Fwd: moving HD with 32bit Feisty from 64 bit motherboard to 32 bit motherboard

Krsnendu dasa krsnendu108 at gmail.com
Sun Feb 24 17:56:45 GMT 2008


Extra info: I also have problems when my laptop is not turned on.
---------- Forwarded message ----------
From: Krsnendu dasa <krsnendu108 at gmail.com>
Date: 25 Feb 2008 06:53
Subject: Re: moving HD with 32bit Feisty from 64 bit motherboard to 32 bit
motherboard
To: Charles Austin <ceaustin at gmail.com>

Thanks for your patient and practical help. I have given more infomation
below.

On 25/02/2008, Charles Austin <ceaustin at gmail.com> wrote:
>
> On Sun, Feb 24, 2008 at 3:26 AM, Krsnendu dasa <krsnendu108 at gmail.com>
> wrote:
> > I took the advice of Charles and a friend who is a geek. I installed
> > Wireshark. Straight away I noticed a lot of bad checksum messages.
> Thousands
> > of them! I am not sure what that means, but I'm sure it has something to
> do
> > with the problem. Any ideas what causes checksum errors?
> >
>
> Bad checksums mean that the TCP packet your device is receiving is
> corrupt.  Any number of things can cause this - physical network,
> software, rouge device, etc.  Are there any changes to the
> environment?  New lighting (can cause interference if network cables
> run close to it)?  New network switch? New patch cable for a
> workstation? (I once saw a LAN crippled by single patch cable that was
> not Cat 5.) Does Wireshark give you any info about the origin of the
> bad checksum packages?


Thanks for this information. The messages I saw mostly yesterday were from
the server .254 to my windows laptop .5 using ssh protocol.
I was using NX client to connect to FreeNX to connect to my server desktop
through a wireless connection.
The routing is as follows  Edubuntu Server (running FreeNX) -- Main
Gigaswitch -- Secondary 100Mhz switch -- Wireless access point with 4 port
switch (but only connected to the other switch; extra ports unused)--
Windows laptop (running NX client software).

See the packet information at the end of this message.


> > Next steps: Try to isolate the problem more.
> > 1. Connect the server to just one client and see if it disconnects. If
> that
> > works...
> > 2. Connect to one client through the switch
> > 3. Connect the second server
> > 4. Connect secondary switches
> >  etc...
> >

You are on the right track.  Let us know which device it turns out to be.


I haven't had a chance to do this yet. I  will probably try in a few days
time.

Here is the Wireshark output for one packet.
No.     Time        Source                Destination           Protocol
Info
     30 0.376735    192.168.0.254         192.168.0.5           SSH
Encrypted response packet len=48

Frame 30 (102 bytes on wire, 102 bytes captured)
    Arrival Time: Feb 24, 2008 17:26:08.410371000
    [Time delta from previous packet: 0.001369000 seconds]
    [Time since reference or first frame: 0.376735000 seconds]
    Frame Number: 30
    Packet Length: 102 bytes
    Capture Length: 102 bytes
    [Frame is marked: True]
    [Protocols in frame: eth:ip:tcp:ssh]
    [Coloring Rule Name: Checksum Errors]
    [Coloring Rule String: edp.checksum_bad==1 || ip.checksum_bad==1 ||
tcp.checksum_bad || udp.checksum_bad]
Ethernet II, Src: Micro-St_b8:c1:5b (00:0c:76:b8:c1:5b), Dst:
00:1b:77:94:eb:06 (00:1b:77:94:eb:06)
    Destination: 00:1b:77:94:eb:06 (00:1b:77:94:eb:06)
        Address: 00:1b:77:94:eb:06 (00:1b:77:94:eb:06)
        .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
        .... ..0. .... .... .... .... = LG bit: Globally unique address
(factory default)
    Source: Micro-St_b8:c1:5b (00:0c:76:b8:c1:5b)
        Address: Micro-St_b8:c1:5b (00:0c:76:b8:c1:5b)
        .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
        .... ..0. .... .... .... .... = LG bit: Globally unique address
(factory default)
    Type: IP (0x0800)
Internet Protocol, Src: 192.168.0.254 (192.168.0.254), Dst: 192.168.0.5 (
192.168.0.5)
    Version: 4
    Header length: 20 bytes
    Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP; ECN: 0x00)
        0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
        .... ..0. = ECN-Capable Transport (ECT): 0
        .... ...0 = ECN-CE: 0
    Total Length: 88
    Identification: 0x0e71 (3697)
    Flags: 0x04 (Don't Fragment)
        0... = Reserved bit: Not set
        .1.. = Don't fragment: Set
        ..0. = More fragments: Not set
    Fragment offset: 0
    Time to live: 64
    Protocol: TCP (0x06)
    Header checksum: 0xa9cb [correct]
        [Good: True]
        [Bad : False]
    Source: 192.168.0.254 (192.168.0.254)
    Destination: 192.168.0.5 (192.168.0.5)
Transmission Control Protocol, Src Port: ssh (22), Dst Port: 4245 (4245),
Seq: 6352, Ack: 160, Len: 48
    Source port: ssh (22)
    Destination port: 4245 (4245)
    Sequence number: 6352    (relative sequence number)
    [Next sequence number: 6400    (relative sequence number)]
    Acknowledgement number: 160    (relative ack number)
    Header length: 20 bytes
    Flags: 0x18 (PSH, ACK)
        0... .... = Congestion Window Reduced (CWR): Not set
        .0.. .... = ECN-Echo: Not set
        ..0. .... = Urgent: Not set
        ...1 .... = Acknowledgment: Set
        .... 1... = Push: Set
        .... .0.. = Reset: Not set
        .... ..0. = Syn: Not set
        .... ...0 = Fin: Not set
    Window size: 1170
    Checksum: 0x829e [incorrect, should be 0x23ee (maybe caused by checksum
offloading?)]
    [SEQ/ACK analysis]
        [This is an ACK to the segment in frame: 29]
        [The RTT to ACK the segment was: 0.001369000 seconds]
SSH Protocol
    Encrypted Packet: 50E8BEC5AAC2566782574FB05971902326B84E6D7825D0FE...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.ubuntu.com/archives/edubuntu-users/attachments/20080225/d6a82c49/attachment.htm 


More information about the edubuntu-users mailing list