How TCP RETRANSMISSIONS Work // Analyzing Packet Loss

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ต.ค. 2024

ความคิดเห็น • 89

  • @predatorishi
    @predatorishi 2 ปีที่แล้ว +39

    I’m a senior TAC engineer at Cisco and currently mentoring new hires in my team , I have shared your channel for them to brush up their wireshark skills and I must say that my students are super impressed with you Chris, Great Job!! these videos are gold .

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      Thank you! By chance are you at Cisco live? Let’s meet up!

    • @benedictjojo5761
      @benedictjojo5761 ปีที่แล้ว +4

      Cisco TAC Engineer here as well and damn this guy is really good!

  • @TheEitler
    @TheEitler ปีที่แล้ว +1

    way better than the provided lecture notes at university -> best way to learn for the practical exam is to watch your videos! 👍

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Glad you think so!

  • @tonioyendis4464
    @tonioyendis4464 ปีที่แล้ว +2

    Learning layer 4 (transport-layer) is crucial to troubleshooting network/application issues! Most app and most server teams don't understand the importance of TCP- tuning; they have little clue about window-scaling/sizing, SACK-tuning or how much retrans is too much. The BDP calculator is your friend as a network-analyst, most of the issues I discover are usually at layer 4 or below.

  • @IK-iu4rz
    @IK-iu4rz 2 ปีที่แล้ว +1

    Always facing Retransmission issues, This video is a life save. :)

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Glad it helped! Thanks for the comment.

  • @axelcastrejon6730
    @axelcastrejon6730 ปีที่แล้ว

    These videos are so good I can't believe they aren't more widely recognised

  • @nacereddinezekri436
    @nacereddinezekri436 2 ปีที่แล้ว +1

    Thank you Chris, your way of explaining very complexe things in a simple and direct way is very valuable.

  • @kadirrangwala
    @kadirrangwala 2 ปีที่แล้ว +4

    Amazing Content ! Please continue to upload such videos regularly.
    Suggestion for next video: I would like to see PCAP analysis of a voip call with choppy audio/One Way audio.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Nice suggestion, thanks!

    • @tomschulte3237
      @tomschulte3237 2 ปีที่แล้ว +1

      Great Idea. Kinda similar problem. I have a partially (what ever that means) working VoIP-phone behind a second router (USG3 Ubiquiti). The phone works well at the first router (AVM Fritzbox 7940 - a consumer router very popular in the EU in particular in Germany ) which runs the software and my other phones.
      Even if this is not going to be covered, it would be very interesting to see some VoIP "debugging" in general.

  • @atzelepis1
    @atzelepis1 2 ปีที่แล้ว

    thnk you chris,i am a technical support negineer for several years,feel i am gaining good enough knowledge here

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @bellaambiens
    @bellaambiens 2 ปีที่แล้ว +1

    Very interesting video, you’re now in my go to channels list.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @vedsachit604
    @vedsachit604 6 หลายเดือนก่อน

    One of the best video on explaining the reason for retransmission.. Subscribed your channel.. looking for more videos..on packet analysis

  • @raulbalderrama9396
    @raulbalderrama9396 2 ปีที่แล้ว +3

    What a valuable video! I have learned too much from you Chris, thanks a lot!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Glad it was helpful! Thanks Raul.

  • @socat9311
    @socat9311 2 ปีที่แล้ว +2

    Would love to see a video on SIP packet troubleshooting :)

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the idea!

  • @aminderpuri9392
    @aminderpuri9392 2 ปีที่แล้ว +1

    What else is there to say, informative and well presented. Like your videos a lot

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      I appreciate that - Thank you for stopping by the channel!

  • @RicardoDiaz21129
    @RicardoDiaz21129 11 หลายเดือนก่อน

    Been learning so much from your videos. Thanks you Chris

  • @SnortDefence
    @SnortDefence 2 ปีที่แล้ว

    Nice post, looking for depth on this topic Chris. Thanks

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Great Praveen! Great you have to stop by the channel.

  • @ravishere-mn6no
    @ravishere-mn6no ปีที่แล้ว

    Thank you very much for all the knowledge you have been sharing!!!

  • @wiresharkmania709
    @wiresharkmania709 2 ปีที่แล้ว +1

    Hello Chris, once again...Thanks ;-)

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Happy you stopped by and thank you for the comment.

