Split the hexadecimal format, Operating System

Assignment Help:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

We need to first split the above hex as such

00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10

1.1  What is the source port number?

Source port is 2 bytes take 00 CD   = 205

           (00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10)

1.2  What is the destination port number?

Next 2 bytes as destination address 00 18 = 24

1.3  What is the sequence number?

Next 4 bytes as sequence number 00 00 0E F1 = 3825

1.4  What is the acknowledgment number?

Next 4 bytes as acknowledgment number 00 00 0D 5D = 3421

1.5  What is the length of the header?

Next 4 bits as HLEN 5 (this indicates number of sets of 4 bytes which makes the header lenght = 20bytes)

1.6  Which control bits are set and what do they represent?

Next 6 bits are reserved 02 = 02 (10 - remaining (binary))

Next 6 bits are control bits 22= 34 (100010)

1.7  What is the window size?

Next 2 bytes indicate the window length 00 D1 =209


Related Discussions:- Split the hexadecimal format

Explain process state with diagram, Question 1 Explain single Partition Al...

Question 1 Explain single Partition Allocation and Multiple Partition Question 2 What is PCB? What useful information is available in PCB? Question 3 Explain Preemptive and No

What are the methods for handling deadlocks?, What are the methods for hand...

What are the methods for handling deadlocks ? The technique for handling the deadlocks are: We are able to use protocol to prevent or avoid the deadlock, make sure tha

Define jobs which are admitted to the system for processing, Define the Job...

Define the Jobs which are admitted to the system for processing is called The Jobs which are admitted to the system for processing is known as long-term scheduling.

What is an acyclic graph, What is an acyclic graph? A tree that has bee...

What is an acyclic graph? A tree that has been corrupted by links to other branches, but does not have any cyclic paths in it.

What methods are used to monitor intrusion detection, Question : a) Wh...

Question : a) What do you understand by a Directory Structure? Support your answer with a diagram. b) Give an example how Access Lists and Groups are arranged to mode of

What is a semaphore, Question 1: a) State the different file attribute...

Question 1: a) State the different file attributes and briefly explain the operations that can be performed on each files. b) What is a semaphore? Describe why it is impor

Explain kernel activity for ults, KERNEL ACTIVITY FOR ULTS: The kernel...

KERNEL ACTIVITY FOR ULTS: The kernel isn't aware of thread activity but it is still managing process activity. When a thread compose a system call the whole process will be bl

Explain how a domain user account is authenticated, Question: a) The fo...

Question: a) The following questions pertain to User and Group accounts in Windows XP: i) Give four differences between a Power User and a Guest User account. ii) Explain h

Name two differences between logical and physical addresses, Q. Name two di...

Q. Name two differences between logical and physical addresses? Answer: A logical address doesn't refer to an actual existing address rather it refers to an abstract address in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd