Tuesday, December 27, 2016

Connectivity troubleshooting 101

Theory

Lets's start with necessary theory

All connectivity troubleshooting is around 3 protocols which will help us to find if connectivity works. We will not discuss if application/server/deamon running on the port works correctly.
Those protocol are ICMP, TCP and UDP and there understanding is crucial to correctly work with testing tools and scripts and understand results.
We however will cover just necessary aspects

ICMP

Internet Control Message Protocol is useful to find out if routing works correctly. Among a lot of messages we will concentrate on 3 echo request, echo reply, and TTL exceeded.

Echo request and reply 

Is pair of messages they are used in ping you send Echo request and the destination devices shall reply with echo reply.

TTL Exceeded

Each packet (not only ICMP but also TCP and UDP) have set TTL (time to live) as packet is routed through the network each device doing routing(firewall, router, computer, switch with routing module) will inspect the packet and check TTL if it's higher then 0 it will decrease it by one and send packet further based on routing table. If it's 0 it shall send the ICMP message TTL exceed to source of the packet this behavior is utilized by traceroute.

TCP

Transmission Control Protocol is used to transfer data. For us is important to understand it connection oriented. So there is something we call session. Session begins with so called 3 way hand shake which if successful establish the session. Then is data transfer. And then connection is closed.

For easier understanding you can imagine it as call.You call, somebody answers it. For each question you ask you got "some" answer, if you don't understand you ask to repeat and before hangup you say goodbye.

To specify session TCP use ports 0 - 65535 so the session is identified by source IP, source Port and destination IP and destination Port. Source port is assigned dynamically and is usually higher then 1024. Destination port depends on setting of service on destination servers, but there are standard ports which are reserved for specific services. For example port 80 for http, 443 for https, 22 SSH, 21 FTP, 25 SMTP...

3 way handshake

Client starts connection with SYN packet server reply with SYN-ACK and client sends ACK. That's how connection is established.
If server doesn't want or cannot accept the connection it shall send RST packet instead of SYN-ACK.
Most of the testing utilities will show message "Connection refused" or "Connection closed by foriegn host"

Joke to easier remember :-)
- Can I tell you TCP joke?
+ Yes. please tell me TCP joke.
- OK. I will tell you TCP joke.

UDP

User Datagram Protocol similar as TCP is used for transfer of data also use ports i same way as TCP. The difference is that UDP is connection less. You send data and you don't care if it's received or if it's in correct order.

Again analogy for easier understanding. You can imagine it as pigeon post. You send message and you don't know if it was received or not and you don't even care.

Joke to easier remember :-)
- I would tell you UDP joke, but I'm not sure if you would get it.

General Process of troubleshooting

There are few steps to troubleshoot and get to quickly to conclusion point 1) you can do on your own, if you have access to destination machine, points 2) and 3) needs to be resolved by network admin using info from traceroutes.

1) is port open at destination(is there some service listening)?
 - try connect locally (telnet, nc)
 - check open ports (netstat, lsof, ps)
 - kill the service running and set dummy listener (nc)
 - check firewall allows the traffic (if windows is part of Domain it's possible that even you disable firewall it's still active because of domain policy)
2) is routing working correctly?
 - try ping
 - do the traceroute
3) are all firewalls allowing traffic?
 - do tcp or udp based traceroute
 - run packet capture (tcpdump, wireshark) and test connectivity, check for RST packet
 - check for possible asymetric routing.


Below you have flowchart which help you the troubleshooting path:


Tools

Ping

Ping use ICMP echo request/reply. It send request and wait for reply or other message. If none is received it will show timeout.

Linux/Windows
On both platforms ping s work the same only difference is that on linux by default it run continues ping and you need to stop it by CTRL-C and on windows it do just 4 probes.
You can change the behavior by using options, read the help of those for more details.

Examples:

PS C:\Users\j.kindl> ping 192.168.0.1
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time=5ms TTL=254
Reply from 192.168.0.1: bytes=32 time=26ms TTL=254
Reply from 192.168.0.1: bytes=32 time=26ms TTL=254
Reply from 192.168.0.1: bytes=32 time=1ms TTL=254

Ping statistics for 192.168.0.1:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 26ms, Average = 14ms

PS C:\Users\j.kindl> ping 192.168.0.3

Pinging 192.168.0.3 with 32 bytes of data:
Reply from 192.168.0.10: Destination host unreachable.
Reply from 192.168.0.10: Destination host unreachable.
Reply from 192.168.0.10: Destination host unreachable.
Reply from 192.168.0.10: Destination host unreachable.

