It worked out for me with the following tshark commands :
tshark -r trace_2013-11-22_16:03:22.pcap -q -z ip_hosts,tree
Running as user "root" and group "root". This could be dangerous.
===================================================================
IP Addresses value rate percent
IP Addresses 11974 0.003422
27.61.14.188 9729 0.002781 81.25%
192.168.44.44 11974 0.003422 100.00%
101.223.166.12 311 0.000089 2.60%
223.178.146.17 325 0.000093 2.71%
223.228.148.15 465 0.000133 3.88%
223.182.31.6 313 0.000089 2.61%
117.96.87.7 711 0.000203 5.94%
171.78.138.26 120 0.000034 1.00%
===================================================================
tshark -r trace_2013-11-22_16:03:22.pcap -q io,stat,12000,"ip.addr==27.61.14.188 #&& tcp","COUNT(tcp.analysis.retransmission)ip.addr==27.61.14.188 && tcp.analysis.retransmission","COUNT(tcp.analysis.duplicate_ack)ip.addr==27.61.14.188 && tcp.analysis.duplicate_ack","COUNT(tcp.analysis.lost_segment)ip.addr==27.61.14.188 && tcp.analysis.lost_segment","COUNT(tcp.analysis.fast_retransmission)ip.addr==27.61.14.188 && tcp.analysis.fast_retransmission"
Running as user "root" and group "root". This could be dangerous.
===================================================================
IO Statistics
Interval: 12000.000 secs
Column #0: ip.addr==27.61.14.188 && tcp
Column #1: COUNT(tcp.analysis.retransmission)ip.addr==27.61.14.188 && tcp.analysis.retransmission
Column #2: COUNT(tcp.analysis.duplicate_ack)ip.addr==27.61.14.188 && tcp.analysis.duplicate_ack
Column #3: COUNT(tcp.analysis.lost_segment)ip.addr==27.61.14.188 && tcp.analysis.lost_segment
Column #4: COUNT(tcp.analysis.fast_retransmission)ip.addr==27.61.14.188 && tcp.analysis.fast_retransmission
| Column #0 | Column #1 | Column #2 | Column #3 | Column #4
Time |frames| bytes | COUNT | COUNT | COUNT | COUNT
000.000-12000.000 9729 7519861 393 1900 1 283
Thanks,
Jain