Solved

Protocol Analayzer Understanding..

Posted on 2006-07-18
5
226 Views
Last Modified: 2010-03-05
Ok so i am new to using protocol analayzer i ahve a couple questsions for those that are expertise in it..

On which layer will will i be using to find whether information is being retransmitted ?

and

Which layer will i look to determine whether there is a routing problem ??

reason i ask this, is because i am trying to troubleshoot my network problem... between my current work area and our headquaters in a different city.. The data being transmitted from each other is taking twice as long as it usually did a week ago ? i was told to use a protocol analyzer to help further find the problem... well i am new to using analyzer so if anyone could help me answer these questions, would be greatly appreciated thanks..
0
Comment
Question by:Coupee36
  • 2
5 Comments
 
LVL 57

Expert Comment

by:giltjr
ID: 17135673
Data retransmission can take place at many layers so the answer there is "It depends."

For routing problems, you don't need a protocol analyzer, you just need the ability to do traceroute (tracert in Windows) from source PC and the target PC.

What you want to look for in the the trace is the general packet flow between the two hosts.  You also need to know what protocol/application is being used to transmit the data.  Is it ftp, sftp, ftps, or SCP?

Even more generally typically you should see data going from the source to the target and ACK's everynow and then from the target to the source.  You want to look for delay's between the data and the ACK's.

0
 

Accepted Solution

by:
vodkamilkshake earned 63 total points
ID: 17152531
You should use Ethereal, its a free network analyzer. It can detect and display many anomalies regarding TCP traffic and it shows pretty user friendly messages too. As far as which layer to look at is concerned, pay attention to source and destination addresseses in physical layer, and the same in tcp layer. Just go around with it a little bit and you will find alot of useful information.
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 62 total points
ID: 17153468
Are you already using a analyzer?  If so which one?  If not you can use Ethereal as vodkamilkshake or its "replacement" Wireshark (http://www.wireshark.org)

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now