[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re[2]: lost of packets



Hello Daniel,
Many thanks for your response.
I try to obtain the differents informations.
On this run, 157 packets are lost.
f:netstat_udp.before
udp:
        7802 datagrams received
        0 with incomplete header
        0 with bad data length field
        0 with bad checksum
        0 with no checksum
        7802 input packets hardware-checksummed
        0 output packets hardware-checksummed
        0 dropped due to no socket
        7794 broadcast/multicast datagrams dropped due to no socket
        0 dropped due to missing IPsec protection
        0 dropped due to full socket buffers
        8 delivered
        8 datagrams output
        2 missed PCB cache
f:netstat_udp.after
udp:
        7802 datagrams received
        0 with incomplete header
        0 with bad data length field
        0 with bad checksum
        0 with no checksum
        7802 input packets hardware-checksummed
        0 output packets hardware-checksummed
        0 dropped due to no socket
        7794 broadcast/multicast datagrams dropped due to no socket
        0 dropped due to missing IPsec protection
        0 dropped due to full socket buffers
        8 delivered
        8 datagrams output
        2 missed PCB cache
diff
f:netstat_ip.before
ip:
        15439 total packets received
        0 bad header checksums
        0 with size smaller than minimum
        0 with data size < data length
        0 with header length < data size
        0 with data length < header length
        0 with bad options
        0 with incorrect version number
        0 fragments received
        0 fragments dropped (duplicates or out of space)
        0 malformed fragments dropped
        0 fragments dropped after timeout
        0 packets reassembled ok
        10335 packets for this host
        0 packets for unknown/unsupported protocol
        4296 packets forwarded
        91 packets not forwardable
        0 redirects sent
        2107 packets sent from this host
        0 packets sent with fabricated ip header
        0 output packets dropped due to no bufs, etc.
        0 output packets discarded due to no route
        0 output datagrams fragmented
        0 fragments created
        0 datagrams that can't be fragmented
        0 fragment floods
        0 packets with ip length > max ip packet size
        0 tunneling packets that can't find gif
        0 datagrams with bad address in header
        0 input datagrams checksum-processed by hardware
        0 output datagrams checksum-processed by hardware
f:netstat_ip.after
ip:
        16462 total packets received
        0 bad header checksums
        0 with size smaller than minimum
        0 with data size < data length
        0 with header length < data size
        0 with data length < header length
        0 with bad options
        0 with incorrect version number
        0 fragments received
        0 fragments dropped (duplicates or out of space)
        0 malformed fragments dropped
        0 fragments dropped after timeout
        0 packets reassembled ok
        10342 packets for this host
        0 packets for unknown/unsupported protocol
        5139 packets forwarded
        109 packets not forwardable
        0 redirects sent
        2112 packets sent from this host
        0 packets sent with fabricated ip header
        0 output packets dropped due to no bufs, etc.
        0 output packets discarded due to no route
        0 output datagrams fragmented
        0 fragments created
        0 datagrams that can't be fragmented
        0 fragment floods
        0 packets with ip length > max ip packet size
        0 tunneling packets that can't find gif
        0 datagrams with bad address in header
        0 input datagrams checksum-processed by hardware
        0 output datagrams checksum-processed by hardware
/home/work # tcpdump -nvvvXr bge0.pcap dst host 10.128.2.251
09:53:31.836876 172.19.40.169.1024 > 10.128.2.251.161:  [udp sum ok] |30|29|02|01|04|06|a0|1cGetRequest(28)|02|04|02|01|02|01|30|0e
|30|0c|06|08.1.3.6.1.2.1.1.1.0|05|00 (DF) [tos 0x10] (ttl 64, id 0)
  0000: 4510 0047 0000 4000 4011 585f ac13 28a9  [email protected]@.X_¬.(©
  0010: 0a80 02fb 0400 00a1 0033 8f93 3029 0201  ...û...¡.3..0)..
  0020: 0004 0670 7562 6c69 63a0 1c02 0409 4b6a  ...public?....Kj
  0030: 7102 0100 0201 0030 0e30 0c06 082b 0601  q......0.0...+..
  0040: 0201 0101 0005 00                        .......
/home/work # tcpdump -nvvvXr bge0.pcap dst host 10.128.2.252
09:53:31.836878 172.19.40.169.1024 > 10.128.2.252.161:  [udp sum ok] |30|29|02|01|04|06|a0|1cGetRequest(28)|02|04|02|01|02|01|30|0e
|30|0c|06|08.1.3.6.1.2.1.1.1.0|05|00 (DF) [tos 0x10] (ttl 64, id 0)
  0000: 4510 0047 0000 4000 4011 585e ac13 28a9  [email protected]@.X^¬.(©
  0010: 0a80 02fc 0400 00a1 0033 8f92 3029 0201  ...ü...¡.3..0)..
  0020: 0004 0670 7562 6c69 63a0 1c02 0409 4b6a  ...public?....Kj
  0030: 7102 0100 0201 0030 0e30 0c06 082b 0601  q......0.0...+..
  0040: 0201 0101 0005 00                        .......
The shell use to get the informations
  pfctl -s all > pfctl.before
  netstat -sp udp > netstat_udp.before
  netstat -sp ip  > netstat_ip.before
  pbge0=''
  pbge1=''
  tcpdump -n -i bge0 -w bge0.pcap & 
  pbge0=$!
  tcpdump -n -i bge1 -w bge1.pcap & 
  pbge1=$!
  sleep 3
  echo attente fin du test
  read bidon
  [ -z "$pbge0" ] || kill -HUP $pbge0
  sleep 3
  [ -z "$pbge1" ] || kill -HUP $pbge1
  sleep 3
  netstat -sp udp > netstat_udp.after
  netstat -sp ip  > netstat_ip.after
  pfctl -s all > pfctl.after
  tcpdump -nr bge0.pcap net 10 | tee bge0.txt | wc -l
  tcpdump -nr bge1.pcap net 10 | tee bge1.txt | wc -l