Fundamentals 12 min read

Why Does One HTTP Request Trigger Multiple TCP Handshakes? Wireshark Deep Dive

This article walks through capturing and dissecting an HTTP request with Wireshark, explaining TCP three‑way handshake, window scaling, SACK options, four‑way termination, and Keep‑Alive mechanisms, and shows how browsers may differ in connection handling.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Why Does One HTTP Request Trigger Multiple TCP Handshakes? Wireshark Deep Dive

Overview

The article uses Wireshark to capture a simple HTTP request to a demo service and analyses the underlying TCP/IP packets, which is a common interview topic.

Environment Preparation

A minimal demo HTTP server is deployed on a server (IP 45.76.105.92) with client IP 192.168.2.135. Wireshark is used as the packet capture tool.

Packet Capture Analysis

A) Three‑Way Handshake

The first three packets correspond to the TCP SYN, SYN‑ACK and ACK steps. The SYN packet contains fields such as source and destination ports, sequence number, window size, MSS and WS (window scaling) option.

60738->8081 [SYN] Seq=0 Win=64240 Len=0 Mss=1460 Ws=256 SACK_PERM=1

Explanation of each field: 60738->8081: source port → destination port [SYN]: synchronization flag Seq: sequence number Win: TCP window size Len: payload length Mss: maximum segment size Ws: window scaling factor SACK_PERM=1: selective acknowledgment enabled

The TCP header diagram is shown below.

B) Four‑Way Termination

Normally a TCP connection is closed with four packets (FIN, ACK, FIN, ACK). In the captured trace the server merges the ACK and FIN of the second side, resulting in only three packets.

60738->8081 [FIN ACK] Seq=396 Ack=120 Win=66560 Len=0

This demonstrates that the FIN and ACK can be combined, turning a four‑step termination into a three‑step one.

C) Keep‑Alive

HTTP/1.1 uses persistent connections by default. The client periodically sends a one‑byte Keep‑Alive packet; the server replies with an ACK, keeping the connection alive and allowing quick detection of dead peers.

Conclusion

HTTP requests rely on TCP, which performs a three‑way handshake and a four‑way termination (which may be merged). Window scaling and SACK improve performance, while Keep‑Alive maintains persistent connections and detects failures.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

networkTCPWiresharkpacket analysis
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.