|
Edited by CMDann at Thu Apr 23, 2015 06:41
hawhill replied at Thu Apr 23, 2015 03:33 
Can you sniff on mon.wlan0 for what exactly happens when the 6th client comes and tries to connect?
Yes to be honest I am not entirely sure the best way to do that. I will update my post once I figure this out haha.
Ok so I am using tcpdump to monitor the network. Here is the output of my available interfaces on the Pro.- root@bananapi ~ # tcpdump -D
- 1.eth0
- 2.wlan0
- 3.mon.wlan0
- 4.nflog (Linux netfilter log (NFLOG) interface)
- 5.usbmon1 (USB bus number 1)
- 6.usbmon2 (USB bus number 2)
- 7.usbmon3 (USB bus number 3)
- 8.usbmon4 (USB bus number 4)
- 9.any (Pseudo-device that captures on all interfaces)
- 10.lo
Copy the Code I was connecting to the wlan0 interface, I am not sure what mon.wlan0 is but I will output the dump of each network. mon.wlan0 doesn't seem to do anything ever.- root@bananapi ~ # tcpdump -i mon.wlan0
- tcpdump: WARNING: mon.wlan0: no IPv4 address assigned
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on mon.wlan0, link-type IEEE802_11_RADIO (802.11 plus radiotap header), capture size 65535 bytes
Copy the Code wlan0 is much busier, especially since I have connected 5 devices already. Here is the output of the sniff.- root@bananapi ~ # tcpdump -i wlan0
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on wlan0, link-type EN10MB (Ethernet), capture size 65535 bytes
- 12:42:24.806483 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 12:42:25.405431 IP 192.168.42.12.bootpc > bananapi.bootps: BOOTP/DHCP, Request from 0c:d2:92:01:f0:63 (oui Unknown), length 300
- 12:42:25.411961 IP bananapi.bootps > 192.168.42.12.bootpc: BOOTP/DHCP, Reply, length 300
- 12:42:25.751985 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- 12:42:26.428334 IP 192.168.42.12.51916 > 208.64.201.169.27021: UDP, length 84
- 12:42:26.746809 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- 12:42:27.030192 IP 72.21.91.8.https > 192.168.42.11.43858: Flags [P.], seq 3056131319:3056131350, ack 2577646060, win 33, options [nop,nop,TS val 3812998995 ecr 3001929], length 31
- 12:42:27.030309 IP 72.21.91.8.https > 192.168.42.11.43858: Flags [F.], seq 31, ack 1, win 33, options [nop,nop,TS val 3812998995 ecr 3001929], length 0
- 12:42:27.186551 IP 192.168.42.11.43858 > 72.21.91.8.https: Flags [.], ack 32, win 1641, options [nop,nop,TS val 3004953 ecr 3812998995], length 0
- 12:42:27.746805 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- 12:42:27.781416 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
- 12:42:27.788982 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
- 12:42:27.789632 IP 192.168.42.15.17500 > 255.255.255.255.17500: UDP, length 202
- 12:42:27.792177 IP 192.168.42.15.17500 > 192.168.42.255.17500: UDP, length 202
- 12:42:30.885961 IP 192.168.42.11.39626 > pc-in-f95.1e100.net.https: Flags [P.], seq 4163500662:4163500689, ack 807228214, win 1546, options [nop,nop,TS val 3005312 ecr 1769826955], length 27
- 12:42:31.514596 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [S], seq 2706161343, win 29200, options [mss 1460,sackOK,TS val 35970158 ecr 0,nop,wscale 7], length 0
- 12:42:31.583424 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [S.], seq 1273917094, ack 2706161344, win 42540, options [mss 1430,sackOK,TS val 2629004623 ecr 35970158,nop,wscale 7], length 0
- 12:42:31.585709 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 1, win 229, options [nop,nop,TS val 35970176 ecr 2629004623], length 0
- 12:42:31.597581 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 1:214, ack 1, win 229, options [nop,nop,TS val 35970179 ecr 2629004623], length 213
- 12:42:31.658294 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], ack 214, win 341, options [nop,nop,TS val 2629004698 ecr 35970179], length 0
- 12:42:31.660812 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], seq 1:1419, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 1418
- 12:42:31.660923 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], seq 1419:2837, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 1418
- 12:42:31.661239 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 2837:3581, ack 214, win 341, options [nop,nop,TS val 2629004700 ecr 35970179], length 744
- 12:42:31.662678 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 1419, win 251, options [nop,nop,TS val 35970195 ecr 2629004700], length 0
- 12:42:31.662882 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 3581, win 285, options [nop,nop,TS val 35970195 ecr 2629004700], length 0
- 12:42:31.664684 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 214:364, ack 3581, win 285, options [nop,nop,TS val 35970196 ecr 2629004700], length 150
- 12:42:31.728336 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 3581:3835, ack 364, win 350, options [nop,nop,TS val 2629004767 ecr 35970196], length 254
- 12:42:31.730455 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [P.], seq 364:737, ack 3835, win 307, options [nop,nop,TS val 35970212 ecr 2629004767], length 373
- 12:42:31.834200 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [.], ack 737, win 358, options [nop,nop,TS val 2629004873 ecr 35970212], length 0
- 12:42:32.036799 ARP, Request who-has 192.168.42.11 tell bananapi, length 28
- 12:42:32.058411 ARP, Reply 192.168.42.11 is-at 2c:8a:72:b4:4f:43 (oui Unknown), length 28
- 12:42:32.190333 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 4269765089:4269765094, ack 3720137309, win 1386, options [nop,nop,TS val 3005440 ecr 1060901877], length 5
- 12:42:32.193881 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 2596942780:2596942788, ack 3219756916, win 1369, options [nop,nop,TS val 3005441 ecr 776758801], length 8
- 12:42:32.280968 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 1:5, ack 8, win 34, options [nop,nop,TS val 776829377 ecr 3005441], length 4
- 12:42:32.299653 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [P.], seq 3835:4816, ack 737, win 358, options [nop,nop,TS val 2629005338 ecr 35970212], length 981
- 12:42:32.305051 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [F.], seq 737, ack 4816, win 329, options [nop,nop,TS val 35970356 ecr 2629005338], length 0
- 12:42:32.322055 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 8:99, ack 5, win 1369, options [nop,nop,TS val 3005466 ecr 776829377], length 91
- 12:42:32.366394 IP pa-in-f95.1e100.net.https > 192.168.42.12.50412: Flags [F.], seq 4816, ack 738, win 358, options [nop,nop,TS val 2629005406 ecr 35970356], length 0
- 12:42:32.369429 IP 192.168.42.12.50412 > pa-in-f95.1e100.net.https: Flags [.], ack 4817, win 329, options [nop,nop,TS val 35970372 ecr 2629005406], length 0
- 12:42:32.409304 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 5:113, ack 99, win 34, options [nop,nop,TS val 776829409 ecr 3005466], length 108
- 12:42:32.457368 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 0:5, ack 1, win 1386, options [nop,nop,TS val 3005479 ecr 1060901877], length 5
- 12:42:32.457598 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [P.], seq 99:103, ack 113, win 1369, options [nop,nop,TS val 3005479 ecr 776829409], length 4
- 12:42:32.547211 IP 157.55.130.142.40012 > 192.168.42.11.38685: Flags [P.], seq 113:117, ack 103, win 34, options [nop,nop,TS val 776829444 ecr 3005479], length 4
- 12:42:32.636107 IP 192.168.42.11.38685 > 157.55.130.142.40012: Flags [.], ack 117, win 1369, options [nop,nop,TS val 3005497 ecr 776829444], length 0
- 12:42:33.108393 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 12:42:33.109324 IP6 fe80::54d0:a94a:3d3c:ac39.56172 > ff02::1:3.hostmon: UDP, length 22
- 12:42:33.109757 IP 192.168.42.15.56172 > 224.0.0.252.hostmon: UDP, length 22
- 12:42:33.112110 IP6 fe80::54d0:a94a:3d3c:ac39.62838 > ff02::1:3.hostmon: UDP, length 22
- 12:42:33.112256 IP 192.168.42.15.62838 > 224.0.0.252.hostmon: UDP, length 22
- 12:42:33.255261 IP 192.168.42.11.40091 > 91.190.218.54.12350: Flags [P.], seq 0:5, ack 1, win 1386, options [nop,nop,TS val 3005557 ecr 1060901877], length 5
- 12:42:33.522931 IP6 fe80::54d0:a94a:3d3c:ac39.56172 > ff02::1:3.hostmon: UDP, length 22
- 12:42:33.523817 IP6 fe80::54d0:a94a:3d3c:ac39.62838 > ff02::1:3.hostmon: UDP, length 22
- 12:42:33.523892 IP 192.168.42.15.56172 > 224.0.0.252.hostmon: UDP, length 22
- 12:42:33.524079 IP 192.168.42.15.62838 > 224.0.0.252.hostmon: UDP, length 22
- 12:42:33.857859 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 12:42:34.260469 IP pc-in-f189.1e100.net.https > 192.168.42.12.42508: Flags [P.], seq 1372870358:1372870419, ack 734197651, win 373, options [nop,nop,TS val 1744800534 ecr 35963504], length 61
- 12:42:34.261907 IP 192.168.42.12.42508 > pc-in-f189.1e100.net.https: Flags [.], ack 61, win 254, options [nop,nop,TS val 35970845 ecr 1744800534], length 0
- 12:42:34.287322 IP 192.168.42.12.47420 > s3-website-us-east-1.amazonaws.com.http: Flags [.], ack 1116211667, win 493, length 0
- 12:42:34.351066 IP s3-website-us-east-1.amazonaws.com.http > 192.168.42.12.47420: Flags [.], ack 1, win 127, length 0
- 12:42:34.617868 IP 192.168.42.15.netbios-ns > 192.168.42.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
- 12:42:34.663457 IP pa-in-f189.1e100.net.https > 192.168.42.12.55926: Flags [P.], seq 3778196599:3778196660, ack 2955587059, win 771, options [nop,nop,TS val 2624161896 ecr 35963504], length 61
- 12:42:34.664808 IP 192.168.42.12.55926 > pa-in-f189.1e100.net.https: Flags [.], ack 61, win 1159, options [nop,nop,TS val 35970946 ecr 2624161896], length 0
- 12:42:35.064503 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- 12:42:35.138449 IP 192.168.42.15.50817 > pe-in-f189.1e100.net.https: UDP, length 24
- 12:42:35.232398 IP pe-in-f189.1e100.net.https > 192.168.42.15.50817: UDP, length 32
- 12:42:35.475088 IP 192.168.42.12.51916 > 208.64.201.169.27021: UDP, length 84
- 12:42:35.892994 IP 208.64.201.169.27021 > 192.168.42.12.51916: UDP, length 36
- 12:42:36.056813 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- 12:42:37.056821 ARP, Request who-has 192.168.42.13 tell bananapi, length 28
- ^C
- 69 packets captured
- 69 packets received by filter
- 0 packets dropped by kernel
Copy the Code The devices I have connected are all very diverse.
- iPad Mini 3
- MSI GE70 laptop
- Mac Mini
- HP Chromebook
- HTC ONE M8
The last device I am trying to connect is an Acer Switch. When one of the devices disconnects, I am able to connect the last device. Always maintaining a max of 5 clients.
|
|