C:\Python27\python.exe C:/Users/TLCB/PycharmProjects/untitled2/http/t2.py
('192.168.137.1', 50606)
('192.168.137.2', 8080)
9317
response:1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111
node1:/root#tcpdump -S -i eth1 '((tcp) and (port 8080) )'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
01:41:07.046199 IP 192.168.137.1.50606 > node1.webcache: Flags [S], seq 1199093012, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
01:41:07.046231 IP node1.webcache > 192.168.137.1.50606: Flags [S.], seq 1891105553, ack 1199093013, win 2560, options [mss 256,nop,nop,sackOK,nop,wscale 6], length 0
01:41:07.046366 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891105554, win 16482, length 0
01:41:07.047465 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199093013:1199093549, ack 1891105554, win 16482, length 536
01:41:07.047474 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199093549:1199094085, ack 1891105554, win 16482, length 536
01:41:07.047872 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199093549, win 57, length 0
01:41:07.047960 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199094085:1199094621, ack 1891105554, win 16482, length 536
01:41:07.047963 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199094621:1199095157, ack 1891105554, win 16482, length 536
01:41:07.047971 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199094085, win 74, length 0
01:41:07.048038 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199095157:1199095693, ack 1891105554, win 16482, length 536
01:41:07.048041 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199095693:1199096229, ack 1891105554, win 16482, length 536
01:41:07.048052 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199094621, win 91, length 0
01:41:07.048123 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199095157, win 107, length 0
01:41:07.048172 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199095693, win 124, length 0
01:41:07.048220 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199096229, win 141, length 0
01:41:07.048266 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199096229:1199096765, ack 1891105554, win 16482, length 536
01:41:07.048270 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199096765, win 158, length 0
01:41:07.048333 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199096765:1199097301, ack 1891105554, win 16482, length 536
01:41:07.048341 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199097301, win 174, length 0
01:41:07.048385 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199097301:1199097837, ack 1891105554, win 16482, length 536
01:41:07.048388 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199097837, win 191, length 0
01:41:07.048414 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199097837:1199098373, ack 1891105554, win 16482, length 536
01:41:07.048417 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199098373, win 208, length 0
01:41:07.048442 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199098373:1199098909, ack 1891105554, win 16482, length 536
01:41:07.048445 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199098909, win 225, length 0
01:41:07.048468 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199098909:1199099445, ack 1891105554, win 16482, length 536
01:41:07.048471 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199099445, win 241, length 0
01:41:07.048494 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199099445:1199099981, ack 1891105554, win 16482, length 536
01:41:07.048497 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199099981, win 258, length 0
01:41:07.048520 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199099981:1199100517, ack 1891105554, win 16482, length 536
01:41:07.048523 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199100517, win 275, length 0
01:41:07.048546 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199100517:1199101053, ack 1891105554, win 16482, length 536
01:41:07.048551 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199101053, win 292, length 0
01:41:07.048577 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199101053:1199101589, ack 1891105554, win 16482, length 536
01:41:07.048580 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199101589, win 308, length 0
01:41:07.048609 IP 192.168.137.1.50606 > node1.webcache: Flags [.], seq 1199101589:1199102125, ack 1891105554, win 16482, length 536
01:41:07.048613 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199102125, win 325, length 0
01:41:07.048639 IP 192.168.137.1.50606 > node1.webcache: Flags [P.], seq 1199102125:1199102330, ack 1891105554, win 16482, length 205
01:41:07.048643 IP node1.webcache > 192.168.137.1.50606: Flags [.], ack 1199102330, win 342, length 0
01:41:07.048784 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891105554:1891106066, ack 1199102330, win 342, length 512
01:41:07.048911 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106066, win 16354, length 0
01:41:07.048925 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891106066:1891106578, ack 1199102330, win 342, length 512
01:41:07.049013 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106578, win 16482, length 0
01:41:07.049023 IP node1.webcache > 192.168.137.1.50606: Flags [P.], seq 1891106578:1891106587, ack 1199102330, win 342, length 9
01:41:07.049174 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891106587:1891107099, ack 1199102330, win 342, length 512
01:41:07.049272 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891106843, win 16415, length 0
01:41:07.049282 IP node1.webcache > 192.168.137.1.50606: Flags [.], seq 1891107099:1891107611, ack 1199102330, win 342, length 512
01:41:07.049382 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891107355, win 16482, length 0
01:41:07.049396 IP node1.webcache > 192.168.137.1.50606: Flags [P.], seq 1891107611:1891107620, ack 1199102330, win 342, length 9
01:41:07.049472 IP 192.168.137.1.50606 > node1.webcache: Flags [.], ack 1891107620, win 16415, length 0
01:41:07.050216 IP 192.168.137.1.50606 > node1.webcache: Flags [R.], seq 1199102330, ack 1891107620, win 0, length 0
tcp 窗口大小
转载本文章为转载内容,我们尊重原作者对文章享有的著作权。如有内容错误或侵权问题,欢迎原作者联系我们进行内容更正或删除文章。
上一篇:各种开源协议介绍
下一篇:为什么视频用udp不用tcp
提问和评论都可以,用心的回复会被更多人看到
评论
发布评论
相关文章
-
终极串口接收方式,极致效率
串口终极接收方式,你值得拥有!!!
数据 缓存 串口