Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.protocols.tcp-ip    |    TCP and IP network protocols.    |    14,669 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 13,742 of 14,669    |
|    Jorgen Grahn to Mark Hobley    |
|    Re: Linux 2.6.39-rc7 - Wrong Maximum Seg    |
|    21 May 11 22:28:56    |
      XPost: comp.os.linux.networking       From: grahn+nntp@snipabacken.se              ["Followup-To:" header set to comp.protocols.tcp-ip. You should have       mentioned that you started crossposting.]              On Sat, 2011-05-21, Mark Hobley wrote:       > On Sat, 21 May 2011 14:58:32 +0000, Mark Hobley wrote:       ...       >> 03:40:48.745614 IP venus.markhobley.yi.org.52196 >       >> news.eternal-september.org.nntp: Flags [S], seq 185692436, win 14600,       >> options [mss 1460,sackOK,TS val 47088682 ecr 0,nop,wscale 5], length 0       >       > The value of win 14600 here is presumably the number of bytes of data that       > venus is prepared to receive in a single instance. Is that right? Presumably       > that is just data, and excludes headers. Is that right? It is bigger than       > any datagram that my ISP can carry. Does it have any effect on datagram       > sizes?              No.              ...       > 03:43:04.320740 IP venus.markhobley.yi.org.52201 >       >> news.eternal-september.org.nntp: Flags [S], seq 2304145392, win 14600,       >> options [mss 1460,sackOK,TS val 47122576 ecr 0,nop,wscale 5], length 0       >       > A big window again. Hey look at the mss value! That looks big to me.       > My ISP cannot carry a datagram above 1412 bytes.              1460 looks perfectly normal to me; it's the mss for a normal Ethernet.       n.e-s.o cannot know that your ISP is weird. As far as I can tell       you're not using Path MTU discovery, so you're relying on the routers       on the way handling IP fragmentation correctly. Which they must.              Perhaps you should have captured ICMP messages too, in case there are       any which are relevant.              ...              I've looked some at your tcpdump. It's a bit confusing because it       contains multiple sessions -- n.e-s.org times out and forces your       client to reconnect a few times.              Anyway, I don't see anything really strange, apart from the fact that       large segments from you (at least 1368 and upwards) don't get through.       You send a bunch of them and resend them, but the server never ACKs       any of them. For example in this part (abbreviated for clarity):              1:55.072935 IP C > S: Flags [.], seq 66:1434, ack 324, win 457, length 1368       1:55.072986 IP C > S: Flags [P.], seq 1434:2113, ack 324, win 457, length 679       1:55.073028 IP C > S: Flags [.], seq 2113:3481, ack 324, win 457, length 1368       1:55.073074 IP C > S: Flags [.], seq 3481:4849, ack 324, win 457, length 1368       1:55.242762 IP S > C: Flags [.], ack 66, win 46, length 0       1:56.524109 IP C > S: Flags [.], seq 66:1434, ack 324, win 457, length 1368       1:59.424110 IP C > S: Flags [.], seq 66:1434, ack 324, win 457, length 1368       2:05.232112 IP C > S: Flags [.], seq 66:1434, ack 324, win 457, length 1368       2:16.832117 IP C > S: Flags [.], seq 66:1434, ack 324, win 457, length 1368              /Jorgen              --        // Jorgen Grahn |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca