[root@alaska ~]# cat /etc/redhat-release
Fedora release 11 (Leonidas)
[root@alaska ~]# uname -r
2.6.29.5-191.fc11.i686.PAE
httping , http_ping
両方とも、http の latency を計測するツール。
どっちがいいんだろー。
http_ping のほうが、コネクションの開設、最初に受け取ったレスポンス、
最後のデータを受け取ったまでの時間が出力されるので、こっちのほうが
いいのかなー。
・http_ping
[root@alaska ~]# yum list | grep http_ping
http_ping.i586 20050629-9.fc11 @fedora
connect: コネクション開設
response: GETから最初のレスをうけるまで
data: その後のすべてのデータを受信するまで( 200 OK まで ? )
なのかな。。
total = connect + response + data になる。
[root@alaska ~]# http_ping -c 1 http://www.google.co.jp.
5454 bytes from http://www.google.co.jp.: 118.501 ms (49.529c/62.962r/6.01d)
--- http://www.google.co.jp. http_ping statistics ---
1 fetches started, 1 completed (100%), 0 failures (0%), 0 timeouts (0%)
total min/avg/max = 118.501/118.501/118.501 ms
connect min/avg/max = 49.529/49.529/49.529 ms
response min/avg/max = 62.962/62.962/62.962 ms
data min/avg/max = 6.01/6.01/6.01 ms
[root@alaska ~]# tshark -i eth0 port 80
Running as user "root" and group "root". This could be dangerous.
Capturing on eth0
0.000000 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [SYN] Seq=0 Win=5840 Len=0 MSS=1460 TSV=7633558 TSER=0 WS=6
0.049293 74.125.153.104 -> 192.168.1.200 TCP http > 33066 [SYN, ACK] Seq=0 Ack=1 Win=5672 Len=0 MSS=1430 TSV=448182951 TSER=7633558 WS=6
0.049364 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [ACK] Seq=1 Ack=1 Win=5888 Len=0 TSV=7633608 TSER=448182951
0.049498 192.168.1.200 -> 74.125.153.104 HTTP GET / HTTP/1.0
0.103264 74.125.153.104 -> 192.168.1.200 TCP http > 33066 [ACK] Seq=1 Ack=67 Win=5696 Len=0 TSV=448183004 TSER=7633608
0.112272 74.125.153.104 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.112355 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [ACK] Seq=67 Ack=1419 Win=8768 Len=0 TSV=7633671 TSER=448183012
0.115288 74.125.153.104 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.115368 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [ACK] Seq=67 Ack=2837 Win=11648 Len=0 TSV=7633674 TSER=448183012
0.115407 74.125.153.104 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.115430 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [ACK] Seq=67 Ack=4255 Win=14528 Len=0 TSV=7633674 TSER=448183012
0.115445 74.125.153.104 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.115472 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [ACK] Seq=67 Ack=4412 Win=17408 Len=0 TSV=7633674 TSER=448183012
0.118222 74.125.153.104 -> 192.168.1.200 HTTP HTTP/1.0 200 OK (text/html)
0.118354 192.168.1.200 -> 74.125.153.104 TCP 33066 > http [FIN, ACK] Seq=67 Ack=5771 Win=20288 Len=0 TSV=7633677 TSER=448183013
0.171527 74.125.153.104 -> 192.168.1.200 TCP http > 33066 [ACK] Seq=5771 Ack=68 Win=5696 Len=0 TSV=448183073 TSER=7633677
^C16 packets captured
[root@alaska ~]#
・httping
[root@alaska ~]# httping -V
HTTPing v1.2.9, (C) 2003-2008 folkert@vanheusden.com
SSL support included
[root@alaska ~]# httping -G -c 1 -h www.google.co.jp.
PING www.google.co.jp.:80 (http://www.google.co.jp.:80/):
connected to www.google.co.jp.:80, seq=0 time=144.73 ms
--- http://www.google.co.jp.:80/ ping statistics ---
1 connects, 1 ok, 0.00% failed
round-trip min/avg/max = 144.7/144.7/144.7 ms
[root@alaska ~]# tshark -i eth0 port 80
Running as user "root" and group "root". This could be dangerous.
Capturing on eth0
0.000000 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [SYN] Seq=0 Win=5840 Len=0 MSS=1460 TSV=7890379 TSER=0 WS=6
0.049348 74.125.153.99 -> 192.168.1.200 TCP http > 51489 [SYN, ACK] Seq=0 Ack=1 Win=5672 Len=0 MSS=1430 TSV=65665032 TSER=7890379 WS=6
0.049412 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [ACK] Seq=1 Ack=1 Win=5888 Len=0 TSV=7890428 TSER=65665032
0.049548 192.168.1.200 -> 74.125.153.99 HTTP GET http://www.google.co.jp.:80/ HTTP/1.0
0.102977 74.125.153.99 -> 192.168.1.200 TCP http > 51489 [ACK] Seq=1 Ack=99 Win=5696 Len=0 TSV=65665086 TSER=7890428
0.115296 74.125.153.99 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.115328 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [ACK] Seq=99 Ack=1419 Win=8768 Len=0 TSV=7890494 TSER=65665097
0.118277 74.125.153.99 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.118312 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [ACK] Seq=99 Ack=2837 Win=11648 Len=0 TSV=7890497 TSER=65665097
0.118399 74.125.153.99 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.118433 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [ACK] Seq=99 Ack=4255 Win=14528 Len=0 TSV=7890497 TSER=65665097
0.118450 74.125.153.99 -> 192.168.1.200 TCP [TCP segment of a reassembled PDU]
0.118482 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [ACK] Seq=99 Ack=4412 Win=17408 Len=0 TSV=7890497 TSER=65665097
0.121405 74.125.153.99 -> 192.168.1.200 HTTP HTTP/1.0 200 OK (text/html)
0.121533 192.168.1.200 -> 74.125.153.99 TCP 51489 > http [FIN, ACK] Seq=99 Ack=5771 Win=20288 Len=0 TSV=7890500 TSER=65665097
0.174533 74.125.153.99 -> 192.168.1.200 TCP http > 51489 [ACK] Seq=5771 Ack=100 Win=5696 Len=0 TSV=65665157 TSER=7890500
^C16 packets captured
[root@alaska ~]#
stevie salas のニューアルバム set it on blast いいなー。
グルーブ感がたまらん。
3曲目の Block Rockin がお気に入り。
リフ、バッキングがかっこいい。繰り返し聞きまくってる。
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.