How TCP really works: MTU vs MSS

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ม.ค. 2025

ความคิดเห็น •

  • @imnainggolanpm2245
    @imnainggolanpm2245 2 ปีที่แล้ว +65

    7:55 is very IMPORTANT reminder.
    MTU is per hop, while MSS, since it is on TCP, it's end-to-end.
    Networking people (me too) sometimes jump the gun that when they pinged next hop and able to get 1500 bytes MTU (do not fragments), immediately assume it is the same treatment along the hops throughout the network.
    I remember dealing with MPLS backbone team and they assumed basically that same thing.
    UNTIL we went P routers by P routers pinged each hop and identified there was an issue where somehow the MTU on that hop was dropped down to ~400 bytes.
    Once the "expert" backbone team rerouted the traffic away from that backbone path, then the application can resume.

    • @mikkio5371
      @mikkio5371 ปีที่แล้ว

      It was really an eye opener. I have read a book on ccnp by Bradley another author I respect so much. He actually recommended tunnels to be set ip mtu to 1400 and mss 1360. But it was until today .I know why .also we have other encapsulation like mpls ,gre that has their sizes that need to be put into consideration. Thanks Bombia and Chris .

  • @EWCRC
    @EWCRC 2 ปีที่แล้ว +15

    Yes, more content with Chris and Wireshark. The real world examples are great and really helps show the thought process for going through the capture. It is also great how you go back and forth and ask questions that we the viewer may ask.

  • @davidbombal
    @davidbombal  2 ปีที่แล้ว +20

    // MENU //
    00:00 ▶ Coming Up
    00:25 ▶ Intro
    00:32 ▶ Chris introduction
    00:47 ▶ Topic: Maximum Segment Size (MSS)
    01:27 ▶ Explaining Maximum Transmission Unit (MTU)
    08:42 ▶ Interface layout
    10:25 ▶ David Bombal "War Story"
    12:00 ▶ Wireshark demo
    13:26 ▶ Increasing the MTU on your device for larger connections
    16:27 ▶ Difference between MTU and MSS
    19:36 ▶ Wireshark demo (cont'd)
    24:58 ▶ Using Path MTU Discovery
    27:02 ▶ Ping and Wireshark demo
    33:32 ▶ Cool trick for Mac system
    35:08 ▶ TCP/MSS Clamping
    38:21 ▶ Chris Greer "War Story"
    51:09 ▶ What happens if you can't capture a server
    55:08 ▶ MSS Adjustment commands
    56:55 ▶ Tunnel Path MTU Discovery
    57:40 ▶ Figuring out 1432
    01:02:52 ▶ Conclusion
    01:04:48 ▶ "Cool features" in Wireshark
    Previous video: th-cam.com/video/rmFX1V49K8U/w-d-xo.html
    // Wireshark PCAP files //
    MTU PCAP: github.com/packetpioneer/youtube/blob/main/PMTUD.pcapng
    War Story PCAP Client: github.com/packetpioneer/youtube/blob/main/slowfile-clientside.pcapng
    War Story PCAP Server: github.com/packetpioneer/youtube/blob/main/slowfile-serverside.pcapng
    Special “Thumbs Up” and “Subscribe” PCAP: github.com/packetpioneer/youtube/blob/main/tcp-streamexport.pcapng
    // GOOD READING //
    Network Implications of PMTUD: www.ipspace.net/kb/Internet/PMTUD/30-network-implications.html
    Path MTU Discovery: www.ipspace.net/kb/Internet/PMTUD/20-mtu-discovery.html
    Resolve IPv4 Fragmentation, MTU, MSS, and PMTUD Issues with GRE and IPsec: www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/25885-pmtud-ipfrag.html
    Configuring TCP MSS Adjustment: www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3650/software/release/16-9/configuration_guide/ip/b_169_ip_3650_cg/configuring_tcp_mss_adjustment.pdf
    Ethernet MTU and TCP MSS Adjustment Concept for PPPoE Connections: www.cisco.com/c/en/us/support/docs/ip/transmission-control-protocol-tcp/200932-Ethernet-MTU-and-TCP-MSS-Adjustment-Conc.html
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // David SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    TH-cam: th-cam.com/users/davidbombal
    // Chris SOCIAL //
    Udemy course: davidbombal.wiki/chriswireshark
    LinkedIn: www.linkedin.com/in/cgreer/
    TH-cam: th-cam.com/users/ChrisGreer
    Twitter: twitter.com/packetpioneer
    // VLAD SOCIAL //
    Twitter: twitter.com/Packet_vlad
    PMTUD Blog: www.packettrain.net/2016/09/21/pmtud-or-not/
    Thanks Vladimir Gerasimov!
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @N1v3dh
      @N1v3dh 2 ปีที่แล้ว +1

      i just want to say thank you from the bottom of my heart lots of love david ... i am getting started in cyber security and i have everything i wanted here in your channe thanks for your effort ......

  • @JaCkFlApPiNg
    @JaCkFlApPiNg 2 ปีที่แล้ว +4

    David and Chris, you won't believe how many networking professionals have no understanding on MTU or MSS, so thank you so much for this!
    Please more on TCP and ideally the next with some focus on TTL (You touched on it in this video "My TTL started at 64 and it's now 54, so I'm going through 10 Routers")
    Great video, subscribed and liked and will check out Chris' TH-cam channel

  • @ryanflint386
    @ryanflint386 2 ปีที่แล้ว +28

    Great video! I had a client running a Cisco 1100 in their home office - everything was working perfectly except for Netflix and Disney+ which seemed very strange. After a fair bit of investigation the issue turned out to be the MSS. They were on a home internet plan using pppoe so had to use IP TCP ADJUST-MSS 1452 command to account for the 8 byte overhead of pppoe.

    • @gorge5412
      @gorge5412 2 ปีที่แล้ว +5

      RF: Thank you for providing your own war story, complete with your winning battle command. Good on ya', mate!
      .

    • @moneymac1114
      @moneymac1114 10 หลายเดือนก่อน

      I like that you explained the battle and the winning command so if somebody has this problem in the field they can also use your strategy to fix it. God bless you

  • @brunomedeirosfraga
    @brunomedeirosfraga 2 ปีที่แล้ว +6

    Amazing job, guys ! We see a lot of information written on web but when we see a live demo it's much more interesting and captivating. I've recently found David and Chris's channels and can't stop watching. Keep doing wireshark analyses for network problems ! It's awesome !

  • @rusnakhraj7401
    @rusnakhraj7401 2 ปีที่แล้ว +4

    This was a great video. It reminded me and issue that I was dealing with around 2 years ago with Aruba APs. Our client has setup like this. One local WLAN aruba controller on site Spain and one redundant controller which was on remote site in Sweden. Clients reported issue with slow wifi. I found out that clients that are connected to APs which are connected to remote controller experience slowness. Other users connected to APs which used local wlan controller had no issue. So we started live troubleshooting and see that ping was ok but there was real slowness when opening web page or doing skype call (user was green but with packet loss). We started to manipulate ping request with more bytes and then packet loss appeared. Later I found out that APs has set "do not fragment" bit by default and we did calculation with wan team that packet is too big. So on our side we turn on preemption which will move APs to local WLC if it is online and WAN team did their config to divide packets to smaller size. This was really great issue and I enjoyed it :)
    Btw. redundat remote wlc served for several small sites. Usually medium and big sites had 2 local WLCs but because of fact that some customer sites were too small they had setup with one local and one remote wlc.

  • @esesimon3523
    @esesimon3523 2 ปีที่แล้ว +2

    Wow. I'm indeed wowed. This is an impressive and exceptional delivery.
    It's unbelievable to find this kind of quality content for free. I felt I was in a classroom. I would appreciate a deep dive on the entire TCP/IP and Ethernet header.
    Thanks for putting this out.

  • @WillKohut
    @WillKohut ปีที่แล้ว +1

    These videos answer the question: what if Robin Williams was a network engineering vlogger? In all seriousness though, great content; appreciate the clear and real-world explanations!

  • @dwaynesudduth1028
    @dwaynesudduth1028 2 ปีที่แล้ว +2

    Anohter fantastic collaboration and learning time. And the 'War Story" shows a real-world example for us to dive into and understand. Thank you David and Chris!

  • @TomWhi
    @TomWhi 2 ปีที่แล้ว +2

    Boys, this video was incredible! Chris, you did an amazing job of practically explaining this and David’s input was very helpful.

  • @adajatobi7866
    @adajatobi7866 2 ปีที่แล้ว +2

    Thank you so much Chris and David. This video is a goldmine and I learnt a lot from it. Watching it over and over again, and it just keeps making more sense.

  • @sirsquirrel0
    @sirsquirrel0 2 ปีที่แล้ว +1

    I love the way you both engaged us all. I have really struggled in and out to know mtu and mss in detail. Now, I’m all good and proud. Thanks for the video. Keep up the great work!

  • @saramaeks9826
    @saramaeks9826 2 ปีที่แล้ว +33

    I love these interviews, thank you so much for what you do David :) your channel has really helped me learn and grow as a web developer!

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Fantastic! Very happy to hear that Sara!

  • @yomisaurio
    @yomisaurio 2 ปีที่แล้ว +1

    Great video guys, very explanatory and easy to comprehend, I confirm this TCP issues are nigthmares, having dealing with a similar problem months ago where one of the branch offices experience a low vpn throughput and fragmentation, the issue was caused by incorrect mss clamping value,
    it took few days to figure out whats was causing it. Like Chris said, its easier to find out what's wrong when the path is broken rather that in this trickier issues.
    Thanks for sharing your vastly knowledge

  • @techlearner4806
    @techlearner4806 ปีที่แล้ว

    27:02 ▶ Ping and Wireshark demo. This part made my day. Best ever explanation I found on this concept. Thanks to you both 👍👍

  • @jonathantx
    @jonathantx 2 ปีที่แล้ว +14

    Excellent content, Thanks again for sharing this valuable knowledge specially for newbies like me. I've been working on learning and mastering the fundamentals and this material makes it possible. Thanks Again.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +2

      Great to hear that! You're welcome!

  • @smanolito
    @smanolito 2 ปีที่แล้ว +1

    Brilliant video. thanks guys. An hour with you guys and I learnt more than when I spend a year with my manager.

  • @nilmega
    @nilmega 2 ปีที่แล้ว +4

    Guys, this stuff is awesome. More videos, please, and continue this great work you guys are doing.

  • @techieadam5031
    @techieadam5031 ปีที่แล้ว

    If anyone is confused when Chris is explaining about ping capping at 1472 bytes because you have the IP and ICMP headers on top, but wondering what happened to the TCP header that he was talking about earlier in the video and why that isn't subtracted, remember that ICMP is a completely different L4 protocol. Hence in this example we do not need to take into account the 20 byte TCP header, just the ICMP and IP headers.
    Layer 4 - UDP, TCP, ICMP

  • @jacobhenriksen2324
    @jacobhenriksen2324 2 ปีที่แล้ว

    Nothing better than waking up, grabbing a cup of coffee and watch David and Chris talk about networking for an hour. Absolute fantastic content!

  • @mk-or8nm
    @mk-or8nm 2 ปีที่แล้ว

    you two are like ... superman meets batman, no fighting though, only starting Justice League right away. Thanks for a great video.

  • @sunnyzheng7511
    @sunnyzheng7511 ปีที่แล้ว

    David combines real war story to explain the symptoms we will experience if we have MTU and MSS issue. that is cool. Connects the theory with real life. More war stories please, that makes technical video more interesting.

  • @juanrebella2589
    @juanrebella2589 2 ปีที่แล้ว

    Thanks, David. This hour lesson had so much information that I had to watch in slow-mode and analyse it for about 7 days! true gold.
    Thanks again and I am subscribing to Chris' channel as well.
    Have a great day.

  • @touchdown74
    @touchdown74 2 ปีที่แล้ว +1

    Excellent topic!! Reminding me why a Tunnel wasn't created however both routers were able to ping each other. Adjust for the overhead data

  • @chekov6668
    @chekov6668 2 ปีที่แล้ว

    Videos with Chris and you will never get to long! Great to watch and thanks for sharing your knowlege

  • @albertsamuel7090
    @albertsamuel7090 2 ปีที่แล้ว

    Hi David & Chris,
    Thank you for sharing your experience and knowledge. Now I understand why MTU & MSS-adjust commands are used in the mGRE tunnels comes into play.
    Thanks alot guys and i can't wait to see you twos in your next collaboration.
    Cheers! 🇵🇬

  • @Xotty
    @Xotty 2 ปีที่แล้ว

    New video with Chris! Yessss! Thank you David for keep bringing him back.

