Split the hexadecimal format, Operating System

Assignment Help:

The following is a dump of a TCP header in hexadecimal format:

00CD0018 00000EF1 00000D5D 502200D1 01BF0010

We need to first split the above hex as such

00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10

1.1  What is the source port number?

Source port is 2 bytes take 00 CD   = 205

           (00 CD 00 18 00 00 0E F1 00 00 0D 5D 50 22 00 D1 01 BF 00 10)

1.2  What is the destination port number?

Next 2 bytes as destination address 00 18 = 24

1.3  What is the sequence number?

Next 4 bytes as sequence number 00 00 0E F1 = 3825

1.4  What is the acknowledgment number?

Next 4 bytes as acknowledgment number 00 00 0D 5D = 3421

1.5  What is the length of the header?

Next 4 bits as HLEN 5 (this indicates number of sets of 4 bytes which makes the header lenght = 20bytes)

1.6  Which control bits are set and what do they represent?

Next 6 bits are reserved 02 = 02 (10 - remaining (binary))

Next 6 bits are control bits 22= 34 (100010)

1.7  What is the window size?

Next 2 bytes indicate the window length 00 D1 =209


Related Discussions:- Split the hexadecimal format

Explain relative file organization, Relative file organization A rela...

Relative file organization A relative file is an array of fixed-length slots and the records can be inserted in the first free slot found from the beginning of the file and

Optimal replacement policy, The optimal replacement policy, called OPT, is ...

The optimal replacement policy, called OPT, is to evict the page which will be accessed farthest into the future. Since we can't predict the future precisely, we can't implement OP

How does windows xp execute transport protocols, Q. What kinds of networkin...

Q. What kinds of networking does Windows XP support? How does Windows XP execute transport protocols? Describe two networking protocols. Answer: Support is offer for bo

An operating system for a real-time environment, Q. What is the major diffi...

Q. What is the major difficulty that a programmer should overcome in writing an operating system for a real-time environment? Answer: The major difficulty is keeping the oper

Safety algorithm and resource request algorithm, Safety algorithm : This is...

Safety algorithm : This is to make sure if the system is in safe state or not. It may need an order of m x n2 operation to determine if the state of the system is safe or not.

Explain schemes for defining the logical structure, What are the most commo...

What are the most common schemes for defining the logical structure of a directory? The most common schemes for explaining the logical structure of a directory Single-L

List antivirus techniques used for protection purposes, Question: a) Th...

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

Explain lru page replacement in detail, LRU page replacement In least ...

LRU page replacement In least lately used page replacement algorithm we will replace that page that hasn't been used for the longest period of time. This is similar as an opti

Explain hierarchical paging, Hierarchical paging Single way is to use a...

Hierarchical paging Single way is to use a two-level paging algorithm, in which the page table itself is also paged. A logical address is separated into a page number and a pag

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd