Solved

Any way to test for 'slow' spots between two nationwide locations

Posted on 2011-09-22
8
317 Views
Last Modified: 2012-05-12
A client telephoned me just now to complain our web application is broken because its working very slowly.  I went online and it was working perfectly well.  So, I blamed network traffic in their area to save our reputation(!).  The client is in Northern England, we are central England, and the server is in Southern England (about 400 miles in total between them and the server).

Anyway, is there any method to test whether the infrastructure is encountering issues between two geographical locations?  It would be lovely to just blame BT (usually correctly) but some proof would be also be nice...!

Thanks in advance.
0
Comment
Question by:Rouchie
  • 4
  • 3
8 Comments
 
LVL 4

Accepted Solution

by:
sakman earned 100 total points
Comment Utility
400 miles isn't really that far - I can ping a site 1,000 miles away in less than 200ms.

You can try traceroute to check the time to reach each hop between yourself and your client.  

A nice web utility for traceroute and ping is at: http://tools.pingdom.com/ping/

0
 
LVL 7

Assisted Solution

by:Pr1z
Pr1z earned 400 total points
Comment Utility
VisualRoute gives you a hop by hop analysis of the latency of a connection.  It will not give you the full picture but at least gives you an indication of where the problem lies.

There is a web version and a download version, you probably need the latter here ==> http://www.visualroute.com/

Good luck

Priz
0
 
LVL 7

Assisted Solution

by:Pr1z
Pr1z earned 400 total points
Comment Utility
... Windows PC's have a pathping utility that will generate raw numbers for you.

Priz
0
 
LVL 25

Author Comment

by:Rouchie
Comment Utility
Thanks for your suggestions.  Pingdom and PathPing (from what I can understand) only seem to generate the figures from my current location (or their respective) location to a specified location.  Is it possible to specify both a start and end location with these tools?
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 7

Assisted Solution

by:Pr1z
Pr1z earned 400 total points
Comment Utility
You can use web based servers to get from that servers physical location to a destination you specify ... but you  cannot pick an arbitrary start point.

Priz
0
 
LVL 25

Author Comment

by:Rouchie
Comment Utility
How about if I know the target and destination IP addresses - is that possible then?
0
 
LVL 7

Assisted Solution

by:Pr1z
Pr1z earned 400 total points
Comment Utility
You can trace from You to the Target and You to the Destination, but not from Target to Destination.

The way these tools work is by slowly increasing the allowed number of hops that a packet is allowed to travel and measuring the responses.  If you "spoof up" a packet with a different source address, the responses will go back to that source.  You would need access to run the commands on Target and/or Destination to measure latency there.  Unless of course  the routing out there on the Internet happens to take your packet through Destination on it's way to Target.

Hope this helps

Priz
0
 
LVL 25

Author Closing Comment

by:Rouchie
Comment Utility
Thanks for your help :-)
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now