Ping statistics for 192.168.0.3:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

traceroute/tracert


Traceroute features TTL field in packet, it start be sending probe where TTL = 1, hence first router shall respond that TTL expires. second probe with TTL = 2 so second router respond TTL expired, 3rd probe TTL=3 and 3rd router will respond ... and so one it keep increasing TTL till it reach destination or limit of probes, which by default is 30.

Linux/windows:
On linux it's traceroute and it use UDP on high ports it keeps increasing the UDP port along with TTL which makes it denied by almost any firewall.
The solution is easy, you can use -I option to make it use ICMP instead. However you have to run it with root rights. (Same tcp traceroute).
To omit the problem with ever increasing UDP port I wrote simple script which use possibility to start at custom UDP port and start from certain hop, hence it going in loop and for each hop it's doin traceroute with one probe starting from custom hop and using custom port. It's bit of scratching right ear with left hand, but it works.
Here you can find my shell script for UDP Trace with not increasing UDP port: udptrace
Windows version, tracert is using ICMP by default.

Examples:
Here you can see one succesful traceroute (it's from linux using -I, hence use ICMP as probe packets). Those lines containing * * * are router or firewalls, which are set not to answer with TTL.

root@raspberrypi:/home/pi# traceroute -I lifehacker.com
traceroute to lifehacker.com (151.101.1.34), 30 hops max, 60 byte packets
 1  10.0.0.1 (10.0.0.1)  0.368 ms  0.513 ms *
 2  * * *
 3  * * *
 4  * * *
 5  * * *
 6  * 124.197.broadband16.iol.cz (90.183.197.124)  30.275 ms  29.408 ms
 7  * * *
 8  * * *
 9  * * *
10  * * *
11  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
12  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
13  * * *
14  * * *
15  * * *
16  * * *
17  * 151.101.1.34 (151.101.1.34)  47.523 ms *

Now let's say network admin do the change routing change on ffm-b1-link.telia.net and by mistake enter wrong route and create routing loop below is how the traceroute will look like

root@raspberrypi:/home/pi# traceroute -I lifehacker.com
traceroute to lifehacker.com (151.101.1.34), 30 hops max, 60 byte packets
 1  10.0.0.1 (10.0.0.1)  0.368 ms  0.513 ms *
 2  * * *
 3  * * *
 4  * * *
 5  * * *
 6  * 124.197.broadband16.iol.cz (90.183.197.124)  30.275 ms  29.408 ms
 7  * * *
 8  * * *
 9  * * *
10  * * *
11  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
12  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
13  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
14  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
15  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
16  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
17  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
18  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
...
29  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
30  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *

In case above you can clearly identify the problem, however your traceroute might just "stop in the midle" and then traffic need to be checked hop by hop by network admins, and traceroute is just the hint for them.
The problems which produce output below can be:
Firewall or access-list is blocking the traffic
Devices are set not to send ICMP error codes. (In this case the traffic might go further then we see)

root@raspberrypi:/home/pi# traceroute -I lifehacker.com
traceroute to lifehacker.com (151.101.1.34), 30 hops max, 60 byte packets
 1  10.0.0.1 (10.0.0.1)  0.368 ms  0.513 ms *
 2  * * *
 3  * * *
 4  * * *
 5  * * *
 6  * 124.197.broadband16.iol.cz (90.183.197.124)  30.275 ms  29.408 ms
 7  * * *
 8  * * *
 9  * * *
10  * * *
11  * * ffm-bb4-link.telia.net (62.115.113.114)  48.533 ms
12  ffm-b1-link.telia.net (62.115.116.160)  48.519 ms * *
13  * * *
14  * * *
15  * * *
...
30  * * *

nslookup

Use to check your DNS is working. Even though it's not related with connectivity for some applications it's important that name resolution works.

Examples:
root@NSA320:~# nslookup judo.local
Server:    10.0.0.1
Address 1: 10.0.0.1

nslookup: can't resolve 'judo.local'

telnet

Telnet is TCP client, and it can be used to test connectivity to any TCP Port. If the server we connect to is not using encryption, it can be even used to test higher protocol.
It's avalable on and work same for linux and windows enviroment, in Windows you just need to "add
feature: Telnet client". In linux you need to install it, it's usually part of main repository.

Examples:

This is how succesfull connection looks like
root@raspberrypi:/home/pi# telnet 10.0.0.34 80
Trying 10.0.0.34...
Connected to 10.0.0.34.
Escape character is '^]'.
^]
telnet> quit
Connection closed.


This is what you will get if the connectivity is blocked by firewall (and firewall is talkative) or nothing is listening on that port.
root@raspberrypi:/home/pi# telnet 10.0.0.34 8080
Trying 10.0.0.34...
telnet: Unable to connect to remote host: Connection refused

nc/netcat

Netcat or nc is networking Swiss knife.
It can be used as dummy listener on port or bound the command or script to port, to create simple server.
It can be used as a client as well.
It operates over UDP and TCP.
In linux you need to install it it's usually in main repository. For windows you need to download compiled version for eaxample from here (https://eternallybored.org/misc/netcat/)
Or for creating "dummy" TCP server / listener you can use powershell script like this https://github.com/kindljiri/connectivity-testing/blob/master/PortListener.ps1
Below are examples of creating dummy listener and connecting to it in order to test end to end connectivity.

Examples:

First we set on my raspberry pi netcat to listen on port 160 TCP

root@raspberrypi:/home/pi# nc -l 160
hello raspi from turris
root@raspberrypi:/home/pi#

Second we connect from my turris router to my raspberry pi to port 160 TCP and write the test message you see same message shows on the Raspberry as well, which means connection works perfectly.

root@turris:~# telnet 10.0.0.37 160
hello raspi from turris
^]

Console escape. Commands are:
 l      go to line mode
 c      go to character mode
 z      suspend telnet
 e      exit telnet

e

root@turris:~#

Now we do same think but with UDP port 162.
root@raspberrypi:/home/pi# nc -u -l 162

hello raspi from NSA320

^C
root@raspberrypi:/home/pi#

root@NSA320:~# nc -u 10.0.0.37 162
hello raspi from NSA320
^Cpunt!

root@NSA320:~#


tcpdump

TCPDump is tool for capturing packets. So you can see exactly what's going on.
TCPDump is avalable on linux, on windows it's better to use wireshark, even though you can find and download tcpdump for windows as well.
You shall learn few basic filters and combine them:
tcpdump host  - to filter just traffic to and from specific device
tcpdump port - to filter traffic on specific port


Below are two examples:
1) is succesfull connection to port 80 at host 10.0.0.39 in output I added few empty lines to separated so you better see.
First 3 packets are 3 way handshare we discussed in theory part.
Next two is data and ack that is was recieved. (in longer connections you'll see the traffic coming both ways)
Last 3 packets are closeing of connection.

root@raspberrypi:/home/pi# tcpdump -n host 10.0.0.39
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes

18:57:12.524518 IP 10.0.0.37.48472 > 10.0.0.39.80: Flags [S], seq 1769757482, win 29200, options [mss 1460,sackOK,TS val 63103684 ecr 0,nop,wscale 6], length 0
18:57:12.528361 IP 10.0.0.39.80 > 10.0.0.37.48472: Flags [S.], seq 2965564486, ack 1769757483, win 8688, options [mss 1460,nop,wscale 0,nop,nop,sackOK,nop,nop,TS val 631341150 ecr 63103684], length 0
18:57:12.528754 IP 10.0.0.37.48472 > 10.0.0.39.80: Flags [.], ack 1, win 457, options [nop,nop,TS val 63103684 ecr 631341150], length 0

18:57:22.141319 IP 10.0.0.37.48472 > 10.0.0.39.80: Flags [P.], seq 1:11, ack 1, win 457, options [nop,nop,TS val 63104646 ecr 631341150], length 10
18:57:22.144151 IP 10.0.0.39.80 > 10.0.0.37.48472: Flags [.], ack 11, win 8678, options [nop,nop,TS val 631350800 ecr 63104646], length 0

18:57:22.152834 IP 10.0.0.39.80 > 10.0.0.37.48472: Flags [FP.], seq 1, ack 11, win 8678, options [nop,nop,TS val 631350800 ecr 63104646], length 0
18:57:22.153440 IP 10.0.0.37.48472 > 10.0.0.39.80: Flags [F.], seq 11, ack 2, win 457, options [nop,nop,TS val 63104647 ecr 631350800], length 0
18:57:22.156770 IP 10.0.0.39.80 > 10.0.0.37.48472: Flags [.], ack 12, win 8688, options [nop,nop,TS val 631350800 ecr 63104647], length 0

2) is connection refused when trying to connect to port 82 at host 10.0.039. (there is nothing listening there).
You can see that destination device refuse connection with RST packet.

root@raspberrypi:/home/pi# tcpdump -n host 10.0.0.39
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
19:00:02.370831 IP 10.0.0.37.44112 > 10.0.0.39.82: Flags [S], seq 303448752, win 29200, options [mss 1460,sackOK,TS val 63120669 ecr 0,nop,wscale 6], length 0
19:00:02.374124 IP 10.0.0.39.82 > 10.0.0.37.44112: Flags [R.], seq 0, ack 303448753, win 0, length 0

wireshark

As tcpdump wireshark is a packet capturing and analysing tool. For connectivity troubleshooting it's Must to learn the use filters.

