Skip to content

Commit 5454f61

Browse files
committed
update
1 parent 6d311b3 commit 5454f61

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

support/windows-client/networking/diagnose-packet-loss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Local packet loss is fully observable and can be caused by various internal and
4545

4646
## Common causes of remote packet loss
4747

48-
Remote packet loss isn't directly observable to the local machine when the packet is dropped. The IP (Internet Protocol) protocol and most layers below it are "best effort" and not reliable. The [end-to-end principle](https://en.wikipedia.org/wiki/End-to-end_principle) requires endpoints to implement reliability within their protocols if resilience to packet loss is required. In some scenarios, the network or remote endpoint sends a protocol-specific error message indicating the reason for the loss. However, in many cases, the only indication of packet loss is a lack of response.
48+
Remote packet loss isn't directly observable to the local machine when the packet is dropped. Internet Protocol (IP) and most layers below it are "best effort" and not reliable. The [end-to-end principle](https://en.wikipedia.org/wiki/End-to-end_principle) requires endpoints to implement reliability within their protocols if resilience to packet loss is required. In some scenarios, the network or remote endpoint sends a protocol-specific error message indicating the reason for the loss. However, in many cases, the only indication of packet loss is a lack of response.
4949

5050
- Congestion
5151

support/windows-client/networking/tcp-ip-connectivity-issues-troubleshooting.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ audience: itpro
1818
1919
_Applies to:_   Supported versions of Windows client and Windows Server
2020

21-
This article provides a comprehensive guide for troubleshooting TCP/IP connectivity errors.
21+
This article provides a comprehensive guide for troubleshooting Transmission Control Protocol (TCP)/Internet Protocol (IP) connectivity errors.
2222

2323
## Symptoms and analysis
2424

@@ -40,9 +40,9 @@ During the troubleshooting process, you might encounter a TCP RESET in the netwo
4040
TCP is characterized as a connection-oriented and reliable protocol. It ensures reliability through the handshake process. A TCP session initiates with a three-way handshake, followed by data transfer, and concludes with a four-way closure.
4141

4242
- A four-way closure, where both the sender and receiver agree to close the session, is known as a graceful closure. This is identified by the FIN flag in the TCP header being set to 1.
43-
4443
- After the four-way closure, the machine waits for 4 minutes (by default) before releasing the port. This is termed as TIME_WAIT state. During this TIME_WAIT state, any pending packets for the TCP connection can be processed. Once the TIME_WAIT state completes, all resources allocated for the connection are released.
45-
- A TCP reset is an abrupt session closure, causing the immediate release of allocated resources and erasure of all connection information. This is identified by the RESET flag in the TCP header being set to 1.
44+
- A TCP reset is an abrupt session closure, causing the immediate release of allocated resources and erasure of all connection information. This is identified by the RESET flag in the TCP header being set to 1.
45+
4646
A network trace collected simultaneously on the source and the destination helps you to determine the flow of the traffic and identify the point of failure.
4747

4848
The following sections outline scenarios in which a RESET could occur.
@@ -70,7 +70,7 @@ The same TCP conversation seen in the network trace collected on the destination
7070

7171
:::image type="content" source="media/tcp-ip-connectivity-issues-troubleshooting/destination-side-same-filter.png" alt-text="Screenshot of frame summary with filter in Network Monitor.":::
7272

73-
If the TCP SYN packets are reaching the destination, but the destination doesn't response, verify whether the TCP port that is connected to is in the LISTENING state on destination machine. This can be checked in the output of the command `netstat -anob`.
73+
If the TCP SYN packets are reaching the destination, but the destination doesn't response, verify whether the TCP port being connected to on destination machine is in the LISTENING state. This can be checked in the output of the command `netstat -anob`.
7474

7575
If the port is listening and there's still no response, there could be a drop at the Windows Filtering Platform (WFP).
7676

@@ -119,15 +119,15 @@ An ACK+RST flagged TCP packet can also occur when a TCP SYN packet is sent out.
119119
:::image type="content" source="media/tcp-ip-connectivity-issues-troubleshooting/ack-rst-flag-packet.png" alt-text="Screenshot of packet with ACK RSK flag.":::In such cases, it's essential to investigate the application causing the reset (identified by port numbers) to understand why the connection is being reset.
120120

121121
> [!NOTE]
122-
> The above information pertains to resets from a TCP perspective and not UDP. UDP is a connectionless protocol, and packets are sent unreliably. Consequently, retransmissions or resets are not observed when using UDP as a transport protocol. However, UDP utilizes ICMP as an error reporting protocol. When a UDP packet is sent to a port that is not listed at the destination, the destination will immediately respond with an ICMP "**Destination Host Unreachable: Port Unreachable**" message.
122+
> The above information pertains to resets from a TCP perspective and not UDP. UDP is a connectionless protocol, and packets are sent unreliably. So, retransmissions or resets aren't observed when using UDP as a transport protocol. However, UDP utilizes ICMP as an error reporting protocol. When a UDP packet is sent to a port that isn't listed at the destination, the destination will immediately respond with an ICMP "**Destination Host Unreachable: Port Unreachable**" message.
123123
124124
```output
125125
10.10.10.1 10.10.10.2 UDP UDP:SrcPort=49875,DstPort=3343
126126
127127
10.10.10.2 10.10.10.1 ICMP ICMP:Destination Unreachable Message, Port Unreachable,10.10.10.2:3343
128128
```
129129

130-
During the troubleshooting of TCP/IP connectivity issues, you may observe in the network trace that a machine receives packets but doesn't respond to them. This could indicate a drop at the destination server's network stack.
130+
During the troubleshooting of TCP/IP connectivity issues, you might observe in the network trace that a machine receives packets but doesn't respond to them. This could indicate a drop at the destination server's network stack.
131131

132132
To determine whether the local Windows Firewall is dropping the packet, enable auditing for the Windows Filtering Platform (WFP) on the machine using the following command.
133133

0 commit comments

Comments
 (0)