$min_len) { $new_str[$i] = $string; $i++; } } $t_name = implode(" ", $new_str); unset($new_str); $t_name = preg_replace($pattern, $replace, $t_name); $t_nameL = strtolower($t_name); return $t_nameL; } // PCL Output function pcl_output($id) { if ($id == 0) return false; $query1 = tep_db_query("select c.parent_id, cd.categories_name from " . TABLE_CATEGORIES . " c, " . TABLE_CATEGORIES_DESCRIPTION . " cd where c.categories_id = $id and cd.categories_id = $id"); $pcla = array(); while ($pc_values = tep_db_fetch_array($query1)) { $pc_header = $pc_values[categories_name]; $parent_id = $pc_values[parent_id]; $type = "c"; $query2 = tep_db_query("select c.categories_id, c.parent_id, cd.categories_name from " . TABLE_CATEGORIES . " c, " . TABLE_CATEGORIES_DESCRIPTION . " cd where c.parent_id = $id and c.categories_id = cd.categories_id"); while ($q2v = tep_db_fetch_array($query2)) { $q2_id = $q2v[categories_id]; $q2_head = $q2v[categories_name]; array_push($pcla, "$q2_id$q2_head"); } } $i = 0; $cPath = tep_get_path($id); echo ""; foreach ($pcla as $key => $data) { $split = explode("", $data); $p_id = $split[0]; $p_head = $split[1]; $cPath = tep_get_path($p_id); if ($i == 2) { echo ""; $i = 0; } echo ""; $i++; } echo "
Shop our Online Catalog: ". $pc_header . "

"; } // Sub Topic Sister Linking function sub_topic_links($starting_topic_id) { echo ""; echo ""; $parent_query = "SELECT parent_id FROM topics WHERE topics_id='". $starting_topic_id ."'"; $parent_results = tep_db_query($parent_query); $parent_id = tep_db_fetch_array($parent_results); $parent_id = $parent_id['parent_id']; if ($parent_id == 0) { $parent_id = $starting_topic_id; } /* $parent_name_query = "SELECT topics_name FROM topics_description WHERE topics_id='". $parent_id ."'"; $parent_name_results = tep_db_query($parent_name_query); $parent_name = tep_db_fetch_array($parent_name_results); $parent_name = $parent_name['topics_name']; $parent_name = preg_replace('/ /', '', $parent_name); */ $i = 0; $topics_query = "SELECT t.topics_id, td.topics_name, t.parent_id FROM topics t, topics_description td WHERE (t.parent_id='". $parent_id ."' OR t.parent_id='". $starting_topic_id ."') AND t.topics_id = td.topics_id"; $topics_results = tep_db_query($topics_query); while ($subs = tep_db_fetch_array($topics_results)) { $topic_id = $subs['topics_id']; $topic_name = $subs['topics_name']; if ($subs['parent_id'] == 0) { $tPath = "tPath=". $subs['topics_id']; } else { $tPath = "tPath=". $subs['parent_id'] ."_". $subs['topics_id']; } if ($i == 0) { echo ""; } if ($topic_id != $starting_topic_id) { echo ""; $i++; } if ($i == 3) { echo ""; $i = 0; } } echo "
Related Topics:
  • ". $topic_name ."
  • "; } // Sister Artile Linking function sister_article_linking($current_id) { $fetch_cat = tep_db_query("SELECT at.topics_id, t.parent_id, td.topics_name FROM articles_to_topics at, topics t, topics_description td WHERE at.articles_id = $current_id AND at.topics_id = t.topics_id AND td.topics_id = t.topics_id"); while ($result = tep_db_fetch_array($fetch_cat)) { $tID = $result['topics_id']; $pID = $result['parent_id']; $tName = $result['topics_name']; } if ($pID == 0) { $tPath = "tPath=". $tID; } else { $tPath = "tPath=". $pID ."_". $tID; } echo ""; echo "

    "; sub_topic_links($tID); echo "

