The receiver will look at the data and see that it has already received it
and drop it.
Ole
~
Ole Drews Jensen
Systems Network Manager
CCNA, MCSE, MCP+I
RWR Enterprises, Inc.
[EMAIL PROTECTED]
~
> -Original Message-
> From: [EMAIL PRO
Pls. elaborate your point of view
Thanks in advance
Hitesh
Ole Drews Jensen <[EMAIL PROTECTED]> on 07/18/2000 08:39:06 PM
Please respond to Ole Drews Jensen <[EMAIL PROTECTED]>
To: harora, [EMAIL PROTECTED]
cc:
Subject: RE: TCP
The receiver will look at the data and see
Enterprises, Inc.
[EMAIL PROTECTED]
> -Original Message-
> From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, July 18, 2000 10:55 PM
> To: Ole Drews Jensen
> Cc: [EMAIL PROTECTED]
> Subject: RE: TCP
>
> Pls. elaborate your p
On Dec 9, 4:01am, [EMAIL PROTECTED] wrote:
}
} Pls. elaborate your point of view
It is not a "point of view", but rather part of the TCP spec. You
asked what happens to the original piece of data when a duplicate
arrives due to the lose of an acknowledgement packet. The short answer
is th
Think of the network connection diagrams that show lines at each level of
the IOS model connecting the hosts at each end. Layer 4 TCP at host A is
talking to layer 4 TCP at host B. If layer 3 IP messes up then it is up to
TCP to detect the error and notify the other end to retransmit.
Each layer h
Essentially IP is responsible for addressing the packet so that it conveys information
about the location of the destination and therefore can be routed.
TCP is responsible for establishing and maintaining reliable communications. This
means that if TCP A sends data to TCP B and this data is no
Probably the best thing you can do is search for specific
areas of interest. Check out:
http://www.cis.ohio-state.edu/hypertext/information/rfc.html
For example, if you want to read up on BGP, do a keyword search
for BGP or BGP-4. Typically, at the end of each RFC, they'll
have references t
In addition:
IP - #791
TCP - #793
UDP - #768
ARP - #826
-Eric
"Timmons, Robert" wrote:
>
> Probably the best thing you can do is search for specific
> areas of interest. Check out:
>
> http://www.cis.ohio-state.edu/hypertext/information/rfc.html
>
> For example, if you want to read up on
your help.
jeongwoo
--Original Message--
From: "Koen&Beth" <[EMAIL PROTECTED]>
To: jeongwoo park <[EMAIL PROTECTED]>
Sent: July 14, 2000 12:56:52 AM GMT
Subject: RE: Tcp/ip question
I forgot to say how I remembered it
If I saw a Class B IP Address and it had
;Beth" <[EMAIL PROTECTED]>
To: jeongwoo park <[EMAIL PROTECTED]>
Sent: July 14, 2000 6:05:09 AM GMT
Subject: RE: Tcp/ip question
No that's not correct
You can have a class B with subnet mask 255.252.0.0 but that's supernetting
and alot more complicated then subnetting. It us
The length isn't explicitly transmitted but is
computed via the Sequence Number and Ack Number.
RFC 793 has more detail.
http://www.faqs.org/rfcs/rfc793.html
Regards,
Phil.
PS: There are some talented women on this site !!
"Guy"
--- Thomas Peroutka <[EMAIL PROTECTED]>
wrote: > Hi Guys,
>
>The length isn't explicitly transmitted but is
>computed via the Sequence Number and Ack Number.
>
>RFC 793 has more detail.
>
>http://www.faqs.org/rfcs/rfc793.html
>
>Regards,
>
>Phil.
>
>PS: There are some talented women on this site !!
>"Guy"
Excellent answer! I was about to go check the
I thought that these numbers are randomly generated, and the the length was
contained in a psuedo header.
Duck
- Original Message -
From: Phil Barker <[EMAIL PROTECTED]>
To: Thomas Peroutka <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, August 29, 2000 4:26 A
This trap is being caused by someone closing a telnet session from the
router sending the trap.
Jim
-Original Message-
From:
Sent: Monday, June 19, 2000 4:20 AM
Subject: TCP Connection terminated
Hi,
I our company, we have a HP Openview NNM and some
Cisco routers (4500, 7200). Afte
there are five layer in TCP/IP model, lower 4 layer are almost the same as
OSI
___
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violat
Check out this article on Cisco web
site.
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ap1.htm
Also, this page shows how TCP/IP layers
function.
http://www.scan-technologies.com/tutorials/TCPIP%20Tutorial.htm
Basically, I see alot of people trying to make
eve
Should I assume that the BCRAN book by Thomas M.
Thomas & Adam Quiggle (McGraw Hill, Technical Expert)
is not a good book for preparing for the BCRAN exam?
Please advise before I purchase the Cisco Press BCRAN
book.
--- "Michael L. Williams" <[EMAIL PROTECTED]> wrote:
> Check out this article
It's the DOD model (not five layers as "claimed" by
someone here).
--- Sammi <[EMAIL PROTECTED]> wrote:
> Hello,
> I understand TCP/IP packets, and the OSI Network
> Model 7 layers.
> However I'm not sure what is meant by TCP/IP layers?
> Would this be
> reference to the 4 layer IPX model:
> Appl
There are 4 layers in the TCP/ip model.
They are:
Network Interface
Internet
Host-to-host
Application
If you need more information about what the layers do or how they map to the
OSI model let me know.
Regards,
Aaron K. Dixon
WAN Element Manager - Cisco
Omnes, A Schlumberger Company
-Ori
At 2:17 PM + 8/5/03, Janik James wrote:
>Here are some tcp questions:
>
>1.Can the sender send more than the window size?
No.
>2.Can receiver send ack before whole window comes in?
Not for the window it's receiving, but for a previous window.
Message Posted at:
http://www.groupstudy.com/
1.Can the sender send more than the window size?
No a sender can not send more than the window size
e.g if we have two hosts A and B and B's advertised window size is 32kb.
Upon the first tcp connection A(sender) can send up to the maximum window
sise(segments) and it then has to wait for an ac
lication before it
>expects return data, then it would set the PSH bit on the second packet.
>
>
>
>-Original Message-
>From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED]
>Sent: Tuesday, August 05, 2003 11:15 AM
>To: [EMAIL PROTECTED]
>Subject: Re: tcp [7:73518]
>
On Tuesday, August 5, 2003, at 10:14 AM, Howard C. Berkowitz wrote:
>
>
>> 2.Can receiver send ack before whole window comes in?
>
> Not for the window it's receiving, but for a previous window.
>
Unless you're Microsoft.
http://grotto11.com/blog/slash.html?+1039831658
This isn't to make this a
---Original Message-
From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 05, 2003 11:15 AM
To: [EMAIL PROTECTED]
Subject: Re: tcp [7:73518]
At 2:17 PM + 8/5/03, Janik James wrote:
>Here are some tcp questions:
>
>1.Can the sender send more than the window siz
Napster seems to use a wide range of ports, whatever
it finds available. The only successful way that I have
found to block Napster is to block the server IP addresses,
which are actually found in two blocks.
deny ip any 208.184.216.0 0.0.0.255 log
deny ip any 64.124.41.0 0.0.0.255 log
permit ip
ahp (51), eigrp (88), esp (50), gre (47), igrp (9), icmp (1), igmp (2), igrp (9), ip
(0), ipinip (4), nos (94), ospf (89), pcp (108), pim (103), tcp (6), or udp (17).
0 is 'ip'.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Nurarif W
Sent: Friday, Jan
Hi,
Without seeing the actual access-list, I would imagine that no port numbers
are being logged because you are not interrogating the traffic at a port
level, simply at a protocol level. You are seeing TCP traffic but not
checking for the port.
