THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.

Revision history  [back]

Google Chrome TCP Retransmission

Hi I'm a new in Wireshark and im trying to study a certain transaction which caused a Network Error.

This set of packets occured after 6hrs 31mins of soaking google chrome overnight. Before 6 hrs and 31mins the trace is almost fine with very little abnormalities, wherein the communication between the client and the host does not break.

BTW, The device that google chrome is communicating with is a prototype communications module, so let me know if there's any problem caused by it.

communications module: 192.168.1.5 google chrome: 192.168.1.50

"1","0.000000","192.168.1.5","192.168.1.50","TCP","384","80  >  63364 [PSH, ACK] Seq=1 Ack=1 Win=532 Len=330 [TCP segment of a reassembled PDU]"
"2","0.000404","192.168.1.50","192.168.1.5","TCP","54","63364  >  80 [FIN, ACK] Seq=1 Ack=331 Win=64971 Len=0"
"3","0.001056","54:55:58:10:00:37","Broadcast","ARP","60","Who has 192.168.2.50? Tell 192.168.1.5"
"4","0.004033","192.168.1.5","192.168.1.50","TCP","60","80  >  63364 [FIN, ACK] Seq=331 Ack=2 Win=532 Len=0"
"5","0.004109","192.168.1.50","192.168.1.5","TCP","54","63364  >  80 [ACK] Seq=2 Ack=332 Win=64971 Len=0"
"6","0.550871","192.168.1.50","192.168.1.5","TCP","66","63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"7","0.801320","192.168.1.50","192.168.1.5","TCP","66","63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"8","1.010239","192.168.1.50","192.168.1.5","TCP","66","63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"9","3.550877","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"10","3.800935","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"11","4.012859","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"12","7.017225","192.168.1.50","192.168.1.5","TCP","66","63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"13","9.546120","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"14","9.796111","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"15","10.007071","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"16","10.017104","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"17","13.019651","192.168.1.50","192.168.1.5","TCP","66","63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"18","16.019352","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"19","16.020343","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"20","19.021877","192.168.1.50","192.168.1.5","TCP","66","63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"21","22.021585","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"22","22.022568","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"23","22.858590","192.168.1.50","192.168.1.5","TCP","66","63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"24","25.858780","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"25","28.018832","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"26","28.859022","192.168.1.50","192.168.1.5","TCP","66","63395  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"27","31.859015","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"28","31.859017","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63395  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"29","34.862195","192.168.1.50","192.168.1.5","TCP","66","63401  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

Hopefully someone can share his thought about this problem. Thanks.

Google Chrome TCP Retransmission

Hi I'm a new in Wireshark and im trying to study a certain transaction which caused a Network Error.

This set of packets occured after 6hrs 31mins of soaking google chrome overnight. Before 6 hrs and 31mins the trace is almost fine with very little abnormalities, wherein the communication between the client and the host does not break.

BTW, The device that google chrome is communicating with is a prototype communications module, so let me know if there's any problem caused by it.

communications module: 192.168.1.5 google chrome: 192.168.1.50


"1","0.000000","192.168.1.5","192.168.1.50","TCP","384","80 > 63364 [PSH, ACK] Seq=1 Ack=1 Win=532 Len=330 [TCP segment of a reassembled PDU]" "2","0.000404","192.168.1.50","192.168.1.5","TCP","54","63364 > 80 [FIN, ACK] Seq=1 Ack=331 Win=64971 Len=0" "3","0.001056","54:55:58:10:00:37","Broadcast","ARP","60","Who has 192.168.2.50? Tell 192.168.1.5" "4","0.004033","192.168.1.5","192.168.1.50","TCP","60","80 > 63364 [FIN, ACK] Seq=331 Ack=2 Win=532 Len=0" "5","0.004109","192.168.1.50","192.168.1.5","TCP","54","63364 > 80 [ACK] Seq=2 Ack=332 Win=64971 Len=0" "6","0.550871","192.168.1.50","192.168.1.5","TCP","66","63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "7","0.801320","192.168.1.50","192.168.1.5","TCP","66","63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "8","1.010239","192.168.1.50","192.168.1.5","TCP","66","63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "9","3.550877","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "10","3.800935","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "11","4.012859","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "12","7.017225","192.168.1.50","192.168.1.5","TCP","66","63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "13","9.546120","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "14","9.796111","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "15","10.007071","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "16","10.017104","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "17","13.019651","192.168.1.50","192.168.1.5","TCP","66","63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "18","16.019352","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "19","16.020343","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "20","19.021877","192.168.1.50","192.168.1.5","TCP","66","63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "21","22.021585","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "22","22.022568","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "23","22.858590","192.168.1.50","192.168.1.5","TCP","66","63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "24","25.858780","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "25","28.018832","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "26","28.859022","192.168.1.50","192.168.1.5","TCP","66","63395 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "27","31.859015","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "28","31.859017","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63395 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" SACK_PERM=1"

"29","34.862195","192.168.1.50","192.168.1.5","TCP","66","63401 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

SACK_PERM=1"

Hopefully someone can share his thought about this problem. Thanks.