[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference 7.286::fddi

Title:FDDI - The Next Generation
Moderator:NETCAD::STEFANI
Created:Thu Apr 27 1989
Last Modified:Thu Jun 05 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:2259
Total number of notes:8590

1121.0. "duplicate packets" by ZPAC20::rick (Richard Tan - it's now or never) Thu Oct 21 1993 03:55

On a DEC7000 with DEMFA running OSF/1 V1.3, we get ICMP ECHO_RESPONSE
duplicate packets quite often when we use the ping command.
137.132.1.1 is a proteon router on the same ring.  Anyone know what
the general cause of this is?

Script started on Thu Oct 21 14:36:44 1993
leonis:~> ping 137.132.1.1
PING 137.132.1.1 (137.132.1.1): 56 data bytes
64 bytes from 137.132.1.1: icmp_seq=0 ttl=59 time=2 ms
64 bytes from 137.132.1.1: icmp_seq=1 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=2 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=3 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=4 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=5 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=6 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=7 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=8 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=9 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=10 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=11 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=12 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=13 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=14 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=15 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=16 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=17 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=18 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=19 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=19 ttl=59 time=2 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=20 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=21 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=22 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=23 ttl=59 time=15 ms
64 bytes from 137.132.1.1: icmp_seq=24 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=24 ttl=59 time=2 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=25 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=26 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=27 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=28 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=29 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=30 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=31 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=32 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=33 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=34 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=35 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=36 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=37 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=38 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=39 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=40 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=41 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=42 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=42 ttl=59 time=1 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=43 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=44 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=45 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=46 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=47 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=48 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=49 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=50 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=50 ttl=59 time=1 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=51 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=52 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=53 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=54 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=55 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=56 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=57 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=58 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=59 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=60 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=60 ttl=59 time=1 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=61 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=61 ttl=59 time=2 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=62 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=63 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=64 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=65 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=66 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=67 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=68 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=69 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=70 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=71 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=71 ttl=59 time=1 ms (DUP!)
64 bytes from 137.132.1.1: icmp_seq=72 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=73 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=74 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=75 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=76 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=77 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=78 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=79 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=80 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=81 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=82 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=83 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=84 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=85 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=86 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=87 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=88 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=89 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=90 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=91 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=92 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=93 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=94 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=95 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=96 ttl=59 time=3 ms
64 bytes from 137.132.1.1: icmp_seq=97 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=98 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=99 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=100 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=101 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=102 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=103 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=104 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=105 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=106 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=107 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=108 ttl=59 time=2 ms
64 bytes from 137.132.1.1: icmp_seq=109 ttl=59 time=1 ms
64 bytes from 137.132.1.1: icmp_seq=110 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=111 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=112 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=113 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=114 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=115 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=116 ttl=59 time=0 ms
64 bytes from 137.132.1.1: icmp_seq=117 ttl=59 time=0 ms
^C

----137.132.1.1 PING Statistics----
118 packets transmitted, 118 packets received, +7 duplicates, 0% packet loss
round-trip (ms)  min/avg/max = 0/0/15 ms
leonis:~> exit

script done on Thu Oct 21 14:38:52 1993
T.RTitleUserPersonal
Name
DateLines
1121.1NETRIX::thomasThe Code WarriorThu Oct 21 1993 08:214
Are you sure it isn't the proteon?  Have you put an FDDI sniffer on LAN?
Considering the way DEC OSF/1 does network input, I doubt it's being
duplicated in the DEMFA input path.  Could the proteon not be stripping
its packets properly?  Are you running the Ring Purger on this ring?
1121.2more informationZPAC20::rickRichard Tan - it's now or neverThu Oct 21 1993 21:1682
> Have you put an FDDI sniffer on LAN?

We will try to do this.

> Are you running the Ring Purger on this ring?

No - if I did, the DEMFA would freeze (literally) within minutes!

anyway, here's the output from "netstat -s -I mfa0":

mfa0 FDDI counters at Fri Oct 22 07:59:22 1993

       65535 seconds since last zeroed
  4294967295 ANSI MAC frame count
           0 ANSI MAC frame error count
           0 ANSI MAC frames lost count
  4294967295 bytes received
  2742590340 bytes sent
    32557797 data blocks received
    19510962 data blocks sent
   207152955 multicast bytes received
      854410 multicast blocks received
     1844752 multicast bytes sent
       24342 multicast blocks sent
           0 transmit underrun errors
           0 send failures
           0 FCS check failures
           0 frame status errors
           0 frame alignment errors
           0 frame length errors
           0 unrecognized frames
           0 unrecognized multicast frames
           0 receive data overruns
           0 system buffers unavailable
           0 user buffers unavailable
           0 ring reinitialization received
          36 ring reinitialization initiated
           0 ring beacon process initiated
           0 ring beacon process received
           0 duplicate tokens detected
           0 duplicate address test failures
           0 ring purger errors
           0 bridge strip errors
           0 traces initiated
           0 traces received
           0 LEM reject count
           0 LEM events count
           0 LCT reject count
           0 TNE expired reject count
           1 Completed Connection count
           0 Elasticity Buffer Errors

mfa0 FDDI status 

Adapter State:                     Running State
LED State:                         Yellow/Green
Link State:                        On Ring Running
Duplicate Address Condition:       Absent
Ring Purger State:                 Purger off
Negotiated TRT:                    7.987  ms
Upstream Neighbor Address:         00-00-93-00-C0-F6
UNA Timed Out:                     False
Downstream Neighbor Address:       08-00-2B-34-B6-5B
Ring Error Reason:                 Ring Init Received
Physical Port State:               In Use
Neighbor Physical Port Type:       Master
Reject Reason:                     Unknown
Physical Link Error Estimate:      15

mfa0 FDDI characteristics 

Link Address:                      08-00-2B-37-DC-63
Firmware Revision:                 V1.4
Hardware Revision:                 V5
SMT Version ID:                    1   
Requested TRT:                     7.987  ms 
Maximum TRT:                       173.015 ms 
Valid Transmission Time:           2.621  ms 
LEM Threshold:                     8 
Restricted Token Timeout:          7705.600 ms 
PMD Type                           ANSI Multimode

1121.3NETRIX::thomasThe Code WarriorThu Oct 21 1993 22:131
Why would the DEMFA freeze if you ran Ring Purger?
1121.4same (sort of) questionCSC32::PITTThu Aug 18 1994 09:4414
    
    Similar problem: when customer ran netsetup and configured his defta,
    he got "duplicate token found".  As with the basenote, he does also 
    ocasionally get the dup packet on ping. 
    
    His ring consists of 7 alpha boxes (3000/300s with DEFTAs) a Cray and a
    mystery...(may be a Proteon- he's not sure). He doesn't remember
    getting that duplicate token found when configuring his other nodes.
    
    Can you explain what a Ring Purger is? Would it eliminate this
    problem? Is this what it sounds like it might be--some sort of echo
    that the system is seeing as a valid packet???? Thanks!!!!!!!
    
    
1121.5koning.lkg.dec.com::koningPaul Koning, B-16504Thu Aug 18 1994 18:378
Yes, the ring purger may help.  Certainly it will help detect duplicate
token problems (and as soon as they are detected, they are corrected
by doing a Claim).

However, a significant rate of duplicate tokens (more than a few per day)
is a sign of something quite strange going on in your network.

	paul