<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Duplicate TCP acks in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831076#M581256</link>
    <description>Output from netstat -s on the system.&lt;BR /&gt;&lt;BR /&gt;tcp:&lt;BR /&gt;        654339 packets sent&lt;BR /&gt;                365738 data packets (931324376 bytes)&lt;BR /&gt;                61 data packets (3936 bytes) retransmitted&lt;BR /&gt;                296348 ack-only packets (70079 delayed)&lt;BR /&gt;                0 URG only packets&lt;BR /&gt;                0 window probe packets&lt;BR /&gt;                7826 window update packets&lt;BR /&gt;                126586 control packets&lt;BR /&gt;        756438 packets received&lt;BR /&gt;                233790 acks (for 931340985 bytes)&lt;BR /&gt;                7443 duplicate acks&lt;BR /&gt;                0 acks for unsent data&lt;BR /&gt;                528802 packets (1229001953 bytes) received in-sequence&lt;BR /&gt;                0 completely duplicate packets (0 bytes)&lt;BR /&gt;                0 packets with some dup, data (0 bytes duped)&lt;BR /&gt;                0 out of order packets (0 bytes)&lt;BR /&gt;                0 packets (0 bytes) of data after window&lt;BR /&gt;                39 window probes&lt;BR /&gt;                502329 window update packets&lt;BR /&gt;                114 packets received after close&lt;BR /&gt;                2 segments discarded for bad checksum&lt;BR /&gt;                0 bad TCP segments dropped due to state change&lt;BR /&gt;        5224 connection requests&lt;BR /&gt;        6805 connection accepts&lt;BR /&gt;        12029 connections established (including accepts)&lt;BR /&gt;        12543 connections closed (including 558 drops)&lt;BR /&gt;        12 embryonic connections dropped&lt;BR /&gt;        216403 segments updated rtt (of 216403 attempts)&lt;BR /&gt;        37 retransmit timeouts&lt;BR /&gt;                0 connections dropped by rexmit timeout&lt;BR /&gt;        0 persist timeouts&lt;BR /&gt;        6170 keepalive timeouts&lt;BR /&gt;                6034 keepalive probes sent&lt;BR /&gt;                2 connections dropped by keepalive&lt;BR /&gt;        0 connect requests dropped due to full queue&lt;BR /&gt;        97040 connect requests dropped due to no listener&lt;BR /&gt;udp:&lt;BR /&gt;        0 incomplete headers&lt;BR /&gt;        0 bad checksums&lt;BR /&gt;        0 socket overflows&lt;BR /&gt;ip:&lt;BR /&gt;        649345 total packets received&lt;BR /&gt;        0 bad IP headers&lt;BR /&gt;        5846 fragments received&lt;BR /&gt;        0 fragments dropped (dup or out of space)&lt;BR /&gt;        0 fragments dropped after timeout&lt;BR /&gt;        0 packets forwarded&lt;BR /&gt;        0 packets not forwardable&lt;BR /&gt;icmp:&lt;BR /&gt;        15033 calls to generate an ICMP error message&lt;BR /&gt;        0 ICMP messages dropped&lt;BR /&gt;        Output histogram:&lt;BR /&gt;         echo reply: 15031&lt;BR /&gt;         destination unreachable: 2&lt;BR /&gt;         source quench: 0&lt;BR /&gt;         routing redirect: 0&lt;BR /&gt;         echo: 0&lt;BR /&gt;         time exceeded: 0&lt;BR /&gt;         parameter problem: 0&lt;BR /&gt;         time stamp: 0&lt;BR /&gt;         time stamp reply: 0&lt;BR /&gt;         address mask request: 0&lt;BR /&gt;         address mask reply: 0&lt;BR /&gt;        0 bad ICMP messages&lt;BR /&gt;        Input histogram:&lt;BR /&gt;         echo reply: 23&lt;BR /&gt;         destination unreachable: 4&lt;BR /&gt;         source quench: 0&lt;BR /&gt;         routing redirect: 0&lt;BR /&gt;         echo: 15031&lt;BR /&gt;         time exceeded: 0&lt;BR /&gt;         parameter problem: 0&lt;BR /&gt;         time stamp request: 0&lt;BR /&gt;         time stamp reply: 0&lt;BR /&gt;         address mask request: 0&lt;BR /&gt;         address mask reply: 0&lt;BR /&gt;        15031 responses sent&lt;BR /&gt;igmp:&lt;BR /&gt;        0 messages received&lt;BR /&gt;        0 messages received with too few bytes&lt;BR /&gt;        0 messages received with bad checksum&lt;BR /&gt;        0 membership queries received&lt;BR /&gt;        0 membership queries received with incorrect fields(s)&lt;BR /&gt;        0 membership reports received&lt;BR /&gt;        0 membership reports received with incorrect field(s)&lt;BR /&gt;        0 membership reports received for groups to which this host belongs&lt;BR /&gt;        0 membership reports sent&lt;BR /&gt;&lt;BR /&gt;I am trying to speed up an use case in our application where the client using a browser and uploads large sized PDF files to the Webserver.&lt;BR /&gt;&lt;BR /&gt;Since there is no data being send back from the server to the client while uploading the file, I am assuming that the ack for the data recieved from the client is just sitting on the server since tcp piggy backing of acks, the ack gets back to the client only when the timer goes off...&lt;BR /&gt;&lt;BR /&gt;While conducting tests, we eliminated all net gear, the client and the server are in the same subnet. &lt;BR /&gt;&lt;BR /&gt;Thanx Ron</description>
    <pubDate>Wed, 23 Oct 2002 21:05:11 GMT</pubDate>
    <dc:creator>Dhilip Krishnan</dc:creator>
    <dc:date>2002-10-23T21:05:11Z</dc:date>
    <item>
      <title>Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831072#M581252</link>
      <description>Pls take a look at the tcp dump file attached.&lt;BR /&gt;I have noticed dumplcate acks from both the client(Win 2K - 10.1.1.13) as well as the server(HPUX 11.0 - ccux09.c2.cv.hp.com)&lt;BR /&gt;&lt;BR /&gt;Things we tried include:&lt;BR /&gt;Turning off SACK, the seldom mentioned, undocumented TCP extension.&lt;BR /&gt;Changing buffer sizes.&lt;BR /&gt;eliminating net gear (routers, CSS, etc.)&lt;BR /&gt;&lt;BR /&gt;Why is the server acking over and over?&lt;BR /&gt;</description>
      <pubDate>Tue, 22 Oct 2002 16:38:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831072#M581252</guid>
      <dc:creator>Dhilip Krishnan</dc:creator>
      <dc:date>2002-10-22T16:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831073#M581253</link>
      <description>The server is just telling you that a packet got dropped.  Each time it receives a packet that is not the one it is looking for it will ack with the number from the packet it is expecting.&lt;BR /&gt;Depending on the local implementation of TCP/IP it may hold on to what it considers to be out of order packets until it receives the missing one (or the timer expires) or it may just drop it right away.&lt;BR /&gt;&lt;BR /&gt;What does your network look like?  Check your WAN links for dropped or damaged packets.  If there is more than one route to the other end make sure the routers are not trying to do per packet load sharing on unequal speed links.&lt;BR /&gt;&lt;BR /&gt;Check &lt;BR /&gt;lanadmin&lt;BR /&gt;lan&lt;BR /&gt;display&lt;BR /&gt;for errors.&lt;BR /&gt;&lt;BR /&gt;check &lt;BR /&gt;netstat -s&lt;BR /&gt;&lt;BR /&gt;Believe there was a patch to correct improper handling of out of order packets so make sure you have the latest network patches for your OS.&lt;BR /&gt;&lt;BR /&gt;Ron</description>
      <pubDate>Wed, 23 Oct 2002 13:57:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831073#M581253</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2002-10-23T13:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831074#M581254</link>
      <description>Ron,&lt;BR /&gt;Thanx for your response.&lt;BR /&gt;We seem to have a workaround for the problem mentioned above.&lt;BR /&gt;&lt;BR /&gt;I changed &lt;BR /&gt;&lt;BR /&gt;ndd -get /dev/tcp tcp_deferred_ack_interval which returns 50 &lt;BR /&gt;&lt;BR /&gt;to &lt;BR /&gt;&lt;BR /&gt;ndd -set /dev/tcp tcp_deferred_ack_interval 1&lt;BR /&gt;&lt;BR /&gt;and booom the server sucked the file from the client as fast as pissible.&lt;BR /&gt; &lt;BR /&gt;This setting seems to have solved the problem. Will conduct more tcpdump sessions to see how this parameter made the difference.&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Oct 2002 17:39:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831074#M581254</guid>
      <dc:creator>Dhilip Krishnan</dc:creator>
      <dc:date>2002-10-23T17:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831075#M581255</link>
      <description>The delayed ack messes up the calculation of the round trip delay so that retransmissions interval is increased more than really necessary.  By reducing it I expect you are speeding up the retransmissions of lost acks and masking your problem.&lt;BR /&gt;&lt;BR /&gt;This is what RFC 1122 says about delayed acks:&lt;BR /&gt;(&lt;A href="ftp://nic.merit.edu/internet/documents/rfc/rfc1122.txt)" target="_blank"&gt;ftp://nic.merit.edu/internet/documents/rfc/rfc1122.txt)&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;4.2.3.2  When to Send an ACK Segment&lt;BR /&gt; &lt;BR /&gt;            A host that is receiving a stream of TCP data segments can increase efficiency in both the internet and the hosts by     sending fewer than one ACK (acknowledgment) segment per data segment received; this is known as a "delayed ACK" [TCP:5].&lt;BR /&gt; &lt;BR /&gt;            A TCP SHOULD implement a delayed ACK, but an ACK should not be excessively delayed; in particular, the delay MUST be&lt;BR /&gt;less than 0.5 seconds, and in a stream of full-sized segments there SHOULD be an ACK for at least every second&lt;BR /&gt;            segment.&lt;BR /&gt; &lt;BR /&gt;            DISCUSSION:&lt;BR /&gt; &lt;BR /&gt;    A delayed ACK gives the application an opportunity to&lt;BR /&gt;update the window and perhaps to send an immediate response.  In particular, in the case of character-mode remote login, a delayed ACK can reduce the number of segments sent by the server by a factor of 3 (ACK, window update, and echo character all combined in one segment).&lt;BR /&gt; &lt;BR /&gt;In addition, on some large multi-user hosts, a delayed&lt;BR /&gt;ACK can substantially reduce protocol processing overhead by reducing the total number of packets to be processed [TCP:5].  However, excessive delays on ACK's can disturb the round-trip timing and packet "clocking" algorithms [TCP:7].&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt; &lt;BR /&gt;</description>
      <pubDate>Wed, 23 Oct 2002 20:29:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831075#M581255</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2002-10-23T20:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831076#M581256</link>
      <description>Output from netstat -s on the system.&lt;BR /&gt;&lt;BR /&gt;tcp:&lt;BR /&gt;        654339 packets sent&lt;BR /&gt;                365738 data packets (931324376 bytes)&lt;BR /&gt;                61 data packets (3936 bytes) retransmitted&lt;BR /&gt;                296348 ack-only packets (70079 delayed)&lt;BR /&gt;                0 URG only packets&lt;BR /&gt;                0 window probe packets&lt;BR /&gt;                7826 window update packets&lt;BR /&gt;                126586 control packets&lt;BR /&gt;        756438 packets received&lt;BR /&gt;                233790 acks (for 931340985 bytes)&lt;BR /&gt;                7443 duplicate acks&lt;BR /&gt;                0 acks for unsent data&lt;BR /&gt;                528802 packets (1229001953 bytes) received in-sequence&lt;BR /&gt;                0 completely duplicate packets (0 bytes)&lt;BR /&gt;                0 packets with some dup, data (0 bytes duped)&lt;BR /&gt;                0 out of order packets (0 bytes)&lt;BR /&gt;                0 packets (0 bytes) of data after window&lt;BR /&gt;                39 window probes&lt;BR /&gt;                502329 window update packets&lt;BR /&gt;                114 packets received after close&lt;BR /&gt;                2 segments discarded for bad checksum&lt;BR /&gt;                0 bad TCP segments dropped due to state change&lt;BR /&gt;        5224 connection requests&lt;BR /&gt;        6805 connection accepts&lt;BR /&gt;        12029 connections established (including accepts)&lt;BR /&gt;        12543 connections closed (including 558 drops)&lt;BR /&gt;        12 embryonic connections dropped&lt;BR /&gt;        216403 segments updated rtt (of 216403 attempts)&lt;BR /&gt;        37 retransmit timeouts&lt;BR /&gt;                0 connections dropped by rexmit timeout&lt;BR /&gt;        0 persist timeouts&lt;BR /&gt;        6170 keepalive timeouts&lt;BR /&gt;                6034 keepalive probes sent&lt;BR /&gt;                2 connections dropped by keepalive&lt;BR /&gt;        0 connect requests dropped due to full queue&lt;BR /&gt;        97040 connect requests dropped due to no listener&lt;BR /&gt;udp:&lt;BR /&gt;        0 incomplete headers&lt;BR /&gt;        0 bad checksums&lt;BR /&gt;        0 socket overflows&lt;BR /&gt;ip:&lt;BR /&gt;        649345 total packets received&lt;BR /&gt;        0 bad IP headers&lt;BR /&gt;        5846 fragments received&lt;BR /&gt;        0 fragments dropped (dup or out of space)&lt;BR /&gt;        0 fragments dropped after timeout&lt;BR /&gt;        0 packets forwarded&lt;BR /&gt;        0 packets not forwardable&lt;BR /&gt;icmp:&lt;BR /&gt;        15033 calls to generate an ICMP error message&lt;BR /&gt;        0 ICMP messages dropped&lt;BR /&gt;        Output histogram:&lt;BR /&gt;         echo reply: 15031&lt;BR /&gt;         destination unreachable: 2&lt;BR /&gt;         source quench: 0&lt;BR /&gt;         routing redirect: 0&lt;BR /&gt;         echo: 0&lt;BR /&gt;         time exceeded: 0&lt;BR /&gt;         parameter problem: 0&lt;BR /&gt;         time stamp: 0&lt;BR /&gt;         time stamp reply: 0&lt;BR /&gt;         address mask request: 0&lt;BR /&gt;         address mask reply: 0&lt;BR /&gt;        0 bad ICMP messages&lt;BR /&gt;        Input histogram:&lt;BR /&gt;         echo reply: 23&lt;BR /&gt;         destination unreachable: 4&lt;BR /&gt;         source quench: 0&lt;BR /&gt;         routing redirect: 0&lt;BR /&gt;         echo: 15031&lt;BR /&gt;         time exceeded: 0&lt;BR /&gt;         parameter problem: 0&lt;BR /&gt;         time stamp request: 0&lt;BR /&gt;         time stamp reply: 0&lt;BR /&gt;         address mask request: 0&lt;BR /&gt;         address mask reply: 0&lt;BR /&gt;        15031 responses sent&lt;BR /&gt;igmp:&lt;BR /&gt;        0 messages received&lt;BR /&gt;        0 messages received with too few bytes&lt;BR /&gt;        0 messages received with bad checksum&lt;BR /&gt;        0 membership queries received&lt;BR /&gt;        0 membership queries received with incorrect fields(s)&lt;BR /&gt;        0 membership reports received&lt;BR /&gt;        0 membership reports received with incorrect field(s)&lt;BR /&gt;        0 membership reports received for groups to which this host belongs&lt;BR /&gt;        0 membership reports sent&lt;BR /&gt;&lt;BR /&gt;I am trying to speed up an use case in our application where the client using a browser and uploads large sized PDF files to the Webserver.&lt;BR /&gt;&lt;BR /&gt;Since there is no data being send back from the server to the client while uploading the file, I am assuming that the ack for the data recieved from the client is just sitting on the server since tcp piggy backing of acks, the ack gets back to the client only when the timer goes off...&lt;BR /&gt;&lt;BR /&gt;While conducting tests, we eliminated all net gear, the client and the server are in the same subnet. &lt;BR /&gt;&lt;BR /&gt;Thanx Ron</description>
      <pubDate>Wed, 23 Oct 2002 21:05:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831076#M581256</guid>
      <dc:creator>Dhilip Krishnan</dc:creator>
      <dc:date>2002-10-23T21:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Duplicate TCP acks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831077#M581257</link>
      <description>What does the other end's netstat -s say?&lt;BR /&gt;&lt;BR /&gt;Ron</description>
      <pubDate>Thu, 24 Oct 2002 00:24:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/duplicate-tcp-acks/m-p/2831077#M581257</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2002-10-24T00:24:47Z</dc:date>
    </item>
  </channel>
</rss>

