by pan » Wed Feb 24, 2021 12:26 am
new tcp error control tcpdump files, with h2 specifying "-M 736" to enforce h1 only sends 724 bytes
Code: Select all
root@h2:/home/jovyan# iperf -s -w 2896 -l 724 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 5.66 KByte (WARNING: requested 2.83 KByte)
------------------------------------------------------------
[ 4] local 10.10.1.100 port 5001 connected with 192.168.1.100 port 32992
[ ID] Interval Transfer Bandwidth
[ 4] 0.0- 2.7 sec 5.66 KBytes 17.5 Kbits/sec
root@r:/home/jovyan# tc qdisc add dev r-eth1 root netem delay 100ms loss 25%
root@r:/home/jovyan# tc qdisc show dev r-eth1
qdisc netem 8003: root refcnt 2 limit 1000 delay 100.0ms loss 25%
root@r:/home/jovyan# tcpdump -i r-eth0 tcp port 5001 -Z root -w /tmp/tcp-error-before-new.cap
tcpdump: listening on r-eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
^C27 packets captured
27 packets received by filter
0 packets dropped by kernel
root@r:/home/jovyan# mv /tmp/tcp-error-* .
root@r:/home/jovyan# tcpdump -n -l -r tcp-error-before-new.cap
reading from file tcp-error-before-new.cap, link-type EN10MB (Ethernet)
22:51:58.834920 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035365 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.035404 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.035755 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035803 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035833 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035859 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135900 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135930 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.174768 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.275011 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:51:59.275033 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917080 ecr 1798127627], length 724
22:51:59.874952 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917680 ecr 1798127627], length 724
22:52:01.026772 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.127015 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.127038 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.127042 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227165 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.227188 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.227189 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327358 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.826852 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927217 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936380 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:01.936390 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715919742 ecr 1798130289], length 0
22:52:02.243022 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.243047 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0
pan@jupyter:~$ sudo ip netns exec r tcpdump -i r-eth1 tcp port 5001 -Z root -w /tmp/tcp-error-after-new.cap
tcpdump: listening on r-eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
^C21 packets captured
21 packets received by filter
0 packets dropped by kernel
pan@jupyter:~$ sudo tcpdump -n -l -r tcp-error-after-new.cap
reading from file tcp-error-after-new.cap, link-type EN10MB (Ethernet)
22:51:59.035284 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035346 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.135604 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.135845 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135885 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135919 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135927 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.274948 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.274997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:52:01.126936 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.126997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.227094 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227106 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227148 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.327260 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327340 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.927140 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927200 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936374 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:02.242980 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.343090 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0
root@h1:/home/jovyan# iperf -c h2 -l 724 -n 5792 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Client connecting to h2, TCP port 5001
TCP window size: 45.0 KByte (default)
------------------------------------------------------------
[ 3] local 192.168.1.100 port 32992 connected with 10.10.1.100 port 5001
[ ID] Interval Transfer Bandwidth
[ 3] 0.0- 0.0 sec 5.66 KBytes 274 Mbits/sec
- Attachments
-
- tcp-error-before-new.cap
- (11.44 KiB) Downloaded 447 times
-
- tcp-error-after-new.cap
- (7.42 KiB) Downloaded 467 times
new tcp error control tcpdump files, with h2 specifying "-M 736" to enforce h1 only sends 724 bytes [code]root@h2:/home/jovyan# iperf -s -w 2896 -l 724 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Server listening on TCP port 5001
TCP window size: 5.66 KByte (WARNING: requested 2.83 KByte)
------------------------------------------------------------
[ 4] local 10.10.1.100 port 5001 connected with 192.168.1.100 port 32992
[ ID] Interval Transfer Bandwidth
[ 4] 0.0- 2.7 sec 5.66 KBytes 17.5 Kbits/sec
root@r:/home/jovyan# tc qdisc add dev r-eth1 root netem delay 100ms loss 25%
root@r:/home/jovyan# tc qdisc show dev r-eth1
qdisc netem 8003: root refcnt 2 limit 1000 delay 100.0ms loss 25%
root@r:/home/jovyan# tcpdump -i r-eth0 tcp port 5001 -Z root -w /tmp/tcp-error-before-new.cap
tcpdump: listening on r-eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
^C27 packets captured
27 packets received by filter
0 packets dropped by kernel
root@r:/home/jovyan# mv /tmp/tcp-error-* .
root@r:/home/jovyan# tcpdump -n -l -r tcp-error-before-new.cap
reading from file tcp-error-before-new.cap, link-type EN10MB (Ethernet)
22:51:58.834920 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035365 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.035404 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.035755 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035803 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035833 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.035859 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135900 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135930 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.174768 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.275011 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:51:59.275033 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917080 ecr 1798127627], length 724
22:51:59.874952 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715917680 ecr 1798127627], length 724
22:52:01.026772 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.127015 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.127038 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.127042 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227165 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.227188 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.227189 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327358 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.826852 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927217 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936380 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:01.936390 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715919742 ecr 1798130289], length 0
22:52:02.243022 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.243047 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0
pan@jupyter:~$ sudo ip netns exec r tcpdump -i r-eth1 tcp port 5001 -Z root -w /tmp/tcp-error-after-new.cap
tcpdump: listening on r-eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
^C21 packets captured
21 packets received by filter
0 packets dropped by kernel
pan@jupyter:~$ sudo tcpdump -n -l -r tcp-error-after-new.cap
reading from file tcp-error-after-new.cap, link-type EN10MB (Ethernet)
22:51:59.035284 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [S], seq 3985537874, win 65504, options [mss 736,sackOK,TS val 3715916640 ecr 0,nop,wscale 7], length 0
22:51:59.035346 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [S.], seq 1788771642, ack 3985537875, win 2896, options [mss 736,sackOK,TS val 1798127388 ecr 3715916640,nop,wscale 0], length 0
22:51:59.135604 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 0
22:51:59.135845 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 725:1449, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135885 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 1 {725:1449}], length 0
22:51:59.135919 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 2173:2897, ack 1, win 512, options [nop,nop,TS val 3715916841 ecr 1798127388], length 724
22:51:59.135927 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1, win 2896, options [nop,nop,TS val 1798127488 ecr 3715916841,nop,nop,sack 2 {2173:2897}{725:1449}], length 0
22:51:59.274948 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1:725, ack 1, win 512, options [nop,nop,TS val 3715916980 ecr 1798127488], length 724
22:51:59.274997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 1449, win 1448, options [nop,nop,TS val 1798127627 ecr 3715916980,nop,nop,sack 1 {2173:2897}], length 0
22:52:01.126936 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 1449:2173, ack 1, win 512, options [nop,nop,TS val 3715918832 ecr 1798127627], length 724
22:52:01.126997 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 2897, win 1448, options [nop,nop,TS val 1798129479 ecr 3715918832], length 0
22:52:01.227094 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 2897:3621, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227106 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [P.], seq 3621:4345, ack 1, win 512, options [nop,nop,TS val 3715918932 ecr 1798129479], length 724
22:52:01.227148 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 4345, win 1448, options [nop,nop,TS val 1798129579 ecr 3715918932], length 0
22:52:01.327260 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], seq 4345:5069, ack 1, win 512, options [nop,nop,TS val 3715919033 ecr 1798129579], length 724
22:52:01.327340 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5069, win 1448, options [nop,nop,TS val 1798129680 ecr 3715919033], length 0
22:52:01.927140 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [FP.], seq 5069:5793, ack 1, win 512, options [nop,nop,TS val 3715919632 ecr 1798129680], length 724
22:52:01.927200 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [.], ack 5794, win 1448, options [nop,nop,TS val 1798130280 ecr 3715919632], length 0
22:52:01.936374 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130289 ecr 3715919632], length 0
22:52:02.242980 IP 10.10.1.100.5001 > 192.168.1.100.32992: Flags [F.], seq 1, ack 5794, win 1448, options [nop,nop,TS val 1798130595 ecr 3715919632], length 0
22:52:02.343090 IP 192.168.1.100.32992 > 10.10.1.100.5001: Flags [.], ack 2, win 512, options [nop,nop,TS val 3715920048 ecr 1798130289], length 0
root@h1:/home/jovyan# iperf -c h2 -l 724 -n 5792 -M 736
WARNING: attempt to set TCP maximum segment size to 736, but got 536
------------------------------------------------------------
Client connecting to h2, TCP port 5001
TCP window size: 45.0 KByte (default)
------------------------------------------------------------
[ 3] local 192.168.1.100 port 32992 connected with 10.10.1.100 port 5001
[ ID] Interval Transfer Bandwidth
[ 3] 0.0- 0.0 sec 5.66 KBytes 274 Mbits/sec[/code]