piconet

Post a reply

Smilies
:D :) :( :o :shock: :? 8) :lol: :x :P :oops: :cry: :evil: :twisted: :roll: :wink: :!: :?: :idea: :arrow: :| :mrgreen:

Markdown is OFF

BBCode is ON
[img] is ON
[url] is ON
Smilies are ON

Topic review
   

Expand view Topic review: piconet

Re: piconet

by pan » Sat Oct 01, 2022 5:02 pm

the original recursive dns server (deadwood) in piconet does not support dnssec, and now akamai-supported name resolution forces dnssec, so deadwood cannot walk down the dns hierarchy once it hits akamai. many big names including www.ibm.com and www.mit.edu are supported by akamai, so we need to move the recursive dns server in piconet from deadwood to bind9 (the full-fledged, original dns server known as berkeley internet name daemon). students interaction such as nslookup and tcpdump is not changed (the only thing they need is "/etc/init.d/bind9 restart" when to refresh bind9 dns cache to see the full recursion)

e.g., domains without dnssec by deadwood: tcpdump

Code: Select all

16:55:10.242974 IP 192.168.1.130.16248 > 198.97.190.53.53: 36117 A? www.uvic.ca. (29)
16:55:10.283634 IP 198.97.190.53.53 > 192.168.1.130.16248: 36117- 0/4/8 (282)
16:55:10.284179 IP 192.168.1.130.15802 > 199.4.144.2.53: 12836 A? www.uvic.ca. (29)
16:55:10.307007 IP 199.4.144.2.53 > 192.168.1.130.15802: 12836- 0/3/3 (133)
16:55:10.307559 IP 192.168.1.130.17109 > 216.171.224.23.53: 22702 A? www.uvic.ca. (29)
16:55:11.361925 IP 192.168.1.130.16356 > 142.104.80.2.53: 59606 [b2&3=0x80] A? www.uvic.ca. (29)
16:55:11.369598 IP 142.104.80.2.53 > 192.168.1.130.16356: 59606*- 1/3/3 A 142.104.197.120 (149)
16:55:11.371382 IP 192.168.1.130.17365 > 216.171.224.23.53: 29251 AAAA? www.uvic.ca. (29)
16:55:12.425832 IP 192.168.1.130.15454 > 142.104.80.2.53: 28208 [b2&3=0x80] AAAA? www.uvic.ca. (29)
16:55:12.433147 IP 142.104.80.2.53 > 192.168.1.130.15454: 28208*- 1/3/3 AAAA 2607:f8f0:c10::100 (161)

with nslookup

Code: Select all

> www.uvic.ca.
Server:		127.0.0.1
Address:	127.0.0.1#53

Non-authoritative answer:
Name:	www.uvic.ca
Address: 142.104.197.120
Name:	www.uvic.ca
Address: 2607:f8f0:c10::100

domains with dnssec by deadwood

Code: Select all

16:55:48.820222 IP 192.168.1.130.15639 > 192.33.4.12.53: 27416 A? www.ibm.com. (29)
16:55:48.862061 IP 192.33.4.12.53 > 192.168.1.130.15639: 27416- 0/13/14 (492)
16:55:48.862662 IP 192.168.1.130.15379 > 192.42.93.30.53: 58200 A? www.ibm.com. (29)
16:55:48.890716 IP 192.42.93.30.53 > 192.168.1.130.15379: 58200- 0/8/0 (195)
16:55:48.891382 IP 192.168.1.130.17832 > 192.5.5.241.53: 5544 A? ns1-99.akam.net. (33)
16:55:48.901187 IP 192.5.5.241.53 > 192.168.1.130.17832: 5544-| 0/13/11 (490)
16:55:49.955965 IP 192.168.1.130.17880 > 192.58.128.30.53: 7015 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:55:50.960386 IP 192.168.1.130.18929 > 198.41.0.4.53: 15609 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:55:50.987499 IP 198.41.0.4.53 > 192.168.1.130.18929: 15609-| 0/13/11 (490)
16:55:51.992012 IP 192.168.1.130.19019 > 192.203.230.10.53: 62344 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:55:52.996048 IP 192.168.1.130.15735 > 192.36.148.17.53: 31648 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:55:53.092071 IP 192.36.148.17.53 > 192.168.1.130.15735: 31648- 0/13/14 (496)
16:55:53.092631 IP 192.168.1.130.16745 > 192.55.83.30.53: 58112 A? ns1-99.akam.net. (33)
16:55:53.128932 IP 192.55.83.30.53 > 192.168.1.130.16745: 58112-| 0/13/12 (503)
16:55:54.121643 IP 192.168.1.130.16518 > 192.31.80.30.53: 17378 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:55:54.133180 IP 192.31.80.30.53 > 192.168.1.130.16518: 17378-| 0/13/12 (503)
16:55:58.820487 IP 192.168.1.130.18264 > 192.12.94.30.53: 8535 A? eur2.akam.net. (31)
16:55:58.829010 IP 192.12.94.30.53 > 192.168.1.130.18264: 8535-| 0/13/12 (501)
16:55:59.883713 IP 192.168.1.130.15928 > 192.48.79.30.53: 59356 [b2&3=0x80] A? eur2.akam.net. (31)
16:55:59.919551 IP 192.48.79.30.53 > 192.168.1.130.15928: 59356-| 0/13/12 (501)
16:56:00.923968 IP 192.168.1.130.17331 > 192.5.6.30.53: 11114 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:00.932560 IP 192.5.6.30.53 > 192.168.1.130.17331: 11114-| 0/13/12 (501)
16:56:01.936910 IP 192.168.1.130.16810 > 192.35.51.30.53: 37502 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:01.963270 IP 192.35.51.30.53 > 192.168.1.130.16810: 37502-| 0/13/12 (501)
16:56:02.967643 IP 192.168.1.130.16693 > 192.52.178.30.53: 43022 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:03.000386 IP 192.52.178.30.53 > 192.168.1.130.16693: 43022-| 0/13/12 (501)
16:56:04.004725 IP 192.168.1.130.18830 > 192.33.14.30.53: 47888 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:04.958819 IP 192.168.1.130.17072 > 192.43.172.30.53: 48005 A? usc3.akam.net. (31)
16:56:04.986887 IP 192.43.172.30.53 > 192.168.1.130.17072: 48005-| 0/13/12 (501)
16:56:05.991440 IP 192.168.1.130.17614 > 192.12.94.30.53: 324 A? usc2.akam.net. (31)
16:56:06.003980 IP 192.12.94.30.53 > 192.168.1.130.17614: 324-| 0/13/12 (501)
16:56:06.941454 IP 192.168.1.130.16857 > 192.48.79.30.53: 21741 A? ns1-206.akam.net. (34)
16:56:06.941488 IP 192.168.1.130.16491 > 192.48.79.30.53: 59999 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:06.941500 IP 192.168.1.130.16194 > 192.12.94.30.53: 65268 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:06.952311 IP 192.12.94.30.53 > 192.168.1.130.16194: 65268-| 0/13/12 (501)
16:56:06.977368 IP 192.48.79.30.53 > 192.168.1.130.16857: 21741-| 0/13/12 (504)
16:56:06.980655 IP 192.48.79.30.53 > 192.168.1.130.16491: 59999-| 0/13/12 (501)
16:56:08.035469 IP 192.168.1.130.15504 > 192.48.79.30.53: 38529 A? eur5.akam.net. (31)
16:56:08.035614 IP 192.168.1.130.17546 > 192.5.6.30.53: 19176 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:08.035705 IP 192.168.1.130.17642 > 192.48.79.30.53: 47113 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:08.035865 IP 192.168.1.130.15035 > 192.5.6.30.53: 26429 [b2&3=0x80] A? ns1-206.akam.net. (34)
16:56:08.047758 IP 192.5.6.30.53 > 192.168.1.130.17546: 19176-| 0/13/12 (501)
16:56:08.051744 IP 192.5.6.30.53 > 192.168.1.130.15035: 26429-| 0/13/12 (504)
16:56:08.072137 IP 192.48.79.30.53 > 192.168.1.130.17642: 47113-| 0/13/12 (501)
16:56:08.072206 IP 192.48.79.30.53 > 192.168.1.130.15504: 38529-| 0/13/12 (501)
16:56:09.076678 IP 192.168.1.130.17905 > 192.42.93.30.53: 29881 A? eur2.akam.net. (31)
16:56:09.076823 IP 192.168.1.130.15354 > 192.35.51.30.53: 43698 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:09.076915 IP 192.168.1.130.16133 > 192.5.6.30.53: 24138 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:09.077079 IP 192.168.1.130.15472 > 192.35.51.30.53: 32470 [b2&3=0x80] A? ns1-206.akam.net. (34)
16:56:09.077335 IP 192.168.1.130.16227 > 192.5.6.30.53: 4353 [b2&3=0x80] A? eur5.akam.net. (31)
16:56:09.088261 IP 192.5.6.30.53 > 192.168.1.130.16133: 24138-| 0/13/12 (501)
16:56:09.088332 IP 192.5.6.30.53 > 192.168.1.130.16227: 4353-| 0/13/12 (501)
16:56:09.105616 IP 192.35.51.30.53 > 192.168.1.130.15354: 43698-| 0/13/12 (501)
16:56:09.105690 IP 192.42.93.30.53 > 192.168.1.130.17905: 29881-| 0/13/12 (501)
16:56:09.105727 IP 192.35.51.30.53 > 192.168.1.130.15472: 32470-| 0/13/12 (504)
16:56:09.859274 IP 192.168.1.130.16574 > 192.31.80.30.53: 58855 A? asia3.akam.net. (32)
16:56:09.868683 IP 192.31.80.30.53 > 192.168.1.130.16574: 58855-| 0/13/12 (502)
16:56:10.120201 IP 192.168.1.130.16508 > 192.52.178.30.53: 22079 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:10.120329 IP 192.168.1.130.15868 > 192.35.51.30.53: 48399 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:10.120412 IP 192.168.1.130.16512 > 192.52.178.30.53: 36598 [b2&3=0x80] A? ns1-206.akam.net. (34)
16:56:10.120540 IP 192.168.1.130.17321 > 192.35.51.30.53: 57791 [b2&3=0x80] A? eur5.akam.net. (31)
16:56:10.120730 IP 192.168.1.130.17167 > 192.41.162.30.53: 62979 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:10.148949 IP 192.35.51.30.53 > 192.168.1.130.17321: 57791-| 0/13/12 (501)
16:56:10.149021 IP 192.35.51.30.53 > 192.168.1.130.15868: 48399-| 0/13/12 (501)
16:56:10.155400 IP 192.52.178.30.53 > 192.168.1.130.16512: 36598-| 0/13/12 (504)
16:56:10.158690 IP 192.41.162.30.53 > 192.168.1.130.17167: 62979-| 0/13/12 (501)
16:56:10.158761 IP 192.52.178.30.53 > 192.168.1.130.16508: 22079-| 0/13/12 (501)
16:56:10.912250 IP 192.168.1.130.18881 > 192.33.14.30.53: 8151 A? usw2.akam.net. (31)
16:56:10.912395 IP 192.168.1.130.16008 > 192.43.172.30.53: 45120 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:10.938281 IP 192.43.172.30.53 > 192.168.1.130.16008: 45120-| 0/13/12 (502)
16:56:10.985879 IP 192.33.14.30.53 > 192.168.1.130.18881: 8151-| 0/13/12 (501)
16:56:11.136872 IP 192.168.1.130.18063 > 192.33.14.30.53: 42823 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:11.137018 IP 192.168.1.130.16662 > 192.33.14.30.53: 34161 [b2&3=0x80] A? ns1-206.akam.net. (34)
16:56:11.137103 IP 192.168.1.130.16003 > 192.52.178.30.53: 10185 [b2&3=0x80] A? eur5.akam.net. (31)
16:56:11.137196 IP 192.168.1.130.17988 > 192.26.92.30.53: 15886 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:11.148682 IP 192.26.92.30.53 > 192.168.1.130.17988: 15886-| 0/13/12 (501)
16:56:11.175700 IP 192.52.178.30.53 > 192.168.1.130.16003: 10185-| 0/13/12 (501)
16:56:11.929212 IP 192.168.1.130.15541 > 192.42.93.30.53: 42187 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:11.929347 IP 192.168.1.130.17377 > 192.12.94.30.53: 63354 A? ns1-99.akam.net. (33)
16:56:11.942350 IP 192.12.94.30.53 > 192.168.1.130.17377: 63354-| 0/13/12 (503)
16:56:11.957614 IP 192.42.93.30.53 > 192.168.1.130.15541: 42187-| 0/13/12 (501)
16:56:12.089887 IP 192.168.1.130.16872 > 192.42.93.30.53: 4376 [b2&3=0x80] A? ns1-206.akam.net. (34)
16:56:12.089915 IP 192.168.1.130.18424 > 192.33.14.30.53: 57641 [b2&3=0x80] A? eur5.akam.net. (31)
16:56:12.089929 IP 192.168.1.130.17293 > 192.54.112.30.53: 52813 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:12.117579 IP 192.42.93.30.53 > 192.168.1.130.16872: 4376-| 0/13/12 (504)
16:56:12.117590 IP 192.54.112.30.53 > 192.168.1.130.17293: 52813-| 0/13/12 (501)
16:56:12.878937 IP 192.168.1.130.18929 > 192.41.162.30.53: 10312 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:12.878970 IP 192.168.1.130.16490 > 192.55.83.30.53: 31235 A? usc3.akam.net. (31)
16:56:12.878984 IP 192.168.1.130.17909 > 192.48.79.30.53: 55910 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:12.878996 IP 192.168.1.130.15727 > 192.12.94.30.53: 41750 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:12.891015 IP 192.12.94.30.53 > 192.168.1.130.15727: 41750-| 0/13/12 (502)
