Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

Google Chrome TCP Retransmission

Hi I'm a new in Wireshark and im trying to study a certain transaction which caused a Network Error.

This set of packets occured after 6hrs 31mins of soaking google chrome overnight. Before 6 hrs and 31mins the trace is almost fine with very little abnormalities, wherein the communication between the client and the host does not break.

BTW, The device that google chrome is communicating with is a prototype communications module, so let me know if there's any problem caused by it.

communications module: 192.168.1.5 google chrome: 192.168.1.50


"1","0.000000","192.168.1.5","192.168.1.50","TCP","384","80 > 63364 [PSH, ACK] Seq=1 Ack=1 Win=532 Len=330 [TCP segment of a reassembled PDU]" "2","0.000404","192.168.1.50","192.168.1.5","TCP","54","63364 > 80 [FIN, ACK] Seq=1 Ack=331 Win=64971 Len=0" "3","0.001056","54:55:58:10:00:37","Broadcast","ARP","60","Who has 192.168.2.50? Tell 192.168.1.5" "4","0.004033","192.168.1.5","192.168.1.50","TCP","60","80 > 63364 [FIN, ACK] Seq=331 Ack=2 Win=532 Len=0" "5","0.004109","192.168.1.50","192.168.1.5","TCP","54","63364 > 80 [ACK] Seq=2 Ack=332 Win=64971 Len=0" "6","0.550871","192.168.1.50","192.168.1.5","TCP","66","63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "7","0.801320","192.168.1.50","192.168.1.5","TCP","66","63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "8","1.010239","192.168.1.50","192.168.1.5","TCP","66","63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "9","3.550877","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "10","3.800935","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "11","4.012859","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "12","7.017225","192.168.1.50","192.168.1.5","TCP","66","63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "13","9.546120","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63366 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "14","9.796111","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63367 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "15","10.007071","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63369 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "16","10.017104","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "17","13.019651","192.168.1.50","192.168.1.5","TCP","66","63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "18","16.019352","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "19","16.020343","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63374 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "20","19.021877","192.168.1.50","192.168.1.5","TCP","66","63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "21","22.021585","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "22","22.022568","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63380 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "23","22.858590","192.168.1.50","192.168.1.5","TCP","66","63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "24","25.858780","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "25","28.018832","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63386 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "26","28.859022","192.168.1.50","192.168.1.5","TCP","66","63395 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1" "27","31.859015","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63389 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1" "28","31.859017","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63395 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

"29","34.862195","192.168.1.50","192.168.1.5","TCP","66","63401 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

Hopefully someone can share his thought about this problem. Thanks.

Google Chrome TCP Retransmission

Hi I'm a new in Wireshark and im trying to study a certain transaction which caused a Network Error.

This set of packets occured after 6hrs 31mins of soaking google chrome overnight. Before 6 hrs and 31mins the trace is almost fine with very little abnormalities, wherein the communication between the client and the host does not break.

BTW, The device that google chrome is communicating with is a prototype communications module, so let me know if there's any problem caused by it.

communications module: 192.168.1.5 google chrome: 192.168.1.50


"1","0.000000","192.168.1.5","192.168.1.50","TCP","384","80  >  63364 [PSH, ACK] Seq=1 Ack=1 Win=532 Len=330 [TCP segment of a reassembled PDU]"
"2","0.000404","192.168.1.50","192.168.1.5","TCP","54","63364  >  80 [FIN, ACK] Seq=1 Ack=331 Win=64971 Len=0"
"3","0.001056","54:55:58:10:00:37","Broadcast","ARP","60","Who has 192.168.2.50? Tell 192.168.1.5"
"4","0.004033","192.168.1.5","192.168.1.50","TCP","60","80  >  63364 [FIN, ACK] Seq=331 Ack=2 Win=532 Len=0"
"5","0.004109","192.168.1.50","192.168.1.5","TCP","54","63364  >  80 [ACK] Seq=2 Ack=332 Win=64971 Len=0"
"6","0.550871","192.168.1.50","192.168.1.5","TCP","66","63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"7","0.801320","192.168.1.50","192.168.1.5","TCP","66","63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"8","1.010239","192.168.1.50","192.168.1.5","TCP","66","63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"9","3.550877","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"10","3.800935","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"11","4.012859","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"12","7.017225","192.168.1.50","192.168.1.5","TCP","66","63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"13","9.546120","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63366  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"14","9.796111","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63367  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"15","10.007071","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63369  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"16","10.017104","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"17","13.019651","192.168.1.50","192.168.1.5","TCP","66","63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"18","16.019352","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"19","16.020343","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63374  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"20","19.021877","192.168.1.50","192.168.1.5","TCP","66","63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"21","22.021585","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"22","22.022568","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63380  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"23","22.858590","192.168.1.50","192.168.1.5","TCP","66","63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"24","25.858780","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"25","28.018832","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63386  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"26","28.859022","192.168.1.50","192.168.1.5","TCP","66","63395  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"
"27","31.859015","192.168.1.50","192.168.1.5","TCP","62","[TCP Retransmission] 63389  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1"
"28","31.859017","192.168.1.50","192.168.1.5","TCP","66","[TCP Retransmission] 63395  >  80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

SACK_PERM=1" "29","34.862195","192.168.1.50","192.168.1.5","TCP","66","63401 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1"

SACK_PERM=1"

Hopefully someone can share his thought about this problem. Thanks.