SlideShare a Scribd company logo
Monitoring Network Performance in China
2
About ThousandEyes
ThousandEyes delivers visibility into every network your organization relies on.
Founded by network
experts; strong
investor backing
Relied on for "
critical operations by
leading enterprises
Recognized as "
an innovative "
new approach
31 Fortune 500
5 top 5 SaaS Companies
4 top 6 US Banks
3
•  High latency and packet loss are common
•  10 backbone access points (i.e., “choke points”)
•  2 dominant, government-controlled ISPs: China Unicom
(North), China Telecom (South)
–  Underdeveloped and congested
–  Few peering points in between
•  Highly sophisticated censorship system
–  Great Firewall
–  Great Cannon
A Different Internet in China
4
•  IP blocking
–  Routers drop all
packets going
to blacklisted IP
addresses
–  Lightweight
•  DNS tampering
–  Cache
poisoning
–  Keyword-based
hijacking
The Great Firewall
5
•  Deep packet inspection and
keyword filtering
–  Resource-intensive
The Great Firewall
Read more: https://blog.thousandeyes.com/deconstructing-great-firewall-china/
6
•  Set up Network tests to benchmark performance metrics
like latency and packet loss
•  Expect:
–  Higher latency and loss
•  Especially for traffic crossing into or out of China
–  Changing conditions due to censorship and diurnal patterns
Baseline Network Performance
Read more: https://blog.thousandeyes.com/benchmarking-network-performance-china/
7
Higher loss
and latency
from China
Clear diurnal
patterns in
outbound
traffic
Use Reports to Benchmark Performance
8
Compare HK with geographically
close locations in China: Foshan,
Zhuhai, Guangzhou
Performance differences can
then be attributed to crossing the
Great Firewall
Use Hong Kong for Comparison
9
•  DNS packets often go missing
–  Frequently congested, unreliable networks
–  DNS poisoning and hijacking
•  Cloud Agents in China use local ISP caches
•  Use DNS Server and Trace tests and alerts to check if
records:
–  Are always available
–  Have the correct mappings
–  Are served up quickly
DNS Issues
Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
10
DNS lookup of “dns-
plx.ewr1.nytimes.com”
returns incorrect
mappings to blocked
IPs of services
including Facebook,
Dropbox
Tests to these blocked
IPs are then blocked in
China Telecom and
China Unicom
DNS Server Test: NYTimes.com A record
11
DNS lookup of
“ns1.p24.dynect.net”
returns correct
mapping, suggesting
DNS tampering on
NYTimes
nameserver’s A
record
Test traffic from China
makes it through to the
Dyn nameserver
Evidence of DNS Tampering
12
Lookup of
NYTimes.com A record
returns incorrect
mappings to blocked IPs
Impossibly low
resolution times
suggest DNS
cache poisoning
Evidence of DNS Cache Poisoning
13
•  Page objects with blocked keywords or domains may fail
to load and slow down page load times
•  Watch out for:
–  Google: fonts, APIs, ads, Google Analytics
–  Facebook
–  Adobe Typekit
–  Marketo
•  Use the waterfall in Page Load and Transaction tests to
monitor for objects that fail to load
Blocked Page Components
Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
14
Objects from blocked
sites Facebook and
Google have long wait
times and fail to load
Page Load Test: Starbucks US from China
15
China-optimized
webpage sees
much lower object
load times
Still room for
improvement:
Google object has
long DNS time
Page Load Test: Starbucks China from China
16
•  Scope alerts to
China agents and
recalibrate
thresholds
•  Consider ISP-
specific Path
Trace alerts
Alerting
Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
17
q Adjust your expectations and
alerts based on Network test
data
q Use Reports to analyze data by
country
q Also benchmark:
q  CDN providers
q  Data center/colocation providers
q Continuously monitor important
services in China’s volatile
environment
Best Practices for Monitoring in China
q Understand the difficulties unique
to the Chinese Internet and adjust
your monitoring strategy
accordingly
q 2 ISPs with few peering points
q  Underdeveloped and congested
q Only 10 access points
q Stringent censorship
q  DNS poisoning and hijacking
q  Blocked page objects
18
See what you’re missing.
Watch the webinar:

https://www.thousandeyes.com/resources/network-performance-in-china-webinar

More Related Content

PDF
2016 Internet Outages: Trends, Insights & Analysis
PDF
Monitoring DNS Records and Servers
PDF
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
PDF
Troubleshooting Remote Workers and VPNs
PDF
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
PDF
Best Practices for Monitoring DNS
PDF
Enterprise Agents: Deployment Best Practices
PPTX
Enterprise and Wide Area Network Visibility
2016 Internet Outages: Trends, Insights & Analysis
Monitoring DNS Records and Servers
Endpoint Agent Part 2: Monitoring SaaS Apps from Anywhere
Troubleshooting Remote Workers and VPNs
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
Best Practices for Monitoring DNS
Enterprise Agents: Deployment Best Practices
Enterprise and Wide Area Network Visibility

What's hot (20)

PPTX
Endpoint Agent Part 1: End User Experience
PDF
Monitoring and Troubleshooting for Online Operations
PDF
Diagnosing Internet Outages
PDF
Optimizing WAN to Deliver SharePoint Online Globally
PDF
Monitoring IPv6 Networks
PPTX
Tips for Optimizing Web Performance
PDF
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
PDF
Discover Network Insights with Reports
PDF
Getting Started with ThousandEyes
PDF
ISP Connectivity Webinar: No Longer a Black Box
PDF
Monitoring for DNS Security
PDF
Reverse Path Visibility with Agent-to-Agent Tests
PDF
Monitoring End User Experience with Endpoint Agent
PDF
ThousandEyes Alerting Essentials for Your Network
PDF
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
PDF
NANOG 68: Decoding Performance Data from Large-Scale Internet Outages
PDF
Optimizing AS Paths
PDF
Cisco IT and ThousandEyes
PPTX
ION Sri Lanka - Why Implement DNSSEC?
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Endpoint Agent Part 1: End User Experience
Monitoring and Troubleshooting for Online Operations
Diagnosing Internet Outages
Optimizing WAN to Deliver SharePoint Online Globally
Monitoring IPv6 Networks
Tips for Optimizing Web Performance
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
Discover Network Insights with Reports
Getting Started with ThousandEyes
ISP Connectivity Webinar: No Longer a Black Box
Monitoring for DNS Security
Reverse Path Visibility with Agent-to-Agent Tests
Monitoring End User Experience with Endpoint Agent
ThousandEyes Alerting Essentials for Your Network
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
NANOG 68: Decoding Performance Data from Large-Scale Internet Outages
Optimizing AS Paths
Cisco IT and ThousandEyes
ION Sri Lanka - Why Implement DNSSEC?
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Ad

Viewers also liked (18)

PPT
Reunião de pais 21032017 2 e 3 º anos
PDF
OpenZFS novel algorithms: snapshots, space allocation, RAID-Z - Matt Ahrens
PPTX
презентація до відкритого уроку читання «Весна йде та йде» за Марко Вовчок, ...
PPTX
Film industry task 5
PPTX
Frederico garcia lorca definitiu ok
PPTX
Recursion
PDF
Video Editing Resume
PPTX
Top Reasons to learn Digital Marketing
PPTX
Audience feedback of my magazine SIMRAN KAUR
PDF
11plus workbook s
DOCX
конспект відкритого уроку читання «Весна йде та йде» за Марко Вовчок, «Прихо...
PPTX
Introduction aux leçons
PDF
Crowdfunding x Scholarship
PPTX
Project tiger and wild life conservation in india
PPTX
0394827198
PPT
Präsentation Eingangsstufe GS Staakenweg
PDF
Казка "Струмок"
PPTX
Mercadotecnia y Promoción de la Salud. Heberto Priego
Reunião de pais 21032017 2 e 3 º anos
OpenZFS novel algorithms: snapshots, space allocation, RAID-Z - Matt Ahrens
презентація до відкритого уроку читання «Весна йде та йде» за Марко Вовчок, ...
Film industry task 5
Frederico garcia lorca definitiu ok
Recursion
Video Editing Resume
Top Reasons to learn Digital Marketing
Audience feedback of my magazine SIMRAN KAUR
11plus workbook s
конспект відкритого уроку читання «Весна йде та йде» за Марко Вовчок, «Прихо...
Introduction aux leçons
Crowdfunding x Scholarship
Project tiger and wild life conservation in india
0394827198
Präsentation Eingangsstufe GS Staakenweg
Казка "Струмок"
Mercadotecnia y Promoción de la Salud. Heberto Priego
Ad