    "; echo "Back to main topic: $tName
    "; $link_builder_query = tep_db_query("SELECT ad.articles_id, ad.articles_name, at.topics_id, at.articles_id FROM articles_description ad, articles_to_topics at WHERE at.topics_id='$tID' AND at.articles_id = ad.articles_id;"); while ($link_builder = tep_db_fetch_array($link_builder_query)) { $a_id = $link_builder['articles_id']; $a_name = $link_builder['articles_name']; $aPath = "articles_id=". $a_id; if ($current_id == $a_id) { } else { echo "$a_name
    "; } } print ("
    "); } ?> Application Performance Analysis WireShark Ethereal Sniffer Virtual

    Telephone: (215) 716-7373

    Top » Troubleshooting » Network & Application Performance Analysis Fundamentals

    Network & Application Performance Analysis Fundamentals

    Bookmark and Share

     Cutting Through Opinions
    Diagnosing Facts
    Providing Resolution

    Click Here to Listen to this topic as a "The ROOT Cause" podcast.  


    Click Here to Subscribe through


    Click Here to Subscribe through  


    There are IT application problems that have been unresolved for many weeks or even years, or there may be a new problem as a result of a recent move or change in the application infrastructure environment. Often, different IT departments are engaged in extensive troubleshooting and reach a stage where each is convinced that the problem is not in their area. This can result in a long-standing problem that is often never completely resolved.

    This document describes how an expert Network & Application  Performance Analyst can solve these problems, leveraging a root cause analysis approach.  Resolution is the primary goal.  The same approach can be used to establish a baseline for an application in an existing environment, prior to moving to a new server environment. This process involves single transaction testing or small load testing exercises in order to create a baseline of how the application behaves under controlled circumstances. Ideally, this is done in the original production environment first. This helps address the user’s experience in the new production environment by providing a baseline against which to measure the application’s behavior, and is beneficial for the NAPA to evaluate performance when troubleshooting. With a properly set and documented baseline the success rate of finding performance problems in a new production environment is extremely high.

    Application & Network  Root Cause Analysis

    The Interpath Technologies Root Cause Analysis approach is a step by step method that can be used to set an application performance baseline, and to discover the root cause of application failures. Every application failure happens for a number of reasons. In a multi-tiered enterprise environment, there is a progression of actions and consequences that lead to a failure. A Root Cause Analysis (RCA) investigation traces the cause and effect trail from the symptoms back to the root cause - much like a detective solving a crime.

    Finding the root cause of an application or network problem is extremely challenging due to the number of different components and the relationships between these components. The RCA approach analyzes application execution at the transaction level looking at the lowest common element in the IT networking environment – the TCP/IP packets.

    Pre-Requisite Skills and Tool Sets

    Many tools will provide metrics, but only a Sniffer ®/ Ethereal ® or WireShark ® tool in the hands of an experienced analyst that specializes in such a tool, will allow users to see each and every TCP/IP packet that moves between all of the components involved in an enterprise system. Analysis of the packets will show exact packet's contents such as the following:

    • How much time it takes to get from device to device.
    • Exactly how long each device took to reply and anything out of the normally expected pattern.
    • Any network or application issues.
    • Irrefutable proof of what is discovered, which is key in getting vendors and different internal departments aligned.

    Effective transaction analysis requires more than just a suite of tools, it requires highly specialized skills as well as very strong skills in all aspects of enterprise networking including servers, switches/routers, operating systems, security, documentation, diplomacy and project management. The Network & Application Performance Analyst must also have excellent research and analysis skills.

    Required Information

    The following information will assure the effective use of the Network & Application Performance Analyst time and the execution of a smooth, efficient Root Cause Analysis process.

    • LAN diagrams – required for proper placement of the Sniffer ®/ Ethereal ® or WireShark ® protocol analyzers. The analyst must understand the physical path that the packets will take as they move from server to server to router, etc.
    • WAN information – required to learn about the pathways between participating networks/locations.
    • Host name/IP address of all server interfaces – required to identify the servers involved with the problem application.
    • Server types – required to understand the role of each server (e.g.,file server, database server, application server, web server, scheduler, etc.)
    • Application design – including data flow diagrams and/or an interview with the application subject matter expert. The ANPA must understand the following about the application:
      • TCP/UDP ports used and their roles.
      • Port Data Flow – in most cases, the ANPA will need to create this diagram showing the flow of data and on which ports it moves between all servers involved.

