Split the hexadecimal format, Operating System

Assignment Help:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

We need to first split the above hex as such

00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10

1.1  What is the source port number?

Source port is 2 bytes take 00 CD   = 205

           (00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10)

1.2  What is the destination port number?

Next 2 bytes as destination address 00 18 = 24

1.3  What is the sequence number?

Next 4 bytes as sequence number 00 00 0E F1 = 3825

1.4  What is the acknowledgment number?

Next 4 bytes as acknowledgment number 00 00 0D 5D = 3421

1.5  What is the length of the header?

Next 4 bits as HLEN 5 (this indicates number of sets of 4 bytes which makes the header lenght = 20bytes)

1.6  Which control bits are set and what do they represent?

Next 6 bits are reserved 02 = 02 (10 - remaining (binary))

Next 6 bits are control bits 22= 34 (100010)

1.7  What is the window size?

Next 2 bytes indicate the window length 00 D1 =209


Related Discussions:- Split the hexadecimal format

Define tii stands for, TII stands for The abbreviation of TII is Table o...

TII stands for The abbreviation of TII is Table of incomplete instructions.

What is multitasking, What is Multitasking? Multitasking provides power...

What is Multitasking? Multitasking provides power to users by offering them to run multiple applications at once. The applications are loaded into memory and appear to the user

List disadvantages of using a single directory, List disadvantages of using...

List disadvantages of using a single directory. Users have no privacy. Users must be careful in choosing file names, to avoid names used by others. Users may destroy each othe

Hashed page table, Hashed page tables A common approach for handling ad...

Hashed page tables A common approach for handling address spaces larger than 32 bits is to use a hashed page table. Every entry in the hash table having a linked list of elemen

Unix process api, Unix process API The two most important function calls...

Unix process API The two most important function calls to use when programming with several processes are fork and exec:  fork() creates a copy of current process. It gives

Rule a magnetic hard disk, Q. If magnetic hard disks eventually have the s...

Q. If magnetic hard disks eventually have the same cost per gigabyte as do tapes will tapes turn into obsolete or will they still be needed? Describe your answer. Answer: Tap

Socket, socket based fortune teller sever.your program should create a serv...

socket based fortune teller sever.your program should create a server that listens to a specific port when a client receives a connection the server should respond with a random fo

Major advantage of the layered approach to system design, Q. What is the ma...

Q. What is the major advantage of the layered approach to system design? What are the de-merits of using the layered approach? Answer: As in all cases of modular design as well

GIS, 1. The City of Boston needs to be about 2 acres of green space per 1,0...

1. The City of Boston needs to be about 2 acres of green space per 1,000 persons. You have been hired as the GIS expert by an independent consulting company to determine where the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd