Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: Re: [Wireshark-users] TCP fragmentation and wireshark

Date Prev · Date Next · Thread Prev · Thread Next
From: Bill Meier <wmeier@xxxxxxxxxxx>
Date: Sat, 01 May 2010 10:27:21 -0400
Kevin Wilson wrote:
Hello,
I want to use wireshark sniffer for analyzing TCP fragmented traffic.
  I had written a small TCP client-server app, which creates large
packets (over 20 K) and sends them.
When I tried to sniff the traffic with wireshark, I saw single
packets, and no sign of fragmentation
(like ip frag_offset field, or ip more fragments field).
(I know for sure that the PMTU between client and server is 1500.)

Any ideas why ? or maybe my application is not good and I can use
existing applications?


What you're seeing is as expected and is the way TCP/IP works.

In general, IP fragmentation is not desirable.

TCP when sending from a host uses a "Maximum Segment Size" (MSS) related to the MTU so that no IP fragmentation will be needed.

See MSS on http://en.wikipedia.org/wiki/Transmission_Control_Protocol (for example) for more details.

I haven't played around with this for a long time, but I do seem to remember that you *might* be able to force IP fragmentation by fiddling with MSS or MTU. Using a socket option ? Configuring the TCP/IP stack ?