  • @jerekyox
    @jerekyox 2 ปีที่แล้ว

    I so needed this! For those of us who have spent days to tshoot an MTU issue.

  • @alaaroumeeh2752
    @alaaroumeeh2752 2 ปีที่แล้ว

    Such Chris-David videos are the best thing happened in 2022. Keep it up⁦❤️⁩

  • @MrBitviper
    @MrBitviper 2 ปีที่แล้ว

    it's always a treat when chris comes over for one of these deep dive videos
    thanks David for the great content. much appreciated

  • @djdawso
    @djdawso 2 ปีที่แล้ว +5

    Wow, David! What a blast from the past! That Cisco MTU/MSS white paper you showed a clip of was my "go to" doc for many years for helping to explain fragmentation issues to customers and peers alike. I still have the link to it in my bookmarks, since you never know when MTU's are gonna raise their ugly heads! As a long-time CCIE (#1937 just over 26 years ago) your content is refreshingly good!

  • @JBNetwork
    @JBNetwork 2 ปีที่แล้ว

    Wow! Thanks crystal clear for me! i had some cloudy areas on this topic and now its clear. Amazingly explained. Thanks again to both of you.

  • @ehcankur
    @ehcankur 2 ปีที่แล้ว +12

    We need time with Chris to get learn more about the packets, that transmit everything ..Great knowledge on handling the payload in defined mtu

  • @faran_siddiqui-d3t
    @faran_siddiqui-d3t 2 ปีที่แล้ว +3

    David and Chris .. dropping dope content like never before 🔥🔥🔥🔥💯💯💯

  • @yatharthsharma7442
    @yatharthsharma7442 11 หลายเดือนก่อน

    This was an amazing session! The clarity of thought and concept is too good and helpful !! I owe you guys !😇

  • @vyasG
    @vyasG 2 ปีที่แล้ว

    Thank you both for this detailed video. Appreciate the time and effort both put into for this interview! At many places I was lost - if the header bytes should be added or not. Should watch this video at-least twice to comprehend the depth of knowledge that this video contains. Pls continue your interviews with Chris. Absolutely love them and learning a lot from them. Looking forward for more Wireshark deep dive videos.

  • @Azy_Azhar
    @Azy_Azhar 2 ปีที่แล้ว

    Awesome guys, you guys made my day..First time watching a long video of yours, I hope this will help a lot. Thanks, Chris and David for teaching new kinds of stuff in TS.

  • @cyphodias1640
    @cyphodias1640 2 ปีที่แล้ว +1

    1:06:37 Yes please let’s get into the weeds. Great content as always from you and Chris. Thanks so much. 👍

  • @zoranzasovski
    @zoranzasovski 2 ปีที่แล้ว

    Great episode David and Chris. The way Chris explains the topics is just amazing! Can't wait for the sequel.

  • @nessd665
    @nessd665 2 ปีที่แล้ว +2

    Man this is gold, I'd love to see that video about 10Gpbs and 100Gbps connections and MTU tweaking, I happen to work at a service provider and there are so many customers out there that complain about running speed test on 10Gbps links while using laptops and not getting to the right speeds, of course at times there are more issues in the middle that can produce such outcome but most of the time is just either speed and duplex or MTU on the PE side that may cause things of that nature, at least in my experience.

    • @emirelezovic1574
      @emirelezovic1574 2 ปีที่แล้ว +2

      Having same problem as you, but commonly laptops are coming capped to 1Gbps NIC card, so even incrementing their MTU won't benefit as they won't be able to test above 1gbps.

  • @z0nerider
    @z0nerider 2 ปีที่แล้ว

    Loved the WarStories, loved the vid, keep em comming David & Chris

  • @sidreb7642
    @sidreb7642 2 ปีที่แล้ว

    Thanks guys for your generosity, you’re awesome!

