zoukankan      html  css  js  c++  java
  • tcpdump win

    
     win window
    
    win--就是告诉对方自己能接受多大的数据。
    
    Window is the number of bytes of receive buffer space available the other direction on this connection.
    
    import socket
    import time
    s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
    SEND_BUF_SIZE = 13
    RECV_BUF_SIZE = 19
    s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
    s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
    s.setsockopt( socket.SOL_SOCKET, socket.SO_SNDBUF, SEND_BUF_SIZE)
    s.setsockopt( socket.SOL_SOCKET, socket.SO_RCVBUF, RECV_BUF_SIZE)
    print s.getsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF)
    print s.getsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF)
    
    
    C:Python27python.exe C:/Users/TLCB/PycharmProjects/untitled2/http/t5.py
    19
    13
    
    RECV_BUF_SIZE 19
    客户端定义SEND_BUF_SIZE 13
    
    
    
    
    
    node1:/root#tcpdump -S -i eth1 '((tcp) and  (port 8080) and (host 192.168.137.1))'
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
    05:47:27.887156 IP 192.168.137.1.56605 > node1.webcache: Flags [S], seq 476814817, win 19, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
    05:47:27.887200 IP node1.webcache > 192.168.137.1.56605: Flags [S.], seq 2829851870, ack 476814818, win 1536, options [mss 256,nop,nop,sackOK,nop,wscale 6], length 0
    05:47:27.887384 IP 192.168.137.1.56605 > node1.webcache: Flags [.], ack 2829851871, win 4, length 0
    
    
    05:47:27.889388 IP 192.168.137.1.56605 > node1.webcache: Flags [P.], seq 476814818:476814823, ack 2829851871, win 4, length 5
    05:47:27.889858 IP node1.webcache > 192.168.137.1.56605: Flags [.], ack 476814823, win 24, length 0
    05:47:27.890020 IP node1.webcache > 192.168.137.1.56605: Flags [P.], seq 2829851871:2829851885, ack 476814823, win 24, length 14
    05:47:27.890227 IP 192.168.137.1.56605 > node1.webcache: Flags [R.], seq 476814823, ack 2829851885, win 0, length 0
    
    
    查看wireshark:

  • 相关阅读:
    Python-02 基础语法
    Python-01 基础语法
    windows端口被占用-解决方案
    vue两个独立的组件之间的传值通信
    URI
    Inversion of control
    7月10日每日总结
    7月9日每日总结
    xshell终端设置主机名和用户名颜色
    PyTorch中一些损失函数的使用
  • 原文地址:https://www.cnblogs.com/hzcya1995/p/13348538.html
Copyright © 2011-2022 走看看