Sniffer Adaptive Application Analyzer: Adaptive Mode ... - NetScout

Sniffer Adaptive Application Analyzer: Adaptive Mode ... - NetScout Sniffer Adaptive Application Analyzer: Adaptive Mode ... - NetScout

10.03.2013 Views

How Adaptive Processing Works EARLY FIELD TRIAL Chapter 7 144 Sniffer Adaptive Application Analyzer Adaptive Session processing works differently than traditional packet capture, condensing packet data in to Adaptive Session Packets (ASPs) and recording end-to-end session metrics in Adaptive Session Records (ASRs). This section summarizes how Adaptive processing works, as well as how the results are presented (Figure 7-2). Adaptive Packet Processing in the Adaptive Decode View Packets with an ASI protocol interpreter are condensed into Adaptive Session Packets (ASPs). ASPs include compressed packet headers through the transport layer and an intelligently “derived” payload rather than the actual payload. ASPs are much smaller than their raw counterparts and can be stored and analyzed much more efficiently. The exact fields preserved in an ASP vary by protocol but include compressed MAC/ IP headers and key data fields (for example, SQL calls embedded in the data portion of an HTTP packet). TCP/UDP v4 packets without an ASI protocol interpreter are captured with compressed headers and a raw application payload (with an optional slice size starting after the TCP/UDP header). Generic session data is also available for these packets. Other IP packets (including IPv6) can be captured as raw packets with an optional slice size. No session data is available for these packets. Sniffer Adaptive Application Analyzer presents ASPs in the Adaptive Decode view. ASPs are also correlated with their parent ASRs for drillup analysis. Adaptive Session Processing in the Adaptive Session View In addition to condensing packets into ASPs, Sniffer Adaptive Application Analyzer also records flow-based metadata in Adaptive Session Records (ASRs) for session analysis. Session analysis for flows with an ASI protocol interpreter include application-specific metrics in addition to standard transaction metrics, including: Source/Destination Identifiers Session start/end times Latency metrics, success/failure codes, and error messages.

EARLY FIELD TRIAL Adaptive Session Analysis Sniffer Adaptive Application Analyzer also provides session analysis for TCP/UDP v4 flows without an ASI protocol interpreter, providing transaction metrics under GENERIC entries in the Session Decode view. Sniffer Adaptive Application Analyzer presents ASRs in the Adaptive Session view. ASRs are also correlated with their underlying ASPs for drilldown analysis. Figure 7-2. Postcapture Views for Adaptive Mode Adaptive capture produces session statistics. Here we see flow statistics for an FTP session. Use the Adaptive Packet Drill Down command to view the underlying packet events. Packet events are available for viewing in the Adaptive Decode view. Standard Summary and Detail panes let you browse through the events. Here we see one of the FTP packets associated with the session listed above. Use the Open ASR command to drill up to the session file containing the parent flow. User’s Guide 145

How <strong>Adaptive</strong> Processing Works<br />

EARLY FIELD TRIAL Chapter 7<br />

144 <strong>Sniffer</strong> <strong>Adaptive</strong> <strong>Application</strong> <strong>Analyzer</strong><br />

<strong>Adaptive</strong> Session processing works differently than traditional packet<br />

capture, condensing packet data in to <strong>Adaptive</strong> Session Packets (ASPs)<br />

and recording end-to-end session metrics in <strong>Adaptive</strong> Session Records<br />

(ASRs). This section summarizes how <strong>Adaptive</strong> processing works, as<br />

well as how the results are presented (Figure 7-2).<br />

<strong>Adaptive</strong> Packet Processing in the <strong>Adaptive</strong> Decode View<br />

Packets with an ASI protocol interpreter are condensed into<br />

<strong>Adaptive</strong> Session Packets (ASPs).<br />

ASPs include compressed packet headers through the transport<br />

layer and an intelligently “derived” payload rather than the actual<br />

payload. ASPs are much smaller than their raw counterparts and<br />

can be stored and analyzed much more efficiently. The exact fields<br />

preserved in an ASP vary by protocol but include compressed MAC/<br />

IP headers and key data fields (for example, SQL calls embedded<br />

in the data portion of an HTTP packet).<br />

TCP/UDP v4 packets without an ASI protocol interpreter are<br />

captured with compressed headers and a raw application payload<br />

(with an optional slice size starting after the TCP/UDP header).<br />

Generic session data is also available for these packets.<br />

Other IP packets (including IPv6) can be captured as raw packets<br />

with an optional slice size. No session data is available for these<br />

packets.<br />

<strong>Sniffer</strong> <strong>Adaptive</strong> <strong>Application</strong> <strong>Analyzer</strong> presents ASPs in the <strong>Adaptive</strong><br />

Decode view. ASPs are also correlated with their parent ASRs for drillup<br />

analysis.<br />

<strong>Adaptive</strong> Session Processing in the <strong>Adaptive</strong> Session View<br />

In addition to condensing packets into ASPs, <strong>Sniffer</strong> <strong>Adaptive</strong> <strong>Application</strong><br />

<strong>Analyzer</strong> also records flow-based metadata in <strong>Adaptive</strong> Session<br />

Records (ASRs) for session analysis.<br />

Session analysis for flows with an ASI protocol interpreter include<br />

application-specific metrics in addition to standard transaction<br />

metrics, including:<br />

Source/Destination Identifiers<br />

Session start/end times<br />

Latency metrics, success/failure codes, and error messages.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!