Below are few usefull examples:
ip.addr == 10.0.0.39
udp.port == 162

Below is same example as in tcpdump above.


netstat

Netstat will show all kinds of network statistics, as what connections are open, or which are waiting to be closed, how is routing set and for us most important is what ports are open (it also say the PID of process listening on the port so you can kill it if you need to replace it with dummy listener for troubleshooting purpose.) Netstat is default for both Linux and Windows and can be in connection with grep(Linux), select-string (Windows/power shell)  

Windows:
netstat -aon
netstat -aon | select-string

Linux:
netstat -tupln
netstat -tupln | grep

PS C:\Users\j.kindl> netstat -aon

Active Connections

  Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:80             0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       880
...
  TCP    10.0.0.31:139          0.0.0.0:0              LISTENING       4
  TCP    10.0.0.31:59245        0.0.0.0:0              LISTENING       5676
  TCP    10.0.0.31:62273        149.154.167.91:443     ESTABLISHED     5624
...
  TCP    10.0.0.31:63069        31.13.93.3:443         ESTABLISHED     3092
  TCP    10.0.0.31:63085        52.222.148.86:443      CLOSE_WAIT      9936
  TCP    10.0.0.31:63116        173.194.76.189:443     ESTABLISHED     3092
  TCP    10.0.0.31:63578        52.45.152.106:443      CLOSE_WAIT      9936
  TCP    10.0.0.31:63593        108.160.172.225:443    CLOSE_WAIT      9936
  TCP    10.0.0.31:63596        2.21.74.9:80           TIME_WAIT       0
...
  TCP    127.0.0.1:63054        127.0.0.1:63053        ESTABLISHED     9936
  TCP    192.168.71.1:139       0.0.0.0:0              LISTENING       4
...
  TCP    [::]:49667             [::]:0                 LISTENING       1832
  TCP    [::]:49668             [::]:0                 LISTENING       2108
  TCP    [::]:49670             [::]:0                 LISTENING       732
  TCP    [::]:49681             [::]:0                 LISTENING       724
  UDP    0.0.0.0:443            *:*                                    4560
  UDP    0.0.0.0:3702           *:*                                    696
...
  UDP    0.0.0.0:58363          *:*                                    1832
  UDP    0.0.0.0:60778          *:*                                    1164
  UDP    0.0.0.0:62458          *:*                                    4560
  UDP    10.0.0.31:137          *:*                                    4
  UDP    10.0.0.31:138          *:*                                    4
  UDP    10.0.0.31:1900         *:*                                    3356
  UDP    10.0.0.31:2177         *:*                                    3356
  UDP    10.0.0.31:53304        *:*                                    3356
  UDP    10.0.0.31:59245        *:*                                    5676
  UDP    127.0.0.1:1900         *:*                                    3356
...
  UDP    192.168.136.1:2177     *:*                                    3356
  UDP    192.168.136.1:53302    *:*                                    3356
  UDP    [::]:3702              *:*                                    3356
...
  UDP    [::1]:1900             *:*                                    3356
  UDP    [::1]:53301            *:*                                    3356

Thursday, November 17, 2016

Local DNS zone with unbound

If you have OpenWRT based router you can quite easily set you local DNS and make your life easier. I did.

In config file /etc/config/resolver add section config resolver 'unbound_includes' with line
list include_path '/etc/unbound/local.conf'

It shall look like this:

config resolver 'unbound_includes'
 list include_path '/etc/unbound/local.conf'

Create the file which was included, hence /etc/unbound/local.conf
Below is my setting, you might noticed I'm lame and use several A records instead of CNAME, well actually unbound doesn't support CNAME record.
I created one domain .local and set there few common devices which have global role (central heating, printer, network storage). I also created subdomain .livingroom.local where are devices in living room. I plan other subdomains, because I would like to place several sensors all around the house.

server:
local-zone: 'local.' static
local-data: 'judo.local. IN A 10.0.0.37'
local-data: 'nas.local. IN A 10.0.0.33'
local-data: 'nsa320.local. IN A 10.0.0.33'
local-data: 'brother.local. IN A 10.0.0.39'
local-data: 'printer.local. IN A 10.0.0.39'
local-data: 'heating.local. IN A 10.0.0.42'
local-data: 'turris.local. IN A 10.0.0.1'

local-zone: 'livingroom.local.' static
local-data: 'yun.livingroom.local. IN A 10.0.0.43'
local-data: 'evolve.livingroom.local. IN A 10.0.0.38'
local-data: 'tv.livingroom.local. IN A 10.0.0.38'
local-data: 'dvb-t.livingroom.local. IN A 10.0.0.38'
local-data: 'switch.livingroom.local. IN A 10.0.0.34'
local-data: 'xbox360.livingroom.local. IN A 10.0.0.41'
local-data: 'nec.livingroom.local. IN A 10.0.0.40'
local-data: 'monitor.livingroom.local. IN A 10.0.0.40'
local-data: 'display.livingroom.local. IN A 10.0.0.40'
local-data: 'yamaha.livingroom.local. IN A 10.0.0.36'
local-data: 'av-reciever.livingroom.local. IN A 10.0.0.36'
local-data: 'reciever.livingroom.local. IN A 10.0.0.36'