  • @DanielAlmonte-t3q
    @DanielAlmonte-t3q ปีที่แล้ว

    Great video and explanation, thanks

  • @vedsachit604
    @vedsachit604 6 หลายเดือนก่อน

    Need more videos on RETRANSMISSION

  • @mcgirishnetwork
    @mcgirishnetwork 2 ปีที่แล้ว +1

    Thank you for the informative video.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment Girish!

  • @malkeetkalera7520
    @malkeetkalera7520 2 ปีที่แล้ว +1

    I always wait for uer new video 👍

  • @maumotec2345
    @maumotec2345 2 ปีที่แล้ว

    Always the best.
    Great content. Thank you for much for it.

  • @andreizoom
    @andreizoom 2 ปีที่แล้ว +1

    Great video! Thank you!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it!

  • @adajatobi7866
    @adajatobi7866 2 ปีที่แล้ว

    Thank you Chris. This really helped me 😁

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You're very welcome!

  • @m.adnankhan8245
    @m.adnankhan8245 2 ปีที่แล้ว

    Thanks for making it.

  • @EduardKhiaev
    @EduardKhiaev 2 ปีที่แล้ว +1

    Thank you so much!

  • @davepete9537
    @davepete9537 ปีที่แล้ว +1

    What causes [TCP Retransmission] [TCP Port numbers reused] and how to fix it?

  • @MrSomaaoo
    @MrSomaaoo 2 ปีที่แล้ว

    amazing video , thanks so much

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it!

  • @haroldcalderon4514
    @haroldcalderon4514 2 ปีที่แล้ว

    I'm here because David bom and subscribed 🎉🎉🎉🎉🎉🚀🚀🚀🚀🚀🚀

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Welcome to the channel!

  • @jjames7206
    @jjames7206 2 ปีที่แล้ว

    Great tips Thanks a lot

  • @ranjanadissanayaka5390
    @ranjanadissanayaka5390 2 ปีที่แล้ว +1

    boom ...more knowledge transmitted successfully from server(Chris) to client(me).

  • @emirh.9376
    @emirh.9376 2 ปีที่แล้ว

    Thanks Chris!

  • @gofai2003
    @gofai2003 2 ปีที่แล้ว

    Great Chris

  • @shivamt157
    @shivamt157 2 ปีที่แล้ว

    Thank you!

  • @geneva93
    @geneva93 2 ปีที่แล้ว

    Thanks!

  • @breakingbisley
    @breakingbisley 2 ปีที่แล้ว +4

    Hey Chris, great video. Just a quick confirmation, in the three way handshake, I see the (TX - Sender) has a MSS of 1460 whereas the (RXR - Server) has a MSS of 1440. Could that be a potential problem, or based on the three handshake. Will both parties agree to some diligence in the network like with windowing sizing? Thanks

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +6

      Great question - The easy answer is no. The MSS is not negotiated, so both ends are allowed to support different values. The MSS is an advertisement of the largest segment that the endpoint can receive. In effect, telling the other side not to send anything larger than this length of payload in one segment. After that, TCP leaves it to IP to sort out MTU and fragmentation.

  • @pranavsingh8503
    @pranavsingh8503 ปีที่แล้ว +1

    All TAC and Escalation engineers watching this video, give a like !

  • @luisfelipeortizmartinez6615
    @luisfelipeortizmartinez6615 5 หลายเดือนก่อน

    Hello Chris,
    Great videos, on a particular case where we have a constant but high latency, is it a good idea to have frto or is a better approach to deactivate the frto at the source.
    Thanks.

  • @scottb4029
    @scottb4029 2 ปีที่แล้ว

    Awesome video and series. Simple and stupid question, what's a MTU ?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      th-cam.com/video/XMcYwr-yJGA/w-d-xo.html - Here ya go. Here is a video about it.

    • @scottb4029
      @scottb4029 2 ปีที่แล้ว

      Thanks Chris, the video was perfect. Funny thing, it was the next video in the series I was watching on your playlist. The TCP series is well done. I would like to see a deep dive into UDP.

  • @krishangopal4156
    @krishangopal4156 2 ปีที่แล้ว

    U are awesome 🤠

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for watching!