Similar to Monitoring Network Performance in China (20)

PDF
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
PDF
Fast 360 assessment sample report
PPTX
Designing Modern Web Applications
PPTX
The DNS Tunneling Blindspot
PPTX
HDFS: Optimization, Stabilization and Supportability
PPTX
Hdfs 2016-hadoop-summit-dublin-v1
PDF
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PPTX
Cloud Services Powered by IBM SoftLayer and NetflixOSS
PPT
PPTX
Kscope 14 Presentation : Virtual Data Platform
PDF
ICANN 51: Name Collision
PPTX
DNS - MCSE 2019
PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
PDF
CNIT 50: 1. Network Security Monitoring Rationale
PPTX
Finding the source of Ransomware - Wire data analytics
PPT
Slideshare 1
PDF
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
PDF
SOHOpelessly Broken
PPTX
Data Virtualization: revolutionizing database cloning
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
Fast 360 assessment sample report
Designing Modern Web Applications
The DNS Tunneling Blindspot
HDFS: Optimization, Stabilization and Supportability
Hdfs 2016-hadoop-summit-dublin-v1
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Cloud Services Powered by IBM SoftLayer and NetflixOSS
Kscope 14 Presentation : Virtual Data Platform
ICANN 51: Name Collision
DNS - MCSE 2019
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
CNIT 50: 1. Network Security Monitoring Rationale
Finding the source of Ransomware - Wire data analytics
Slideshare 1
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
SOHOpelessly Broken
Data Virtualization: revolutionizing database cloning

More from ThousandEyes (20)

PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
PDF
2025-07-15 EMEA Volledig Inzicht Dutch Webinar
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PPTX
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
PPTX
Assurance Best Practices: Unlocking Proactive Network Operations
PPTX
ThousandEyes Partner Innovation Updates for May 2025
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PPTX
How to Optimize Your AWS Environment for Improved Cloud Performance
PPTX
Introduction to ThousandEyes platform March 2025
PPTX
What's New? ThousandEyes Product Features and Highlights for February 2025
PPTX
AMER Introduction to ThousandEyes Webinar
PPTX
What's New? ThousandEyes Product Features and Highlights
PPTX
Top Outages of 2024, Explained: Lessons in Digital Resilience
PPTX
Top Outages of 2024, Explained: Lessons in Digital Resilience
PPTX
Top Outages of 2024, Explained: Lessons in Digital Resilience
New ThousandEyes Product Innovations: Cisco Live June 2025
IT Runs Better with ThousandEyes AI-driven Assurance
2025-07-15 EMEA Volledig Inzicht Dutch Webinar
New ThousandEyes Product Innovations: Cisco Live June 2025
New ThousandEyes Product Innovations: Cisco Live June 2025
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
Assurance Best Practices: Unlocking Proactive Network Operations
ThousandEyes Partner Innovation Updates for May 2025
How to Optimize Your AWS Environment for Improved Cloud Performance
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
Introduction to ThousandEyes platform March 2025
What's New? ThousandEyes Product Features and Highlights for February 2025
AMER Introduction to ThousandEyes Webinar
What's New? ThousandEyes Product Features and Highlights
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience
Top Outages of 2024, Explained: Lessons in Digital Resilience

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
MIND Revenue Release Quarter 2 2025 Press Release
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Monitoring Network Performance in China

  • 2. 2 About ThousandEyes ThousandEyes delivers visibility into every network your organization relies on. Founded by network experts; strong investor backing Relied on for " critical operations by leading enterprises Recognized as " an innovative " new approach 31 Fortune 500 5 top 5 SaaS Companies 4 top 6 US Banks
  • 3. 3 •  High latency and packet loss are common •  10 backbone access points (i.e., “choke points”) •  2 dominant, government-controlled ISPs: China Unicom (North), China Telecom (South) –  Underdeveloped and congested –  Few peering points in between •  Highly sophisticated censorship system –  Great Firewall –  Great Cannon A Different Internet in China
  • 4. 4 •  IP blocking –  Routers drop all packets going to blacklisted IP addresses –  Lightweight •  DNS tampering –  Cache poisoning –  Keyword-based hijacking The Great Firewall
  • 5. 5 •  Deep packet inspection and keyword filtering –  Resource-intensive The Great Firewall Read more: https://blog.thousandeyes.com/deconstructing-great-firewall-china/
  • 6. 6 •  Set up Network tests to benchmark performance metrics like latency and packet loss •  Expect: –  Higher latency and loss •  Especially for traffic crossing into or out of China –  Changing conditions due to censorship and diurnal patterns Baseline Network Performance Read more: https://blog.thousandeyes.com/benchmarking-network-performance-china/
  • 7. 7 Higher loss and latency from China Clear diurnal patterns in outbound traffic Use Reports to Benchmark Performance
  • 8. 8 Compare HK with geographically close locations in China: Foshan, Zhuhai, Guangzhou Performance differences can then be attributed to crossing the Great Firewall Use Hong Kong for Comparison
  • 9. 9 •  DNS packets often go missing –  Frequently congested, unreliable networks –  DNS poisoning and hijacking •  Cloud Agents in China use local ISP caches •  Use DNS Server and Trace tests and alerts to check if records: –  Are always available –  Have the correct mappings –  Are served up quickly DNS Issues Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
  • 10. 10 DNS lookup of “dns- plx.ewr1.nytimes.com” returns incorrect mappings to blocked IPs of services including Facebook, Dropbox Tests to these blocked IPs are then blocked in China Telecom and China Unicom DNS Server Test: NYTimes.com A record
  • 11. 11 DNS lookup of “ns1.p24.dynect.net” returns correct mapping, suggesting DNS tampering on NYTimes nameserver’s A record Test traffic from China makes it through to the Dyn nameserver Evidence of DNS Tampering
  • 12. 12 Lookup of NYTimes.com A record returns incorrect mappings to blocked IPs Impossibly low resolution times suggest DNS cache poisoning Evidence of DNS Cache Poisoning
  • 13. 13 •  Page objects with blocked keywords or domains may fail to load and slow down page load times •  Watch out for: –  Google: fonts, APIs, ads, Google Analytics –  Facebook –  Adobe Typekit –  Marketo •  Use the waterfall in Page Load and Transaction tests to monitor for objects that fail to load Blocked Page Components Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
  • 14. 14 Objects from blocked sites Facebook and Google have long wait times and fail to load Page Load Test: Starbucks US from China
  • 15. 15 China-optimized webpage sees much lower object load times Still room for improvement: Google object has long DNS time Page Load Test: Starbucks China from China
  • 16. 16 •  Scope alerts to China agents and recalibrate thresholds •  Consider ISP- specific Path Trace alerts Alerting Read more: https://blog.thousandeyes.com/monitoring-application-delivery-china/
  • 17. 17 q Adjust your expectations and alerts based on Network test data q Use Reports to analyze data by country q Also benchmark: q  CDN providers q  Data center/colocation providers q Continuously monitor important services in China’s volatile environment Best Practices for Monitoring in China q Understand the difficulties unique to the Chinese Internet and adjust your monitoring strategy accordingly q 2 ISPs with few peering points q  Underdeveloped and congested q Only 10 access points q Stringent censorship q  DNS poisoning and hijacking q  Blocked page objects
  • 18. 18 See what you’re missing. Watch the webinar: https://www.thousandeyes.com/resources/network-performance-in-china-webinar