  • @twd3212
    @twd3212 2 ปีที่แล้ว +1

    Really fantastic content. Thank you so much!
    I had network technology and Cisco trainings in my education two times, but it was always boring theory an I thought, it's a hard way to go any deeper in this stuff. But your videos show me, that it's all about good coaches.

  • @warclan5429
    @warclan5429 2 ปีที่แล้ว +1

    Thank you for the review. I ve seen this in the 2000 during ATM implementations and many tunnel and datalinks. it is a great video to review and or learn in a practical matter what you just setup as default as MTU 1500 in your routers. and as you described to know why datalinks are slow when pings show Ips are reachable

  • @micah6465
    @micah6465 ปีที่แล้ว

    I know I’m late to the game but dang this was well explained. Enjoyed all of it! Thank you for making this video!

  • @tenaciousmbob1826
    @tenaciousmbob1826 2 ปีที่แล้ว

    Very educational and good for troubleshooting we need more of Chris

  • @ghanthor
    @ghanthor 2 ปีที่แล้ว

    Great vid. Loving it! Keep taking us down, all the way to the bottom!

  • @202Electrics
    @202Electrics 2 ปีที่แล้ว

    this is teaching 2.0. You can read school books, learn all the commands and theories as much as you can but this is both fun ánd interesting AND you even learning more then ever.
    Thanks guys

  • @ram-gc7gl
    @ram-gc7gl 10 หลายเดือนก่อน

    awww you guys are such a cool duo! enjoyed watching videos with you both

  • @hackingnut4164
    @hackingnut4164 2 ปีที่แล้ว

    I love learning with you guys. Maybe there is something slow in my brain, but I need to watch these more than once.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Glad you are enjoying the content. This is a deep dive - so you may need to watch it a few times as we cover a lot of information.

  • @James_Knott
    @James_Knott 2 ปีที่แล้ว +1

    One point about the Don't Fragment flag. Windows only sets it on TCP, but Linux does it for everything, IIRC. This can lead to a situation with Windows where TCP works fine, but there may be problems with UDP. On the other hand, Linux will not experience the UDP problem. Also, Path MTU Discovery is mandatory with IPv6, as fragmentation is not allowed.

  • @chaithanyakatari7896
    @chaithanyakatari7896 2 ปีที่แล้ว

    Finally, after a longtime looking for a right video for interviews

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      It's taken too long :) But, hope you enjoy the video!

    • @chaithanyakatari7896
      @chaithanyakatari7896 2 ปีที่แล้ว

      @@davidbombal Absolutely it was a fantastic video again.

  • @sergioeduard4422
    @sergioeduard4422 2 ปีที่แล้ว

    Thank you for another great video, always a pleasure to watch 🖤

  • @alaahaider
    @alaahaider 2 ปีที่แล้ว

    Wow, so much details and information. Amazing video. Thank you David

  • @hobbitreal
    @hobbitreal 2 ปีที่แล้ว +1

    Real life TCP/IP, real life MTU, just what our society needs! 👏👏👏

  • @Alain9-1
    @Alain9-1 2 ปีที่แล้ว

    David and Chris are just amazing i've enjoyed every sec

  • @techlearner4806
    @techlearner4806 ปีที่แล้ว

    12:44 Important note. For perfection, system can receive maximum. The reason for that is to avoid fragmentation. As we know, nowadays lots of applications use DF (do not fragment) bit. So, this is the reason to use standard number 1460 bytes.

  • @Obsessedwithcoding
    @Obsessedwithcoding ปีที่แล้ว

    GOOD STUFF. LOVING ALL THE NETWORKING CONTENT

  • @liamobrien1506
    @liamobrien1506 2 ปีที่แล้ว

    Excellent video, been running into this a lot lately in a number of scenarios when replacing branch routers, first thing that breaks is Eap-TLS for wireless, those certificates do not like fragmentation, so have had to adjust MTU in a bunch of places.

  • @jameezybreezy9030
    @jameezybreezy9030 2 ปีที่แล้ว

    We need more of this. There's a lack of affordable and good Wireshark content/courses

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Check the video description for Chris's new Wireshark course on Udemy. That ia both great and affordable.

  • @lxn7404
    @lxn7404 11 หลายเดือนก่อน

    you guys are amazing teachers, thanks for sharing all that for free

  • @mitchellroberson
    @mitchellroberson 2 ปีที่แล้ว

    Awesome video. Confirmed my beliefs and what u have seen. Would like to see a video on pmtud, with mtu, and miss discussion

  • @lanpaule3428
    @lanpaule3428 2 ปีที่แล้ว

    Great video! Learned a lot! Thank you David and Chris!

  • @dden-qz8ym
    @dden-qz8ym 2 ปีที่แล้ว

    Had this issue with MPLS WAN circuits. We ran GRE over the MPLS circuits to carry our own EIGRP routing traffic. We had to do MSS "clamping" to account for the extra overhead from our GRE tunnel. We added another MPLS provider circuit to our headend and had to do the same but with a lower value to those locations using that MPLS provider. All to do with them using space in the TCP header for VLAN/MPLS.

  • @yave4algeria
    @yave4algeria 2 ปีที่แล้ว

    David, I clicked a thumb up before the start of the vidoe

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Thank you very much!

  • @carlb641
    @carlb641 2 ปีที่แล้ว

    This is an awesome topic to deep dive into. Thank you for sharing this, definitely will go and subscribe to Chris' channel.

  • @SirPeterlll
    @SirPeterlll 2 ปีที่แล้ว

    Cool instead of just disabling ipv6 on a router I now know what the reason could be when pages aren't loading on those random clients that uses corporate VPNs. MTU settings, never knew thanks :) Valuable information as always!

  • @nvelchev
    @nvelchev 2 ปีที่แล้ว

    Best explanation heard ever. Thanks a lot.

  • @NickyDekker89
    @NickyDekker89 9 หลายเดือนก่อน

    Chris is a great teacher 👍

  • @cassioOsoares
    @cassioOsoares 2 ปีที่แล้ว

    Thank you David and Chris!

  • @xszleader7887
    @xszleader7887 2 ปีที่แล้ว +1

    great video david ❤️

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      Thanks! Glad the video helped :)

  • @zia_g7
    @zia_g7 2 ปีที่แล้ว +2

    I already have experienced this in a large prod. environmen network where too much packet drops were coming and finally we were able to figure out the root cause to be the MTU size.
    Gr8 video.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Thank you and thank you for sharing Zia! MTU can be an absolute nightmare!

    • @zia_g7
      @zia_g7 2 ปีที่แล้ว

      @@davidbombal It happened on a Fortigate firewall, and after 2 days of troubleshooting and banging our heads and involving their tech support, this was identified. But still, no one was still able to identify where the MTU was getting changed in the packets complete path.
      I hope this video will be a good starting point for many.
      Kudos, and please keep up the good work!

    • @zia_g7
      @zia_g7 2 ปีที่แล้ว +1

      Also there's an open source tool called mturoute which will return you the max possible mtu on the complete packet route.

  • @abhiparay6454
    @abhiparay6454 2 ปีที่แล้ว

    Wow Wow Wow
    All my concepts are clear
    Best ever video
    Thank you so much 💝💝💝

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome Abhi!

  • @TAL74
    @TAL74 2 ปีที่แล้ว

    Very nice!! I love it . Thanks for all the great content 💎

  • @pafooo1043
    @pafooo1043 2 ปีที่แล้ว

    WOW ! Grest video, thank you both so much, I just want more 👍🏼

  • @ahadislamshanto5478
    @ahadislamshanto5478 2 ปีที่แล้ว

    Other tubers would tell you about MTU ping & fragmentation, just crank is down or make it higher. But none explain like chris ❤️

  • @jamespostlethwaite7799
    @jamespostlethwaite7799 2 ปีที่แล้ว

    This is just ridiculously good content. Thank you

  • @amitpatil1900
    @amitpatil1900 2 ปีที่แล้ว

    Excellent content, Thank you both of you!! Love to learn more..Waiting for next.

  • @coldham77
    @coldham77 2 ปีที่แล้ว

    Great discussion and I learned about jumbo packets. Thanks David! I really enjoy your show.

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว

      You're welcome! Glad you enjoyed it!

  • @peterpt4264
    @peterpt4264 2 ปีที่แล้ว

    As always , great videos with a lot of explanation . Thank you for going into detail of TCP communication .

