sam sneed wrote:
> 
> I have been troubleshooting a problem and have seen something I
> don't
> understand. If host A sends data to host B and host B acks the
> data, isn't
> host A supposed to increment its seq #. Here is an actual
> tcpdump. Host A is
> 192.168.133.21 and B is 10.10.10.12.
> You'll notice host A is pushing 1 byte of data and Host B is
> acking it, yet
> host A's seq never increments. Is this normal?

It sounds like Host A has gone into a keepalive mode. It doesn't have any
actual data to send, so it just sits there sending one byte at a time.

We had a long discussion about TCP keepalives last week sometime. You might
want to check the archives. The TCP RFC (793) doesn't actually mention
keepalives. With ordinary TCP, when there's no data to send, both sides are
silent. But a lot of implementations send keepalives, and the host
requirements RFC does say that's OK. (RFC 1122)

Theoretically a host should just be able to send an empty TCP segment with
no data to implement the keepalive function. In that case, there's no reason
to increment the sequence number as sequence numbers count payload bytes.
However, some older implementations based on 4.2 BSD UNIX do not respond if
the keepalive contains no data, causing the sender to think its partner has
died.

Some systems instead send one garbage byte of data to elicit an ACK. They
purposely keep the sequence number the same so that the garbage byte can't
cause any harm. It's not the expected sequence number. It's a sequence
number that the receiver already received and ACKed, so the byte is thrown
away before being given to an application (although it is ACKed by TCP.)

Some implementations send a keepalive with no data and if no response is
received, switch over to the 4.2 BSD style and send a garbage byte.

Anyway, I doubt this is related to the problem you are troubleshooting since
it's normal behavior. What is the problem? Can you tell us more about it?
Thanks.
________________________

Priscilla Oppenheimer
http://www.priscilla.com


> 
> 17:56:46.563514 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 17:56:46.604328 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 17:58:20.327090 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 17:58:20.368296 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 17:59:54.090651 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 17:59:54.132170 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 18:01:27.854289 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 18:01:27.895254 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 18:03:01.618100 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 18:03:01.658892 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 18:04:35.381698 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 18:04:35.422538 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 18:06:09.145358 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 18:06:09.186227 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 18:07:42.909048 O 192.168.133.21.5055 > 10.10.10.12.1617: P
> 2653258020:2653258021(1) ack 808512610 win 8760 (DF)
> 18:07:42.949850 I 10.10.10.12.1617 > 192.168.133.21.5055: . ack
> 2653258021
> win 17520 (DF)
> 
> thanks
> 
> 




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=49583&t=49535
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to