[00:03:16.248,352] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:16.273,925] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4dc6 [00:03:16.300,231] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 10 [00:03:16.535,339] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:16.563,629] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:16.592,254] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39725 (3652425509) ack 0x2f66cb0 (49704112/0) [00:03:16.621,917] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:16.647,552] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x44a3 [00:03:16.673,828] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:16.964,111] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:16.995,635] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:17.026,092] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:17.054,443] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:17.134,246] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:17.165,802] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:17.196,197] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:17.224,548] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:17.255,065] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:17.283,660] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39730 (3652425520) ack 0x2f66cbe (49704126/14) [00:03:17.313,476] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:17.339,050] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4dad [00:03:17.365,356] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 11 The volatge value corresponding to bean 0 is 3449.013672 The volatge value corresponding to bean 1 is 3456.907715 The volatge value corresponding to bean 2 is 3463.744385 The volatge value corresponding to bean 3 is 3470.165527 The volatge value corresponding to bean 4 is 3468.666992 The volatge value corresponding to bean 5 is 3424.092529 The volatge value corresponding to bean 6 is 3460.329834 The volatge value corresponding to bean 7 is 3465.244873 The volatge value corresponding to bean 8 is 3394.826416 The volatge value corresponding to bean 9 is 3457.763428 The volatge value corresponding to bean 10 is 3466.956787 The optimal beam direction is 3, and corresponding power value is 3470.165527 [00:03:18.404,418] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:18.435,943] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:18.466,369] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:18.494,689] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:18.525,207] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:18.553,833] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39730 (3652425520) ack 0x2f66cc7 (49704135/9) [00:03:18.583,526] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:18.609,100] net_tcp.net_tcp_trace: (0x200024b0): win 1271 chk 0x4d9f [00:03:18.635,406] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 [00:03:18.663,269] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 10 [00:03:18.691,772] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:18.720,367] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39730 (3652425520) ack 0x2f66cc7 (49704135/0) [00:03:18.750,061] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:18.775,665] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x407c [00:03:18.801,971] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (70 bytes) uart:~$ WPT_Reset_ACK message successfully transmitted [00:03:19.091,918] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:19.123,443] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:19.153,900] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:19.182,250] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 70 bytes) [00:03:19.212,707] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:19.241,027] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:19.269,653] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3973a (3652425530) ack 0x2f66cc7 (49704135/0) [00:03:19.299,316] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:19.324,890] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4477 [00:03:19.351,226] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:19.639,617] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:19.671,142] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:19.701,568] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:19.729,949] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:19.809,661] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:19.841,186] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:19.871,612] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:19.899,993] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:19.930,511] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:19.959,106] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39745 (3652425541) ack 0x2f66cd5 (49704149/14) [00:03:19.988,891] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:20.014,465] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d81 [00:03:20.040,771] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 1 [00:03:20.275,787] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:20.304,077] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:20.332,641] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39745 (3652425541) ack 0x2f66cd5 (49704149/0) [00:03:20.362,335] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:20.387,939] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x445e [00:03:20.414,245] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:20.703,247] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:20.734,771] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:20.765,197] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:20.793,579] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:20.874,206] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:20.905,761] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:20.936,187] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:20.964,538] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:20.995,056] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:21.023,651] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39750 (3652425552) ack 0x2f66ce3 (49704163/14) [00:03:21.053,436] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:21.079,040] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d68 [00:03:21.105,377] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 2 [00:03:21.340,332] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:21.368,621] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:21.397,216] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39750 (3652425552) ack 0x2f66ce3 (49704163/0) [00:03:21.426,910] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:21.452,484] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4445 [00:03:21.478,759] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:21.769,012] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:21.800,567] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:21.830,993] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:21.859,344] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:21.937,500] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:21.969,055] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:21.999,511] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:22.027,862] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:22.058,349] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:22.086,944] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3975b (3652425563) ack 0x2f66cf1 (49704177/14) [00:03:22.116,760] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:22.142,364] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d4f [00:03:22.168,640] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 3 [00:03:22.403,686] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:22.432,006] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:22.460,601] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3975b (3652425563) ack 0x2f66cf1 (49704177/0) [00:03:22.490,295] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:22.515,899] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x442c [00:03:22.542,175] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:22.833,801] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:22.865,447] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:22.895,874] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:22.924,255] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:23.004,669] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:23.036,224] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:23.066,711] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:23.095,001] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:23.125,488] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:23.154,083] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39766 (3652425574) ack 0x2f66cff (49704191/14) [00:03:23.183,837] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:23.209,442] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d36 [00:03:23.235,717] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 4 [00:03:23.470,703] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:23.498,992] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:23.527,587] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39766 (3652425574) ack 0x2f66cff (49704191/0) [00:03:23.557,281] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:23.582,885] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4413 [00:03:23.609,161] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:23.900,360] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:23.931,915] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:23.962,371] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:23.990,753] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:24.069,152] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:24.100,708] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:24.131,164] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:24.159,515] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:24.190,002] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:24.218,597] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39771 (3652425585) ack 0x2f66d0d (49704205/14) [00:03:24.248,382] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:24.273,956] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d1d [00:03:24.300,262] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 5 [00:03:24.535,278] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:24.563,598] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:24.592,193] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39771 (3652425585) ack 0x2f66d0d (49704205/0) [00:03:24.621,887] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:24.647,460] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x43fa [00:03:24.673,797] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:24.963,409] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:24.994,964] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:25.025,390] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:25.053,741] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:25.132,904] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:25.164,459] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:25.194,915] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:25.223,266] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:25.253,753] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:25.282,348] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3977c (3652425596) ack 0x2f66d1b (49704219/14) [00:03:25.312,103] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:25.337,707] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4d04 [00:03:25.364,013] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 6 [00:03:25.598,968] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:25.627,288] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:25.655,914] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3977c (3652425596) ack 0x2f66d1b (49704219/0) [00:03:25.685,607] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:25.711,181] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x43e1 [00:03:25.737,518] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:26.055,908] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:26.087,463] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:26.118,011] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:26.146,362] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:26.227,600] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:26.259,155] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:26.289,581] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:26.317,932] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:26.348,419] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:26.377,014] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39787 (3652425607) ack 0x2f66d29 (49704233/14) [00:03:26.406,799] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:26.432,373] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4ceb [00:03:26.458,740] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 7 [00:03:26.693,725] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:26.722,045] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:26.750,671] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39787 (3652425607) ack 0x2f66d29 (49704233/0) [00:03:26.780,334] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:26.805,938] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x43c8 [00:03:26.832,275] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:27.632,476] net_tcp.tcp_retry_expired: (0x200035ec): retry 3: [0x200028dc] sent pkt 0x20008cf0 [00:03:27.921,752] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:27.953,277] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:27.983,764] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:28.012,115] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:40.890,258] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:40.921,813] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:40.952,301] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:40.980,651] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:41.011,138] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:41.039,733] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39792 (3652425618) ack 0x2f66d37 (49704247/14) [00:03:41.069,519] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:41.095,123] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4cd2 [00:03:41.121,398] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 8 [00:03:41.356,384] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:41.384,674] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:41.413,269] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39792 (3652425618) ack 0x2f66d37 (49704247/0) [00:03:41.442,993] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:41.468,597] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x43af [00:03:41.494,903] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:41.785,827] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:41.817,413] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:41.847,869] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:41.876,159] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:41.954,895] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:41.986,480] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:42.016,937] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:42.045,288] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:42.075,775] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:42.104,339] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3979d (3652425629) ack 0x2f66d45 (49704261/14) [00:03:42.134,124] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:42.159,698] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4cb9 [00:03:42.186,035] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 9 [00:03:42.420,989] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:42.449,310] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:42.477,905] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3979d (3652425629) ack 0x2f66d45 (49704261/0) [00:03:42.507,568] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:42.533,172] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4396 [00:03:42.559,509] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:42.849,761] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:42.881,317] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:42.911,743] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:42.940,093] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:43.019,592] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:43.051,116] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:43.081,573] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:43.109,893] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:43.140,411] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:43.169,036] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397a8 (3652425640) ack 0x2f66d53 (49704275/14) [00:03:43.198,822] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:43.224,426] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4ca0 [00:03:43.250,732] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 10 [00:03:43.485,809] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:43.514,099] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:43.542,694] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397a8 (3652425640) ack 0x2f66d53 (49704275/0) [00:03:43.572,387] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:43.597,991] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x437d [00:03:43.624,298] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:43.916,107] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:43.947,662] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:43.978,088] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:44.006,469] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:03:44.085,845] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:44.117,401] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:44.147,827] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:44.176,177] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:44.206,665] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:44.235,290] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397b3 (3652425651) ack 0x2f66d61 (49704289/14) [00:03:44.265,075] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:44.290,679] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4c87 [00:03:44.316,986] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 11 The volatge value corresponding to bean 0 is 3453.708252 The