For example,
if you have a list that resembles th
- Original Message -
From: ""õ¸®¾È¸ÞÀÏ"" <[EMAIL PROTECTED]>
Newsgroups: groupstudy.cisco
Sent: Friday, January 19, 2001 10:06 AM
Subject: RE: TCP port number 0
> ahp (51), eigrp (88), esp (50), gre (47), igrp (9), icmp (1), igmp (2),
igrp (9), ip (0), i
Most likely someone was trying to do some "passive OS fingerprinting" with
hping2. The default port the hping2 uses is 0. They might have been trying
to map your network or they may have been just poking around.
Neil
""Nurarif W"" <[EMAIL PROTECTED]> wrote in message
009c01c081eb$19cc9730$1600
TCP port 0 is reserved.
Bookmark this site:
http://www.isi.edu/in-notes/iana/assignments/port-numbers
Chuck
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Nurarif W
Sent: Thursday, January 18, 2001 11:41 PM
To: [EMAIL PROTECTED]
Subject:
check
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/secur
_c/scprt3/scdenial.htm
or alternatively search for tcp and intercept at:
www.cisco.com
like I just did
Andy
- Original Message -
From: "Jeff Duchin"
To:
Sent: Tuesday, May 08, 2001 10:27 PM
Subject:
I found them as well, thanks.
I guess I need to rephrase the question... there are many parameters
(watch-timeout/drop-mode,etc.) that you can configure and I was wondering
what most people out there are using?
There's usually pros and cons to everything and talking to people who have
already do
With regard to the Window sizes agreeing a common
value (1024) the answer is generally no.
Let Host A have a large buffer and host B have a small
buffer. If the window sizes had to agree then the
window would have no choice but to take the smaller
size. The window sizes are for host A and host B
r
i think this is because the window size is allowed to get much larger
befrore something gets dropped on a higer speed segment.
i think sending the window size is still used.
also dont forget that sometimes ICMP is used to control certain things.
of course you've read the rfcs, the authoritative
At 10:01 AM 7/10/01, Peter Slow wrote:
>i think this is because the window size is allowed to get much larger
>befrore something gets dropped on a higer speed segment.
Would a TCP recipient know it was on a high-speed segment, though? A sender
might have some idea because it tracks congestion, b
Comments below..
"Priscilla Oppenheimer" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> At 10:01 AM 7/10/01, Peter Slow wrote:
> >i think this is because the window size is allowed to get much larger
> >befrore something gets dropped on a higer speed segment.
>
> Would a TCP
At 06:38 PM 7/10/01, Michael L. Williams wrote:
>Comments below..
>
>"Priscilla Oppenheimer" wrote in message
>[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > At 10:01 AM 7/10/01, Peter Slow wrote:
> > >i think this is because the window size is allowed to get much larger
> > >befrore someth
NICE!
See below.
"Priscilla Oppenheimer" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> A recipient is not told to use a window size by the sender. Each side has
> its own receive window size, based on its own buffer space. It used to be
> that a recipient ACKed whe
OK,
See if I have it here.
The receive window is a buffer. It is specified in bytes. During the 3 way
handshake, each side tells the other it's buffer size. This is the start of
our flow control.
During the 3 way handshake, Each side also specifies a sequence number. The
other will r
Stevens, TCP/IP Illustrated, page 266-267. And this
appears
to be happening in the sniffer trace that I was examine.
Brett
-Original Message-
From: Ayers, Michael [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 11:21 AM
To: [EMAIL PROTECTED]
Subject: RE: TCP Ack [7:11703]
OK
OK I'm reposting because my original got cut off.
See if I have it here.
The receive window is a buffer. It is specified in bytes. During the 3 way
handshake, each side tells the other it's buffer size. This is the start of
our flow control.