Now restart unbound service
/etc/init.d/unbound restart
and enjoy

Tuesday, August 9, 2016

Learn music for programmers with Sonci Pi - 04 - Jam Session

In second lesson we created random Chinese music generator just by randomly playing tones from pentatonic scale. But pentatonic scale is not the only one of course.

Theory


Diatonic Scale


The basic and most known is of course diatonic scale. It's the one all of you know C-D-E-F-G-A-B(H)-C. I will not go in to further details. First of all we already touch the basic in first lesson and second you can ready more on wikipedia.

Pentatonic Scale


We touch pentatonic scale in second lesson and we said it's the black keys on the piano, so C# D# F# G# A#. However in the music the difference between tones matter more then the frequencies so if you move all of them by half tones you again get pentatonic scale. If you are interested more you can go on and again wikipedia is good source

Jazz Scale


There is also jazz scale. A great deal of modern jazz harmony arises from the modes of the ascending form of the melodic minor scale, also known as the jazz melodic minor scale C D E-flat F G A B
Well there are many jazz scales and again rather then explain all, you can read wikipedia.

There are also other scales, but for today enough of theory.


Sonic PI


So the question is if  we can create the Chinese music by just randomly playing pentatonic scale can we create Jam session by "randomly" playing jazz scale?

Let's start with little repetition

Function

Just use define :name do |prametr1, parametr2| to define function, if you want it to be function  you must return some value, so then before the end use name = value
Below example is factorial function.

define :fact do |n|
  fact = (1..n).reduce(:*)||1
end

So with factorial and combination functions, I've create ghoose function from second lesson, choose "randomly" with Gaussian probability distribution, but this time it's general for any list.

define :gchoose do |list|
  fl = list.length
  choosen_index = (fl/2).to_i
  base = 2**(fl-1)
  index = 0
  (fl). times do
    #puts (combination (fl-1), index)
    choosen_index = index if one_in((base/(combination (fl-1), index)).to_i)
    index = inc index
  end
  ghoose = list[choosen_index]
end


Now we just play random notes from Jazz scale with random duration

loop do
  play (gchoose jazz_scale)
  sleep (gchoose durations)
end

Here is the complete code on github if you will play it you find out that it's not what you would expect. The problem is that it miss one important think, rhythm.

OK, let's add underlying rhythm (jazz use 4/4 time signature so easiest would be 4 quarter notes, F D D D for example).

#Basic rhythm
in_thread do
  loop do
    play (F-12)
    sleep 1
    3. times do
      play (D-12)
      sleep 1
    end
  end
end

We also need to sync the our "improvisation" part to reflect the time signature. We just set Total Duration to 4 and initiate Remaining Duration to the same. Choose Current Duration, if it's higher then remaining we cut it short and use remaining. Once RD is 0 we reset it to TD.

#Total Duration
TD = 4
#Remaining Duration
RD = TD

loop do
  play (gchoose jazz_scale)
  #Choosen Duration
  CD = gchoose durations
  if CD > RD
    CD = CD - RD
  end
  sleep CD
  RD = RD - CD
  if RD <= 0
    RD = TD
  end
end

The complete code is my github. If you will try to play it I think you find that even we add rhythm and it sound little more like jazz, it's actually terrible. If you use default choose function instead of my gchoose it sound better, but still not jam session.

So let's can we create Jam session by "randomly" playing jazz scale?
No, not even if add rhythm to it.

Tuesday, August 2, 2016

Learn music for programmers with Sonci Pi - 03 - Rythm

Theory


Beat

One beat is basic time unit. One beat equals (most often) 1/4 note (because it's most common time measure in music).

Measure or Bar(line)

Measure or sometimes referred as bar is musical time unit which divides the song into larger units

Time signature

Time signature actually is telling us how many notes (the blue number) of and how long (the red number) we shall play. In example below it 3 quarter notes. if it would be 4/4 it would be 4 quarter notes, 2/2 would be 2 half notes, 4/8 would be 4 eights notes, etc.
Now as you can see in example below you don't have to play quarter notes, but if you summarize you shall get time corresponding to the time signature.
Take example of part between green lines(the end part). It's six 1/8 notes hence 6/8 = 3/4.

