Got something else to discuss that is not covered by the previous forums? Post it here!
#77044 by wizwor
Sat Mar 12, 2011 3:47 am
I've had a hub for over a year. It's the first device after the fairpoint 'modem' and originally there was an actiontec router between the hub and my network. Eventually, the actiontec router failed and was replaced with a netgear router then a belkin 'n' router.

A couple weeks ago, I tried to stream a movie to an Insignia NS-BRDVD3 over netflix and got the try again message. I did and it didn't. I tried another Insignia box and got the same thing. Interestingly, my PS3 and PC were still able to stream.

I called Netflix, Fairpoint, and Insignia who all shrugged their shoulders. Fairpoint sent a tech to my house. He replaced my hub and belkin router with a new actiontec router and all was good. Putting the hub back between the modem and the actiontec router reintroduced the problem.

I downloaded wireshark and captured a session. I think this is of interest...

375 160.095017 192.168.1.9 204.236.230.238 TLSv1 Client Hello
376 160.120239 204.236.230.238 192.168.1.9 TCP https > 33171 [ACK] Seq=1 Ack=123 Win=5792 Len=0 TSV=586401212 TSER=4294857514
377 160.122676 204.236.230.238 192.168.1.9 TLSv1 Server Hello
378 160.123887 204.236.230.238 192.168.1.9 TCP [TCP segment of a reassembled PDU]
379 160.124283 204.236.230.238 192.168.1.9 TLSv1 Certificate, Server Hello Done
380 160.124356 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=123 Ack=1441 Win=8720 Len=0 TSV=4294857542 TSER=586401212
381 160.124428 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=123 Ack=2881 Win=11600 Len=0 TSV=4294857543 TSER=586401212
382 160.124566 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=123 Ack=3180 Win=11600 Len=0 TSV=4294857544 TSER=586401212
383 160.174360 192.168.1.9 204.236.230.238 TLSv1 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
384 160.202282 204.236.230.238 192.168.1.9 TLSv1 Change Cipher Spec, Encrypted Handshake Message
385 160.203102 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=321 Ack=3239 Win=11600 Len=0 TSV=4294857622 TSER=586401232
386 160.205670 192.168.1.9 204.236.230.238 TLSv1 Application Data
387 160.253803 204.236.230.238 192.168.1.9 TCP [TCP segment of a reassembled PDU]
388 160.253859 204.236.230.238 192.168.1.9 TLSv1 Application Data
389 160.254616 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=1398 Ack=4684 Win=14480 Len=0 TSV=4294857674 TSER=586401245
390 160.256327 204.236.230.238 192.168.1.9 TCP [TCP segment of a reassembled PDU]
391 160.257553 204.236.230.238 192.168.1.9 TCP [TCP segment of a reassembled PDU]
392 160.258775 204.236.230.238 192.168.1.9 TCP [TCP segment of a reassembled PDU]
393 160.258849 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=1398 Ack=7564 Win=20240 Len=0 TSV=4294857677 TSER=586401245
394 160.280206 204.236.230.238 192.168.1.9 TLSv1 Application Data
395 160.280375 192.168.1.9 204.236.230.238 TCP 33171 > https [ACK] Seq=1398 Ack=9409 Win=23120 Len=0 TSV=4294857699 TSER=586401245
396 160.298206 192.168.1.9 204.236.230.238 TLSv1 Encrypted Alert
397 160.299392 192.168.1.9 204.236.230.238 TCP 33171 > https [FIN, ACK] Seq=1435 Ack=9409 Win=23120 Len=0 TSV=4294857718 TSER=586401245
398 160.322267 204.236.230.238 192.168.1.9 TLSv1 Encrypted Alert
399 160.322482 192.168.1.9 204.236.230.238 TCP 33171 > https [RST] Seq=1435 Win=0 Len=0
400 160.322593 204.236.230.238 192.168.1.9 TCP https > 33171 [FIN, ACK] Seq=9446 Ack=1435 Win=9024 Len=0 TSV=586401263 TSER=4294857717
401 160.322707 192.168.1.9 204.236.230.238 TCP 33171 > https [RST] Seq=1435 Win=0 Len=0
402 160.324808 204.236.230.238 192.168.1.9 TCP https > 33171 [ACK] Seq=9447 Ack=1436 Win=9024 Len=0 TSV=586401263 TSER=4294857718
403 160.324929 192.168.1.9 204.236.230.238 TCP 33171 > https [RST] Seq=1436 Win=0 Len=0
404 160.355452 192.168.1.9 204.236.230.238 TCP 33172 > https [SYN] Seq=0 Win=5840 Len=0 MSS=1460 SACK_PERM=1 TSV=4294857774 TSER=0 WS=1
405 160.380200 204.236.230.238 192.168.1.9 TCP https > 33172 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM=1 TSV=586401277 TSER=4294857774 WS=3
406 160.380393 192.168.1.9 204.236.230.238 TCP 33172 > https [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=4294857799 TSER=586401277
407 160.403233 192.168.1.9 204.236.230.238 TLSv1 Client Hello
408 160.427936 204.236.230.238 192.168.1.9 TCP https > 33172 [ACK] Seq=1 Ack=155 Win=6864 Len=0 TSV=586401289 TSER=4294857822
409 160.428268 204.236.230.238 192.168.1.9 TLSv1 Server Hello, Change Cipher Spec, Encrypted Handshake Message
410 160.428599 192.168.1.9 204.236.230.238 TCP 33172 > https [ACK] Seq=155 Ack=139 Win=5840 Len=0 TSV=4294857848 TSER=586401289
411 160.445234 192.168.1.9 204.236.230.238 TLSv1 Change Cipher Spec, Encrypted Handshake Message
412 160.507230 204.236.230.238 192.168.1.9 TCP https > 33172 [ACK] Seq=139 Ack=214 Win=6864 Len=0 TSV=586401309 TSER=4294857864
413 160.507877 192.168.1.9 204.236.230.238 TLSv1 Application Data
414 160.534768 204.236.230.238 192.168.1.9 TCP https > 33172 [ACK] Seq=139 Ack=795 Win=8032 Len=0 TSV=586401316 TSER=4294857926
415 160.534972 204.236.230.238 192.168.1.9 TLSv1 Application Data
416 160.573464 192.168.1.9 204.236.230.238 TCP [TCP segment of a reassembled PDU]
417 160.574701 192.168.1.9 204.236.230.238 TCP [TCP segment of a reassembled PDU]
418 160.757323 204.236.230.238 192.168.1.9 TLSv1 [TCP Retransmission] Application Data
419 160.757509 192.168.1.9 204.236.230.238 TCP [TCP Dup ACK 417#1] 33172 > https [ACK] Seq=3691 Ack=192 Win=5840 Len=0 TSV=4294858176 TSER=586401372 SLE=139 SRE=192
420 160.801806 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
421 161.259838 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
422 162.175918 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
423 164.008070 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
424 167.672387 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
425 175.000947 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
426 189.658123 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
427 218.972513 192.168.1.9 204.236.230.238 TCP [TCP Retransmission] [TCP segment of a reassembled PDU]
428 220.410316 192.168.1.9 204.236.230.238 TLSv1 Ignored Unknown Record
429 220.440302 204.236.230.238 192.168.1.9 TCP [TCP Dup ACK 418#1] https > 33172 [ACK] Seq=192 Ack=795 Win=8032 Len=0 TSV=586416292 TSER=4294857926 SLE=3691 SRE=5014
430 221.475418 204.236.230.238 192.168.1.9 TLSv1 Application Data
431 221.475508 204.236.230.238 192.168.1.9 TLSv1 Encrypted Alert
432 221.475641 192.168.1.9 204.236.230.238 TCP 33172 > https [RST] Seq=795 Win=0 Len=0
433 221.476484 192.168.1.9 204.236.230.238 TCP 33172 > https [RST] Seq=795 Win=0 Len=0

This cycle repeats itself until the player times out. I wonder if the hub is choking on some packets. Anyone at OOMA want to see the entire PCAP file? I guess I put my hub behind the actiontec, but I would prefer to preserve QoS if there is some kind of MTU setting that I can set.
#78027 by P&K
Sat Mar 26, 2011 5:15 pm
Try powering off all devices and then go up the chain, modem first then the Ooma hub then your wireless router then try the TV netflix, also look for if your TV or Bluray device that plays your Netflix needs a update from the Manufacture websites
Good luck

Who is online

Users browsing this forum: No registered users and 6 guests