Here is an example: We first pick an unused subnet (say 10.0.0.0/8) and then choose two IP addresses from that subnet: One (say 10.0.0.1) for the local host, and another (say 10.0.0.2) for a 'virtual' host that will be the communication partner of the local host. Neither of these two addresses must currently be assigned to any host. Of course, we also need the address of the remote host where Monarch should send the probe packets (say foo.bar.net). Next, we use these addresses to configure Monarch in standalone mode as follows:
./monarch -m standalone -i eth0 -o auto -k auto --sender 10.0.0.1:5001 --virtual-receiver 10.0.0.2:5002 --virtual-sender 10.0.0.2:5003 --receiver 10.0.0.1:5004 foo.bar.net &Monarch will create a TUN device, bind it to 10.0.0.1, and then wait in the background for packets to intercept. Now we can start the sender and the receiver:
./my-sender-app --bind-to 10.0.0.1:5001 --send-udp-packets-to 10.0.0.2:5002 --num-packets 100 & ./my-receiver-app --bind-to 10.0.0.1:5004 --receive-udp-packets-from 10.0.0.2:5003 &Once the transfer has completed, we can terminate Monarch (killall -SIGTERM monarch), which will cause it to write the trace files and to perform self-diagnosis as usual.
You may wonder why it is necessary to have two IP addresses; could Monarch
not simply be configured with --sender 10.0.0.1:5001 and --receiver 10.0.0.1:5004?
The answer is that in that case, Monarch would not be able to intercept any
packets, since the kernel would recognize 10.0.0.1 as a local IP address and
simply deliver the packets, instead of routing them to the TUN device.
Note that the sender and the receiver must communicate using either TCP or UDP,
since Monarch relies on port numbers to identify the packets it should intercept.
The kernel trace file is created with the -k option and is only available
in flow mode. It contains periodic snapshots of several TCP state variables,
such as the congestion window or the kernel's RTT estimate. Each file contains a
header that lists the names of all the state variables, which correspond to the
definitions in /usr/include/linux/tcp.h. For the exact meaning of these
variables, please refer to the Linux kernel documentation.
The 'unexpected' packets can have several reasons:
What format does Monarch use for its trace files?
The standard Monarch trace file (the one that is created with the -o option)
contains all packets Monarch has sent or received, including probe and response
packets and any packets intercepted from the sender or the receiver.
If you choose the PCAP format (-t pcap), the trace file can be read
with standard tools such as tcpdump. The MOUT format (-t mout)
contains essentially the same information, but uses a textual representation and
partially decodes the packet headers. This is useful for script processing.Can I run multiple instances of Monarch concurrently?
Yes, but you cannot run multiple concurrent flows between the same pair of hosts.
The reason is that each Monarch instance uses the source and destination address in the
IP header to filter out responses to its own probe packets. If two instances on the
same host were to use the same destination address, they would receive not only their own
response packets, but those of the other instance as well.
Why does Monarch report 'unexpected' packets on the TUN device?
Monarch creates a TUN device to intercept packets between the TCP sender and the
TCP receiver (or, if in standalone mode, between two other protocol instances).
Normally, these should be the only packets that appear on the TUN device.
If Monarch intercepts a packet that comes neither from the TCP sender nor from
the TCP receiver, it ignores that packet but prints the above warning message.
In most cases, the emulation will still work, but since the 'unexpected' packets
may be interfering with the TCP flow, it is better to remove them.
If none of these cases apply, we suggest invoking tcpdump -i tun0 -n -x
while Monarch is running.
Probe exchange: 139.19.131.1:10334 <-> 139.19.131.2:10334
Sender: 10.0.0.1:48575 <-> 10.0.0.2:10001
Receiver: 10.0.0.1:55742 <-> 10.0.0.2:10002
The last two lines show the expected IP addresses and port numbers for packets
from the sender and the receiver. If either of them is bound to a different
address or sends its traffic to some other destination, Monarch will not recognize
the packets.
Why does the IPID sanity check fail whenever I use the tcp-ack probe?
Please check whether your measurement host is behind a firewall. Some firewalls will intercept
the ACK probes before they even leave the local network, and send back a RST packet immediately.
To find out whether this is happening, run a Monarch flow to a host that is far away, create a
pcap trace, and look at the trace with tcpdump -r. If you see very low round-trip times
(at most a few milliseconds), the responses are probably coming from a firewall and not from
the remote host.
Back to the Monarch home page
Imprint | Data Protection