During the 3 way handshake, Each side also specifies
At 11:09 PM 7/10/01, Michael L. Williams wrote:
>You're correct, and I should be more careful with my terminology
>segments are what TCP deals with I'm wondering how you could get away
>with writing an RFC that doesn't specify something as critical as sending
>ACKs =)
Well, I think
At 01:29 PM 7/11/01, Ayers, Michael wrote:
>OK I'm reposting because my original got cut off.
>See if I have it here.
>The receive window is a buffer. It is specified in bytes. During the 3 way
>handshake, each side tells the other it's buffer size. This is the start of
>our flow control.
>Duri
OK, last try on my post
The receive window is a buffer. It is specified in bytes. During the 3 way
handshake, each side tells the other it's buffer size. This is the start of
our flow control.
During the 3 way handshake, Each side also specifies a sequence number. The
other will reply with a
dialup user.
>
>My $9.99 :)
>
>
> -Original Message-
>From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]]
>Sent: Wednesday, July 11, 2001 11:53 AM
>To: [EMAIL PROTECTED]
>Subject:RE: TCP Ack [7:11703]
>
>At 01:29 PM 7/11/01, Ayers, Michael
after some of the messages that have crossed both this list and the CCIE
list tonight, I have to ask:
this is a joke, right?
Chuck
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, August 07, 2001 9:46 PM
To: [EMAIL PROTEC
Why - It is called software because it is.
Explain - Cause you can't carry it in a bag like a piece of hardware.
Think of how light your carry-on at the airport would be, if all you had in
there was TCP/IP.
- Original Message -
From:
To:
Sent: Tuesday, August 07, 2001 9:45 PM
Subject
Not quite true.
TCP/IP CAN be done in silicon. However, it's not a good idea to do
this. The reason being is that if you have a bug in your stack, you
gotta toss the whole card.
These are called Layer 3 network cards, and are being used in some cases
to speed up some server stuff. Generall
So does this card come with a preconfigured address.
- Original Message -
From: "Michael R. Eckhoff"
To:
Sent: Wednesday, August 08, 2001 2:09 PM
Subject: Re: TCP/IP [7:15213]
> Not quite true.
>
> TCP/IP CAN be done in silicon. However, it's not a good
Next time somebody uses that term why don't you ask them what they mean.
And if they give you a everybody knows don't you answer, ask them what RFC
that is.
- Original Message -
From: "Ouellette, Tim"
To:
Sent: Thursday, October 04, 2001 11:23 AM
Subject: TCP TURN? [7:22083]
> Does
Were there any Marketing types in these meetings?
- Original Message -
From: "Ouellette, Tim"
To:
Sent: Thursday, October 04, 2001 11:23 AM
Subject: TCP TURN? [7:22083]
> Does anyone know what a TCP Turn is? I've heard this mentioned on a couple
> of conference calls i've been on lat
again there will be 5000 responses 4 this qs i guess
why dont u search b4 posting
- Original Message -
From: "Donald B Johnson jr"
To:
Sent: Thursday, October 04, 2001 11:35 PM
Subject: Re: TCP TURN? [7:22083]
> Next time somebody uses that term why don't you ask t
; guess
>
> why dont u search b4 posting
> - Original Message -
> From: "Donald B Johnson jr"
> To:
> Sent: Thursday, October 04, 2001 11:35 PM
> Subject: Re: TCP TURN? [7:22083]
>
>
> > Next time somebody uses that term why don't
> you
This topic seems to have taken a TCP Turn.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=22187&t=22083
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure
Normally, it is associated with application response time measure.
http://www.compuware.com/products/ecosystems/appexpert/detail.htm#tune
Cheers
TD
""Ouellette, Tim"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Does anyone know what a TCP Turn is? I've heard this mentioned on
On Mar 8, 3:14am, "Ghassan Majeed" wrote:
}
} From my little experience on the structure of TCP/IP , I draw the following
} chart:
}
} HTTPSMTPFTPTelnet| TFTPDNSDHCPSNMP
} |
} TCP|UDP
}
Looks good, I'd through in datalink layer between IP and NIC for a little
more clarification Since IP can use so many different datalink protocols.
Also for a little more understanindg you should also figure out where ICMP
protocol goes since its so important in troubleshooting IP networks.
""Gh
Juniper Networks Launches First Purpose-built Technical Certification
Program for ISP Professionals
Sunnyvale, CA - Jan. 30, 2001 - Juniper Networks, Inc. (Nasdaq: JNPR), a
leading provider of Internet hardware and software systems, today announced
the introduction of the Juniper Networks Tech
You have to use NAT, but your firewall handles that, and translates your RFC
1918 address to one that is publically routable... What you need is an
outside interface address from your partners' network, that translates to
the RFC 1918 address on their network...
Brant I. Stevens
Internetwork Sol
> -Original Message-
> From: Brant Stevens [SMTP:[EMAIL PROTECTED]]
> Sent: Friday, February 02, 2001 7:59 PM
> To: Ole Drews Jensen; [EMAIL PROTECTED]
> Subject: RE: TCP/IP print through firewall
>
> You have to use NAT, but your firewall
Hi,
I may be way, way off on this but I'll take a stab. If everybody that
uses the printer sits on the 10.0.0.0 network (ie. 10.0.0.100 and 10.0.0.200)
couldn't you change the printers default gateway to be the 10.0.0.0 network?
That way it would send the replies back to that network and
NEED A JOB ???
http://www.oledrews.com/job
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Saturday, February 03, 2001 2:49 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: TCP/IP print through
In addition to the public routable address on the printer, you need a
routable address on the workstation. You can accomplish this with a static
NAT translation on your firewall. Most likely, you currently have one
public address for your entire network for browsing. Hopefully you have a
spare
Hi,
I think, you would doing a NAT in this case and your packets to the
printer would already be going as a public IP address. So the printer
would be knowing where to send the responses back and you wont be
needing another NAT.
BRgds
Sudarshan
-Original Message-
From: [EMAIL PROTECTED]
ECTED]
Subject: Re: TCP/IP print through firewall
In addition to the public routable address on the printer, you need a
routable address on the workstation. You can accomplish this with a static
NAT translation on your firewall. Most likely, you currently have one
public address for your entire ne
http://www.oledrews.com/job
-Original Message-
From: Christopher Larson [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 05, 2001 1:05 PM
To: 'Dennis'; [EMAIL PROTECTED]
Subject: RE: TCP/IP print through firewall
We print to remote printers a
Correct me if I'm wrong but TCP Slow Start is that TCP starts sending slowly
and increases it's transfer rate until it gets dropped packets.
It is inherit to TCP and you always use it. You can kinda see this when you
start a large download off the web. My ADSL connection starts at around 40
kb/s
TCP slow start is mandarory of all TCP implementations. It operates by
observing the rate which acknowledgemenst are returned and injecting new
packets into the network accordingly. It uses a congestion window on the
senders side.It initializes this window to one segment when a new connection
is
Heres a Berkowitz reply from the last time you asked this.
Remember that TCP only understands a byte stream, not the structure
of application records within it. Brian is correct about one
application for interactive traffic.
Another might be if you had, let's say, 2000 byte application
records,
Well put, Sam. Below is a link to RFC 2001 that defines Slow Start,
Congestion Avoidance, Fast Retransmit and Fast Recovery.
Slow Start is indeed as described by Sam. However, it's important to note
that, although Slow Start and Congestion Avoidance are separate algorithms
with separate tasks,
itz"
To:
Sent: Sunday, August 26, 2001 10:01 PM
Subject: Re: TCP/IP question [7:17343]
>there was a question regarding 127.0.0.1. I understand that the actual
>TCP/IP "software" actually uses this address for self testing.
>when ping localhost {or computer {netbios} name} th
ceived and the Link Layer address of the host
or router from which the packet was received.
>
>- Original Message -
>From: "Howard C. Berkowitz"
>To:
>Sent: Sunday, August 26, 2001 10:01 PM
>Subject: Re: TCP/IP question [7:17343]
>
>
>>there was a qu
google returns all kinds of hits looks like novell or something..
http://www.google.com/search?q=tcp+port+280
mirror that port and trace what each packet contains You should also be
looking at the source fo the packets. workstations? servers? printers?
etc...
Patrick Ramsey
Sr. Ne
According to snort.org it would be this:
Port 280 / tcp
Keyword http-mgmt
Description
Port 280 / udp
Keyword http-mgmt
Description
--
James Haynes
Network Architect
Cendant IT
A+,MCSE,CCNA,CCDA,CCNP,CCDP,
CQS-SNA/IPSS
""Martin Roy"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTEC
Certainly I see it a lot when using the web based management software from
Compaq & Novell. I also recall seeing mention of it in the well known ports
lists as to do with http management, so that should givew you a place to
start.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=
http-mgmt 280/tcphttp-mgmt
http-mgmt 280/udphttp-mgmt
# Adrian Pell
#
HTH
Scott
-Original Message-
From: Patrick Ramsey [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 14, 2002 8:16 AM
To: [EMAIL PROTECTED]
Subject: Re: TCP port 280 [7:31867
ement
-Original Message-
From: Scott Nawalaniec [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 14, 2002 12:42
To: [EMAIL PROTECTED]
Subject: RE: TCP port 280 [7:31867]
Hi Martin,
"The Well Known Ports are assigned by the IANA and on most systems can
only be used by system (or root) pr
I found this in /etc/services
http-mgmt 280/tcp
http-mgmt 280/udp
Dave
Martin Roy wrote:
>
> Can any one tell me which application is using port 280? I get several
hits
> on my access-list from port 280 but I cannot seem to narrow the source.
>
> Thanks
>
> Martin
>
> Martin
http based mngt on some hp printers. check out list of
registered ports with IANA.
http://www.iana.org/assignments/port-numbers
hope that helps.
--- Martin Roy wrote:
> Can any one tell me which application is using port
> 280? I get several hits
> on my access-list from port 280 but I cannot s
Did you check the host requirements RFC, RFC 1122? I think it's OS-dependent
though and not specified
Priscilla
John Neiberger wrote:
>
> One of our programmers is asking me about this and I really
> don't have an answer. I've checked RFC 793 and haven't spotted
> the answer yet.
>
> Is th
I don't know any Java but standard UNIX sockets allow a non-blocking
connect. Thus you don't care what the underlying stack is doing, you
just time-out at the application layer.
rgds
Marc
John Neiberger wrote:
>
> One of our programmers is asking me about this and I really don't have an
> answer
Scott Hoover wrote:
>
> Running a solaris (v8 I think) box with Lotus Notes on it (new
> build). We
> are having a problem with the server immediately sending a
> reset to clients
> after receiving the syn.
I bet there's a firewall on the server that's blocking access to the port.
> Congestion
Is it being load balanced or does it have 2 nics ?
We just went thru this issue with a mail server and load balancing
That had default gateway probs with two nics on separate subnets...
Larry Letterman
Cisco Systems
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Larry Letterman wrote:
>
> Is it being load balanced or does it have 2 nics ?
> We just went thru this issue with a mail server and load
> balancing
> That had default gateway probs with two nics on separate
> subnets...
Default gateway problems caused it to send TCP resets? What happened to the
Here is one of hundreds of links I got when i entered tcp push bit on
google.com
http://www.daemon.org/tcp.html
*** REPLY SEPARATOR ***
On 9/19/2001 at 10:34 AM Mr. Laughs wrote:
>I need help finding out what the TCP Push bit is. Would you please help
>me
>with a source?
>
>T
Matthew here's a little info on the ports used in h323:
To set up a voice connection, the initiator starts a H.225 connection over
TCP to the destination entity (normally the gatekeeper) at port number 1720.
In this session a port number for the following H.245 connection is
exchanged. The initi
Patrick,
thanks for your help.
Matthew.
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=21625&t=21519
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure viol
According to the well-known port list
http://www.iana.org/assignments/port-numbers it is:
h323hostcall
1720/TCP h323hostcall
h323hostcall
1720/up h323hostcall
Heather
> -Original Message-
> From: Matthew Webster [SMTP:[EMAIL PROTECTED]]
> Sent: Sunday, Septe
The window size has nothing to do with packet size. It sounds like you have
misunderstood its purpose (which is for flow control).
Priscilla
At 07:25 PM 10/31/01, John Tafasi wrote:
>Hi Group,
>
>I have a little but difficut question regarding TCP window size. How can the
>tcp window size confi
John- I believe you've let this term confuse you. What you are seeing with
TCP windowing is how may packets you send before requiring an
acknowledgement. This is better know as the sliding window principle,
because consistent connections allow the window to open more freely (i.e.
larger periods
Here is an excerpt of what Mike Crane, author of the Cisco CID Exam
Certification
Guide from Cisco Press, is saying in his own words in this book, page 538:
"Another adjustment is to increase the TCP window size to allow more
outstanding requests. This command can also minimize packet fragmentati
At 09:44 PM 10/31/01, John Tafasi wrote:
>Here is an excerpt of what Mike Crane, author of the Cisco CID Exam
>Certification
>Guide from Cisco Press, is saying in his own words in this book, page 538:
>
>"Another adjustment is to increase the TCP window size to allow more
>outstanding requests.
W
Thank you Priscilla. Now thing are quite clear.
>From now on I have to look out for authors' mistakes.
John Tafasi
""Priscilla Oppenheimer"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> At 09:44 PM 10/31/01, John Tafasi wrote:
> >Here is an excerpt of what Mike Crane, author
sam sneed wrote:
>
> Lets say we have host A 22.12.12.12 and host B 99.99.99.99.
> Host B is a
> server listening on port 3055. Host A connects to the server B
> and sends
> data. Now neither host A or B send anything to each other for
> 1 hour. Is
> the connection still there? Is there a timeo
Someone sent me this link which I think was helpful:
http://www.sean.de/Solaris/soltune.html#common
I will have to do more research.
The problem I need to solve:
My firewall keeps connections in its state table for 1 hour. So after one
hour if you did a netstat on each host the connection appear
I think the RFC that say's keepalives must be at least 2 hours isn't very
security conscious. What I mean is if you take a syn attack, it sets up
connections and then never sends any data, holding the connection in a
half-open state. I know there's a finite number of connections that a host
can
Let me tell you about this experience I have with this and if someone could
please explain it.
I usually telnet into my mini-lab and open a session for each router and
switch. I also have the "exec-timeout 0 0" command for the vty interfaces.
So at night when I go to bed ... I put my W2K machine
By default, most OS's will keep the sockets open. When you created a socket,
you can include the SO_KEEPALIVE option. This will keep the socket open for
tcp_keepalive_interval value of the OS, the defult is 2 hours on microsoft
and Solaris sysems. If you do not use this socket options they will s
Priscilla Oppenheimer wrote:
>
> Zsombor Papp wrote:
> >
> > As a side question, do you think that TCP must run over IP? :)
>
> I forgot to comment on that very important question! :-)
>
> I've never seen TCP run over anything other than IP, although
> in theory it could.
Has anyone seen TCP
Priscilla Oppenheimer wrote:
>Has anyone seen TCP run over anything other than IP? I'm curious.
IIRC, even Avian Carriers use IP
> By the way, TCP was developed before IP. Most people assume the
> opposite. At the time, TCP included most of IP's current
> functionality. Then it was wisely de
1 - 100 of 225 matches
Mail list logo