Rhythm

Rhythm is event repeating over time. Main beat and unstressed off beat or Accented back beat, repeating in pattern. To distinct them we use different drums, high and low, long and short beats.

Except using the traditional notation to understand and follow the rhythm, instead of linear display we can use circle, so one circle equals to one measure. Hence the measure with 3/4 time signature we can divide into 3 parts which each correspond to 1/4 note. (If tempo is 60 bpm then the full circle is 3 seconds).

In below section I show you few examples of rhythms, how they look on the "rhythm circle" and how we can write that in Sonic PI

Sonic PI


Waltz

Waltz use 3/4 time signature. Below we can see the basic simple waltz rhythm the first tone higher(main beat) next two lower(off and secondary beat).



It divides the rhythm circle below in to 3 equal parts each is for one 1/4 note.
In sonic code example below it corresponds to F and two D


Sonic Pi code:
# Welcome to Sonic Pi v2.10
use_bpm 90
use_synth :piano

#Let first define basic tones
D = 63
F = 66

#Basic rhythm
loop do
  play F
  sleep 1
  play D
  sleep 1
  play D
  sleep 1
end

Polka

Polka use 2/4 time signature. Below we can see it on rhythm circle. It's pretty easy one note (let it be E) starts on "12 o'clock" and last 1/4 as we have 2/4 = full circle, then 1/4 is one half of the circle so second note(let it be F) starts on "6 o'clock"


And here is the same in Sonic Pi

loop do
  play E
  sleep 1
  play F
  sleep 1
end

Let's try something little more interesting.


It's not hard we only need to play more things at once so lets do threads. It's easy syntax:
in_thread do
  commands
end

Complete Sonic PI code for polka rhythm above, the main rhythm(2 quarter F notes) are played in thread 1/8ths in "main" part:

# Welcome to Sonic Pi v2.10
use_bpm 90
use_synth :piano

#Let first define basic tones
C = 61
F = 66

#Basic rhythm
in_thread do
  loop do
    2.times do 
      play F
      sleep 1
    end
 end
end

loop do
  sleep 0.5
  play C+12
  sleep 0.5
  sleep 0.5
  play C+12
  sleep 0.5
end

Tango

Tango is in use 4/4 time signature. If we little simplify it's long, short, short, long. If you learn tango in dancing lesson you might remember the step pattern, slow, slow, quick, quick.

So here we go this one is pretty simple two long C to short E. (The dot behind the C means 1/8 longer)

Here it's on the rhythm circle



And here is the Sonic Pi code:
# Welcome to Sonic Pi v2.10
use_bpm 78
use_synth :piano
loop do
  play 61
  sleep 1
  sleep 0.5
  play 65
  sleep 0.5
  play 65
  sleep 1
  play 61
  sleep 1
end


Here is one little more complected as it's more changing the pitches but the timing is important (not the pitch)


You can try to write Sonic Pi code your self and then compare with my on github


Tuesday, July 26, 2016

Learn music for programmers with Sonci Pi - 02 - Random Chinese music generator

If you play just black keys on the piano in randomly you'll generate a Chinese music.

Pentatonic scale


Now this time it makes sense Penta tonic = 5 tones. Which is exactly what it is.
There are several pentatonic scales, but as suggested lets start with black piano keys which are:
C#, D#, F#, G#, A#, c#, d#, f#, g#, a#
However most important is the difference between them if we take the number for those tones from Sonic Pi it's:
62, 64, 67, 69, 71, (74, 76, 79, 81, 83)
Hence differences are:
2, 3, 2, 2, (3, 2, 3, 2, 2)
I guess you can see the pattern there, so if you choose any tone and just do the differences, you got pentatonic scale.

Sonic Pi

OK so musical theory we have, what we will need to create simple generator. Endless loop and randomly choose tone and duration in each go run through in the loop.


Loop

Loop just do commands in endless loop.

loop do
  commands
end

Field

Field is the list of items in square brackets separated by comma(s)
[62, 64, 67, 69, 71]
pentatonic_scale = [62, 64, 67, 69, 71]

Choose

Randomly choose one of the item in the give field
choose(field)
choose([62, 64, 67, 69, 71])

One_in

This returns true with probability of 1/X
one_in(X)
For example gives true with probability of 1/5
one_in(5)

Function/Procedure

Just use define :name do |prametr1, parametr2| to define procedure or function, if you want it to return some value then before the end use name = value

define :gchoose_note do
  note = 67
  note = 64 if one_in(5)
  note = 69 if one_in(5)
  note = 62 if one_in(10)
  note = 71 if one_in(10)
  gchoose_note = note
end

Random Chines music generator v1


loop do
  play choose([62, 64, 67, 69, 71])
  sleep choose([0.125, 0.25, 0.5, 1])
end

The problem with this is that it's too random and it doesn't sound as much as Chines music as if you really play the black keys your self randomly.
The reason is that people often misunderstand the randomness and if you ask group of the people to stay in the room randomly they will distribute them self's more or less evenly.
So they do when the play black keys, they tend to play one tone (in the middle often) and going around back and forth.

