[netperf-talk] Some question about TCP_RR test

Hangbin Liu haliu at redhat.com
Fri Jul 22 02:47:04 PDT 2011


On Thu, 2011-07-21 at 10:48 -0700, Rick Jones wrote:
> On 07/21/2011 03:20 AM, Hangbin Liu wrote:
> > Hi all,
> >
> >     I got a network traffic flood in our lab yesterday when I use TCP_RR.
> > Could you help me answer the questions and find the flood reason?
> 
> Traffic flood? With netperf TCP_RR?  FWIW, nothing that follows in the 
> email suggests (at least on the surface) a netperf-induced traffic flood 
> on your network.
> 
Hi Rick,

   Thank you very much for your response, I can get the detailed
description form the url you give me. But there is actually a traffic
flood in our lab. Our administrator said the flood was observed on
another system, which *wasn't* being used as part of my testing on the
lab network. He also gave me the tail end of tcpdump capture, which have
been attached.
   With the time in the attachment, I find the commond from my log. 

"netperf -6 -l 60 -H 2620:52:0:102f:20e:1eff:fe04:8190 -t TCP_STREAM -i
10,2 -I 99,5 -- -m 4096 -s 57344 -S 57344"

But this is strange, ipv6 have no broadcast address, how can a ipv6 TCP
test cause a traffic flood?? I have asked for more information about it
and will tell you ASAP.

Thanks

-- 
Hangbin Liu <haliu at redhat.com>
-------------- next part --------------
58975948, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007443 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758975948:758977376, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007444 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758977376:758978804, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007445 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758978804:758980232, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007492 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758980232:758981660, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007494 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758981660:758983088, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007494 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758983088:758984516, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007495 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758984516:758985944, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007542 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758985944:758987372, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007543 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758987372:758988800, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007543 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758988800:758990228, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.007592 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 758990228:758991656, ack 1, win 45, options [nop,nop,TS val 18812838 ecr 18841084], length 1428
17:13:07.072642 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766291556:766292984, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072644 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766292984:766294412, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072645 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766294412:766295840, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072692 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [P.], seq 766295840:766297268, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072693 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766297268:766298696, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072694 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766298696:766300124, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1428
17:13:07.072695 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [P.], seq 766300124:766301136, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841149], length 1012
17:13:07.072742 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766301136:766302564, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841150], length 1428^C
17:13:07.072744 IP6 2620:52:0:102f:200:1aff:fe1a:d112.37869 > 2620:52:0:102f:207:43ff:fe10:760.55939: Flags [.], seq 766302564:766303992, ack 1, win 45, options [nop,nop,TS val 18812903 ecr 18841150], length 1428



More information about the netperf-talk mailing list