TCP Analysis
TCP Analysis
TCP Analysis
By default, Wireshark’s TCP dissector tracks the state of each TCP session and provides
additional information when problems or potential problems are detected. Analysis is done
once for each TCP packet when a capture file is first opened. Packets are processed in the
order in which they appear in the packet list. You can enable or disable this feature via the
“Analyze TCP sequence numbers” TCP dissector preference.
For analysis of data or protocols layered on top of TCP (such as HTTP), see Section 7.8.3,
“TCP Reassembly”.
TCP Analysis flags are added to the TCP protocol tree under “SEQ/ACK analysis”. Each flag
is described below. Terms such as “next expected sequence number” and “next expected
acknowledgement number” refer to the following”:
TCP Keep-Alive
Set when the segment size is zero or one, the current sequence number is one byte less than
the next expected sequence number, and none of SYN, FIN, or RST are set.
TCP Out-Of-Order
Set when all of the following are true:
Supersedes “Retransmission”.
Set when the SYN flag is set (not SYN+ACK), we have an existing conversation using the
same addresses and ports, and the sequence number is different than the existing
conversation’s initial sequence number.
Set when the current sequence number is greater than the next expected sequence number.
Checks for a retransmission based on analysis data in the reverse direction. Set when all of
the following are true:
TCP Retransmission
TCP ZeroWindow
Set when the receive window size is zero and none of SYN, FIN, or RST are set.
The window field in each TCP header advertises the amount of data a receiver can accept. If
the receiver can’t accept any more data it will set the window value to zero, which tells the
sender to pause its transmission. In some specific cases this is normal — for example, a
printer might use a zero window to pause the transmission of a print job while it loads or
reverses a sheet of paper. However, in most cases this indicates a performance or capacity
problem on the receiving end. It might take a long time (sometimes several minutes) to
resume a paused connection, even if the underlying condition that caused the zero window
clears up quickly.
TCP ZeroWindowProbe
Set when the sequence number is equal to the next expected sequence number, the segment
size is one, and last-seen window size in the reverse direction was zero.
If the single data byte from a Zero Window Probe is dropped by the receiver (not ACKed),
then a subsequent segment should not be flagged as retransmission if all of the following
conditions are true for that segment: * The segment size is larger than one. * The next
expected sequence number is one less than the current sequence number.
TCP ZeroWindowProbeAck
Some captures are quite difficult to analyze automatically, particularly when the time frame
may cover both Fast Retransmission and Out-Of-Order packets. A TCP preference allows to
switch the precedence of these two interpretations at the protocol level.
TCP conversations are said to be complete when they have both opening and closing
handshakes, independently of any data transfer. However, we might be interested in
identifying complete conversations with some data sent, and we are using the following bit
values to build a filter value on the tcp.completeness field :
1 : SYN
2 : SYN-ACK
4 : ACK
8 : DATA
16 : FIN
32 : RST
For example, a conversation containing only a three-way handshake will be found with the
filter 'tcp.completeness==7' (1+2+4) while a complete conversation with data transfer will be
found with a longer filter as closing a connection can be associated with FIN or RST packets,
or even both : 'tcp.completeness==31 or tcp.completeness==47 or tcp.completeness==63'