volatge value corresponding to bean 1 is 3453.708008 The volatge value corresponding to bean 2 is 3459.046631 The volatge value corresponding to bean 3 is 3453.493408 The volatge value corresponding to bean 4 is 3454.776123 The volatge value corresponding to bean 5 is 3406.046387 The volatge value corresponding to bean 6 is 3399.272461 The volatge value corresponding to bean 7 is 3472.949219 The volatge value corresponding to bean 8 is 3456.056641 The volatge value corresponding to bean 9 is 3451.572998 The volatge value corresponding to bean 10 is 3449.653564 The optimal beam direction is 7, and corresponding power value is 3472.949219 [00:03:45.356,475] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:45.388,000] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:45.418,426] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:45.446,807] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:45.477,294] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:45.505,889] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397b3 (3652425651) ack 0x2f66d6a (49704298/9) [00:03:45.535,583] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:45.561,187] net_tcp.net_tcp_trace: (0x200024b0): win 1271 chk 0x4c79 [00:03:45.587,493] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 [00:03:45.615,417] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 10 [00:03:45.643,890] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:45.672,515] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397b3 (3652425651) ack 0x2f66d6a (49704298/0) [00:03:45.702,178] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:45.727,783] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3f55 [00:03:45.754,058] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (70 bytes) uart:~$ WPT_Reset_ACK message successfully transmitted [00:03:46.042,114] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:46.073,699] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:46.104,125] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:46.132,507] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 70 bytes) [00:03:46.162,933] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:46.191,253] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:46.219,848] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397bd (3652425661) ack 0x2f66d6a (49704298/0) [00:03:46.249,542] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:46.275,146] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4351 [00:03:46.301,422] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:46.591,979] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:46.623,535] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:46.653,991] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:46.682,281] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:46.760,681] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:46.792,205] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:46.822,631] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:46.851,013] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:46.881,500] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:46.910,095] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397c8 (3652425672) ack 0x2f66d78 (49704312/14) [00:03:46.939,910] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:46.965,484] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4c5b [00:03:46.991,760] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 1 [00:03:47.226,745] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:47.255,035] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:47.283,630] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397c8 (3652425672) ack 0x2f66d78 (49704312/0) [00:03:47.313,323] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:47.338,958] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4338 [00:03:47.365,234] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:47.655,487] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:47.687,011] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:47.717,468] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:47.745,819] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:47.824,859] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:47.856,414] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:47.886,871] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:47.915,161] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:47.945,678] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:47.974,304] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397d3 (3652425683) ack 0x2f66d86 (49704326/14) [00:03:48.004,058] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:48.029,693] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4c42 [00:03:48.055,999] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 2 [00:03:48.291,046] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:48.319,366] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:48.347,991] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397d3 (3652425683) ack 0x2f66d86 (49704326/0) [00:03:48.377,655] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:48.403,259] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x431f [00:03:48.429,565] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:48.718,200] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:48.749,755] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:48.780,212] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:48.808,563] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:48.887,298] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:48.918,823] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:48.949,249] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:48.977,600] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:49.008,117] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:49.036,712] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397de (3652425694) ack 0x2f66d94 (49704340/14) [00:03:49.066,497] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:49.092,102] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4c29 [00:03:49.118,408] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 3 [00:03:49.353,363] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:49.381,683] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:49.410,308] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397de (3652425694) ack 0x2f66d94 (49704340/0) [00:03:49.440,002] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:49.465,606] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4306 [00:03:49.491,912] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:49.780,273] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:49.811,798] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:49.842,254] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:49.870,605] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:49.952,209] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:49.983,764] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:50.014,190] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:50.042,572] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:50.073,059] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:50.101,654] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397e9 (3652425705) ack 0x2f66da2 (49704354/14) [00:03:50.131,439] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:50.157,012] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4c10 [00:03:50.183,319] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 4 [00:03:50.418,365] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:50.446,655] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:50.475,250] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397e9 (3652425705) ack 0x2f66da2 (49704354/0) [00:03:50.504,943] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:50.530,548] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x42ed [00:03:50.556,854] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:50.847,106] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:50.878,631] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:50.909,118] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:50.937,469] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:51.018,035] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:51.049,591] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:51.080,047] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:51.108,367] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:51.138,854] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:51.167,449] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397f4 (3652425716) ack 0x2f66db0 (49704368/14) [00:03:51.197,204] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:51.222,778] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4bf7 [00:03:51.249,114] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 5 [00:03:51.484,130] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:51.512,420] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:51.541,015] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397f4 (3652425716) ack 0x2f66db0 (49704368/0) [00:03:51.570,709] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:51.596,343] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x42d4 [00:03:51.622,619] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:51.914,398] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:51.945,953] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:51.976,348] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:52.004,730] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:52.084,747] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:52.116,271] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:52.146,697] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:52.175,048] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:52.205,535] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:52.234,130] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b397ff (3652425727) ack 0x2f66dbe (49704382/14) [00:03:52.263,916] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:52.289,489] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4bde [00:03:52.315,765] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 6 [00:03:52.550,720] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:52.579,040] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:52.607,666] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b397ff (3652425727) ack 0x2f66dbe (49704382/0) [00:03:52.637,359] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:52.662,963] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x42bb [00:03:52.689,270] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:52.979,583] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:53.011,138] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:53.041,625] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:53.070,007] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:53.148,345] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:53.179,901] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:53.210,296] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:53.238,647] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:53.269,165] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:53.297,790] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3980a (3652425738) ack 0x2f66dcc (49704396/14) [00:03:53.327,545] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:53.353,118] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4bc5 [00:03:53.379,394] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 7 [00:03:53.614,440] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:53.642,730] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:53.671,356] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3980a (3652425738) ack 0x2f66dcc (49704396/0) [00:03:53.701,049] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:53.726,654] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x42a2 [00:03:53.752,990] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:54.042,907] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:54.074,462] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:54.104,919] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:54.133,300] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:54.211,029] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:54.242,584] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:54.273,010] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:54.301,361] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:54.331,848] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:54.360,443] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39815 (3652425749) ack 0x2f66dda (49704410/14) [00:03:54.390,197] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:54.415,802] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4bac [00:03:54.442,108] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 8 [00:03:54.677,093] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:54.705,352] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:54.733,978] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39815 (3652425749) ack 0x2f66dda (49704410/0) [00:03:54.763,671] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:54.789,276] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4289 [00:03:54.815,582] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:55.106,201] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:55.137,756] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:55.168,182] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:55.196,533] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:55.277,160] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:55.308,715] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:55.339,141] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:55.367,462] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:55.397,918] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:55.426,513] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39820 (3652425760) ack 0x2f66de8 (49704424/14) [00:03:55.456,268] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:55.481,872] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b93 [00:03:55.508,178] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 9 [00:03:55.743,194] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:55.771,514] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:55.800,109] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39820 (3652425760) ack 0x2f66de8 (49704424/0) [00:03:55.829,803] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:55.855,407] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4270 [00:03:55.881,713] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:56.171,936] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:56.203,521] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:56.233,978] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:56.262,359] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:56.341,979] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:56.373,504] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:56.403,930] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:56.432,250] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:56.462,768] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:56.491,363] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3982b (3652425771) ack 0x2f66df6 (49704438/14) [00:03:56.521,148] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:56.546,752] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b7a [00:03:56.573,089] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 10 [00:03:56.808,135] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:03:56.836,456] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:56.865,051] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3982b (3652425771) ack 0x2f66df6 (49704438/0) [00:03:56.894,775] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:56.920,379] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4257 [00:03:56.946,685] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:03:57.406,555] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:57.438,110] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:57.468,536] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:57.496,887] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:03:57.527,160] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:03:57.557,647] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:57.586,273] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39836 (3652425782) ack 0x2f66e04 (49704452/14) [00:03:57.616,058] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:57.641,662] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b61 [00:03:57.667,968] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 11 The volatge value corresponding to bean 0 is 3457.338379 The volatge value corresponding to bean 1 is 3456.697510 The volatge value corresponding to bean 2 is 3393.977051 The volatge value corresponding to bean 3 is 3455.843994 The volatge value corresponding to bean 4 is 3455.628418 The volatge value corresponding to bean 5 is 3450.506592 The volatge value corresponding to bean 6 is 3445.174316 The volatge value corresponding to bean 7 is 3446.240723 The volatge value corresponding to bean 8 is 3344.850342 The volatge value corresponding to bean 9 is 3398.849121 The volatge value corresponding to bean 10 is 3446.027344 The optimal beam direction is 0, and corresponding power value is 3457.338379 [00:03:58.678,192] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:58.709,686] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:58.740,142] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:58.768,524] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:03:58.799,041] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:58.827,636] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39836 (3652425782) ack 0x2f66e0d (49704461/9) [00:03:58.857,330] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:03:58.882,904] net_tcp.net_tcp_trace: (0x200024b0): win 1271 chk 0x4b53 [00:03:58.909,240] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 [00:03:58.937,133] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 10 [00:03:58.965,606] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:03:58.994,262] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39836 (3652425782) ack 0x2f66e0d (49704461/0) [00:03:59.023,925] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:59.049,530] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3e2e [00:03:59.075,836] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (70 bytes) uart:~$ WPT_Reset_ACK message successfully transmitted [00:03:59.365,081] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:03:59.396,606] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:59.427,062] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:03:59.455,413] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 70 bytes) [00:03:59.485,839] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:03:59.514,160] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:03:59.542,785] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39840 (3652425792) ack 0x2f66e0d (49704461/0) [00:03:59.572,479] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:03:59.598,083] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x422b [00:03:59.624,420] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:03:59.914,306] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:03:59.945,831] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:03:59.976,287] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:00.004,638] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:00.085,632] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:00.117,187] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:00.147,644] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:00.175,994] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:00.206,512] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:00.235,107] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3984b (3652425803) ack 0x2f66e1b (49704475/14) [00:04:00.264,892] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:00.290,527] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b35 [00:04:00.316,802] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 1 [00:04:00.551,879] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:00.580,200] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:00.608,825] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3984b (3652425803) ack 0x2f66e1b (49704475/0) [00:04:00.638,519] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:00.664,123] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4212 [00:04:00.690,429] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:01.008,789] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:01.040,344] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:01.070,800] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:01.099,151] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:01.178,558] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:01.210,113] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:01.240,539] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:01.268,890] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:01.299,346] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:01.327,972] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39856 (3652425814) ack 0x2f66e29 (49704489/14) [00:04:01.357,757] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:01.383,331] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b1c [00:04:01.409,637] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 2 [00:04:01.644,653] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:01.672,973] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:01.701,599] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39856 (3652425814) ack 0x2f66e29 (49704489/0) [00:04:01.731,292] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:01.756,896] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x41f9 [00:04:01.783,233] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:03.383,422] net_tcp.tcp_retry_expired: (0x200035ec): retry 4: [0x200028dc] sent pkt 0x20008cf0 [00:04:03.672,393] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:03.703,948] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:03.734,436] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:03.762,817] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:03.841,461] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:03.873,016] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:03.903,472] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:03.931,854] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:03.962,341] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:03.990,966] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39861 (3652425825) ack 0x2f66e37 (49704503/14) [00:04:04.020,721] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:04.046,356] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4b03 [00:04:04.072,662] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 3 [00:04:04.307,678] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:04.335,998] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:04.364,593] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39861 (3652425825) ack 0x2f66e37 (49704503/0) [00:04:04.394,287] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:04.419,891] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x41e0 [00:04:04.446,197] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:04.738,739] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:04.770,294] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:04.800,750] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:04.829,101] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:04.907,165] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:04.938,690] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:04.969,146] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:04.997,497] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:05.027,954] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:05.056,579] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3986c (3652425836) ack 0x2f66e45 (49704517/14) [00:04:05.086,364] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:05.111,968] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4aea [00:04:05.138,275] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 4 [00:04:05.373,260] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:05.401,580] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:05.430,206] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3986c (3652425836) ack 0x2f66e45 (49704517/0) [00:04:05.459,869] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:05.485,504] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x41c7 [00:04:05.511,810] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:05.803,070] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:05.834,686] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:05.865,112] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:05.893,463] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:05.971,740] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:06.003,295] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:06.033,721] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:06.062,103] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:06.092,620] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:06.121,215] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39877 (3652425847) ack 0x2f66e53 (49704531/14) [00:04:06.151,000] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:06.176,605] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4ad1 [00:04:06.202,911] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 5 [00:04:06.437,866] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:06.466,156] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:06.494,781] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39877 (3652425847) ack 0x2f66e53 (49704531/0) [00:04:06.524,475] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:06.550,079] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x41ae [00:04:06.576,385] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:06.866,058] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:06.897,613] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:06.928,039] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:06.956,359] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:07.038,055] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:07.069,610] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:07.100,067] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:07.128,387] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:07.158,874] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:07.187,500] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39882 (3652425858) ack 0x2f66e61 (49704545/14) [00:04:07.217,285] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:07.242,889] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4ab8 [00:04:07.269,195] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 6 [00:04:07.504,180] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:07.532,501] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:07.561,096] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39882 (3652425858) ack 0x2f66e61 (49704545/0) [00:04:07.590,789] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:07.616,394] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4195 [00:04:07.642,700] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:07.932,952] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:07.964,508] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:07.994,995] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:08.023,315] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:08.102,050] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:08.133,605] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:08.164,031] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:08.192,382] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:08.222,900] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:08.251,495] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3988d (3652425869) ack 0x2f66e6f (49704559/14) [00:04:08.281,280] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:08.306,884] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a9f [00:04:08.333,190] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 7 [00:04:08.568,145] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:08.596,466] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:08.625,091] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3988d (3652425869) ack 0x2f66e6f (49704559/0) [00:04:08.654,815] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:08.680,450] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x417c [00:04:08.706,756] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:08.997,253] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:09.028,839] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:09.059,265] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:09.087,646] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:09.165,679] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:09.197,235] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:09.227,691] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:09.256,072] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:09.286,560] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:09.315,155] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39898 (3652425880) ack 0x2f66e7d (49704573/14) [00:04:09.344,940] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:09.370,544] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a86 [00:04:09.396,850] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 8 [00:04:09.631,805] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:09.660,125] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:09.688,720] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39898 (3652425880) ack 0x2f66e7d (49704573/0) [00:04:09.718,383] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:09.744,018] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4163 [00:04:09.770,324] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:10.059,692] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:10.091,247] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:10.121,704] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:10.150,085] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:10.228,485] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:04:10.260,009] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:10.290,466] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:10.318,817] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:04:10.349,334] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:10.377,929] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398a3 (3652425891) ack 0x2f66e8b (49704587/14) [00:04:10.407,684] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:10.433,258] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a6d [00:04:10.459,594] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 9 [00:04:10.694,641] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:10.722,930] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:10.752,258] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398a3 (3652425891) ack 0x2f66e8b (49704587/0) [00:04:10.782,043] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:10.807,647] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x414a [00:04:10.833,953] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:11.124,206] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:11.155,761] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:11.186,218] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:11.214,569] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:11.294,586] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:11.326,141] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:11.356,567] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:11.384,948] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:11.415,405] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:11.444,030] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398ae (3652425902) ack 0x2f66e99 (49704601/14) [00:04:11.473,785] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:11.499,359] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a54 [00:04:11.525,665] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 10 [00:04:11.760,742] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d90 len 11 [00:04:11.789,062] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d90 src 4242 dst 4242 [00:04:11.817,687] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398ae (3652425902) ack 0x2f66e99 (49704601/0) [00:04:11.847,351] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:11.872,955] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4131 [00:04:11.899,261] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d90 (71 bytes) uart:~$ Going to receive [00:04:12.189,819] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:04:12.221,374] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:12.251,831] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:12.280,212] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d90 (len 71 bytes) [00:04:12.358,398] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:04:12.389,953] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:12.420,379] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:12.448,730] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:04:12.479,248] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d90 src 4242 dst 4242 [00:04:12.507,873] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398b9 (3652425913) ack 0x2f66ea7 (49704615/14) [00:04:12.537,628] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:12.563,201] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a3b [00:04:12.589,477] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 11 The volatge value corresponding to bean 0 is 3463.534668 The volatge value corresponding to bean 1 is 3456.484619 The volatge value corresponding to bean 2 is 3443.468750 The volatge value corresponding to bean 3 is 3350.524902 The volatge value corresponding to bean 4 is 3358.520264 The volatge value corresponding to bean 5 is 3450.293213 The volatge value corresponding to bean 6 is 3448.159912 The volatge value corresponding to bean 7 is 3386.787354 The volatge value corresponding to bean 8 is 3441.550293 The volatge value corresponding to bean 9 is 3445.813721 The volatge value corresponding to bean 10 is 3444.534668 The optimal beam direction is 0, and corresponding power value is 3463.534668 [00:04:13.631,927] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:13.663,482] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:13.693,969] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:13.722,320] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:13.752,838] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:13.781,463] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398b9 (3652425913) ack 0x2f66eb0 (49704624/9) [00:04:13.811,126] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:13.836,730] net_tcp.net_tcp_trace: (0x200024b0): win 1271 chk 0x4a2d [00:04:13.863,037] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 [00:04:13.890,930] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d90 len 10 [00:04:13.919,403] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d90 src 4242 dst 4242 [00:04:13.948,028] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398b9 (3652425913) ack 0x2f66eb0 (49704624/0) [00:04:13.977,722] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:14.003,356] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3d07 [00:04:14.029,632] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d90 (70 bytes) uart:~$ WPT_Reset_ACK message successfully transmitted [00:04:14.319,152] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:04:14.350,708] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:14.381,195] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:14.409,545] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d90 (len 70 bytes) [00:04:14.440,002] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:14.468,292] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:14.496,917] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398c3 (3652425923) ack 0x2f66eb0 (49704624/0) [00:04:14.526,611] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:14.552,215] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4105 [00:04:14.578,521] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:14.869,750] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:14.901,275] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:14.931,762] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:14.960,052] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:40.638,549] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:40.670,104] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:40.700,561] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:40.728,912] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:40.759,429] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:40.788,024] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398ce (3652425934) ack 0x2f66ebe (49704638/14) [00:04:40.817,779] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:40.843,383] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4a0f [00:04:40.869,720] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 1 [00:04:41.104,675] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:41.132,995] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:41.161,621] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398ce (3652425934) ack 0x2f66ebe (49704638/0) [00:04:41.191,284] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:41.216,888] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x40ec [00:04:41.243,194] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:41.532,196] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:41.563,720] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:41.594,146] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:41.622,528] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:41.702,270] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:41.733,825] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:41.764,251] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:41.792,602] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:41.823,150] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:41.851,745] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398d9 (3652425945) ack 0x2f66ecc (49704652/14) [00:04:41.881,500] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:41.907,104] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x49f6 [00:04:41.933,380] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 2 [00:04:42.168,365] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:42.196,685] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:42.225,280] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398d9 (3652425945) ack 0x2f66ecc (49704652/0) [00:04:42.254,943] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:42.280,548] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x40d3 [00:04:42.306,854] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:42.597,442] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:42.629,028] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:42.659,454] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:42.687,805] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:42.768,188] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:42.799,713] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:42.830,200] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:42.858,551] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:42.889,068] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:42.917,663] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398e4 (3652425956) ack 0x2f66eda (49704666/14) [00:04:42.947,479] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:42.973,052] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x49dd [00:04:42.999,359] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 3 [00:04:43.234,344] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:43.262,695] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:43.291,320] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398e4 (3652425956) ack 0x2f66eda (49704666/0) [00:04:43.321,014] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:43.346,618] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x40ba [00:04:43.372,924] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:43.662,261] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:43.693,786] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:43.724,212] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:43.752,593] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:43.834,197] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:43.865,753] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:43.896,179] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:43.924,560] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:43.955,078] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:43.983,673] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398ef (3652425967) ack 0x2f66ee8 (49704680/14) [00:04:44.013,458] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:44.039,062] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x49c4 [00:04:44.065,368] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 4 [00:04:44.300,323] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:44.328,643] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:44.357,238] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398ef (3652425967) ack 0x2f66ee8 (49704680/0) [00:04:44.386,901] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:44.412,506] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x40a1 [00:04:44.438,842] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:44.728,759] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:44.760,284] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:44.790,710] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:44.819,091] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:44.898,437] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:44.929,992] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:44.960,449] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:44.988,800] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:45.019,317] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:45.047,912] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b398fa (3652425978) ack 0x2f66ef6 (49704694/14) [00:04:45.077,697] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:45.103,302] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x49ab [00:04:45.129,577] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 5 [00:04:45.364,624] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:45.392,944] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:45.421,539] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b398fa (3652425978) ack 0x2f66ef6 (49704694/0) [00:04:45.451,232] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:45.476,837] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4088 [00:04:45.503,143] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:45.794,036] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:45.825,592] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:45.856,048] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:45.884,429] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:45.961,822] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:45.993,377] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:46.023,834] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:46.052,215] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:46.082,733] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:46.111,297] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39905 (3652425989) ack 0x2f66f04 (49704708/14) [00:04:46.141,052] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:46.166,656] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4992 [00:04:46.192,962] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 6 [00:04:46.427,947] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:46.456,237] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:46.484,863] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39905 (3652425989) ack 0x2f66f04 (49704708/0) [00:04:46.514,526] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:46.540,130] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x406f [00:04:46.566,436] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:46.856,750] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:46.888,336] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:46.918,762] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:46.947,113] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:47.028,717] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:47.060,272] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:47.090,728] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:47.119,049] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:47.149,536] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:47.178,161] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39910 (3652426000) ack 0x2f66f12 (49704722/14) [00:04:47.207,946] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:47.233,520] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4979 [00:04:47.259,826] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 7 [00:04:47.494,812] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:47.523,132] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:47.551,757] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39910 (3652426000) ack 0x2f66f12 (49704722/0) [00:04:47.581,420] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:47.607,025] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4056 [00:04:47.633,331] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:47.924,530] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:47.956,085] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:47.986,511] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:48.014,862] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:48.092,956] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:48.124,511] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:48.154,968] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:48.183,319] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:48.213,836] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:48.242,431] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3991b (3652426011) ack 0x2f66f20 (49704736/14) [00:04:48.272,186] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:48.297,760] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4960 [00:04:48.324,096] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 8 [00:04:48.559,051] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:04:48.587,371] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:48.615,997] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3991b (3652426011) ack 0x2f66f20 (49704736/0) [00:04:48.645,660] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:48.671,264] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x403d [00:04:48.697,570] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:04:48.986,877] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:49.018,432] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:49.048,858] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:49.077,270] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:04:49.156,646] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d90 src port 4242 dst port 4242 family 2 [00:04:49.188,201] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:49.218,627] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:49.246,978] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d90, st=0, user_data=0x00000000 [00:04:49.277,496] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:04:49.306,091] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39926 (3652426022) ack 0x2f66f2e (49704750/14) [00:04:49.335,845] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:04:49.361,450] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4947 [00:04:49.387,756] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 9 [00:04:49.622,985] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:04:49.651,306] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:04:49.679,931] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39926 (3652426022) ack 0x2f66f2e (49704750/0) [00:04:49.709,625] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:04:49.735,229] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x4024 [00:04:49.761,535] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:04:50.053,100] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:04:50.084,655] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:04:50.115,081] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:04:50.143,432] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:05:41.421,783] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:05:41.453,308] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:41.483,795] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:41.512,145] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:05:41.542,633] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:05:41.571,228] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39931 (3652426033) ack 0x2f66f3c (49704764/14) [00:05:41.600,982] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:05:41.626,556] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x492e [00:05:41.652,862] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 10 [00:05:41.887,939] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 11 [00:05:41.916,259] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:05:41.944,854] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39931 (3652426033) ack 0x2f66f3c (49704764/0) [00:05:41.974,548] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:05:42.000,152] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x400b [00:05:42.026,489] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (71 bytes) uart:~$ Going to receive [00:05:42.315,429] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:05:42.346,954] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:42.377,380] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:42.405,731] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 71 bytes) [00:05:42.485,198] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:05:42.516,754] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:42.547,180] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:42.575,561] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008d40, st=0, user_data=0x00000000 [00:05:42.606,079] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:05:42.634,674] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3993c (3652426044) ack 0x2f66f4a (49704778/14) [00:05:42.664,459] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:05:42.690,063] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x4915 [00:05:42.716,400] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 11 The volatge value corresponding to bean 0 is 3451.360107 The volatge value corresponding to bean 1 is 3430.478516 The volatge value corresponding to bean 2 is 3438.780273 The volatge value corresponding to bean 3 is 3434.521729 The volatge value corresponding to bean 4 is 3328.063965 The volatge value corresponding to bean 5 is 3356.836182 The volatge value corresponding to bean 6 is 3443.892090 The volatge value corresponding to bean 7 is 3451.360596 The volatge value corresponding to bean 8 is 3440.267334 The volatge value corresponding to bean 9 is 3458.619141 The volatge value corresponding to bean 10 is 3422.608887 The optimal beam direction is 9, and corresponding power value is 3458.619141 [00:05:43.758,422] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:05:43.789,978] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:43.820,434] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:43.848,785] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:05:43.879,302] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:05:43.907,897] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b3993c (3652426044) ack 0x2f66f53 (49704787/9) [00:05:43.937,591] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:05:43.963,195] net_tcp.net_tcp_trace: (0x200024b0): win 1271 chk 0x4907 [00:05:43.989,471] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 [00:05:44.017,364] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008cf0 len 10 [00:05:44.045,867] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008cf0 src 4242 dst 4242 [00:05:44.074,493] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b3993c (3652426044) ack 0x2f66f53 (49704787/0) [00:05:44.104,156] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:05:44.129,760] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3be0 [00:05:44.156,097] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008cf0 (70 bytes) uart:~$ WPT_Reset_ACK message successfully transmitted [00:05:44.447,601] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008d40 src port 4242 dst port 4242 family 2 [00:05:44.479,187] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:44.509,643] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:44.537,994] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008cf0 (len 70 bytes) [00:05:44.568,420] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:05:44.596,740] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:05:44.625,335] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39946 (3652426054) ack 0x2f66f53 (49704787/0) [00:05:44.655,029] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:05:44.680,664] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3fdf [00:05:44.706,939] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:05:44.996,276] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:05:45.027,832] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:45.058,258] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:45.086,608] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) [00:05:45.166,687] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:05:45.198,211] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:45.228,668] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:45.257,049] net_sock.zsock_received_cb: (0x200024b0): ctx=0x20001f00, pkt=0x20008cf0, st=0, user_data=0x00000000 [00:05:45.287,536] net_tcp.net_tcp_trace: (0x200024b0): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:05:45.316,131] net_tcp.net_tcp_trace: (0x200024b0): seq 0xd9b39951 (3652426065) ack 0x2f66f61 (49704801/14) [00:05:45.345,916] net_tcp.net_tcp_trace: (0x200024b0): flags uAprsf [00:05:45.371,490] net_tcp.net_tcp_trace: (0x200024b0): win 1266 chk 0x48e9 [00:05:45.397,796] net_tcp.print_send_info: (0x200024b0): ACK sent to 2001:db8::4 port 4242 uart:~$ Out of receive 1 [00:05:45.632,843] net_tcp.net_tcp_queue_data: (0x20003510): [0x200028dc] Queue 0x20008d40 len 11 [00:05:45.661,163] net_tcp.net_tcp_trace: (0x20003510): [0x200028dc] pkt 0x20008d40 src 4242 dst 4242 [00:05:45.689,758] net_tcp.net_tcp_trace: (0x20003510): seq 0xd9b39951 (3652426065) ack 0x2f66f61 (49704801/0) [00:05:45.719,451] net_tcp.net_tcp_trace: (0x20003510): flags uAPrsf [00:05:45.745,025] net_tcp.net_tcp_trace: (0x20003510): win 1280 chk 0x3fc6 [00:05:45.771,331] net_tcp.net_tcp_send_data: (0x20003510): [0x200028dc] Sending pkt 0x20008d40 (71 bytes) uart:~$ Going to receive [00:05:46.061,279] net_conn.net_conn_input: (0x200024b0): Check TCP listener for pkt 0x20008cf0 src port 4242 dst port 4242 family 2 [00:05:46.092,834] net_conn.net_conn_input: (0x200024b0): [0x20002754] match found cb 0x000113c1 ud 0x20001f00 rank 0x7f [00:05:46.123,260] net_tcp._tcp_established: (0x200024b0): DATA received from 2001:db8::4 port 4242 [00:05:46.151,611] net_tcp.net_tcp_ack_received: (0x200024b0): [0x200028dc] Received ACK pkt 0x20008d40 (len 71 bytes) uart:~$