16:56:12.913193 IP 192.48.79.30.53 > 192.168.1.130.17909: 55910-| 0/13/12 (503)
16:56:12.913253 IP 192.41.162.30.53 > 192.168.1.130.18929: 10312-| 0/13/12 (501)
16:56:12.916096 IP 192.55.83.30.53 > 192.168.1.130.16490: 31235-| 0/13/12 (501)
16:56:13.167473 IP 192.168.1.130.17763 > 192.42.93.30.53: 61461 [b2&3=0x80] A? eur5.akam.net. (31)
16:56:13.167587 IP 192.168.1.130.15028 > 192.55.83.30.53: 73 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:13.196364 IP 192.42.93.30.53 > 192.168.1.130.17763: 61461-| 0/13/12 (501)
16:56:13.203770 IP 192.55.83.30.53 > 192.168.1.130.15028: 73-| 0/13/12 (501)
16:56:13.957243 IP 192.168.1.130.16360 > 192.26.92.30.53: 33717 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:13.957374 IP 192.168.1.130.18511 > 192.31.80.30.53: 32737 A? usc2.akam.net. (31)
16:56:13.957469 IP 192.168.1.130.16140 > 192.31.80.30.53: 12446 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:13.957630 IP 192.168.1.130.19058 > 192.5.6.30.53: 52651 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:13.957817 IP 192.168.1.130.18670 > 192.48.79.30.53: 45313 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:13.971540 IP 192.26.92.30.53 > 192.168.1.130.16360: 33717-| 0/13/12 (501)
16:56:13.971610 IP 192.31.80.30.53 > 192.168.1.130.18511: 32737-| 0/13/12 (501)
16:56:13.971643 IP 192.31.80.30.53 > 192.168.1.130.16140: 12446-| 0/13/12 (501)
16:56:13.971671 IP 192.5.6.30.53 > 192.168.1.130.19058: 52651-| 0/13/12 (503)
16:56:13.995232 IP 192.48.79.30.53 > 192.168.1.130.18670: 45313-| 0/13/12 (502)
16:56:14.196384 IP 192.168.1.130.17704 > 192.31.80.30.53: 159 [b2&3=0x80] A? eur2.akam.net. (31)
16:56:14.205786 IP 192.31.80.30.53 > 192.168.1.130.17704: 159-| 0/13/12 (501)
16:56:14.858841 IP 192.168.1.130.15453 > 192.41.162.30.53: 59158 A? asia3.akam.net. (32)
16:56:14.892162 IP 192.41.162.30.53 > 192.168.1.130.15453: 59158-| 0/13/12 (502)
16:56:14.992911 IP 192.168.1.130.19052 > 192.54.112.30.53: 23037 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:14.993045 IP 192.168.1.130.18744 > 192.43.172.30.53: 30195 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:14.993140 IP 192.168.1.130.17575 > 192.35.51.30.53: 52603 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:14.993279 IP 192.168.1.130.17829 > 192.43.172.30.53: 18555 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:14.993447 IP 192.168.1.130.15680 > 192.5.6.30.53: 52498 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:15.005027 IP 192.5.6.30.53 > 192.168.1.130.15680: 52498-| 0/13/12 (502)
16:56:15.020330 IP 192.54.112.30.53 > 192.168.1.130.19052: 23037-| 0/13/12 (501)
16:56:15.020402 IP 192.35.51.30.53 > 192.168.1.130.17575: 52603-| 0/13/12 (503)
16:56:15.020433 IP 192.43.172.30.53 > 192.168.1.130.18744: 30195-| 0/13/12 (501)
16:56:15.020532 IP 192.43.172.30.53 > 192.168.1.130.17829: 18555-| 0/13/12 (501)
16:56:15.874407 IP 192.168.1.130.17736 > 192.33.14.30.53: 40560 A? usw2.akam.net. (31)
16:56:15.874553 IP 192.168.1.130.15038 > 192.26.92.30.53: 45472 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:15.883894 IP 192.26.92.30.53 > 192.168.1.130.15038: 45472-| 0/13/12 (502)
16:56:15.946975 IP 192.33.14.30.53 > 192.168.1.130.17736: 40560-| 0/13/12 (501)
16:56:15.997552 IP 192.168.1.130.17698 > 192.55.83.30.53: 60638 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:15.997774 IP 192.168.1.130.18115 > 192.52.178.30.53: 16255 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:16.033270 IP 192.52.178.30.53 > 192.168.1.130.18115: 16255-| 0/13/12 (503)
16:56:16.036931 IP 192.55.83.30.53 > 192.168.1.130.17698: 60638-| 0/13/12 (501)
16:56:16.824256 IP 192.168.1.130.16153 > 192.55.83.30.53: 60847 A? ns1-99.akam.net. (33)
16:56:16.824291 IP 192.168.1.130.18869 > 192.42.93.30.53: 32643 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:16.824305 IP 192.168.1.130.17881 > 192.54.112.30.53: 39845 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:16.852514 IP 192.54.112.30.53 > 192.168.1.130.17881: 39845-| 0/13/12 (502)
16:56:16.852598 IP 192.42.93.30.53 > 192.168.1.130.18869: 32643-| 0/13/12 (501)
16:56:16.862275 IP 192.55.83.30.53 > 192.168.1.130.16153: 60847-| 0/13/12 (503)
16:56:17.013251 IP 192.168.1.130.16109 > 192.12.94.30.53: 17928 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:17.013386 IP 192.168.1.130.16426 > 192.33.14.30.53: 51222 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:17.013454 IP 192.168.1.130.18840 > 192.12.94.30.53: 64956 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:17.024062 IP 192.12.94.30.53 > 192.168.1.130.16109: 17928-| 0/13/12 (501)
16:56:17.024135 IP 192.12.94.30.53 > 192.168.1.130.18840: 64956-| 0/13/12 (501)
16:56:17.928369 IP 192.168.1.130.18919 > 192.42.93.30.53: 34959 A? usc3.akam.net. (31)
16:56:17.928513 IP 192.168.1.130.17769 > 192.41.162.30.53: 41292 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:17.928628 IP 192.168.1.130.17285 > 192.55.83.30.53: 58019 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:17.928777 IP 192.168.1.130.17335 > 192.31.80.30.53: 30038 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:17.939475 IP 192.31.80.30.53 > 192.168.1.130.17335: 30038-| 0/13/12 (503)
16:56:17.956497 IP 192.42.93.30.53 > 192.168.1.130.18919: 34959-| 0/13/12 (501)
16:56:17.962726 IP 192.55.83.30.53 > 192.168.1.130.17285: 58019-| 0/13/12 (502)
16:56:17.965973 IP 192.41.162.30.53 > 192.168.1.130.17769: 41292-| 0/13/12 (501)
16:56:18.016519 IP 192.168.1.130.18463 > 192.48.79.30.53: 2148 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:18.016666 IP 192.168.1.130.15215 > 192.48.79.30.53: 54038 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:18.054639 IP 192.48.79.30.53 > 192.168.1.130.15215: 54038-| 0/13/12 (501)
16:56:18.054710 IP 192.48.79.30.53 > 192.168.1.130.18463: 2148-| 0/13/12 (501)
16:56:18.958827 IP 192.168.1.130.16691 > 192.41.162.30.53: 32049 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:18.959160 IP 192.168.1.130.17702 > 192.26.92.30.53: 5185 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:18.959303 IP 192.168.1.130.16942 > 192.31.80.30.53: 40829 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:18.959475 IP 192.168.1.130.17037 > 192.43.172.30.53: 37183 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:18.969486 IP 192.26.92.30.53 > 192.168.1.130.17702: 5185-| 0/13/12 (501)
16:56:18.972466 IP 192.31.80.30.53 > 192.168.1.130.16942: 40829-| 0/13/12 (502)
16:56:18.972811 IP 192.168.1.130.18768 > 192.5.6.30.53: 17838 [b2&3=0x80] A? usc2.akam.net. (31)
16:56:18.984091 IP 192.5.6.30.53 > 192.168.1.130.18768: 17838-| 0/13/12 (501)
16:56:18.987258 IP 192.43.172.30.53 > 192.168.1.130.17037: 37183-| 0/13/12 (503)
16:56:18.999173 IP 192.41.162.30.53 > 192.168.1.130.16691: 32049-| 0/13/12 (501)
16:56:20.003741 IP 192.168.1.130.18074 > 192.26.92.30.53: 18992 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:20.003877 IP 192.168.1.130.15767 > 192.54.112.30.53: 52774 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:20.003968 IP 192.168.1.130.17106 > 192.43.172.30.53: 49380 [b2&3=0x80] A? asia3.akam.net. (32)
16:56:20.012157 IP 192.26.92.30.53 > 192.168.1.130.18074: 18992-| 0/13/12 (501)
16:56:20.029141 IP 192.43.172.30.53 > 192.168.1.130.17106: 49380-| 0/13/12 (502)
16:56:20.030505 IP 192.54.112.30.53 > 192.168.1.130.15767: 52774-| 0/13/12 (501)
16:56:20.957071 IP 192.168.1.130.18107 > 192.54.112.30.53: 35280 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:20.957101 IP 192.168.1.130.18968 > 192.55.83.30.53: 62104 [b2&3=0x80] A? usw2.akam.net. (31)
16:56:20.957118 IP 192.168.1.130.15487 > 192.12.94.30.53: 13488 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:20.965930 IP 192.12.94.30.53 > 192.168.1.130.15487: 13488-| 0/13/12 (503)
16:56:20.982586 IP 192.54.112.30.53 > 192.168.1.130.18107: 35280-| 0/13/12 (501)
16:56:20.992248 IP 192.55.83.30.53 > 192.168.1.130.18968: 62104-| 0/13/12 (501)
16:56:22.047017 IP 192.168.1.130.16820 > 192.55.83.30.53: 14872 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:22.047282 IP 192.168.1.130.16336 > 192.48.79.30.53: 11813 [b2&3=0x80] A? ns1-99.akam.net. (33)
16:56:22.083695 IP 192.55.83.30.53 > 192.168.1.130.16820: 14872-| 0/13/12 (501)
16:56:22.083766 IP 192.48.79.30.53 > 192.168.1.130.16336: 11813-| 0/13/12 (503)
16:56:23.088228 IP 192.168.1.130.17115 > 192.31.80.30.53: 8724 [b2&3=0x80] A? usc3.akam.net. (31)
16:56:23.099599 IP 192.31.80.30.53 > 192.168.1.130.17115: 8724-| 0/13/12 (501)

