Hopefully these two text files get attached the the mailing list. If not, I'll send them directly.

One sends no GET command and the handshake works correctly.

The other sends the GET command, but not the ACK.

Hope that helps. :~)

On 13/11/14 13:51, Simon Goldschmidt wrote:
I don't think I really get what your problem is. Could you send a small
pcap the packets in question?
Simon
*Gesendet:* Donnerstag, 13. November 2014 um 14:41 Uhr
*Von:* "Robert Wood" <[email protected]>
*An:* [email protected]
*Betreff:* Re: [lwip-users] Pulling data from a server using HTTP with lwIP
Ah, no, I wasn't aware of that at all.

I still don't know how I'd do that as, if left to its own devices, the
stack sends the ACK out anyway and I have no idea how I'd tack that data
on to the ACK.

It seems like the low level stuff does take care of that for you. Is it
the case that I can poll something to wait for the stack to inform me
that the ACK has gone out and I can send stuff or am I looking at it the
wrong way?

Thanks,

Rob

On 13/11/14 13:31, Simon Goldschmidt wrote:
 > Robert,
 > are you aware that it's legal for the ACK you are missing to contain
 > data also? In this case the packets would look like this:
 > SYN ->
 > <- SYN/ACK
 > ACK+DATA(GET) ->
 > This is what I was trying to explain in my last mail...
 > Simon
 > *Gesendet:* Donnerstag, 13. November 2014 um 14:22 Uhr
 > *Von:* "Robert Wood" <[email protected]>
 > *An:* [email protected]
 > *Betreff:* Re: [lwip-users] Pulling data from a server using HTTP
with lwIP
 > It's not quite like that, I'm not explaining very well. I'll try
again. :~)
 >
 > If I send the GET command out, then my board does not send the ACK to
 > the server for the SYN, SYN ACK, ACK handshake. This is what happens.
 > Bear in mind the lwIP board is the client in this case.
 >
 > Here are two different In both cases I do this in the lwIP client thread:
 >
 > IP4_ADDR(&local_ip,emacIPADDR0,emacIPADDR1,emacIPADDR2,emacIPADDR3);
 > rc1 = netconn_bind ( xNetConn, &local_ip, 0 );
 > IP4_ADDR(&remote_ip,192,168,0,87);
 > rc2 = netconn_connect ( xNetConn, &remote_ip, 80 );
 >
 > Scenario 1:
 >
 > In this case I do not send a GET request out.
 >
 > Client -> SYN (Server receives this)
 > Server -> SYN ACK (Client receives this)
 > Client -> ACK (Server receives this)
 >
 > Scenario 2:
 >
 > In this case I send the GET command out.
 >
 > Client -> SYN (Server receives this)
 > Server -> SYN ACK (Client receives this)
 > Client -> GET Command
 >
 > So, in scenario 2, the client is not sending out the ACK in the initial
 > handshake. I'm assuming it's because I need to wait for the lwIP stack
 > to send the ACK. I'm assuming anyway. If that is the case, how does my
 > thread know when the stack has sent the ACK to the server and I am at
 > liberty to send the GET request?
 >
 > I hope I've made that clearer. :~)
 >
 > I'm probably doing naive things because I'm trying to learn a lot of
 > stuff at the moment!
 >
 > On 13/11/14 13:09, Simon Goldschmidt wrote:
 > > Robert Wood wrote:
 > >> If I establish a connection from the board to the desktop and do not
 > >> send a GET request, then lwIP does the SYN, SYN ACK, ACK handshake
just
 > >> fine.
 > >>
 > >> If I add the [potentially incorrect] GET request, the SYNN is
sent, the
 > >> SYN ACK is received, but my board running lwIP does not send the
ACK out
 > >> to the desktop.
 > >
 > > Does it piggy-back the ACK on your GET request or is the GET request
 > not even sent out? I'd expect to see the GET request along with the
 > handshake-ACK.Then, the webserver will eventually time out waiting for
 > the double-CRLF.
 > >
 > > However, if lwIP does not send ANYTHING after receiving the SYN-ACK,
 > there's something wrong... :-/
 > >
 > > Simon
 > >
 > > _______________________________________________
 > > lwip-users mailing list
 > > [email protected]
 > > https://lists.nongnu.org/mailman/listinfo/lwip-users
 > >
 >
 > _______________________________________________
 > lwip-users mailing list
 > [email protected]
 > https://lists.nongnu.org/mailman/listinfo/lwip-users
 >
 >
 > _______________________________________________
 > lwip-users mailing list
 > [email protected]
 > https://lists.nongnu.org/mailman/listinfo/lwip-users
 >

_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users


_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users

No.     Time           Source                Destination           Protocol 
Length Info
     23 11.014021000   192.168.0.205         192.168.0.87          TCP      60  
   patrolview > http [SYN] Seq=0 Win=1500 Len=0 MSS=1500

Frame 23: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on 
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22 
(14:da:e9:30:36:22)
    Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Type: IP (0x0800)
    Padding: 0000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst: 
192.168.0.87 (192.168.0.87)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 44
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 255
    Protocol: TCP (6)
    Header checksum: 0xf956 [validation disabled]
    Source: 192.168.0.205 (192.168.0.205)
    Destination: 192.168.0.87 (192.168.0.87)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http 
(80), Seq: 0, Len: 0
    Source port: patrolview (4097)
    Destination port: http (80)
    [Stream index: 8]
    Sequence number: 0    (relative sequence number)
    Header length: 24 bytes
    Flags: 0x002 (SYN)
    Window size value: 1500
    [Calculated window size: 1500]
    Checksum: 0xe5ef [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    Options: (4 bytes), Maximum segment size
        Maximum segment size: 1500 bytes

No.     Time           Source                Destination           Protocol 
Length Info
     24 11.014054000   192.168.0.87          192.168.0.205         TCP      58  
   http > patrolview [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460

Frame 24: 58 bytes on wire (464 bits), 58 bytes captured (464 bits) on 
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22 
(00:bd:33:06:68:22)
    Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst: 
192.168.0.205 (192.168.0.205)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 44
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0xb857 [validation disabled]
    Source: 192.168.0.87 (192.168.0.87)
    Destination: 192.168.0.205 (192.168.0.205)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview 
(4097), Seq: 0, Ack: 1, Len: 0
    Source port: http (80)
    Destination port: patrolview (4097)
    [Stream index: 8]
    Sequence number: 0    (relative sequence number)
    Acknowledgment number: 1    (relative ack number)
    Header length: 24 bytes
    Flags: 0x012 (SYN, ACK)
    Window size value: 29200
    [Calculated window size: 29200]
    Checksum: 0xb77e [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    Options: (4 bytes), Maximum segment size
        Maximum segment size: 1460 bytes
    [SEQ/ACK analysis]

No.     Time           Source                Destination           Protocol 
Length Info
     25 11.262655000   192.168.0.205         192.168.0.87          TCP      60  
   patrolview > http [ACK] Seq=1 Ack=1 Win=1500 Len=0

Frame 25: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on 
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22 
(14:da:e9:30:36:22)
    Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Type: IP (0x0800)
    Padding: 000000000000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst: 
192.168.0.87 (192.168.0.87)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 40
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 255
    Protocol: TCP (6)
    Header checksum: 0xf95a [validation disabled]
    Source: 192.168.0.205 (192.168.0.205)
    Destination: 192.168.0.87 (192.168.0.87)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http 
(80), Seq: 1, Ack: 1, Len: 0
    Source port: patrolview (4097)
    Destination port: http (80)
    [Stream index: 8]
    Sequence number: 1    (relative sequence number)
    Acknowledgment number: 1    (relative ack number)
    Header length: 20 bytes
    Flags: 0x010 (ACK)
    Window size value: 1500
    [Calculated window size: 1500]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0x3b70 [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    [SEQ/ACK analysis]
No.     Time           Source                Destination           Protocol 
Length Info
     28 19.353301000   192.168.0.205         192.168.0.87          TCP      60  
   patrolview > http [SYN] Seq=0 Win=1500 Len=0 MSS=1500

Frame 28: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on 
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22 
(14:da:e9:30:36:22)
    Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Type: IP (0x0800)
    Padding: 0000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst: 
192.168.0.87 (192.168.0.87)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 44
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 255
    Protocol: TCP (6)
    Header checksum: 0xf956 [validation disabled]
    Source: 192.168.0.205 (192.168.0.205)
    Destination: 192.168.0.87 (192.168.0.87)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http 
(80), Seq: 0, Len: 0
    Source port: patrolview (4097)
    Destination port: http (80)
    [Stream index: 2]
    Sequence number: 0    (relative sequence number)
    Header length: 24 bytes
    Flags: 0x002 (SYN)
    Window size value: 1500
    [Calculated window size: 1500]
    Checksum: 0xe5ef [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    Options: (4 bytes), Maximum segment size
        Maximum segment size: 1500 bytes

No.     Time           Source                Destination           Protocol 
Length Info
     29 19.353322000   192.168.0.87          192.168.0.205         TCP      58  
   http > patrolview [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460

Frame 29: 58 bytes on wire (464 bits), 58 bytes captured (464 bits) on 
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22 
(00:bd:33:06:68:22)
    Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst: 
192.168.0.205 (192.168.0.205)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 44
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0xb857 [validation disabled]
    Source: 192.168.0.87 (192.168.0.87)
    Destination: 192.168.0.205 (192.168.0.205)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview 
(4097), Seq: 0, Ack: 1, Len: 0
    Source port: http (80)
    Destination port: patrolview (4097)
    [Stream index: 2]
    Sequence number: 0    (relative sequence number)
    Acknowledgment number: 1    (relative ack number)
    Header length: 24 bytes
    Flags: 0x012 (SYN, ACK)
    Window size value: 29200
    [Calculated window size: 29200]
    Checksum: 0x16ad [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    Options: (4 bytes), Maximum segment size
        Maximum segment size: 1460 bytes
    [SEQ/ACK analysis]

No.     Time           Source                Destination           Protocol 
Length Info
     30 19.354615000   192.168.0.205         192.168.0.87          TCP      254 
   [TCP segment of a reassembled PDU]

Frame 30: 254 bytes on wire (2032 bits), 254 bytes captured (2032 bits) on 
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22 
(14:da:e9:30:36:22)
    Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst: 
192.168.0.87 (192.168.0.87)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 240
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 255
    Protocol: TCP (6)
    Header checksum: 0xf892 [validation disabled]
    Source: 192.168.0.205 (192.168.0.205)
    Destination: 192.168.0.87 (192.168.0.87)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http 
(80), Seq: 1, Ack: 1, Len: 200
    Source port: patrolview (4097)
    Destination port: http (80)
    [Stream index: 2]
    Sequence number: 1    (relative sequence number)
    [Next sequence number: 201    (relative sequence number)]
    Acknowledgment number: 1    (relative ack number)
    Header length: 20 bytes
    Flags: 0x018 (PSH, ACK)
    Window size value: 1500
    [Calculated window size: 1500]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0xf3c4 [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    [SEQ/ACK analysis]
    TCP segment data (200 bytes)

No.     Time           Source                Destination           Protocol 
Length Info
     31 19.354651000   192.168.0.87          192.168.0.205         TCP      54  
   http > patrolview [ACK] Seq=1 Ack=201 Win=30016 Len=0

Frame 31: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on 
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22 
(00:bd:33:06:68:22)
    Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst: 
192.168.0.205 (192.168.0.205)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 40
    Identification: 0xe315 (58133)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0xd545 [validation disabled]
    Source: 192.168.0.87 (192.168.0.87)
    Destination: 192.168.0.205 (192.168.0.205)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview 
(4097), Seq: 1, Ack: 201, Len: 0
    Source port: http (80)
    Destination port: patrolview (4097)
    [Stream index: 2]
    Sequence number: 1    (relative sequence number)
    Acknowledgment number: 201    (relative ack number)
    Header length: 20 bytes
    Flags: 0x010 (ACK)
    Window size value: 30016
    [Calculated window size: 30016]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0x2a72 [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    [SEQ/ACK analysis]

No.     Time           Source                Destination           Protocol 
Length Info
     89 39.444910000   192.168.0.87          192.168.0.205         HTTP     460 
   HTTP/1.1 408 Request Timeout  (text/html)

