• tcp 窗口大小


    
    C:Python27python.exe C:/Users/TLCB/PycharmProjects/untitled2/http/t2.py
    ('192.168.137.1', 50606)
    ('192.168.137.2', 8080)
    9317
    response:1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
    
    
    
    node1:/root#tcpdump -S -i eth1 '((tcp) and  (port 8080) )'
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
    01:41:07.046199 IP 192.168.137.1.50606 > node1.webcache: Flags [S], seq 1199093012, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
    01:41:07.046231 IP node1.webcache > 192.168.137.1.50606: Flags [S.], seq 1891105553, ack 1199093013, win 2560, options [mss 256,nop,nop,sackOK,nop,wscale 6], length 0
    01:41:07.046366 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891105554, win 16482, length 0
    
    
    01:41:07.047465 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199093013:1199093549, ack 1891105554, win 16482, length 536
    01:41:07.047474 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199093549:1199094085, ack 1891105554, win 16482, length 536
    01:41:07.047872 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199093549, win 57, length 0
    01:41:07.047960 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199094085:1199094621, ack 1891105554, win 16482, length 536
    01:41:07.047963 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199094621:1199095157, ack 1891105554, win 16482, length 536
    01:41:07.047971 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199094085, win 74, length 0
    01:41:07.048038 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199095157:1199095693, ack 1891105554, win 16482, length 536
    01:41:07.048041 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199095693:1199096229, ack 1891105554, win 16482, length 536
    01:41:07.048052 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199094621, win 91, length 0
    01:41:07.048123 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199095157, win 107, length 0
    01:41:07.048172 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199095693, win 124, length 0
    01:41:07.048220 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199096229, win 141, length 0
    01:41:07.048266 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199096229:1199096765, ack 1891105554, win 16482, length 536
    01:41:07.048270 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199096765, win 158, length 0
    01:41:07.048333 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199096765:1199097301, ack 1891105554, win 16482, length 536
    01:41:07.048341 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199097301, win 174, length 0
    01:41:07.048385 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199097301:1199097837, ack 1891105554, win 16482, length 536
    01:41:07.048388 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199097837, win 191, length 0
    01:41:07.048414 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199097837:1199098373, ack 1891105554, win 16482, length 536
    01:41:07.048417 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199098373, win 208, length 0
    01:41:07.048442 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199098373:1199098909, ack 1891105554, win 16482, length 536
    01:41:07.048445 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199098909, win 225, length 0
    01:41:07.048468 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199098909:1199099445, ack 1891105554, win 16482, length 536
    01:41:07.048471 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199099445, win 241, length 0
    01:41:07.048494 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199099445:1199099981, ack 1891105554, win 16482, length 536
    01:41:07.048497 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199099981, win 258, length 0
    01:41:07.048520 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199099981:1199100517, ack 1891105554, win 16482, length 536
    01:41:07.048523 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199100517, win 275, length 0
    01:41:07.048546 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199100517:1199101053, ack 1891105554, win 16482, length 536
    01:41:07.048551 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199101053, win 292, length 0
    01:41:07.048577 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199101053:1199101589, ack 1891105554, win 16482, length 536
    01:41:07.048580 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199101589, win 308, length 0
    01:41:07.048609 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199101589:1199102125, ack 1891105554, win 16482, length 536
    01:41:07.048613 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199102125, win 325, length 0
    01:41:07.048639 IP 192.168.137.1.50606 > node1.webcache: Flags [P.], seq 1199102125:1199102330, ack 1891105554, win 16482, length 205
    01:41:07.048643 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199102330, win 342, length 0
    01:41:07.048784 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891105554:1891106066, ack 1199102330, win 342, length 512
    01:41:07.048911 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106066, win 16354, length 0
    01:41:07.048925 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891106066:1891106578, ack 1199102330, win 342, length 512
    01:41:07.049013 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106578, win 16482, length 0
    01:41:07.049023 IP node1.webcache > 192.168.137.1.50606: Flags [P.], seq 1891106578:1891106587, ack 1199102330, win 342, length 9
    01:41:07.049174 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891106587:1891107099, ack 1199102330, win 342, length 512
    01:41:07.049272 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106843, win 16415, length 0
    01:41:07.049282 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891107099:1891107611, ack 1199102330, win 342, length 512
    01:41:07.049382 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891107355, win 16482, length 0
    01:41:07.049396 IP node1.webcache > 192.168.137.1.50606: Flags [P.], seq 1891107611:1891107620, ack 1199102330, win 342, length 9
    01:41:07.049472 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891107620, win 16415, length 0
    01:41:07.050216 IP 192.168.137.1.50606 > node1.webcache: Flags [R.], seq 1199102330, ack 1891107620, win 0, length 0
    
    
    

  • 相关阅读:
    批处理(*.bat)文件 -> 命令
    设置柱状图:每项颜色不一样
    回到顶部 插件 遇到的一点小问题
    body的滚动事件的坑
    文章标题
    window.open()打开的新窗口被拦截的原因分析和解决方案
    常用正则表达式
    代码整洁之道,clean code
    表单序列化,获取Json对象
    利用聚合函数来去重
  • 原文地址:https://www.cnblogs.com/hzcya1995/p/13348506.html
Copyright © 2020-2023  润新知