Skip to main content
Filter by
Sorted by
Tagged with
0 votes
1 answer
60 views

Getting into protocol development with Scapy, going through documentation and watching videos on Scapy but I'm a bit confused with field types. Let's assume something generic for a packet structure: | ...
Darkonode's user avatar
1 vote
1 answer
106 views

I need to create a connection between 4 clients and a server and they should communicate over a networkprotocol. I'm quite clueless and I don't know what I need to implement in which class. I managed ...
Chulija's user avatar
  • 11
0 votes
1 answer
109 views

I'm creating an Open Metrics HTTP source for a Prometheus server in Rust. I'd rather avoid pulling in a whole web server library (crate) because I control the infrastructure and pretending to answer ...
RandomInsano's user avatar
  • 1,260
0 votes
0 answers
109 views

For learning purposes, I'm writing a basic network protocol over TcpStreams. In order to delimit individual messages, I was using read_until, but because the data sent can contain any bytes, this can'...
Encephala's user avatar
  • 348
0 votes
0 answers
63 views

Problem description: Does internet router discard UDP packet which has IP option data? I have two hosts which both have internet IPv4 address, and installed ubuntu 20.04. If I send normal UDP packet ...
Super Rubin's user avatar
0 votes
2 answers
206 views

Or do they appear identical to a potentially hostile middle-box? Notwithstanding profiling of traffic flows which may out gRPC. TLS/JA3 fingerprints may also be a problem, but assume they are handled ...
voidastro's user avatar
0 votes
1 answer
93 views

how the header structure in bit representation let's take the example icmp header because this icmp has fewest fields. | TYPE | CODE | CHECKSUM | CONTENT Just for example then let's assign some ...
Hanzo Mortal_kombat's user avatar
0 votes
1 answer
659 views

I can see that the Futaba SBus decoder is supported by the community but can't see a way to install it. I have tried copying the files into a new folder alongside the existing decoder files but the ...
flyboy_CW12's user avatar
0 votes
0 answers
96 views

How to implement routing protocol switching under ns3? For example, during simulation, switch from aodv protocol to olsr protocol? The ns-3 version is 3.36.1.
Acbogu's user avatar
  • 65
1 vote
0 answers
423 views

I will have to use the HDLC protocol on a synchronous RS485, but I don't understand the encoding algorithm very well. If I have, for example, this condition: Address: 0x01 (1 byte) Control: 0x02 (1 ...
rostonik's user avatar
  • 709
1 vote
1 answer
5k views

I'm confused because it looks for me like different sources says different things, I don't really understand it: The "layer" refers to a design choice to introduce a new optimized encoding ...
Noname's user avatar
  • 13
1 vote
0 answers
675 views

Thanks in advance for any guidance. This issue is frustrating me. I'm using deepstream SDK,deepstream-test1-rtsp-out sample as base code. This sample sends video over the rtsp server, and it works. I ...
CYrOgAV's user avatar
  • 11
0 votes
0 answers
304 views

if Traefik receives a request for a webpage that includes images and a audio and the configuration specifies different servers for the different content types, does Traefik open individual streams for ...
Mormorion's user avatar
-1 votes
1 answer
69 views

suppose you have 4 home automation product – thermostat , speaker, screen , camera .We need to make sure the interoperability is working as expected . what is the infra that we need to test it What ...
CSB's user avatar
  • 19
0 votes
1 answer
140 views

I wanted to ask something, When an application running on our browser doesn't want its data packet to get fragmented, it uses Do Not Fragment bit, to signify that this packet must not be fragmented, ...
Divyansh Nema's user avatar
0 votes
1 answer
100 views

Previously I was working on my project with a local database, but I have migrated to an aws database, I have already created my instance and everything seems to work properly (I am working on my ...
Eddie Toledo's user avatar
0 votes
2 answers
2k views