and

Code: Select all

> www.ibm.com.
;; connection timed out; no servers could be reached

and by bind9

Code: Select all

16:58:49.823009 IP 192.168.1.130.37374 > 192.5.5.241.53: 38437 [1au] A? www.ibm.com. (52)
16:58:49.828078 IP 192.5.5.241.53 > 192.168.1.130.37374: 38437-| 0/2/1 (375)
16:58:49.845437 IP 192.168.1.130.48266 > 192.26.92.30.53: 12445 [1au] A? www.ibm.com. (52)
16:58:49.855487 IP 192.26.92.30.53 > 192.168.1.130.48266: 12445-| 0/10/1 (481)
16:58:49.880160 IP 192.168.1.130.34105 > 198.41.0.4.53: 64473% [1au] A? eur2.akam.net. (54)
16:58:49.880263 IP 192.168.1.130.46229 > 198.41.0.4.53: 57242% [1au] AAAA? eur5.akam.net. (54)
16:58:49.880518 IP 192.168.1.130.51607 > 198.41.0.4.53: 41968% [1au] AAAA? eur2.akam.net. (54)
16:58:49.880708 IP 192.168.1.130.47930 > 198.41.0.4.53: 44250% [1au] A? usc2.akam.net. (54)
16:58:49.880742 IP 192.168.1.130.46927 > 198.41.0.4.53: 63752% [1au] A? eur5.akam.net. (54)
16:58:49.881189 IP 192.168.1.130.50047 > 198.41.0.4.53: 11083% [1au] AAAA? usc2.akam.net. (54)
16:58:49.881563 IP 192.168.1.130.54487 > 198.41.0.4.53: 4004% [1au] A? usc3.akam.net. (54)
16:58:49.881902 IP 192.168.1.130.60259 > 198.41.0.4.53: 48710% [1au] AAAA? usc3.akam.net. (54)
16:58:49.881925 IP 192.168.1.130.34953 > 198.41.0.4.53: 30845% [1au] A? usw2.akam.net. (54)
16:58:49.882182 IP 192.168.1.130.56257 > 198.41.0.4.53: 53777% [1au] AAAA? usw2.akam.net. (54)
16:58:49.909927 IP 198.41.0.4.53 > 192.168.1.130.46229: 57242-| 0/13/1 (263)
16:58:49.910019 IP 198.41.0.4.53 > 192.168.1.130.51607: 41968-| 0/13/1 (263)
16:58:49.910059 IP 198.41.0.4.53 > 192.168.1.130.46927: 63752-| 0/13/1 (263)
16:58:49.910096 IP 198.41.0.4.53 > 192.168.1.130.47930: 44250-| 0/14/2 (327)
16:58:49.910133 IP 198.41.0.4.53 > 192.168.1.130.34105: 64473-| 0/14/2 (327)
16:58:49.910166 IP 198.41.0.4.53 > 192.168.1.130.34953: 30845-| 0/14/2 (327)
16:58:49.910206 IP 198.41.0.4.53 > 192.168.1.130.50047: 11083-| 0/13/1 (263)
16:58:49.910237 IP 198.41.0.4.53 > 192.168.1.130.54487: 4004-| 0/14/2 (327)
16:58:49.910311 IP 198.41.0.4.53 > 192.168.1.130.60259: 48710-| 0/13/1 (263)
16:58:49.910351 IP 198.41.0.4.53 > 192.168.1.130.56257: 53777-| 0/13/1 (263)
16:58:49.980389 IP 192.168.1.130.38266 > 192.35.51.30.53: 54185% [1au] AAAA? usc2.akam.net. (54)
16:58:49.980715 IP 192.168.1.130.42830 > 192.35.51.30.53: 16916% [1au] A? usc2.akam.net. (54)
16:58:49.980948 IP 192.168.1.130.47959 > 192.35.51.30.53: 53072% [1au] AAAA? usc3.akam.net. (54)
16:58:49.981014 IP 192.168.1.130.38705 > 192.35.51.30.53: 37202% [1au] AAAA? usw2.akam.net. (54)
16:58:49.981314 IP 192.168.1.130.37488 > 192.35.51.30.53: 17454% [1au] A? usw2.akam.net. (54)
16:58:49.982533 IP 192.168.1.130.60952 > 192.35.51.30.53: 55643% [1au] AAAA? eur5.akam.net. (54)
16:58:49.982942 IP 192.168.1.130.44414 > 192.35.51.30.53: 47755% [1au] A? eur2.akam.net. (54)
16:58:49.983473 IP 192.168.1.130.39005 > 192.35.51.30.53: 896% [1au] A? eur5.akam.net. (54)
16:58:49.983974 IP 192.168.1.130.46959 > 192.35.51.30.53: 43291% [1au] AAAA? eur2.akam.net. (54)
16:58:49.984198 IP 192.168.1.130.54679 > 192.35.51.30.53: 23196% [1au] A? usc3.akam.net. (54)
16:58:50.008080 IP 192.35.51.30.53 > 192.168.1.130.47959: 53072-| 0/15/2 (483)
16:58:50.016056 IP 192.35.51.30.53 > 192.168.1.130.38266: 54185-| 0/15/2 (483)
16:58:50.016463 IP 192.35.51.30.53 > 192.168.1.130.37488: 17454-| 0/15/2 (483)
16:58:50.016562 IP 192.35.51.30.53 > 192.168.1.130.38705: 37202-| 0/15/2 (483)
16:58:50.016605 IP 192.35.51.30.53 > 192.168.1.130.60952: 55643-| 0/15/2 (483)
16:58:50.016651 IP 192.35.51.30.53 > 192.168.1.130.39005: 896-| 0/15/2 (483)
16:58:50.016700 IP 192.35.51.30.53 > 192.168.1.130.44414: 47755-| 0/15/2 (483)
16:58:50.016744 IP 192.35.51.30.53 > 192.168.1.130.42830: 16916-| 0/15/2 (483)
16:58:50.016912 IP 192.35.51.30.53 > 192.168.1.130.46959: 43291-| 0/15/2 (483)
16:58:50.016966 IP 192.35.51.30.53 > 192.168.1.130.54679: 23196-| 0/15/2 (483)
16:58:50.066142 IP 192.168.1.130.53054 > 84.53.139.67.53: 34582% [1au] AAAA? usc3.akam.net. (54)
16:58:50.084474 IP 192.168.1.130.32984 > 84.53.139.67.53: 10964% [1au] A? usc3.akam.net. (54)
16:58:50.084565 IP 192.168.1.130.50040 > 84.53.139.67.53: 39995% [1au] A? usw2.akam.net. (54)
16:58:50.084940 IP 192.168.1.130.49824 > 84.53.139.67.53: 18971% [1au] A? eur2.akam.net. (54)
16:58:50.085865 IP 192.168.1.130.56842 > 84.53.139.67.53: 57536% [1au] AAAA? usc2.akam.net. (54)
16:58:50.086807 IP 192.168.1.130.51890 > 84.53.139.67.53: 13458% [1au] AAAA? eur5.akam.net. (54)
16:58:50.086839 IP 192.168.1.130.57462 > 84.53.139.67.53: 43673% [1au] A? usc2.akam.net. (54)
16:58:50.086850 IP 192.168.1.130.48351 > 84.53.139.67.53: 31186% [1au] AAAA? eur2.akam.net. (54)
16:58:50.086973 IP 192.168.1.130.45099 > 84.53.139.67.53: 26843% [1au] AAAA? usw2.akam.net. (54)
16:58:50.087716 IP 192.168.1.130.41710 > 84.53.139.67.53: 39042% [1au] A? eur5.akam.net. (54)
16:58:50.102578 IP 84.53.139.67.53 > 192.168.1.130.53054: 34582*- 0/1/1 (108)
16:58:50.120187 IP 84.53.139.67.53 > 192.168.1.130.32984: 10964*- 1/0/1 A 96.7.50.64 (58)
16:58:50.120273 IP 84.53.139.67.53 > 192.168.1.130.56842: 57536*- 0/1/1 (108)
16:58:50.122133 IP 192.168.1.130.53537 > 96.7.50.64.53: 39746 [1au] A? www.ibm.com. (52)
16:58:50.122321 IP 84.53.139.67.53 > 192.168.1.130.57462: 43673*- 1/0/1 A 184.26.160.64 (58)
16:58:50.122382 IP 84.53.139.67.53 > 192.168.1.130.51890: 13458*- 0/1/1 (108)
16:58:50.122403 IP 84.53.139.67.53 > 192.168.1.130.49824: 18971*- 1/0/1 A 95.100.173.64 (58)
16:58:50.122420 IP 84.53.139.67.53 > 192.168.1.130.50040: 39995*- 1/0/1 A 184.26.161.64 (58)
16:58:50.123103 IP 192.168.1.130.54395 > 2.22.230.67.53: 2832% [1au] A? asia3.akam.net. (55)
16:58:50.123584 IP 192.168.1.130.34780 > 2.22.230.67.53: 6287% [1au] AAAA? asia3.akam.net. (55)
16:58:50.126893 IP 84.53.139.67.53 > 192.168.1.130.45099: 26843*- 0/1/1 (108)
16:58:50.126952 IP 84.53.139.67.53 > 192.168.1.130.48351: 31186*- 0/1/1 (108)
16:58:50.126965 IP 84.53.139.67.53 > 192.168.1.130.41710: 39042*- 1/0/1 A 23.74.25.64 (58)
16:58:50.135670 IP 2.22.230.67.53 > 192.168.1.130.54395: 2832*- 1/0/1 A 23.211.61.64 (59)
16:58:50.135738 IP 2.22.230.67.53 > 192.168.1.130.34780: 6287*- 0/1/1 (109)
16:58:50.185467 IP 96.7.50.64.53 > 192.168.1.130.53537: 39746*- 1/0/1 CNAME www.ibm.com.cs186.net. (75)
16:58:50.187272 IP 192.168.1.130.47351 > 199.7.91.13.53: 25132 [1au] DS? com. (44)
16:58:50.210517 IP 199.7.91.13.53 > 192.168.1.130.47351: 25132*- 2/0/1 DS, RRSIG (367)
16:58:50.212945 IP 192.168.1.130.40346 > 192.5.6.30.53: 46642 [1au] DS? ibm.com. (48)
16:58:50.224281 IP 192.5.6.30.53 > 192.168.1.130.40346: 46642*-| 0/4/1 (463)
16:58:50.249197 IP 192.168.1.130.42705 > 192.54.112.30.53: 14789 [1au] DNSKEY? com. (44)
16:58:50.276851 IP 192.54.112.30.53 > 192.168.1.130.42705: 14789*-| 2/0/1 DNSKEY, DNSKEY (486)
16:58:50.335217 IP 192.168.1.130.37438 > 192.48.79.30.53: 48590 [1au] A? www.ibm.com.cs186.net. (62)
16:58:50.372576 IP 192.48.79.30.53 > 192.168.1.130.37438: 48590-| 0/6/1 (473)
16:58:50.448271 IP 192.168.1.130.33253 > 192.31.80.30.53: 59101% [1au] A? ns.events.ihost.com. (60)
16:58:50.448425 IP 192.168.1.130.45390 > 192.31.80.30.53: 62497% [1au] A? ns1.events.ihost.com. (61)
16:58:50.448594 IP 192.168.1.130.60428 > 192.31.80.30.53: 34350% [1au] AAAA? ns.events.ihost.com. (60)
16:58:50.448732 IP 192.168.1.130.42474 > 192.31.80.30.53: 8519% [1au] AAAA? ns1.events.ihost.com. (61)
16:58:50.448989 IP 192.168.1.130.49609 > 192.31.80.30.53: 9194% [1au] A? ns2.events.ihost.com. (61)
16:58:50.449265 IP 192.168.1.130.56396 > 192.31.80.30.53: 60442% [1au] AAAA? ns2.events.ihost.com. (61)
16:58:50.460173 IP 192.31.80.30.53 > 192.168.1.130.33253: 59101-| 0/10/1 (489)
16:58:50.460259 IP 192.31.80.30.53 > 192.168.1.130.45390: 62497-| 0/10/1 (490)
16:58:50.460280 IP 192.31.80.30.53 > 192.168.1.130.49609: 9194-| 0/10/1 (490)
16:58:50.465173 IP 192.31.80.30.53 > 192.168.1.130.56396: 60442-| 0/10/1 (490)
16:58:50.465252 IP 192.31.80.30.53 > 192.168.1.130.60428: 34350-| 0/10/1 (489)
16:58:50.465275 IP 192.31.80.30.53 > 192.168.1.130.42474: 8519-| 0/10/1 (490)
16:58:50.488095 IP 192.168.1.130.55133 > 193.108.91.67.53: 30355% [1au] A? ns1-99.akam.net. (56)
16:58:50.488530 IP 192.168.1.130.36658 > 184.26.161.64.53: 63113% [1au] A? ns1.events.ihost.com. (61)
16:58:50.488673 IP 192.168.1.130.56450 > 193.108.91.67.53: 11648% [1au] AAAA? ns1-99.akam.net. (56)
16:58:50.488872 IP 192.168.1.130.45308 > 184.26.161.64.53: 42728% [1au] A? ns2.events.ihost.com. (61)
16:58:50.488927 IP 192.168.1.130.60989 > 184.26.161.64.53: 34061% [1au] A? ns.events.ihost.com. (60)
16:58:50.489066 IP 192.168.1.130.53114 > 193.108.91.67.53: 34682% [1au] A? ns1-206.akam.net. (57)
16:58:50.489580 IP 192.168.1.130.37311 > 193.108.91.67.53: 47760% [1au] AAAA? ns1-206.akam.net. (57)
16:58:50.493533 IP 192.168.1.130.52980 > 184.26.161.64.53: 10877% [1au] AAAA? ns2.events.ihost.com. (61)
16:58:50.493584 IP 192.168.1.130.35940 > 184.26.161.64.53: 51695% [1au] AAAA? ns.events.ihost.com. (60)
16:58:50.493594 IP 192.168.1.130.35471 > 184.26.161.64.53: 49025% [1au] AAAA? ns1.events.ihost.com. (61)
16:58:50.523846 IP 184.26.161.64.53 > 192.168.1.130.45308: 42728- 0/3/4 (146)
16:58:50.523940 IP 184.26.161.64.53 > 192.168.1.130.60989: 34061- 0/3/4 (146)
16:58:50.525608 IP 192.168.1.130.49261 > 129.42.3.200.53: 58862% [1au] A? ns.events.ihost.com. (60)
16:58:50.525689 IP 192.168.1.130.48870 > 129.42.3.200.53: 40423% [1au] A? ns2.events.ihost.com. (61)
16:58:50.526687 IP 184.26.161.64.53 > 192.168.1.130.36658: 63113- 0/3/4 (146)
16:58:50.527449 IP 192.168.1.130.58156 > 129.42.3.200.53: 6122% [1au] A? ns1.events.ihost.com. (61)
16:58:50.531853 IP 184.26.161.64.53 > 192.168.1.130.35471: 49025- 0/3/4 (146)
16:58:50.531937 IP 193.108.91.67.53 > 192.168.1.130.56450: 11648*- 1/0/1 AAAA 2600:1401:2::63 (72)
16:58:50.531965 IP 184.26.161.64.53 > 192.168.1.130.52980: 10877- 0/3/4 (146)
16:58:50.532006 IP 193.108.91.67.53 > 192.168.1.130.53114: 34682*- 1/0/1 A 193.108.91.206 (61)
16:58:50.532043 IP 193.108.91.67.53 > 192.168.1.130.55133: 30355*- 1/0/1 A 193.108.91.99 (60)
16:58:50.532116 IP 184.26.161.64.53 > 192.168.1.130.35940: 51695- 0/3/4 (146)
16:58:50.533445 IP 193.108.91.67.53 > 192.168.1.130.37311: 47760*- 1/0/1 AAAA 2600:1401:2::ce (73)
16:58:50.533692 IP 192.168.1.130.37307 > 129.42.3.200.53: 60474% [1au] AAAA? ns2.events.ihost.com. (61)
16:58:50.533940 IP 192.168.1.130.40128 > 129.42.3.200.53: 16189% [1au] AAAA? ns.events.ihost.com. (60)
16:58:50.534411 IP 192.168.1.130.46844 > 129.42.3.200.53: 5279% [1au] AAAA? ns1.events.ihost.com. (61)
16:58:50.562864 IP 129.42.3.200.53 > 192.168.1.130.48870: 40423*- 1/0/1 A 129.42.10.200 (93)
16:58:50.564112 IP 192.168.1.130.46500 > 129.42.10.200.53: 13198 [1au] A? www.ibm.com.cs186.net. (62)
16:58:50.564869 IP 129.42.3.200.53 > 192.168.1.130.49261: 58862*- 1/0/1 A 129.42.3.200 (92)
16:58:50.565352 IP 129.42.3.200.53 > 192.168.1.130.58156: 6122*- 1/0/1 A 129.42.1.200 (93)
16:58:50.570996 IP 129.42.3.200.53 > 192.168.1.130.40128: 16189*- 0/1/1 (127)
16:58:50.571836 IP 129.42.3.200.53 > 192.168.1.130.37307: 60474*- 0/1/1 (128)
16:58:50.572368 IP 129.42.3.200.53 > 192.168.1.130.46844: 5279*- 0/1/1 (124)
16:58:50.714518 IP 129.42.10.200.53 > 192.168.1.130.46500: 13198*- 1/0/1 CNAME outer-global-dual.ibmcom-tls12.edgekey.net. (131)
16:58:50.716323 IP 192.168.1.130.60726 > 199.7.83.42.53: 54396 [1au] DS? net. (44)
16:58:50.778418 IP 199.7.83.42.53 > 192.168.1.130.60726: 54396*- 2/0/1 DS, RRSIG (367)
16:58:50.780772 IP 192.168.1.130.38729 > 192.43.172.30.53: 49592 [1au] DS? cs186.net. (50)
16:58:50.807416 IP 192.43.172.30.53 > 192.168.1.130.38729: 49592*-| 0/4/1 (465)
16:58:50.864428 IP 192.168.1.130.48560 > 192.41.162.30.53: 1364 [1au] DNSKEY? net. (44)
16:58:50.896336 IP 192.41.162.30.53 > 192.168.1.130.48560: 1364*-| 2/0/1 DNSKEY, DNSKEY (484)
16:58:50.966684 IP 192.168.1.130.53013 > 192.33.14.30.53: 14608 [1au] A? outer-global-dual.ibmcom-tls12.edgekey.net. (83)
16:58:51.037704 IP 192.33.14.30.53 > 192.168.1.130.53013: 14608-| 0/15/1 (503)
16:58:51.186680 IP 192.168.1.130.47700 > 95.100.173.65.53: 15972 [1au] A? outer-global-dual.ibmcom-tls12.edgekey.net. (83)
16:58:51.337109 IP 95.100.173.65.53 > 192.168.1.130.47700: 15972*- 1/0/1 CNAME e7817.dscx.akamaiedge.net. (107)
16:58:51.338506 IP 192.168.1.130.50111 > 192.12.94.30.53: 35873 [1au] DS? edgekey.net. (52)
16:58:51.346820 IP 192.12.94.30.53 > 192.168.1.130.50111: 35873*-| 0/4/1 (467)
16:58:51.367792 IP 192.168.1.130.59614 > 192.52.178.30.53: 54862 [1au] A? e7817.dscx.akamaiedge.net. (66)
16:58:51.402927 IP 192.52.178.30.53 > 192.168.1.130.59614: 54862-| 0/15/2 (502)
16:58:51.476916 IP 192.168.1.130.42277 > 84.53.139.192.53: 59382 [1au] A? e7817.dscx.akamaiedge.net. (66)
16:58:51.511101 IP 84.53.139.192.53 > 192.168.1.130.42277: 59382- 0/8/10 (378)
16:58:51.513177 IP 192.168.1.130.51824 > 23.0.163.140.53: 50410 [1au] A? e7817.dscx.akamaiedge.net. (66)
16:58:51.518107 IP 23.0.163.140.53 > 192.168.1.130.51824: 50410*- 1/0/1 A 23.6.255.198 (70)
16:58:51.519437 IP 192.168.1.130.45620 > 192.55.83.30.53: 22833 [1au] DS? akamaiedge.net. (55)
16:58:51.554971 IP 192.55.83.30.53 > 192.168.1.130.45620: 22833*-| 0/4/1 (470)
16:58:51.630736 IP 192.168.1.130.51205 > 184.30.149.219.53: 39157 [1au] AAAA? e7817.dscx.akamaiedge.net. (66)
16:58:51.635975 IP 184.30.149.219.53 > 192.168.1.130.51205: 39157*- 2/0/1 AAAA 2001:569:139:19e::1e89, AAAA 2001:569:139:18c::1e89 (110)

and

Code: Select all

> www.ibm.com.
Server:		127.0.0.1
Address:	127.0.0.1#53

Non-authoritative answer:
www.ibm.com	canonical name = www.ibm.com.cs186.net.
www.ibm.com.cs186.net	canonical name = outer-global-dual.ibmcom-tls12.edgekey.net.
outer-global-dual.ibmcom-tls12.edgekey.net	canonical name = e7817.dscx.akamaiedge.net.
Name:	e7817.dscx.akamaiedge.net
Address: 23.6.255.198
Name:	e7817.dscx.akamaiedge.net
Address: 2001:569:139:18c::1e89
Name:	e7817.dscx.akamaiedge.net
Address: 2001:569:139:19e::1e89

Re: piconet

by pan » Thu Oct 21, 2021 3:27 pm

new tcp congestion control tcpdump files, with reno+nolicw+nosack, reno+licw+nosack, reno+licw+sack, and cubic+licw+sack, before and after where error occurs

Attachments
tcp-congestion-before-new.cap
(21.56 KiB) Downloaded 459 times
tcp-congestion-after-new.cap
(16.05 KiB) Downloaded 442 times
tcp-congestion-before-licw.cap
(26.52 KiB) Downloaded 449 times
tcp-congestion-after-licw.cap
(17 KiB) Downloaded 430 times
tcp-congestion-before-sack.cap
(17.68 KiB) Downloaded 442 times
tcp-congestion-after-sack.cap
(14.53 KiB) Downloaded 438 times
tcp-congestion-before-cubic.cap
(17.69 KiB) Downloaded 437 times
tcp-congestion-after-cubic.cap
(14.46 KiB) Downloaded 437 times

Re: piconet

by pan » Wed Feb 24, 2021 12:26 am

new tcp error control tcpdump files, with h2 specifying "-M 736" to enforce h1 only sends 724 bytes

Code: Select all

root@h2:/home/jovyan# iperf -s -w 2896 -l 724 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 5.66 KByte (WARNING: requested 2.83 KByte)
------------------------------------------------------------
[  4] local 10.10.1.100 port 5001 connected with 192.168.1.100 port 32992
[ ID] Interval       Transfer     Bandwidth
[  4]  0.0- 2.7 sec  5.66 KBytes  17.5 Kbits/sec

root@r:/home/jovyan# tc qdisc add dev r-eth1 root netem delay 100ms loss 25%
root@r:/home/jovyan# tc qdisc show dev r-eth1
qdisc netem 8003: root refcnt 2 limit 1000 delay 100.0ms loss 25%
root@r:/home/jovyan# tcpdump -i r-eth0 tcp port 5001 -Z root -w /tmp/tcp-error-before-new.cap
tcpdump: listening on r-eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
^C27 packets captured
27 packets received by filter
0 packets dropped by kernel
root@r:/home/jovyan# mv /tmp/tcp-error-* .
root@r:/home/jovyan# tcpdump -n -l -r tcp-error-before-new.cap
reading from file tcp-error-before-new.cap, link-type EN10MB (Ethernet)
22:51:58.834920 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035365 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.035404 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.035755 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035803 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035833 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035859 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135900 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135930 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.174768 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.275011 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:51:59.275033 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917080 ecr 1798127627], length 724
22:51:59.874952 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917680 ecr 1798127627], length 724
22:52:01.026772 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.127015 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.127038 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.127042 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227165 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.227188 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.227189 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327358 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.826852 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927217 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936380 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:01.936390 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715919742 ecr 1798130289], length 0
22:52:02.243022 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.243047 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0

pan@jupyter:~$ sudo ip netns exec r tcpdump -i r-eth1 tcp port 5001 -Z root -w /tmp/tcp-error-after-new.cap
tcpdump: listening on r-eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
^C21 packets captured
21 packets received by filter
0 packets dropped by kernel
pan@jupyter:~$ sudo tcpdump -n -l -r tcp-error-after-new.cap
reading from file tcp-error-after-new.cap, link-type EN10MB (Ethernet)
22:51:59.035284 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035346 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.135604 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.135845 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135885 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135919 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135927 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.274948 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.274997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:52:01.126936 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.126997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.227094 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227106 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227148 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.327260 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327340 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.927140 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927200 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936374 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:02.242980 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.343090 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0

root@h1:/home/jovyan# iperf -c h2 -l 724 -n 5792 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Client connecting to h2, TCP port 5001
TCP window size: 45.0 KByte (default)
------------------------------------------------------------
[  3] local 192.168.1.100 port 32992 connected with 10.10.1.100 port 5001
[ ID] Interval       Transfer     Bandwidth
[  3]  0.0- 0.0 sec  5.66 KBytes   274 Mbits/sec
Attachments
tcp-error-before-new.cap
(11.44 KiB) Downloaded 440 times
tcp-error-after-new.cap
(7.42 KiB) Downloaded 457 times

Re: piconet

by pan » Tue Oct 20, 2020 7:27 am

default features

Code: Select all

root@h1:/home/jovyan# ethtool -k h1-eth0
Features for h1-eth0:
rx-checksumming: on
tx-checksumming: on
	tx-checksum-ipv4: off [fixed]
	tx-checksum-ip-generic: on
	tx-checksum-ipv6: off [fixed]
	tx-checksum-fcoe-crc: off [fixed]
	tx-checksum-sctp: on
scatter-gather: on
	tx-scatter-gather: on
	tx-scatter-gather-fraglist: on
tcp-segmentation-offload: on
	tx-tcp-segmentation: on
	tx-tcp-ecn-segmentation: on
	tx-tcp-mangleid-segmentation: on
	tx-tcp6-segmentation: on
udp-fragmentation-offload: off
generic-segmentation-offload: on
generic-receive-offload: on
large-receive-offload: off [fixed]
rx-vlan-offload: on
tx-vlan-offload: on
ntuple-filters: off [fixed]
receive-hashing: off [fixed]
highdma: on
rx-vlan-filter: off [fixed]
vlan-challenged: off [fixed]
tx-lockless: on [fixed]
netns-local: off [fixed]
tx-gso-robust: off [fixed]
tx-fcoe-segmentation: off [fixed]
tx-gre-segmentation: on
tx-gre-csum-segmentation: on
tx-ipxip4-segmentation: on
tx-ipxip6-segmentation: on
tx-udp_tnl-segmentation: on
tx-udp_tnl-csum-segmentation: on
tx-gso-partial: off [fixed]
tx-sctp-segmentation: on
tx-esp-segmentation: off [fixed]
fcoe-mtu: off [fixed]
tx-nocache-copy: off
loopback: off [fixed]
rx-fcs: off [fixed]
rx-all: off [fixed]
tx-vlan-stag-hw-insert: on
rx-vlan-stag-hw-parse: on
rx-vlan-stag-filter: off [fixed]
l2-fwd-offload: off [fixed]
hw-tc-offload: off [fixed]
esp-hw-offload: off [fixed]
esp-tx-csum-hw-offload: off [fixed]
rx-udp_tunnel-port-offload: off [fixed]

to disable tcp segmentation offload

Code: Select all

root@h1:/home/jovyan# ethtool -K h1-eth0 tso off

on h2

Code: Select all

root@h2:/home/jovyan# iperf -s -l 724 -w 2896 -M 736

on r

Code: Select all

root@r:/home/jovyan# tcpdump -i r-eth0 tcp port 5001 -Z root -w /tmp/tcp-error-before-tso-off.cap

on jupyter

Code: Select all

pan@jupyter:~$ sudo tcpdump -i r-eth1 tcp port 5001 -Z root -w /tmp/tcp-error-after-tso-off.cap

on h1

Code: Select all

root@h1:/home/jovyan# iperf -c h2 -l 724 -n 5792 -M 736

the tshark output before packet loss

Code: Select all

    1   0.000000 192.168.1.100 → 10.10.1.100  TCP 74 57412 → 5001 [SYN] Seq=0 Win=65504 Len=0 MSS=736 SACK_PERM=1 TSval=1393806988 TSecr=0 WS=64
    2   0.134897  10.10.1.100 → 192.168.1.100 TCP 74 5001 → 57412 [SYN, ACK] Seq=0 Ack=1 Win=2896 Len=0 MSS=736 SACK_PERM=1 TSval=2343062633 TSecr=1393806988 WS=1
    3   0.134926 192.168.1.100 → 10.10.1.100  TCP 66 57412 → 5001 [ACK] Seq=1 Ack=1 Win=65536 Len=0 TSval=1393807123 TSecr=2343062633
    4   0.135057 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [PSH, ACK] Seq=1 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    5   0.135072 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [PSH, ACK] Seq=725 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    6   0.135078 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [PSH, ACK] Seq=1449 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    7   0.135083 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Window Full] 57412 → 5001 [PSH, ACK] Seq=2173 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    8   0.235484  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#1] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=1449
    9   0.235487  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#2] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=2173
   10   0.235488  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#3] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=2897
   11   0.235502 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Fast Retransmission] 57412 → 5001 [PSH, ACK] Seq=1 Ack=1 Win=65536 Len=724 TSval=1393807223 TSecr=2343062733
   12   0.343489  10.10.1.100 → 192.168.1.100 TCP 66 [TCP ZeroWindow] 5001 → 57412 [ACK] Seq=1 Ack=2897 Win=0 Len=0 TSval=2343062841 TSecr=1393807223
   13   0.343641  10.10.1.100 → 192.168.1.100 TCP 66 [TCP Window Update] 5001 → 57412 [ACK] Seq=1 Ack=2897 Win=1448 Len=0 TSval=2343062842 TSecr=1393807223
   14   0.343651 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [ACK] Seq=2897 Ack=1 Win=65536 Len=724 TSval=1393807332 TSecr=2343062842
   15   0.343651 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Window Full] 57412 → 5001 [PSH, ACK] Seq=3621 Ack=1 Win=65536 Len=724 TSval=1393807332 TSecr=2343062842
   16   0.464905  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [ACK] Seq=1 Ack=4345 Win=1448 Len=0 TSval=2343062963 TSecr=1393807332
   17   0.464921 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [ACK] Seq=4345 Ack=1 Win=65536 Len=724 TSval=1393807453 TSecr=2343062963
   18   0.464922 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [FIN, PSH, ACK] Seq=5069 Ack=1 Win=65536 Len=724 TSval=1393807453 TSecr=2343062963
   19   0.565950  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 16#1] 5001 → 57412 [ACK] Seq=1 Ack=4345 Win=1448 Len=0 TSval=2343063064 TSecr=1393807332 SLE=5069 SRE=5794
   20   0.613381 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Retransmission] 57412 → 5001 [ACK] Seq=4345 Ack=1 Win=65536 Len=724 TSval=1393807602 TSecr=2343063064
   21   0.721276  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [ACK] Seq=1 Ack=5794 Win=1448 Len=0 TSval=2343063220 TSecr=1393807602
   22   0.733853  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [FIN, ACK] Seq=1 Ack=5794 Win=1448 Len=0 TSval=2343063232 TSecr=1393807602
   23   0.733865 192.168.1.100 → 10.10.1.100  TCP 66 57412 → 5001 [ACK] Seq=5794 Ack=2 Win=65536 Len=0 TSval=1393807722 TSecr=2343063232

and after packet loss

Code: Select all

    1   0.000000 192.168.1.100 → 10.10.1.100  TCP 74 57412 → 5001 [SYN] Seq=0 Win=65504 Len=0 MSS=736 SACK_PERM=1 TSval=1393806988 TSecr=0 WS=64
    2   0.000065  10.10.1.100 → 192.168.1.100 TCP 74 5001 → 57412 [SYN, ACK] Seq=0 Ack=1 Win=2896 Len=0 MSS=736 SACK_PERM=1 TSval=2343062633 TSecr=1393806988 WS=1
    3   0.100583 192.168.1.100 → 10.10.1.100  TCP 66 57412 → 5001 [ACK] Seq=1 Ack=1 Win=65536 Len=0 TSval=1393807123 TSecr=2343062633
    4   0.100592 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Previous segment not captured] 57412 → 5001 [PSH, ACK] Seq=725 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    5   0.100593 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [PSH, ACK] Seq=1449 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    6   0.100595 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Window Full] 57412 → 5001 [PSH, ACK] Seq=2173 Ack=1 Win=65536 Len=724 TSval=1393807123 TSecr=2343062633
    7   0.100654  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#1] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=1449
    8   0.100656  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#2] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=2173
    9   0.100658  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 2#3] 5001 → 57412 [ACK] Seq=1 Ack=1 Win=2896 Len=0 TSval=2343062733 TSecr=1393807123 SLE=725 SRE=2897
   10   0.208467 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Retransmission] 57412 → 5001 [PSH, ACK] Seq=1 Ack=1 Win=65536 Len=724 TSval=1393807223 TSecr=2343062733
   11   0.208653  10.10.1.100 → 192.168.1.100 TCP 66 [TCP ZeroWindow] 5001 → 57412 [ACK] Seq=1 Ack=2897 Win=0 Len=0 TSval=2343062841 TSecr=1393807223
   12   0.208816  10.10.1.100 → 192.168.1.100 TCP 66 [TCP Window Update] 5001 → 57412 [ACK] Seq=1 Ack=2897 Win=1448 Len=0 TSval=2343062842 TSecr=1393807223
   13   0.330009 192.168.1.100 → 10.10.1.100  TCP 790 57412 → 5001 [ACK] Seq=2897 Ack=1 Win=65536 Len=724 TSval=1393807332 TSecr=2343062842
   14   0.330049 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Window Full] 57412 → 5001 [PSH, ACK] Seq=3621 Ack=1 Win=65536 Len=724 TSval=1393807332 TSecr=2343062842
   15   0.330075  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [ACK] Seq=1 Ack=4345 Win=1448 Len=0 TSval=2343062963 TSecr=1393807332
   16   0.431085 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Previous segment not captured] 57412 → 5001 [FIN, PSH, ACK] Seq=5069 Ack=1 Win=65536 Len=724 TSval=1393807453 TSecr=2343062963
   17   0.431120  10.10.1.100 → 192.168.1.100 TCP 78 [TCP Dup ACK 15#1] 5001 → 57412 [ACK] Seq=1 Ack=4345 Win=1448 Len=0 TSval=2343063064 TSecr=1393807332 SLE=5069 SRE=5794
   18   0.586418 192.168.1.100 → 10.10.1.100  TCP 790 [TCP Retransmission] 57412 → 5001 [ACK] Seq=4345 Ack=1 Win=65536 Len=724 TSval=1393807602 TSecr=2343063064
   19   0.586448  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [ACK] Seq=1 Ack=5794 Win=1448 Len=0 TSval=2343063220 TSecr=1393807602
   20   0.599026  10.10.1.100 → 192.168.1.100 TCP 66 5001 → 57412 [FIN, ACK] Seq=1 Ack=5794 Win=1448 Len=0 TSval=2343063232 TSecr=1393807602
   21   0.713371 192.168.1.100 → 10.10.1.100  TCP 66 57412 → 5001 [ACK] Seq=5794 Ack=2 Win=65536 Len=0 TSval=1393807722 TSecr=2343063232
Attachments
tcp-error-before-tso-off.cap
(9 KiB) Downloaded 442 times
tcp-error-after-tso-off.cap
(7.42 KiB) Downloaded 452 times

Re: piconet

by pan » Wed Sep 23, 2020 10:16 pm

working on windows (10 pro with multipass using hyper-v and 10 home using virtualbox)

Screenshot (1).png
Screenshot (1).png (328.62 KiB) Viewed 6321 times

for nvda (non-visual desktop access) screen reader too https://www.nvaccess.org/about-nvda/ thanks tomas!

