From b5a462b087bdd7670e1a69786ebbe3f073084ac3 Mon Sep 17 00:00:00 2001 From: Evan Huus Date: Tue, 17 Jun 2014 23:12:58 -0700 Subject: Try to calculate the initial RTT of tcp conns MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This (if it works well) will let us do much more accurate out-of-order detection, which is currently otherwise hardcoded to 3ms. Ask Jörg for details. Change-Id: Ie0662723946edeaea1e43958bf7f5158f09dde71 Reviewed-on: https://code.wireshark.org/review/2367 Reviewed-by: Evan Huus --- epan/dissectors/packet-tcp.h | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'epan/dissectors/packet-tcp.h') diff --git a/epan/dissectors/packet-tcp.h b/epan/dissectors/packet-tcp.h index 1fcf7d2f57..e01b2a6adf 100644 --- a/epan/dissectors/packet-tcp.h +++ b/epan/dissectors/packet-tcp.h @@ -239,6 +239,15 @@ struct tcp_analysis { */ nstime_t ts_first; + /* Remember the timestamp of the most recent SYN in this conversation in + * order to calculate the first_rtt below. Not necessarily ts_first, if + * the SYN is retransmitted. */ + nstime_t ts_mru_syn; + + /* If we have the handshake, remember the RTT between the initial SYN + * and ACK for use detecting out-of-order segments. */ + nstime_t ts_first_rtt; + /* Remember the timestamp of the frame that was last seen in this * tcp conversation to be able to calculate a delta time compared * to previous frame in this conversation -- cgit v1.2.3