  • @random5107
    @random5107 ปีที่แล้ว +1

    Good job guys, keep it up.

  • @CyberDevilSec
    @CyberDevilSec 2 ปีที่แล้ว

    Hi David after i finish up my video about the pure basics for computers in my mission to join the IT teaching community i will watch the full intervieuw :)

  • @robertroy1878
    @robertroy1878 2 ปีที่แล้ว +1

    More!? Of course we want more!

  • @Halomaster4ever
    @Halomaster4ever 2 ปีที่แล้ว

    Excellent topic - a subject that I often revisit, especially dealing with VPNs.

  • @hoomanhu
    @hoomanhu 2 ปีที่แล้ว

    Great Video David! Pretty awesome series for understanding TCP. Just one question though, are you planning on releasing more videos in the series? These videos are a great help and would love to know if we have more coming.
    Anyways, thanks for all the content. Cheers :)

  • @aniketsharma7333
    @aniketsharma7333 2 ปีที่แล้ว +2

    Networking is back 😀❤️

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Networking will never go away :)

  • @pope1089
    @pope1089 4 หลายเดือนก่อน

    Right time to sort my router out once and for all. Great video

  • @Solo_Cyclebaaz
    @Solo_Cyclebaaz 8 วันที่ผ่านมา

    Great video David sir ...🎉

  • @drbabbers
    @drbabbers 2 ปีที่แล้ว

    Superb! Really enjoyed this thanks guys 😎

  • @rooster3592
    @rooster3592 2 ปีที่แล้ว

    Yeah I'd like to go as deep down this rabbit hole as possible.

  • @franchise2570
    @franchise2570 2 ปีที่แล้ว +1

    Great video guys. Something is throwing me off, around the 33:22 mark when you're doing a 1472 df ping and it's replying at 1480, but Wireshark is capturing only 1464 for data + 8 for ICMP. Aren't we missing 8 bytes somewhere?

    • @Racso5
      @Racso5 ปีที่แล้ว +1

      I noticed this discrepancy too, so I did some research to identify the answer: There is an 8-byte 'Timestamp' field shown by Wireshark right above the 'Data' payload section. This 'Timestamp' field is technically part of the ICMP payload, but is distinguished from the random data portion of the ICMP payload that is shown inside the 'Data' payload section.
      You can see this for yourself by reproducing the ping + capture test demonstrated in the video; as you select each field of the ICMP header within the 'Packet Details' panel, pay attention to the highlighted characters within the 'Packet Bytes' panel - each individual character in this panel represents a single byte. Alternatively, the status bar located at the bottom left of the Wireshark application window contains a field description that also includes the byte size of the field.
      By performing this exercise you can manually add up 8 total bytes of header + 8 total bytes of the Timestamp payload data + the 1464 bytes of random payload data, which equals 1480. And then of course you just add the 20 bytes from the IP header to get the total Ethernet MTU size of 1500 bytes.

  • @sobevj
    @sobevj 2 ปีที่แล้ว

    the bridge explanation is so vivid :D

  • @mikkio5371
    @mikkio5371 ปีที่แล้ว

    A video for all networks engr . Weldone guys

  • @gorge5412
    @gorge5412 2 ปีที่แล้ว +1

    Well done, gentlemen. Thank you for providing all the links! Sad to say I only have one lifetime to come up to speed on all this.
    Uh, dumb Q: How to WS an intermediate router? Is that possible?
    .

  • @jos3366
    @jos3366 2 ปีที่แล้ว

    Really love this. Thanks David!

  • @MrFRankor
    @MrFRankor 2 ปีที่แล้ว

    I love this deep dive!!

  • @hunkdahunk
    @hunkdahunk 2 ปีที่แล้ว

    God bless you both! It was educational! Thank you and best regards!

  • @landrover827
    @landrover827 2 ปีที่แล้ว

    I’ve always wondered how this worked! Thanks!

    • @davidbombal
      @davidbombal  2 ปีที่แล้ว +1

      Hope you enjoy the video :)

  • @miloslukic5171
    @miloslukic5171 2 ปีที่แล้ว

    Awesome video, really educational, love it!