Here's some more: 16:03:05.393873 00:16:44:c6:4f:f4 (oui Unknown) > 00:26:08:e9:8a:bc (oui Unknown), ethertype IPv4 (0x0800), length 1514: toil.robots.cse.wustl.edu.53552 > 192.168.1.115.49680: . 1130888:1132336(1448) ack 1 win 108 16:03:05.393892 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.49680 > toil.robots.cse.wustl.edu.53552: . ack 1133784 win 65535 16:03:05.394168 00:16:44:c6:4f:f4 (oui Unknown) > 00:26:08:e9:8a:bc (oui Unknown), ethertype IPv4 (0x0800), length 1514: toil.robots.cse.wustl.edu.53552 > 192.168.1.115.49680: . 1132336:1133784(1448) ack 1 win 108 16:03:05.394182 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.49680 > toil.robots.cse.wustl.edu.53552: . ack 1133784 win 65535 16:03:05.394233 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.49680 > toil.robots.cse.wustl.edu.53552: . ack 1129440 win 65535 16:03:05.394353 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.62595 > toil.robots.cse.wustl.edu.ssh: . ack 752 win 33304 16:03:05.394458 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.49680 > toil.robots.cse.wustl.edu.53552: . ack 1130888 win 65535 16:03:05.394563 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 66: 192.168.1.115.49680 > toil.robots.cse.wustl.edu.53552: . ack 1133784 win 65535 16:03:05.395265 00:26:08:e9:8a:bc (oui Unknown) > 00:16:44:c6:4f:f4 (oui Unknown), ethertype IPv4 (0x0800), length 98: 192.168.1.115 > toil.robots.cse.wustl.edu: ICMP echo request, id 12823, seq 5952, length 64 -Dan On 4/9/10 3:56 PM, Blaise Gassend wrote: >> The man file isn't particularly useful for figuring out how what the >> output means, so here is a few lines: >> >> 15:04:57.045705 IP toil.robots.cse.wustl.edu.53552> >> 192.168.1.115.49680: . 931064:932512(1448) ack 1 win 108 >> >> 15:04:57.045710 IP 192.168.1.115.49680> >> toil.robots.cse.wustl.edu.53552: . ack 931064 win 33304 >> >> 15:04:57.045711 IP 192.168.1.1.http> 192.168.1.115.49706: P 1:351(350) >> ack 597 win 6556 >> 15:04:57.045777 IP 192.168.1.115.49680> >> toil.robots.cse.wustl.edu.53552: . ack 933960 win 33304 >> >> 15:04:57.045809 IP 192.168.1.115.49706> 192.168.1.1.http: . ack 351 win >> 33129 >> >>> Have you tried using compressed image transports? >>> > Strange, I have never seen tcpdump not print packet lengths. Try adding > -e. > > _______________________________________________ > ros-users mailing list > ros-users@code.ros.org > https://code.ros.org/mailman/listinfo/ros-users >