Random Chines music generator v2


So let's try a Gaussian distribution of probability with which we choose the tone to play.

# Welcome to Sonic Pi v2.10
use_bpm 60
use_synth :dull_bell

define :gchoose_note do
  note = 67
  note = 64 if one_in(5)
  note = 69 if one_in(5)
  note = 62 if one_in(10)
  note = 71 if one_in(10)
  gchoose_note = note
end

define :gchoose_duration do
  duration = 0.25
  duration = 0.5 if one_in(3)
  duration = 1 if one_in(6)
  duration = 0.125 if one_in(6)
  gchoose_duration = duration
end

loop do
  play gchoose_note
  sleep gchoose_duration
end

Saturday, July 16, 2016

Learn music for programmers with Sonic Pi - 01 - Brother John

I my self don't have any musical education and they try to teach me in school it was completely nonsense for me. The reason is that it's basically substitution cipher for basic physics. So let's start with few basic substitutions.

Tones/Notes

There is 12 half-tones which musicians call octave(Latin name for 8)
It's actually 7 tones (C,D,E,F,G,A,B) + 5 Sharp tones(C#, D#, F#, G#, A#). - To be more complicated German notation use H instead of B.
Reference tone is A = 440Hz, A octave higher have frequency 2*A (880Hz) and octave lower is 1/2*A (220Hz)

Now if we check the notation we can find where it's C, D, E etc. based on the position, as you can see on the we start with C on the line below "standard lines". D is under first line, E on the first line F between 1st and 2nd, etc. If you would like to ask where are the # (Sharps), there are not there if the note is sharp would see symbol # in front  of the note. (If you try to find logic in it I'm not able to help sorry, it's a cipher, really it is Bb read as B flat = A# read as A Sharp or Ais, 4 names for one frequency, see not only simple substitution it's almost like enigma)


Duration

Tones have duration, whole, half, quarter, 1/8, 1/16 etc.



This is what every musician explains, but still you don't know anything. Half of what? Second, minute, year.... ?
The answer is it depends on tempo. Tempo is number of whole notes which you can play in the minute, BPM, beats per minute.
Hence if tempo is 60 bpm it 60 wholes per minute, hence whole note plays for 1 second,  or half note 0.5 second, etc.

Tones/Notes in Sonic Pi


One more substitution we need to learn this time easy for Sonic Pi. Sonic Pi don't use names of tones it use simple integers.
1 is lowest C
2 is C#
3 is D
4 is D#
etc.
This is however way too low, to get something which we can hear we will start at 61 so

CC#DD#EFF#GG#AA#B
616263646566676869707172

Let's play in Sonic Pi


It's easy we will use command play to play a note and sleep to say how long.
Hence

play 61
sleep 0.25

plays quarter C

Now we just need to define what we are going to play and how fast (tempo). We will use piano and tempo 60 BPM

use_bpm 60
use_synth :piano

And last for today we need to learn to repeat certain parts for that we will use X. times do cyckle it have easy syntax:

X. times do
  commands
end

Will do X times commands between do and end. In below song we use 2 times do.

Brother John

An finally let's play very easy song, which have mutation in various languages, Brother Jacob.

Sonic Pi code:

# Welcome to Sonic Pi v2.10
use_bpm 60
use_synth :piano

#Let first define basic tones
C = 61
CSharp = 62
D = 63
DSharp = 64
E = 65
F = 66
FSharp = 67
G = 68
GSharp = 69
A = 70
ASharp = 71
H = 72
B = 72

#Now lets play the song Brother Jacob

#1st Part 2 times
#Are you slee - pin'
2. times do
  play C
  sleep 0.50
  play D
  sleep 0.50
  play E
  sleep 0.50
  play C
  sleep 0.50
end

#Second part 2 times
#Bro-ther John
2. times do
  play E
  sleep 0.5
  play F
  sleep 0.5
  play G
  sleep 1
end

#3rd part 2 times
#Mor- nin bells are ring-ing
2. times do
  play G
  sleep 0.25
  play A
  sleep 0.25
  play G
  sleep 0.25
  play F
  sleep 0.25
  play E
  sleep 0.5
  play C
  sleep 0.5
end

#4th and last part 2 times
# Bim bam boom
2. times do
  play C
  sleep 0.5
  play G
  sleep 0.5
  play C
  sleep 1
end

Saturday, July 9, 2016

False alerts - Dropped packets

Most of the monitoring is based on same fact it does some kind of probe, ICMP, SNMP, SSH, WinRM, WMI, or some kind of API. But most importantly it because it needs to pull all data from all devices it cannot afford more then few tries. So it's understandable that from time to time something is missed, not reply. It would be fine if it doesn't occur often and ideally on the random bases.