    RCA Process Overview

    Step 1: Kickoff

    The Network & Application Performance Analyst meets with the application SME(s) where they diagram the Application’s Port Data Flow — The Application's Flow Diagram. The Network & Application Performance Analyst and the Client's Subject Matter Expert become the first two members of the Network Application Performance Analysis Team.  The Application or Network Flow diagram shows the flow of all traffic between all participants such as Web Servers, internal and external Firewalls, Application Servers, Database Servers, etc. 

    The Network or Application Flow Diagram allows the Network & Application Performance Analyst to understand what is happening at a Protocol Level as well as a Network Level. The flow of data from the User, through all other devices and back again to the User is The Interpath.  Diagraming the Interpath makes possible the proper placement of Sniffer ®/ Ethereal ®/ WireShark ® or other protocol analyzer to allow visibility into the entire transaction. This process has a very high success rate in finding the root causes of long standing problems.

    Step 2: Deploy Protocol Analyzers

    (Sniffer ®/ Ethereal ® WireShark ® or other tool.)

    The diagrams are used to trace out the actual physical data paths taken by packets to and from switches, servers, routers, firewalls and any other infrastructure components involved.  Based on this knowledge and the number of protocol analyzers available for testing, the Test Plan is created defining where to place the protocol analyzers, and what transactions will be analyzed. The goal is to gain 100% visibility into the movement of data between all participating servers, switches, etc. Often, this is not possible for reasons such as time, budgets, resources or technical issues. It is not necessary to have 100% visibility, but it is highly desirable where possible.

    With the test plan complete, the equipment is shipped to the defined locations. A local resource is required to physically place the Sniffer ®/ Ethereal ® WireShark ® or other tool once they arrive. Port Mirror / SPAN will be created as required. This is also limited by the capabilities of the local Switches and Routers to do Port Mirroring / SPANing.

    Step 3: Perform Transaction Testing

    The application SME works with the ANPA by executing specific transactions while the Sniffer ®/ Ethereal ® WireShark ® or other tool captures trace files (every packet moving in the transaction). Through this process, the ANPA gains an understanding of how the application data is flowing in transactions generated by a typical user.  Many transactions are tested but only a single transaction is tested at one time.

    Step 4: Analyze and Diagnose Problem

    Using the trace files, the Network & Application Performance Analyst works with the application SME to spot where the application or network failed to perform to specifications. With the problem areas identified, the Network & Application Performance Analyst will start to investigate specific components within that area. Root causes of application infrastructure problems will typically be in one or more of the following areas:

    Firewall Issues

    • Error in the rules, or changes that are incompatible with ports required by applications on the other side.
    • Firewall blocking or dropping monitoring protocols used by application monitoring tools.
    • Negative impact due to inefficiently deployed Network Intrusion Detection Sensors.
    • Other.


    • Incorrect OS or software configurations in the server or workstation
    • Replication issues, also possible with server
    • Slow database or trouble with the data
    • Other


    • Incorrect server hardware configuration
    • Addressing issues
    • DNS issues
    • Directory issues
    • Authentication issues
    • Incorrect switch, router or NIC configuration
    • WAN issues
    • Cabling
    • Other


    • Conflicts with other applications on the server (s)
    • Bad components
    • Build issues
    • Replication issues, also possible with application
    • Other

    Step 5: Document

    The Network & Application Performance Analyst will create a “living” document during the entire process to provide Technical Staff and Project Managers with an audit trail into the progress of the team and the ability to answer questions given to them by management.

    The final document must provide incontestable proof of the root cause to allow all departments to accept the results. It will provide an executive summary of the causes and recommended solutions to the problem.  It will contain a detailed technical section that clearly explains the process of the testing and the reasons for the conclusions as well as any recommendations.

    Such documentation will contain snapshots of protocol analyzer trace files and diagrams illustrating the interaction of the various components. The application port data flow diagram will also be included.

    To see Case Studies, Click Here

    For more information on this article, Click Here.

    Subscribe to receive the latest news & specials on our products:

    Quick Find
    Use keywords to find the product you are looking for.
    Advanced Search

    New Articles
    All Topics
     Application Architecture
     Case Studies
     NetAnalysis Myth Series
     Team Building
    Articles RSS Feed
    Shipping & Returns
    Privacy Notice
    Conditions of Use
    Contact Us
    Catalog Feed

    Copyright © 1999-2017 Barry Koplowitz