~phil/net/overhead/
2 hosts on different LANs cannot communicate to each other..
[HOST1]=[ETH SWITCH]=[ROUTER1 ** CLOUD ** ROUTER2]=[ETHSWITCH]=[HOST2]
HOST1: 10.0.0.100/24 – def.gw: 10.0.0.1
HOST2: 10.0.1.100/24 – def.gw: 10.0.1.1
You have access only to the routers.
HOST1 is pingable from ROUTER1 but not pingable from HOST2/ROUTER2.
Traceroute from HOST2 to HOST1 stops at the ROUTER1.
Traceroute from HOST1 to HOST2 has no hops.
Possible problems:
@0: Please check the router interface configurations: IPs and masks are correct?
@1: Please never trust the host settings:
If HOST1 has a bad default gateway then it can routes the ping/traceroute into a black hole.
@2: Please never trust the host settings:
If HOST1 has a bad subnet mask (255.255.254.0 instead of 255.255.255.0)
then HOST1 thinks that HOST2 is in the same LAN segment of her!
10.0.0.0/23 -> hosts: 10.0.0.1 .. 10.0.1.254 -> HOST2 is falling into this range.
You can see (on a Cisco router) if the problem is one of these by:
Please issue term mon and then deb arp and watch the incoming
ARP requests and look for the unreachable HOST1’s entries.
Ask HOST1’s operator to clear the ARP cache, HOST1 should resolve
the MAC address of the default gateway and you should see this
request on the router (ARP is L2 broadcast). You also should see
if HOST1 tries to resolve the MAC of HOST2. (If you have Junipers
you can user the monitor interface traffic commands to achieve the
same ARP wathing function).
Then ask the operator to check the host IP configuration (static/DHCP IPs?).
If this not lead into success please ask to check the HOST1 firewall rules
(may be HOST2 also) and the ACLs applied on the interfaces in the path.
Another problem:
HOST1 is conf’d to use DHCP to obtain IP address.
If the DHCP server not send an offer (not reachable for HOST1 or there
is a restriction for HOST1’s MAC address.. etc..) then a Windows host
will give an address to the interface of the link-local range 169.254.0.0/16
(zero config networking). If this happens the trace from HOST2 also stops
at ROUTER1. You can check this if you configure the interface IP of ROUTER1
(facing to HOST1) to 169.254.0.1/16 and ping the address 169.254.255.255
and HOST1 will reply, you will see the ARP entry in ARP cache and you can
say the MAC address of HOST1 to the operator to check if it is really HOST1.
How to simulate WAN delay/latency in GNS3
Add Microcore linux host to GNS3
How to check an actual Cisco IP Phone telephone call’s statistics on the phone itself
Switch port port-security maximum MAC address when using IP phone
Switch port port-security maximum MAC address when using IP phone
on the switch link with microswitch for PC connectivity on the phone:
Problem: [switch]–[IP Phone]–[PC]
If the user’s switchport config is like this:
errdisable recovery cause psecure-violation
errdisable recovery interval 600
!
interface x/y/z
switchport port-security aging time 5
switchport port-security aging type inactivity
switchport port-security violation shutdown
switchport port-security maximum 2
switchport port-security maximum 1 vlan access
switchport port-security maximum 1 vlan voice
Ideally this will work. But it will cause problems.
When the user turn on the PC he/she will see a system notification that
the link went down (and the phone switched of of PoE powered or loss
the connectivity to the switch). This is because of the port-security config
and a strange bahavior of the IP Phone.
At start the phone is using it’s MAC for CDP in both VLANs, in the native
and the voice also because at startup the the phone not know which is
the voice VLAN -> 2 MAC. When the PC come up and sends a single
packet (DHCP, ARP..) then we have a 3rd MAC. Until the MAC of the phone
in the data (native) VLAN not aged out the port will be secured. If you are
lucky then the phone remains up and got power and not forget the voice
VLAN. After the aging time expires and the auto recovery recovered the
port the PC can communicate because the MAC aging already deleted the
MAC of the phone from the data VLAN. And another problem: some phones
have a weird behavior. The phones have a feature of CDP: the host presence
type length value (TLV) to notify the switch of changes in the attached device’s
port link state. The phones generates this CDP frame in the voice VLAN – this
is a control message to the switch to remove the PC’s MAC from the CAM table.
But some phone plattforms (in my experience) generates this message in the
data (native) VLAN so the switch sees the phone’s MAC in both VLANs. This
leads to the problem that when the PC booted and send the first packet the
switch will secure the port because of the MAC violation. After the MAC aging
time and the automatic error recovery of the port the PC will be able to send
and receive packets on the port.
Solution:
interface x/y/z
switchport port-security maximum 3
switchport port-security maximum 2 vlan access
switchport port-security maximum 1 vlan voice
linkek — Recognizing and Categorizing Symptoms of Voice Quality Problems
Recognizing and Categorizing Symptoms of Voice Quality Problems
http://www.cisco.com/en/US/tech/tk652/tk698/technologies_white_paper09186a00801545e4.shtml
http://www.voiptroubleshooter.com/problems/plc.html
http://www.networkcomputing.com/1001/1001ws2.html
linkek — default passwords
linkek — Telecommunication lines
- http://en.wikipedia.org/wiki/Digital_Access_Carrier_System
- http://www.answers.com/topic/digital-loop-carrier
- http://hccc.ee.ccu.edu.tw/courses/datacom/lecture-vg/carrier.pdf
- http://annsgarden.com/poles/poles.htm
- http://www2.cs.uidaho.edu/~krings/CS420/Notes.S08/08-420-10.pdf
- http://www.google.hu/imgres?imgurl=http://www.fiber-optics.info/images/outside-plant.gif&imgrefurl=http://www.refly.cn/en/js.asp%3Fid%3D133&usg=___pOC5r_hVbpxRGtWIOF8j-TpAW8=&h=161&w=216&sz=10&hl=hu&start=1&um=1&itbs=1&tbnid=UHoC6yGde1cJWM:&tbnh=80&tbnw=107&prev=/images%3Fq%3Dtelecommunication%2BT1%2Bline%2Bconduit%2Bpoles%2Brepeater%26um%3D1%26hl%3Dhu%26client%3Dfirefox-a%26rls%3Dorg.mozilla:hu:official%26tbs%3Disch:1
- http://www.youtube.com/watch?v=UcI_Czmcn8Y
- http://tkne.net/downloads/power/cabels3/Underground%20cables.pdf