Frame 89: 460 bytes on wire (3680 bits), 460 bytes captured (3680 bits) on 
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22 
(00:bd:33:06:68:22)
    Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst: 
192.168.0.205 (192.168.0.205)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 446
    Identification: 0xe316 (58134)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0xd3ae [validation disabled]
    Source: 192.168.0.87 (192.168.0.87)
    Destination: 192.168.0.205 (192.168.0.205)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview 
(4097), Seq: 1, Ack: 201, Len: 406
    Source port: http (80)
    Destination port: patrolview (4097)
    [Stream index: 2]
    Sequence number: 1    (relative sequence number)
    [Next sequence number: 407    (relative sequence number)]
    Acknowledgment number: 201    (relative ack number)
    Header length: 20 bytes
    Flags: 0x018 (PSH, ACK)
    Window size value: 30016
    [Calculated window size: 30016]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0xb1ce [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    [SEQ/ACK analysis]
Hypertext Transfer Protocol
    HTTP/1.1 408 Request Timeout\r\n
    Date: Thu, 13 Nov 2014 13:14:36 GMT\r\n
    Server: Apache/2.4.7 (Mageia)\r\n
    Content-Length: 221\r\n
    Connection: close\r\n
    Content-Type: text/html; charset=iso-8859-1\r\n
    \r\n
    [HTTP response 1/1]
Line-based text data: text/html

No.     Time           Source                Destination           Protocol 
Length Info
     90 39.444924000   192.168.0.87          192.168.0.205         TCP      54  
   http > patrolview [FIN, ACK] Seq=407 Ack=201 Win=30016 Len=0

Frame 90: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on 
interface 0
Ethernet II, Src: AsustekC_30:36:22 (14:da:e9:30:36:22), Dst: 00:bd:33:06:68:22 
(00:bd:33:06:68:22)
    Destination: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Source: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.87 (192.168.0.87), Dst: 
192.168.0.205 (192.168.0.205)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 40
    Identification: 0xe317 (58135)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (6)
    Header checksum: 0xd543 [validation disabled]
    Source: 192.168.0.87 (192.168.0.87)
    Destination: 192.168.0.205 (192.168.0.205)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: http (80), Dst Port: patrolview 
(4097), Seq: 407, Ack: 201, Len: 0
    Source port: http (80)
    Destination port: patrolview (4097)
    [Stream index: 2]
    Sequence number: 407    (relative sequence number)
    Acknowledgment number: 201    (relative ack number)
    Header length: 20 bytes
    Flags: 0x011 (FIN, ACK)
    Window size value: 30016
    [Calculated window size: 30016]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0x28db [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]

No.     Time           Source                Destination           Protocol 
Length Info
     91 39.446186000   192.168.0.205         192.168.0.87          TCP      60  
   patrolview > http [ACK] Seq=201 Ack=408 Win=1093 Len=0

Frame 91: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on 
interface 0
Ethernet II, Src: 00:bd:33:06:68:22 (00:bd:33:06:68:22), Dst: AsustekC_30:36:22 
(14:da:e9:30:36:22)
    Destination: AsustekC_30:36:22 (14:da:e9:30:36:22)
    Source: 00:bd:33:06:68:22 (00:bd:33:06:68:22)
    Type: IP (0x0800)
    Padding: 000000000000
Internet Protocol Version 4, Src: 192.168.0.205 (192.168.0.205), Dst: 
192.168.0.87 (192.168.0.87)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT 
(Not ECN-Capable Transport))
    Total Length: 40
    Identification: 0x0000 (0)
    Flags: 0x02 (Don't Fragment)
    Fragment offset: 0
    Time to live: 255
    Protocol: TCP (6)
    Header checksum: 0xf95a [validation disabled]
    Source: 192.168.0.205 (192.168.0.205)
    Destination: 192.168.0.87 (192.168.0.87)
    [Source GeoIP: Unknown]
    [Destination GeoIP: Unknown]
Transmission Control Protocol, Src Port: patrolview (4097), Dst Port: http 
(80), Seq: 201, Ack: 408, Len: 0
    Source port: patrolview (4097)
    Destination port: http (80)
    [Stream index: 2]
    Sequence number: 201    (relative sequence number)
    Acknowledgment number: 408    (relative ack number)
    Header length: 20 bytes
    Flags: 0x010 (ACK)
    Window size value: 1093
    [Calculated window size: 1093]
    [Window size scaling factor: -2 (no window scaling used)]
    Checksum: 0x99d6 [validation disabled]
        [Good Checksum: False]
        [Bad Checksum: False]
    [SEQ/ACK analysis]
_______________________________________________
lwip-users mailing list
[email protected]
https://lists.nongnu.org/mailman/listinfo/lwip-users

Reply via email to