Re: piconet

by pan » Sun Sep 20, 2020 1:33 pm

poster

Attachments
pan-picohub-sigite20-poster.jpg
pan-picohub-sigite20-poster.jpg (930.53 KiB) Viewed 6325 times
pan-picohub-sigite20-poster.pdf
(2.83 MiB) Downloaded 433 times

Re: piconet

by pan » Wed Sep 02, 2020 3:28 pm

piconet accessibility:

Code: Select all

tcpdump -l -n -i r-eth0

tcpdump on r-eth0 interface, output to screen, without name resolution and line buffering, full text readable

Code: Select all

tcpdump -i r-eth0 -Z root -w r-eth0.cap

tcpdump on r-eth0 interface, output to file r-eth0.cap

Code: Select all

tcpdump -l -n -r r-eth0.cap

read r-eth0.cap file, output to screen, without name resolution and line buffering

Screen Shot 2020-09-02 at 3.27.04 PM.png
Screen Shot 2020-09-02 at 3.27.04 PM.png (227.21 KiB) Viewed 6338 times

full text readable

Code: Select all

reading from file http-non-persistent.cap, link-type EN10MB (Ethernet)
22:54:10.490703 IP 172.16.1.1.57662 > 172.16.1.2.80: Flags [S], seq 1231547258, win 64240, options [mss 1460,sackOK,TS val 4026006663 ecr 0,nop,wscale 6], length 0
22:54:10.490747 IP 172.16.1.2.80 > 172.16.1.1.57662: Flags [S.], seq 2407926694, ack 1231547259, win 65160, options [mss 1460,sackOK,TS val 2699675907 ecr 4026006663,nop,wscale 6], length 0
22:54:10.490788 IP 172.16.1.1.57662 > 172.16.1.2.80: Flags [.], ack 1, win 1004, options [nop,nop,TS val 4026006663 ecr 2699675907], length 0
22:54:10.490942 IP 172.16.1.1.57662 > 172.16.1.2.80: Flags [P.], seq 1:133, ack 1, win 1004, options [nop,nop,TS val 4026006663 ecr 2699675907], length 132: HTTP: GET / HTTP/1.1
22:54:10.490957 IP 172.16.1.2.80 > 172.16.1.1.57662: Flags [.], ack 133, win 1017, options [nop,nop,TS val 2699675907 ecr 4026006663], length 0
22:54:10.491168 IP 172.16.1.2.80 > 172.16.1.1.57662: Flags [FP.], seq 1:351, ack 133, win 1017, options [nop,nop,TS val 2699675907 ecr 4026006663], length 350: HTTP: HTTP/1.1 200 OK
22:54:10.491597 IP 172.16.1.1.57662 > 172.16.1.2.80: Flags [F.], seq 133, ack 352, win 1002, options [nop,nop,TS val 4026006663 ecr 2699675907], length 0
22:54:10.491637 IP 172.16.1.2.80 > 172.16.1.1.57662: Flags [.], ack 134, win 1017, options [nop,nop,TS val 2699675907 ecr 4026006663], length 0
22:54:10.491868 IP 172.16.1.1.57664 > 172.16.1.2.80: Flags [S], seq 4099644610, win 64240, options [mss 1460,sackOK,TS val 4026006664 ecr 0,nop,wscale 6], length 0
22:54:10.491888 IP 172.16.1.2.80 > 172.16.1.1.57664: Flags [S.], seq 2213921587, ack 4099644611, win 65160, options [mss 1460,sackOK,TS val 2699675908 ecr 4026006664,nop,wscale 6], length 0
22:54:10.491906 IP 172.16.1.1.57664 > 172.16.1.2.80: Flags [.], ack 1, win 1004, options [nop,nop,TS val 4026006664 ecr 2699675908], length 0
22:54:10.492003 IP 172.16.1.1.57664 > 172.16.1.2.80: Flags [P.], seq 1:179, ack 1, win 1004, options [nop,nop,TS val 4026006664 ecr 2699675908], length 178: HTTP: GET /dns-recursive.txt HTTP/1.1
22:54:10.492015 IP 172.16.1.2.80 > 172.16.1.1.57664: Flags [.], ack 179, win 1016, options [nop,nop,TS val 2699675908 ecr 4026006664], length 0
22:54:10.492120 IP 172.16.1.2.80 > 172.16.1.1.57664: Flags [FP.], seq 1:550, ack 179, win 1016, options [nop,nop,TS val 2699675908 ecr 4026006664], length 549: HTTP: HTTP/1.1 200 OK
22:54:10.492176 IP 172.16.1.1.57664 > 172.16.1.2.80: Flags [.], ack 551, win 1002, options [nop,nop,TS val 4026006664 ecr 2699675908], length 0
22:54:10.492495 IP 172.16.1.1.57664 > 172.16.1.2.80: Flags [F.], seq 179, ack 551, win 1002, options [nop,nop,TS val 4026006664 ecr 2699675908], length 0
22:54:10.492512 IP 172.16.1.2.80 > 172.16.1.1.57664: Flags [.], ack 180, win 1016, options [nop,nop,TS val 2699675908 ecr 4026006664], length 0
22:54:10.492669 IP 172.16.1.1.57666 > 172.16.1.2.80: Flags [S], seq 305741031, win 64240, options [mss 1460,sackOK,TS val 4026006665 ecr 0,nop,wscale 6], length 0
22:54:10.492689 IP 172.16.1.2.80 > 172.16.1.1.57666: Flags [S.], seq 2247109765, ack 305741032, win 65160, options [mss 1460,sackOK,TS val 2699675909 ecr 4026006665,nop,wscale 6], length 0
22:54:10.492714 IP 172.16.1.1.57666 > 172.16.1.2.80: Flags [.], ack 1, win 1004, options [nop,nop,TS val 4026006665 ecr 2699675909], length 0
22:54:10.492815 IP 172.16.1.1.57666 > 172.16.1.2.80: Flags [P.], seq 1:179, ack 1, win 1004, options [nop,nop,TS val 4026006665 ecr 2699675909], length 178: HTTP: GET /dns-iterative.txt HTTP/1.1
22:54:10.492827 IP 172.16.1.2.80 > 172.16.1.1.57666: Flags [.], ack 179, win 1016, options [nop,nop,TS val 2699675909 ecr 4026006665], length 0
22:54:10.492949 IP 172.16.1.2.80 > 172.16.1.1.57666: Flags [FP.], seq 1:1087, ack 179, win 1016, options [nop,nop,TS val 2699675909 ecr 4026006665], length 1086: HTTP: HTTP/1.1 200 OK
22:54:10.493005 IP 172.16.1.1.57666 > 172.16.1.2.80: Flags [.], ack 1088, win 1000, options [nop,nop,TS val 4026006665 ecr 2699675909], length 0
22:54:10.493338 IP 172.16.1.1.57666 > 172.16.1.2.80: Flags [F.], seq 179, ack 1088, win 1002, options [nop,nop,TS val 4026006665 ecr 2699675909], length 0
22:54:10.493361 IP 172.16.1.2.80 > 172.16.1.1.57666: Flags [.], ack 180, win 1016, options [nop,nop,TS val 2699675909 ecr 4026006665], length 0

Code: Select all

tshark -r r-eth0.cap

read r-eth0.cap file, output to screen, in a wireshark-like but text command-line format

Screen Shot 2020-09-02 at 3.20.39 PM.png
Screen Shot 2020-09-02 at 3.20.39 PM.png (187.74 KiB) Viewed 6338 times

full text readable

Code: Select all

    1   0.000000   172.16.1.1 → 172.16.1.2   TCP 74 57662 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=4026006663 TSecr=0 WS=64
    2   0.000044   172.16.1.2 → 172.16.1.1   TCP 74 80 → 57662 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 TSval=2699675907 TSecr=4026006663 WS=64
    3   0.000085   172.16.1.1 → 172.16.1.2   TCP 66 57662 → 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=4026006663 TSecr=2699675907
    4   0.000239   172.16.1.1 → 172.16.1.2   HTTP 198 GET / HTTP/1.1 
    5   0.000254   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57662 [ACK] Seq=1 Ack=133 Win=65088 Len=0 TSval=2699675907 TSecr=4026006663
    6   0.000465   172.16.1.2 → 172.16.1.1   HTTP 416 HTTP/1.1 200 OK  (text/html)
    7   0.000894   172.16.1.1 → 172.16.1.2   TCP 66 57662 → 80 [FIN, ACK] Seq=133 Ack=352 Win=64128 Len=0 TSval=4026006663 TSecr=2699675907
    8   0.000934   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57662 [ACK] Seq=352 Ack=134 Win=65088 Len=0 TSval=2699675907 TSecr=4026006663
    9   0.001165   172.16.1.1 → 172.16.1.2   TCP 74 57664 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=4026006664 TSecr=0 WS=64
   10   0.001185   172.16.1.2 → 172.16.1.1   TCP 74 80 → 57664 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 TSval=2699675908 TSecr=4026006664 WS=64
   11   0.001203   172.16.1.1 → 172.16.1.2   TCP 66 57664 → 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=4026006664 TSecr=2699675908
   12   0.001300   172.16.1.1 → 172.16.1.2   HTTP 244 GET /dns-recursive.txt HTTP/1.1 
   13   0.001312   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57664 [ACK] Seq=1 Ack=179 Win=65024 Len=0 TSval=2699675908 TSecr=4026006664
   14   0.001417   172.16.1.2 → 172.16.1.1   HTTP 615 HTTP/1.1 200 OK  (text/plain)
   15   0.001473   172.16.1.1 → 172.16.1.2   TCP 66 57664 → 80 [ACK] Seq=179 Ack=551 Win=64128 Len=0 TSval=4026006664 TSecr=2699675908
   16   0.001792   172.16.1.1 → 172.16.1.2   TCP 66 57664 → 80 [FIN, ACK] Seq=179 Ack=551 Win=64128 Len=0 TSval=4026006664 TSecr=2699675908
   17   0.001809   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57664 [ACK] Seq=551 Ack=180 Win=65024 Len=0 TSval=2699675908 TSecr=4026006664
   18   0.001966   172.16.1.1 → 172.16.1.2   TCP 74 57666 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=4026006665 TSecr=0 WS=64
   19   0.001986   172.16.1.2 → 172.16.1.1   TCP 74 80 → 57666 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 TSval=2699675909 TSecr=4026006665 WS=64
   20   0.002011   172.16.1.1 → 172.16.1.2   TCP 66 57666 → 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=4026006665 TSecr=2699675909
   21   0.002112   172.16.1.1 → 172.16.1.2   HTTP 244 GET /dns-iterative.txt HTTP/1.1 
   22   0.002124   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57666 [ACK] Seq=1 Ack=179 Win=65024 Len=0 TSval=2699675909 TSecr=4026006665
   23   0.002246   172.16.1.2 → 172.16.1.1   HTTP 1152 HTTP/1.1 200 OK  (text/plain)
   24   0.002302   172.16.1.1 → 172.16.1.2   TCP 66 57666 → 80 [ACK] Seq=179 Ack=1088 Win=64000 Len=0 TSval=4026006665 TSecr=2699675909
   25   0.002635   172.16.1.1 → 172.16.1.2   TCP 66 57666 → 80 [FIN, ACK] Seq=179 Ack=1088 Win=64128 Len=0 TSval=4026006665 TSecr=2699675909
   26   0.002658   172.16.1.2 → 172.16.1.1   TCP 66 80 → 57666 [ACK] Seq=1088 Ack=180 Win=65024 Len=0 TSval=2699675909 TSecr=4026006665