Usually the problem lies in TCP/IP implementation. Each network interface (no matter if virtual, physical, on switch, server, printer) have incoming and outgoing queue (buffer) which have some size. Packets goes first to this buffer and then they are processed one by one by TCP/IP layers.

When there is lot of traffic in very short period of time, typically when you start big file transfer, this buffer fills and newly incoming packets are dropped. For ongoing TCP connection it's no problem, because dropped packets as they are not acknowledged are resend. But new connections and state less protocols are not able recover and it "timeouts".

In monitoring we usually consider such device as down because it's not responding.
So if you have irregularly flapping devices or more specifically packet loss and your problem might be dropped packets and you shall consider extending those buffers.
This is known issue of VMWare by the way
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2039495
If you want to prove this the problem you just need to get the dropped packet counters so here are tips how you can get it.

For Windows


From Zenoss


winrm -r http://hotsname:5985 -u service-acount@example.net -a kerberos --dcip 10.10.10.10 -f "select * from Win32_PerfRawData_Tcpip_NetworkInterface" -d

From Windows Powershell


Get-WmiObject -computername hostname -Query "select Name,PacketsOutboundDiscarded,PacketsReceivedDiscarded from Win32_PerfRawData_Tcpip_NetworkInterface"

Output example:
__GENUS                  : 2
__CLASS                  : Win32_PerfRawData_Tcpip_NetworkInterface
__SUPERCLASS             :
__DYNASTY                :
__RELPATH                : Win32_PerfRawData_Tcpip_NetworkInterface.Name="vmxnet3 Ethernet Adapter _2"
__PROPERTY_COUNT         : 3
__DERIVATION             : {}
__SERVER                 :
__NAMESPACE              :
__PATH                   :
Name                     : vmxnet3 Ethernet Adapter _2
PacketsOutboundDiscarded : 0
PacketsReceivedDiscarded : 50
PacketsReceivedDiscarded ( https://msdn.microsoft.com/en-us/library/aa394340(v=vs.85).aspx )
Data type: uint32
Access type: Read-only
Qualifiers: DisplayName ("Packets Received Discarded") ,
CounterType (65536) ,
DefaultScale (0) ,
PerfDetail(200)
Number of inbound packets that were chosen to be discarded even though no errors had been detected to prevent delivery to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space.
  

For SNMP Devices

Snmpwalk/get for below OIDs
ifInDiscards .1.3.6.1.2.1.2.2.1.13 
ifOutDiscards .1.3.6.1.2.1.2.2.1.19
The number of in/out bound packets which were chosen to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space

root@raspberrypi:/home/pi# snmpwalk -v 2c -c public 10.0.0.40 .1.3.6.1.2.1.2.2.1.2
iso.3.6.1.2.1.2.2.1.2.1 = STRING: "eth0"
iso.3.6.1.2.1.2.2.1.2.2 = STRING: "LOOPBACK"
root@raspberrypi:/home/pi# snmpwalk -v 2c -c public 10.0.0.40 .1.3.6.1.2.1.2.2.1.13
iso.3.6.1.2.1.2.2.1.13.1 = Counter32: 0
iso.3.6.1.2.1.2.2.1.13.2 = Counter32: 0
root@raspberrypi:/home/pi# snmpwalk -v 2c -c public 10.0.0.40 .1.3.6.1.2.1.2.2.1.19
iso.3.6.1.2.1.2.2.1.19.1 = Counter32: 0
iso.3.6.1.2.1.2.2.1.19.2 = Counter32: 0

For Linux base devices

On linux based devices you can use ifconfig command nad check for dropped counters
root@raspberrypi:/var/www# ifconfig
eth0      Link encap:Ethernet  HWaddr b8:27:eb:1d:89:fe
          inet addr:10.0.0.37  Bcast:10.0.0.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:19462418 errors:0 dropped:43030 overruns:0 frame:0
          TX packets:12891339 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000

          RX bytes:4260766110 (3.9 GiB)  TX bytes:2835848497 (2.6 GiB)