Results 1 to 3 of 3
  1. #1
    Senior Member
    Join Date
    Oct 2004

    How is corrupted TCP traffic dealt with?

    I know about the three-way handshake to establish a TCP connection. If there are two hosts, "A" requesting information and "B" providing it, "A" sets the window size. Let's say that the window size will allow 3 frames to be transferred before "A" issues an ACK.

    Assume that the connection has been establised and transfer of data occurs:

    "B" sends frames 1, 2 and 3 to "A"
    "A" sends an ACK, indicating that the next expected frame is 4
    "B" sends frames 4, 5 and 6 to "A" but frame 5 is damaged
    "A" sends an ACK, indicating that the next expected frame is 5 (rather than 7)

    The question that I have is what happens next?

    Does "B" send frames 5, 6 and 7 (even though 6 and 7 have been received by "A" correctly) and are the original frames 6 and 7 discarded?


    When "A" sends the ACK, does it indicate that it only requires frame 5 and reduce the window size so that a further ACK will be issued after the single frame has been received correctly? If this happens, "A" will have to reassemble the data into the correct order and return the window size to what it was previously.

    I hope that I've explained the question. I've done some googling but haven't come up with any solution. I guess that I could run a packet sniffer and look for retransmitted frames but that might be a long process going through the traffic to identify them.

    Thanks for your time.

  2. #2
    Senior Member
    Join Date
    May 2003
    IIRC it would just resend packet 5 and then continue with8,9, and 10 once it receives the ACK for 5.
    Everyone is going to die, I am just as good of a reason as any.


  3. #3
    Senior Member
    Join Date
    Oct 2004
    So does it mean that "A" reduces the window size to 1 and then back to 3 when frame 5 has been received correctly or is there something special about the request to resend a particular frame which doesn't need the window size to be changed?

Similar Threads

  1. PIX: Access Control Lists and Content Filtering
    By Nokia in forum The Security Tutorials Forum
    Replies: 0
    Last Post: October 23rd, 2006, 04:58 PM
  2. Using IPSec to Secure Computers and Network Traffic.
    By Tiger Shark in forum The Security Tutorials Forum
    Replies: 0
    Last Post: October 7th, 2004, 07:18 PM
  3. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 07:01 AM
  4. HaHaHa Akamaitechnologies Port Scan
    By mathgirl32 in forum IDS & Scanner Discussions
    Replies: 10
    Last Post: February 3rd, 2003, 06:20 PM
  5. The Worlds Longest Thread!
    By Noble Hamlet in forum AntiOnline's General Chit Chat
    Replies: 1100
    Last Post: March 17th, 2002, 08:38 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.