I need to figure out what type of malicious activity is present in this .pcapng file I have received for my coursework using wireshark, however I'm not asking anyone to solve it don't worry. I'm ...
Programmer46234's user avatar
1 vote
1 answer
168 views

Server blocks outgoing SSH on port 22. Trying to connect a new repo to an existing private GitHub repo. On server: git init . git remote add [email protected]:<github_username>/repo_name.git ...
pd_au's user avatar
  • 111
0 votes
2 answers
437 views

I have a requirement where, i need to send a body on a GET request, the .netFramework 4.7.2, throw an Protocol exception, but as far i read, is possible to send it using a WinHttpHandler, but I'm ...
Andres Abarca's user avatar
1 vote
1 answer
98 views

For instance, if a request failed due to no authorization, clients expect a 401. However, if a server returns a 200 but with a message indicating failure to authenticate, does this technically go ...
jclasley's user avatar
  • 678
0 votes
1 answer
1k views

I`m trying to write some tools with chrome Chrome DevTools Protocol https://chromedevtools.github.io/devtools-protocol/tot/Network/#method-enable. I want get page ResponseBody and I don't know where ...
SonyMag's user avatar
  • 171
0 votes
0 answers
393 views

I'm setting up a traffic generator using pktgen-DPDK. What am having a hard time understanding is why DPDK plays a part when sending packets. From what I understand, when the receiver gets a packet ...
Agent smith 2.0's user avatar
0 votes
1 answer
668 views

I want to write a program that can monitor all system HTTP/HTTPS protocols used to open the default browser, and block certain ones, automatically changing certain requested URL into another. The ...
szw0407's user avatar
  • 41
-1 votes
2 answers
203 views

I want to know exactly what a Network Protocol is?Almost all the definitions on the internet say "its a set of rules" But i want to know how and where these rules exist? is it a piece of ...
Hamreen Ahmad's user avatar
0 votes
0 answers
67 views

I am trying to implement the above multicast protocol using ns2, but i am unable to find correct source on how to build the protocol. I read through the documentation, all they said about was ...
Santosh Kumar Doodala's user avatar
0 votes
1 answer
157 views

I am trying to run leach protocol as described in LEACH without success. Any help will be appreciated. Thanks!!! I reinstall it by fellowing the descriptions provided this linlk and I still get the ...
Abdoulaziz Hamayadji's user avatar
0 votes
0 answers
44 views

Cheers! I'm working on a custom TCP implementation for a specific usecase, and the hope is that it should be able to chat with the wider world. I'm currently a little confused when it comes to TCP ...
Narmondur's user avatar
  • 121
0 votes
1 answer
437 views

I'm trying to build a system in which I can connect some devices to a server over the internet. I want to stream some data over CoAP (10-30FPS), frame size = 3KB. Firstly, I used Aiocoap, it sends up ...
waleed Mash's user avatar
0 votes
1 answer
1k views

When I hear/read about internet address, it is always IPv4 address or its successor IPv6 address? But as far as I know, these are not built into the internet itself. Instead, these addresses are ...
Sourav Kannantha B's user avatar
2 votes
0 answers
291 views

I have been looking around the internet to see what protocols are available for the client/server communication. I'm currently not able to find a durable solution for my problem, maybe looking the ...
dennis_ler's user avatar
0 votes
1 answer
229 views

A question about how network data traverses through the internet. I'm wondering whether the encapsulation/de-capsulation process happens at each hop while a request is being sent through the internet. ...
Mze's user avatar
  • 13
0 votes
1 answer
699 views

As shown in the screenshot above, the protocol column always shows correct signs rather than the actual protocol name. The wireshark version is 3.6.5. How to force wireshark to show protocol names?
xmllmx's user avatar
  • 44.6k
1 vote
1 answer
334 views

I've been trying to useorg.apache.commons.net.telnet.TelnetClient and I am having trouble to receive non-ASCII characters (in my case polish chars like ą,ę,ć,ź and few others). The problem is not on ...
avrath's user avatar
  • 21
0 votes
0 answers
131 views

I am having an issue trying to receive a string that I need to split as one part of the string has a name and the other part of the string has a location. although I am unsure how to split this data, ...
menemjeff's user avatar
1 vote
1 answer
1k views

I want to connect a PC to an existing PRP topology, this PC have two Ethernet ports. I have been reading up a lot about PRP protocol, but i don't know if i can setup the PRP protocol over a linux ...
user18335623's user avatar
0 votes
0 answers
406 views

A theoretical question. How can Fragmentation be implemented over the transport layer in the OSI model? How can I "change" the UDP protocol to support that thing?
Omer Idel's user avatar
0 votes
1 answer
238 views

How a streaming (e.g. a sound or video) HTTP server should report failure in the DB from which it streams (when it already streams, 503 header cannot be generated). The client should be able to ...
porton's user avatar
  • 5,909
3 votes
1 answer
868 views

I'm developing an application in Rust in which I need to transfer two types of data to a server on the Internet: Lots of "less important" information, for which I would use the UDP protocol....
Miguel Carvalho's user avatar
0 votes
1 answer
873 views

By default, Vue-CLI-service serves on HTTP 1.1. Is there any way to serve it on HTTP-2?
swapnil biswas's user avatar
1 vote
1 answer
379 views

As socks5 rfc says, A UDP association terminates when the TCP connection that the UDP ASSOCIATE request arrived on terminates. I wonder, doesn't "the TCP connection that the UDP ASSOCIATE ...
badeggg's user avatar
  • 13
-1 votes
1 answer
179 views

When a qBittorrent torrent client (A) shares a file (Seeding == A), the attacker implemented UDP flooding on the IP and PORT used by Qbittorrent. As a result, file sharing was not possible, and other ...
DownTop_oil's user avatar
0 votes
1 answer
536 views

We know that a protocol is a rule that computers follow so that they can effectively communicate with each other. But when we talk about rules, the question arises, what are these rules.? For example, ...
Samvel Ghumashyan's user avatar
1 vote
1 answer
826 views

In my application I need to show a QRCode that embeds a URL to be opened in a browser. I'm using the Nayuki library in my Qt/C++ application and I encode this string: "http://mydevice.local" ...
Mark's user avatar
  • 5,355
0 votes
1 answer
837 views

I`m trying to get access to an area with a Network response I`m using the following code, but it does not work. import websocket import json from pprint import pprint ws = websocket.WebSocket() ...
October's user avatar
  • 61
1 vote
2 answers
2k views

Just wondering, would it be possible to use the ping "time" to calculate the distance between two local computers / machines ?
Tarsky's user avatar
  • 21
1 vote
1 answer
558 views

I'm writing my own client and server, they are implement my own application level protocol. For transport layer TCP is used. For internet layer IPv4 is used. Nor TCP header, nor IPv4 header not ...
Amaimersion's user avatar
  • 1,053
0 votes
1 answer
69 views

Sorry for my ignorance , but this subject has been stressing me for days I currently read in a book about networks that there is a UseNet that is like a blog , but uses a different protocol to ...
MokuchiDev's user avatar
-1 votes
1 answer
186 views

Well, I've read that the Data Link layer is further divided into LLC and MAC sublayers. However, the description of the MAC functions seems just like what the ARP does, which left me a bit confused. ...
Jônatas Silveira de Andrade's user avatar
13 votes
3 answers
5k views

In GitLab, when you click on the blue "Clone" button you will see several options: Clone with SSH Clone with HTTPS Open in your IDE The "Open in your IDE" section shows the option ...
Adrian's user avatar
  • 2,156
0 votes
0 answers
502 views

By definition, HTTP pipelining is a technique in which multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses, according to Wikipedia, and some ...
strck's user avatar
  • 1

1
2 3 4 5
25