java - TCP packet TSval, TSecr - Stack Overflow

My application is creating a connection to Redis and using redis to store keyvalue. I am using lettuce

My application is creating a connection to Redis and using redis to store key/value. I am using lettuce library.

I took packet capture / wireshark on my application.

I saw one packet (from application to redis ) and could not understand who is sending it either lettuce or OS ?

I am seeing some slowness ( 30-70 millisecond ) to send command to redis when this ACK is happening. Is there any way to stop it ?

Below is the packet details . I copied it from wireshark.

75973   2025-03-21 18:51:07.914 10.32.13.202    10.32.13.211    TCP 68  3714 → 6379 [ACK] Seq=78850 Ack=7724 Win=58 Len=0 TSval=2556602378 TSecr=779563942

Frame 75973: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
    Encapsulation type: Linux cooked-mode capture v1 (25)
    Arrival Time: Mar 22, 2025 00:21:07.914380000 India Standard Time
    UTC Arrival Time: Mar 21, 2025 18:51:07.914380000 UTC
    Epoch Arrival Time: 1742583067.914380000
    [Time shift for this packet: 0.000000000 seconds]
    [Time delta from previous captured frame: 0.000122000 seconds]
    [Time delta from previous displayed frame: 0.040982000 seconds]
    [Time since reference or first frame: 9.318908000 seconds]
    Frame Number: 75973
    Frame Length: 68 bytes (544 bits)
    Capture Length: 68 bytes (544 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: sll:ethertype:ip:tcp]
    [Coloring Rule Name: TCP]
    [Coloring Rule String: tcp]
Linux cooked capture v1
    Packet type: Sent by us (4)
    Link-layer address type: Ethernet (1)
    Link-layer address length: 6
    Source: VMware_8f:c1:bc (00:50:56:8f:c1:bc)
    Unused: 003a
    Protocol: IPv4 (0x0800)
Internet Protocol Version 4, Src: 10.32.13.202, Dst: 10.32.13.211
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    Total Length: 52
    Identification: 0x0544 (1348)
    010. .... = Flags: 0x2, Don't fragment
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 64
    Protocol: TCP (6)
    Header Checksum: 0x0520 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 10.32.13.202
    Destination Address: 10.32.13.211
    [Stream index: 1]
Transmission Control Protocol, Src Port: 3714, Dst Port: 6379, Seq: 78850, Ack: 7724, Len: 0
    Source Port: 3714
    Destination Port: 6379
    [Stream index: 25]
    [Stream Packet Number: 3156]
    [Conversation completeness: Incomplete (12)]
    [TCP Segment Len: 0]
    Sequence Number: 78850    (relative sequence number)
    Sequence Number (raw): 2739616864
    [Next Sequence Number: 78850    (relative sequence number)]
    Acknowledgment Number: 7724    (relative ack number)
    Acknowledgment number (raw): 2040541672
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window: 58
    [Calculated window size: 58]
    [Window size scaling factor: -1 (unknown)]
    Checksum: 0x3087 [unverified]
    [Checksum Status: Unverified]
    Urgent Pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - Timestamps: TSval 2556602378, TSecr 779563942
            Kind: Time Stamp Option (8)
            Length: 10
            Timestamp value: 2556602378
            Timestamp echo reply: 779563942
    [Timestamps]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 75731]
        [The RTT to ACK the segment was: 0.040982000 seconds]

发布者:admin,转转请注明出处:http://www.yc00.com/questions/1744247795a4565021.html

相关推荐

  • java - TCP packet TSval, TSecr - Stack Overflow

    My application is creating a connection to Redis and using redis to store keyvalue. I am using lettuce

    8天前
    10

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信