Wireshark mailing list archives

Re: SYN repeated retransmission despite "SYN ACK" following initial SYN packet


From: Martin Visser <martinvisser99 () gmail com>
Date: Sat, 24 Apr 2010 20:35:32 +1000

Jeff,

Well, if the Dup ACKs in frames 206,208 etc don't have ACK *and* SYN set
(just check the flag details in the middle pane on those frames) then I
would say there is a bug in the IP stack of the printer. (Are you capturing
this "close" to printer and is there no firewall or something that might be
altering the TCP flags in between?)

If this problem only happens on the odd occasion when the first SYN+ACK
doesn't make it back to the client then it is possible that this bug (when
the client needs to send a followup SYN) may have gone undetected.

Regards, Martin

MartinVisser99 () gmail com


On Sat, Apr 24, 2010 at 12:14 AM, Jeff Bruns <jeff.bruns () gmail com> wrote:

Martin-
Thank you for your reply, your information was very helpful. I've attached
the wireshark screenshot, hopefully it helps the situation to make more
sense.

Regards-
Jeff


On Thu, Apr 22, 2010 at 9:09 PM, Martin Visser <martinvisser99 () gmail com>wrote:

Jeff,

None of you links seem to be correct at all, only pointing to the top
level forum.

As far as seeing SYN attempts at increasing intervals, this is pretty
normal if you have connectivity issues. The response should always be a
SYN+ACK or a RST, Can't think of why a half-open connection on the printer
would respond to another SYN with just an ACK.

Bottlenecks don't usually reveal  themselves unless they are stressed.
Either you need to test the level that the bottlenecks appears using your
native applications, or traffic generator tools such as iperf. By watching
the amount of traffic that can pass through the bottleneck (measured by
whatever means such as the network equipments stats, the load generator tool
or say Wireshark) you can determine at what point it becomes significant.

Regards, Martin

MartinVisser99 () gmail com


On Fri, Apr 23, 2010 at 3:33 AM, Jeff Bruns <jeff.bruns () gmail com> wrote:

Greetings-
I previously posted on the Devshed forums but haven't received any
response. Hopefully the wireshark community might be able to help...

I wrote a perl program which acts as a network sniffer, intercepting data
sent to a networked laser printer <http://forums.devshed.com/#>. The
resulting data, once parsed, is formatted and written to a serial port which
has connected a series of scrolling LED signboards. I've recently been
experiencing some issues with my network traffic and I was hoping to get
some advice on how to proceed.

I'm running Windows XP <http://forums.devshed.com/#> connected to a
10Mbps wired LAN which is part of a larger VPN. I've been using wireshark in
my effort to better understand my recent network issues.

The following scenario was an attempt to send data to our networked laser
printer <http://forums.devshed.com/#>. I was able to capture the
corresponding network traffic with wireshark. I've attached a snapshot of
the wireshark traffic.

My first question, which I'm under the assumption is out of my control,
has to do with the 5 repeated SYN packets, despite the SYN, ACK that was
sent immediately following the first SYN. I'm thinking maybe the sender
failed to receive the SYN, ACK and as a result resent the SYN packet?? That
being the case, why is the receiver replying with repeated ACK instead of
SYN, ACK?

My next question has to do with the timeframe between each of the
following SYN packets. It would appear that the time<http://forums.devshed.com/#>doubles after each sent SYN 
packet. Given the precision of the time
intervals I would assume it has something to do with the retransmission
timer or persistence timer, although I'm curious as to why the interval
doubles after each attempt.

Information sent to our networked printer is time sensitive, and as you
can see from the timestamps shown throughout the network traffic it takes
almost 3 minutes to successfully transmit the data<http://forums.devshed.com/#>
.

My questions are:
1- Is there anything I can do to prevent the redundant SYN attempts in
the future?
2- Is there a way to decrease the timeout so that in the event of future
occurrences, the interval between SYN attempts is expedited?
3- In the event data loss <http://forums.devshed.com/#> is suspected due
to network congestion or quality, are there any diagnostics I could perform
to identify bottlenecks?

Below is a link to a wireshark screenshot showing the packets within the
message. It being my first time posing to the list, I'm not sure if I'm
permitted to include attachments, so the screenshot is a link to the devshed
post attachment. If it would be helpful and I'm permitted I'd be happy to
attach the wireshark pcap dump file.

Any help would be greatly appreciated.

Thanks-

Jeff Bruns


___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org

Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
            mailto:wireshark-users-request () wireshark org
?subject=unsubscribe




___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org>
Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
            mailto:wireshark-users-request () wireshark org
?subject=unsubscribe



___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org>
Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
            mailto:wireshark-users-request () wireshark org
?subject=unsubscribe

___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org>
Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-request () wireshark org?subject=unsubscribe

Current thread: