I can't receive large binary files in the Browser through
websocket.
labtop[192.168.1.158] ==> here I have the browser subscribed
to a topic "/VIDEO"
Mosquito Broker[192.168.1.102]
PC [192.168.1.153] ==> I use this to publish the file
My test was:
1) PUBLISH FILE from PC: mosquitto_pub -h 192.168.1.102 -p 1883
-t "/VIDEO" -u test -P '123' -f video_test.mp4
2) SUBSCRIBE the Browser in my labtop: _javascript_ subscribe to
"/VIDEO" keep listening for incoming data..
3) TCPDUMP watch something is arrive: tcpdump -i wlan0 host
192.168.1.102
Dump result:
21:26:24.187916 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 2775710603, win 698, options
[nop,nop,TS val 55736832 ecr 497135], length 0
21:26:24.201860 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], ack 1, win 132, options
[nop,nop,TS val 501642 ecr 55725568], length 0
21:26:31.082283 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 1:1449, ack 1, win 132,
options [nop,nop,TS val 502316 ecr 55725568], length 1448
21:26:31.082310 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 1449, win 720, options
[nop,nop,TS val 55738555 ecr 502316], length 0
21:26:31.083975 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [P.], seq 1449:3867, ack 1, win 132,
options [nop,nop,TS val 502316 ecr 55725568], length 2418
21:26:31.083990 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 3867, win 758, options
[nop,nop,TS val 55738556 ecr 502316], length 0
21:26:31.084005 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 3867:11107, ack 1, win 132,
options [nop,nop,TS val 502317 ecr 55725568], length 7240
21:26:31.084019 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 11107, win 871, options
[nop,nop,TS val 55738556 ecr 502317], length 0
21:26:31.084972 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 11107:14003, ack 1, win 132,
options [nop,nop,TS val 502317 ecr 55725568], length 2896
21:26:31.084982 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 14003, win 917, options
[nop,nop,TS val 55738556 ecr 502317], length 0
21:26:31.088993 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 14003:15451, ack 1, win 132,
options [nop,nop,TS val 502330 ecr 55738556], length 1448
21:26:31.089014 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 15451, win 939, options
[nop,nop,TS val 55738557 ecr 502330], length 0
21:26:31.092529 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 15451:22691, ack 1, win 132,
options [nop,nop,TS val 502330 ecr 55738556], length 7240
21:26:31.092561 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 22691, win 1052, options
[nop,nop,TS val 55738558 ecr 502330], length 0
21:26:31.094054 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 22691:29931, ack 1, win 132,
options [nop,nop,TS val 502330 ecr 55738556], length 7240
21:26:31.094075 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 29931, win 1166, options
[nop,nop,TS val 55738558 ecr 502330], length 0
21:26:31.099525 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 29931:37171, ack 1, win 132,
options [nop,nop,TS val 502331 ecr 55738557], length 7240
21:26:31.099539 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 37171, win 1279, options
[nop,nop,TS val 55738559 ecr 502331], length 0
21:26:31.099550 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 37171:38619, ack 1, win 132,
options [nop,nop,TS val 502331 ecr 55738558], length 1448
21:26:31.099553 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 38619, win 1301, options
[nop,nop,TS val 55738559 ecr 502331], length 0
21:26:31.101098 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 38619:44411, ack 1, win 132,
options [nop,nop,TS val 502331 ecr 55738558], length 5792
21:26:31.101122 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 44411, win 1392, options
[nop,nop,TS val 55738560 ecr 502331], length 0
21:26:31.102408 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 44411:54547, ack 1, win 132,
options [nop,nop,TS val 502331 ecr 55738558], length 10136
21:26:31.102423 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 54547, win 1550, options
[nop,nop,TS val 55738560 ecr 502331], length 0
21:26:31.104892 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [.], seq 54547:55995, ack 1, win 132,
options [nop,nop,TS val 502332 ecr 55738559], length 1448
21:26:31.104916 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 55995, win 1573, options
[nop,nop,TS val 55738561 ecr 502332], length 0
21:26:31.109065 IP 192.168.1.102.9001 >
192.168.1.158.57044: Flags [P.], seq 55995:57443, ack 1, win
132, options [nop,nop,TS val 502332 ecr 55738559], length 1448
21:26:31.109086 IP 192.168.1.158.57044 >
192.168.1.102.9001: Flags [.], ack 57443, win 1595, options
[nop,nop,TS val 55738562 ecr 502332], length 0
mosquitto log:
1496879851: Sending PUBLISH to mqtt_browser (d0, q0, r0,
m0, '/VIDEO', ... (38379280 bytes))
1496879851: Received DISCONNECT from
mosq_pub_7260_manuel-l
1496879851: Client mosq_pub_7260_manuel-l
disconnected.
1496879869: New connection from 192.168.1.153 on port
1883.
1496879869: New client connected from 192.168.1.153 as
mosq_pub_7268_manuel-l (c1, k60, u'test').
1496879869: Sending CONNACK to mosq_pub_7268_manuel-l
(0, 0)
1496879876: Received PUBLISH from
mosq_pub_7268_manuel-l (d0, q0, r0, m0, '/VIDEO', ... (38379280
bytes))
As you can see the packets arrived to the labtop but not ALL.
Any Idea where can be the problem?
Thank you.