  • @srinivasann62
    @srinivasann62 ปีที่แล้ว

    Hi Chris, Great Stuff as always! I've a question. Why is server/receiver trying to send with the default MSS value of 536 when it has already negotiated its MSS value of 1440 during TCP 3-way handshake (SYN-ACK)?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว +1

      That is the "When in doubt" default MSS. So if one side or the other is uncertain of the MSS due to retransmission, or a network-level change of MSS, it will try 536 as a last ditch effort before quitting.

  • @DaystarHiker
    @DaystarHiker ปีที่แล้ว

    If the smallest MSS allowed by TCP is 536. Why is packet 16 314

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      I get why that is confusing! So 536 is the minimum value that the MSS can be. So it is a minimum maximum. Packets can still be smaller than that, but the max needs to be at least 536.

  • @tomrt2
    @tomrt2 ปีที่แล้ว

    Hi, in an holistic troubleshooting method I would like to get some quick view informations table about the many tcp connections I can capture in my trace files.
    For each TCP connections I would like to find , the number of packet retransmitions, ther average TCP RTT, the average application RTT, the number of 0 window, and so on.
    Is there any way to get this in Wireshark ? Or is there any other packet analyser doing this on the market ?

  • @gofai2003
    @gofai2003 2 ปีที่แล้ว

    Chris, how do we analyze or troubleshoot esp/ipsec packet loss in wireshark?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +3

      Easiest answer? It's complicated. 😄 I rarely get in and try to decrypt it. Mostly I watch for shifts in roundtrip time, throughput, and network indicators of loss (ICMP or other layer 2 protocols). Or... I forget trying to capture the tunnel itself and install Wireshark on one of the endpoints and capture before traffic enters the tunnel. If things look healthy going in and coming out, then I move to the encrypted traffic.

    • @gofai2003
      @gofai2003 2 ปีที่แล้ว

      @@ChrisGreer thanks a lot

  • @mahavirsinghrajpurohit8004
    @mahavirsinghrajpurohit8004 2 ปีที่แล้ว

    Video 3

  • @tomschulte3237
    @tomschulte3237 2 ปีที่แล้ว

    Always the same problem - having 2 thumbs but only 1 thumb up allowed to give!
    So please feel it doubled

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment!

  • @nicoleanne967
    @nicoleanne967 ปีที่แล้ว

    Hi Chris, I know you are not troubleshooting just for anyone so I would like your input to guide me to resources to help me find out what is wrong with my connections. I don't know what to ask I dont know what to look for so a bit of guidance to the right direction would be a great help.
    My clients can't seem to connect to a certain website, im sure my firewall does not allow this connection. But my firewall log says it allowing it. I decided to check packet logs and found that my TCP SYN "conversation completeness: incomplete 37". I'm guessing my firewall will not trust that. Of course, without firewall, I tried to access the website which works but I also see my TCP SYN "Conversation completeness: incomplete, DATA (15)".
    on firewall: TCP sequence is Client SYN (time:1) > TCP Retransmission x 4 > Server ACK (time 16) > Client TCP RST (time 16)
    Where should I go? What could be causing this?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      If your conv completeness is that high, sounds like you are getting a reset. Guessing it’s a syn/rst. Look at the TTL of the reset and see if it is coming from a local or nearby device. Check out my video on tshooting resets I walk you though all that.

    • @nicoleanne967
      @nicoleanne967 ปีที่แล้ว

      @@ChrisGreer Thank you Chris! will do

  • @AbhisekMishra
    @AbhisekMishra 2 ปีที่แล้ว

    Hey can you please explain me that what is "client hello" which is written in 4th line after 3 way handshake.

    • @wiresharkmania709
      @wiresharkmania709 2 ปีที่แล้ว

      Hello, it's the first request from the client to the server telling him : " Hey, I want to make a secure (TLSv1.2) communication with you.
      But unfortunately the server doesn't answer in the Chris example.
      Take a look at this Wikipedia TLS page : en.wikipedia.org/wiki/Transport_Layer_Security#TLS_handshake

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      What WiresharkMania said.... Basically it is the first part of the TLS handshake. Now I need to do a series on that, so thanks for the question!

  • @zsahe21
    @zsahe21 ปีที่แล้ว

    !!!

  • @troysipple2591
    @troysipple2591 ปีที่แล้ว

    Very good information