Solved

Diagnose problems with capture files!

Posted on 2004-09-23
11
239 Views
Last Modified: 2010-04-10
I have been having a lot of problems with network throughput. File copies fast one way, not the other. I've replaced hardware and drivers to no avail. I have downloaded a packet capturing program that is allowing me to eavesdrop on these cards as their arguing one way and not the other but I need help with the diagnosis. Is there some way I can post some capture files so someone can help me. This would be very helpful for me. Does anybody out there Know Packets?
0
Comment
Question by:tsasmort
11 Comments
 
LVL 1

Expert Comment

by:PRDUBOIS
ID: 12134531
Set your Nic's and Ports for 100 full NOT AUTO. It will make a difference.
0
 
LVL 5

Expert Comment

by:netspec01
ID: 12134553
I haven't heard of "Packets".  Ethereal is probably the best, most widely-used protocol analyzer out there.  Don't forget that if you are in a switched environment you need to span the ports you wnat to listen to.  If you are on a cheapo switch this will be more difficult.

Can you describe your network in some detail?  This would help in assisting you with proble determination.
0
 

Author Comment

by:tsasmort
ID: 12135009
Thank You for the quick responce.

I am using ethereal.

I have a Dell 400sc server with a integrated gigabit nic ( Intel Pro 1000 MT server adapter)

I have bypassed the switch and used a crossover cable to connect to various workstations to test and I am still having the problem.

I tried forcing the nics to 100/Full and it crawls both ways.

With set to auto negotiate best speed I transfer a 50 MB file from the server to my workstation in about 5-7 seconds.

From the workstation to the server takes 10-15 minutes (No other traffic on network)

Also if initiated form server it transfers fast both ways.

I've tested cables.

tried new cables.

3 different workstations.

same either way.

Which gets me to my question, I have capture files from when the file copy is taking place both ways and I believe the problem is visable in the packets( i.e multiple errors, Delays on querys, FS Full). can I post these files somewhere so that some one could verify what they mean and diagnose the problem?

Thank You for your help!
0
 
LVL 5

Expert Comment

by:netspec01
ID: 12135240
Post them on a folder on a web site, news group, yahoo, wherever and post the link.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:tsasmort
ID: 12135712
Any suggestions (specific please ) I don't have a website to post on. Should I just paste them on a messaege here
0
 
LVL 5

Expert Comment

by:netspec01
ID: 12135810
Probably can't effectively post them here.  Send them to my email (see profile) and I'll post them to a public site.

- I had a gig ethernet slowness problem a couple of weeks ago.  It was two-fold.  Auto-negotion of speed/duplex was part of the problem and a cabling issue.

- A gigabit crossover cable has a very specific pin-out and uses all 8 wires not just 1-2, 3-6.
0
 
LVL 5

Expert Comment

by:netspec01
ID: 12143248
I have posted the capture files:

http://www.network-specialties.com/EE/
0
 

Author Comment

by:tsasmort
ID: 12645076
After asking this question I found from Dell advanced technical support that the problem is a known issue with microsoft windows server 2003. The fix is available as a hot fix that is not guaranteed to work under all situations but will be fully tested and released under the next service pack.  Their are two knowledge base articles at Microsoft about the issue.  Thank you for all your help. Great  Website!!

To the moderator :  I don't know very well how this works, I didn't get the answer here but I would think that you might want to leave this answer here due to the high irritation level of this problem.  
0
 

Accepted Solution

by:
modulo earned 0 total points
ID: 12681055
Closed, 500 points refunded.

modulo
Community Support Moderator
Experts Exchange
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Website Routing Issue 3 33
FTP output from Wireshak 6 49
Route summarization 9 44
OpenVPN Speed limitation to only 10 mbps 7 40
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now