Code: Select all

termshark -r r-eth0.cap

read r-eth0 file, output to screen, in a wireshark-like but text terminal format

Screen Shot 2020-09-02 at 3.12.27 PM.png
Screen Shot 2020-09-02 at 3.12.27 PM.png (208.3 KiB) Viewed 6338 times

full text readable

Code: Select all

termshark 2.0.3  |  http-non-persistent.cap                                                                                                                           Analysis    Misc  
┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓ ┃Filter: <Apply> <Recent> ┃ ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛ No. - Time - Source - Destination - Protocol - Length - Info - ▲ 1 0.000000 172.16.1.1 172.16.1.2 TCP 74 57662 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=40260
2 0.000044 172.16.1.2 172.16.1.1 TCP 74 80 → 57662 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 █ 3 0.000085 172.16.1.1 172.16.1.2 TCP 66 57662 → 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=4026006663 TSecr=269
4 0.000239 172.16.1.1 172.16.1.2 HTTP 198 GET / HTTP/1.1
5 0.000254 172.16.1.2 172.16.1.1 TCP 66 80 → 57662 [ACK] Seq=1 Ack=133 Win=65088 Len=0 TSval=2699675907 TSecr=4
6 0.000465 172.16.1.2 172.16.1.1 HTTP 416 HTTP/1.1 200 OK (text/html)
7 0.000894 172.16.1.1 172.16.1.2 TCP 66 57662 → 80 [FIN, ACK] Seq=133 Ack=352 Win=64128 Len=0 TSval=4026006663
8 0.000934 172.16.1.2 172.16.1.1 TCP 66 80 → 57662 [ACK] Seq=352 Ack=134 Win=65088 Len=0 TSval=2699675907 TSecr
9 0.001165 172.16.1.1 172.16.1.2 TCP 74 57664 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=40260
10 0.001185 172.16.1.2 172.16.1.1 TCP 74 80 → 57664 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 ▼ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ [+] Frame 4: 198 bytes on wire (1584 bits), 198 bytes captured (1584 bits)
[+] Ethernet II, Src: 7e:10:82:6e:d6:9c (7e:10:82:6e:d6:9c), Dst: 3e:95:e5:57:f9:50 (3e:95:e5:57:f9:50)
[+] Internet Protocol Version 4, Src: 172.16.1.1, Dst: 172.16.1.2
[+] Transmission Control Protocol, Src Port: 57662, Dst Port: 80, Seq: 1, Ack: 1, Len: 132
[-] Hypertext Transfer Protocol
[+] GET / HTTP/1.1\r\n
User-Agent: Wget/1.19.4 (linux-gnu)\r\n
Accept: */*\r\n
Accept-Encoding: identity\r\n
Host: 172.16.1.2\r\n
Connection: Close\r\n
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0000 3e 95 e5 57 f9 50 7e 10 82 6e d6 9c 08 00 45 00 >..W.P~. .n....E.
0010 00 b8 8a 57 40 00 40 06 55 c5 ac 10 01 01 ac 10 ...W@.@. U.......
0020 01 02 e1 3e 00 50 49 67 eb 7b 8f 86 0b a7 80 18 ...>.PIg .{......
0030 03 ec 5a ce 00 00 01 01 08 0a ef f7 fc 87 a0 e9 ..Z..... ........
0040 c9 03 47 45 54 20 2f 20 48 54 54 50 2f 31 2e 31 ..GET / HTTP/1.1
0050 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 57 67 ..User-A gent: Wg
0060 65 74 2f 31 2e 31 39 2e 34 20 28 6c 69 6e 75 78 et/1.19. 4 (linux
0070 2d 67 6e 75 29 0d 0a 41 63 63 65 70 74 3a 20 2a -gnu)..A ccept: *
0080 2f 2a 0d 0a 41 63 63 65 70 74 2d 45 6e 63 6f 64 /*..Acce pt-Encod
0090 69 6e 67 3a 20 69 64 65 6e 74 69 74 79 0d 0a 48 ing: ide ntity..H
00a0 6f 73 74 3a 20 31 37 32 2e 31 36 2e 31 2e 32 0d ost: 172 .16.1.2.
00b0 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 43 6c 6f .Connect ion: Clo

Re: piconet

by liuuvic » Mon Aug 31, 2020 9:36 pm

t turns out to be the privilege escalation issue, and add "-Z root" when "-w" can work around it https://linux.die.net/man/8/tcpdump

Thanks. All work for me now.

Re: piconet

by pan » Mon Aug 31, 2020 6:49 pm

pan wrote:
liuuvic wrote:
pan wrote:

that's because your html directory where your nginx serves only has a placeholder index.html. you can use the sample html files in http://panlab.cs.uvic.ca/web3/download/ ... p?id=34494 and put them in the document directory where nginx serves incoming http requests (often /var/www/html)

Thanks for the kind reply. The problem for me is that I can not copy the files to the directory because of Permission denied.
Also, I can not read the .cap file generated with the same reason.
*but all these files can be uploaded or downloaded to/from the current folder of picotest.

can you do "sudo"?

it turns out to be the privilege escalation issue, and add "-Z root" when "-w" can work around it https://linux.die.net/man/8/tcpdump

-Z
Drops privileges (if root) and changes user ID to user and the group ID to the primary group of user.

This behavior is enabled by default (-Z tcpdump), and can be disabled by -Z root.

Re: piconet

by pan » Sun Aug 30, 2020 11:26 pm

liuuvic wrote:
pan wrote:

that's because your html directory where your nginx serves only has a placeholder index.html. you can use the sample html files in http://panlab.cs.uvic.ca/web3/download/ ... p?id=34494 and put them in the document directory where nginx serves incoming http requests (often /var/www/html)

Thanks for the kind reply. The problem for me is that I can not copy the files to the directory because of Permission denied.
Also, I can not read the .cap file generated with the same reason.
*but all these files can be uploaded or downloaded to/from the current folder of picotest.

can you do "sudo"?

Re: piconet

by liuuvic » Sun Aug 30, 2020 10:40 pm

pan wrote:

that's because your html directory where your nginx serves only has a placeholder index.html. you can use the sample html files in http://panlab.cs.uvic.ca/web3/download/ ... p?id=34494 and put them in the document directory where nginx serves incoming http requests (often /var/www/html)

Thanks for the kind reply. The problem for me is that I can not copy the files to the directory because of Permission denied.
Also, I can not read the .cap file generated with the same reason.
*but all these files can be uploaded or downloaded to/from the current folder of picotest.

Re: piconet

by pan » Sun Aug 30, 2020 1:57 pm

interworking within a network

Screen Shot 2020-08-30 at 1.52.58 PM.png
Screen Shot 2020-08-30 at 1.52.58 PM.png (147.27 KiB) Viewed 5974 times

and between

Screen Shot 2020-08-30 at 1.54.02 PM.png
Screen Shot 2020-08-30 at 1.54.02 PM.png (172.35 KiB) Viewed 5974 times

so piconet works well for all 10 lab modules inside the docker container too ;-)

Re: piconet

by pan » Sun Aug 30, 2020 1:43 pm

static routing for piconet (h1-r-h2) in the new docker container with the new jupyterlab interface

Attachments
Screen Shot 2020-08-28 at 2.19.29 PM.png
Screen Shot 2020-08-28 at 2.19.29 PM.png (92.53 KiB) Viewed 5974 times

Re: piconet

by pan » Sun Aug 30, 2020 12:47 pm

liuuvic wrote:
pan wrote:

persistent vs non-persistent http connection

Hi Dr.Pan, I see the commands used in your screenshots and that in the manual are different for Lab3. Which one I should follow? Do I need to modify the commands in the manual?

either one is fine. they are for the same purposes

liuuvic wrote:

Also, if I start nginx on terminal 4 and run root@r piconet> wget -e robots=off --no-http-keep-alive -r 172.16.1.2:80 I get: http://172.16.1.2/Connecting to 172.16.1.2:80... connected. HTTP request sent, awaiting response... 200 OK Length: 612 [text/html] Saving to: ‘172.16.1.2/index.html’ 172.16.1.2/inde 100%[====>] 612 --.-KB/s in 0s 2020-08-30 10:49:34 (30.4 MB/s) - ‘172.16.1.2/index.html’ saved [612/612] FINISHED --2020-08-30 10:49:34-- Total wall clock time: 0.003s Downloaded: 1 files, 612 in 0s (30.4 MB/s) The only file downloaded is the index.html, which can be found in the left of the window.

that's because your html directory where your nginx serves only has a placeholder index.html. you can use the sample html files in http://panlab.cs.uvic.ca/web3/download/ ... p?id=34494 and put them in the document directory where nginx serves incoming http requests (often /var/www/html)

Re: piconet

by liuuvic » Sun Aug 30, 2020 10:52 am

liuuvic wrote:
pan wrote:

persistent

Screen Shot 2020-08-28 at 2.36.45 PM.png

vs non-persistent http connection

Screen Shot 2020-08-28 at 2.38.24 PM.png

Hi Dr.Pan, I see the commands used in your screenshots and that in the manual are different for Lab3. Which one I should follow? Do I need to modify the commands in the manual?

Also, if I start nginx on terminal 4 and run

root@r piconet> wget -e robots=off --no-http-keep-alive -r 172.16.1.2:80

I get:

http://172.16.1.2/
Connecting to 172.16.1.2:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 612 [text/html]
Saving to: ‘172.16.1.2/index.html’

172.16.1.2/inde 100%[====>] 612 --.-KB/s in 0s

2020-08-30 10:49:34 (30.4 MB/s) - ‘172.16.1.2/index.html’ saved [612/612]

FINISHED --2020-08-30 10:49:34--
Total wall clock time: 0.003s
Downloaded: 1 files, 612 in 0s (30.4 MB/s)

The only file downloaded is the index.html, which can be found in the left of the window.


Top