Free Essay

Tcp Timestamps

In:

Submitted By redacted
Words 1641
Pages 7
TCP Timestamping can be used to retrieve information about your system that you may not wish to be public. I started investigating this after some discussion of NetCraft's (http://www.netcraft.com/) server uptime stats, and their reliability. Ant Mitchell was very polite in telling me NetCraft would not disclose how they obtain these figures, only that he feels they are reliable. So I started looking into how they could get this information.
What I discovered was TCP Timestamping is equal to the uptime (after a fashion) of many systems, and as such can give you extra information about the running system. What is Timestamping? How can it be used to gain information about a running system? Timestamping is a TCP option, which may be set, and if set takes
12 bytes in the header (for each packet) in addition to the 20 bytes a TCP header normally takes. This is exclusive of any other options. What good is this overhead? According to RFC1323:

"The timestamps are used for two distinct mechanisms: RTTM (Round Trip Time Measurement) and PAWS (Protect Against Wrapped Sequences).".

I suggest that anyone interested in TCP Timestamps read RFC1323 (these are not the IP timestamping options). The fact that timestamping exists isn't anything special in itself, but how the value is populated and how the value is set is somewhat interesting.

4.4BSD increments the timestamp clock once every 500ms and this timestamp clock is reset to 0 on a reboot -- TCP/IP ILLUS v1, p349

The timestamp value to be sent in TSval is to be obtained from a (virtual) clock that we call the "timestamp clock". Its values must be at least approximately proportional to real time, in order to measure actual RTT. -- RFC1323 May 1992

Note that the RFC does not dictate that the timestamp clock be tied to system uptime, so any system that doesn't conform to this is perfectly valid (ie Windows 2000). Additionally the rate at which each system increments the clock need not be disclosed either, as the timestamp value is only echoed back to the sender for the sender to process.

This means that in 4.4BSD we can use this number to directly tell the time that a system has been up. All we have to do is make a connection and record the received timestamp. Not everyone implements timestamping this way however. This yields various results on different operating systems. Linux for instance increments every 1 ms, Cisco IOS increments every .1 ms. Windows 95/98/NT4 do not support Timestamping (although rumor has it that there is a patch to enable RFC1323 functionality on 95/98/NT4)
Win2k does, but this value does not appear to be directly related to uptime.
This means that in order to tell the uptime we need to know what OS we are looking at, or at the very least make multiple connections and try to guess what the increment is based on elapsed time vs increment.

There are some limitations to using this method for recording uptime.
Certain systems have a maximum limit on how long their 'uptime' can be.
The timestamp is a 32 bit number (signed). As such it will overflow into the sign bit after 2147483647 ticks. Based on the number of ticks per second, you can easily determine when this will roll over.

(leap year included)
OS Ticks/sec Rollover time
4.4BSD 2 34 years, 8 days, 17:27:27
Solaris 2 10 6 years, 293 days, 22:53:00
Linux 2.2+ 100 248 days, 13:13:56
Cisco IOS 1000 24 days, 20:31:23

One can also map out the number of systems in a load balanced environment by connecting repeatedly to the group of machines, and inspecting the
Timestamps. For each different time you have a different machine.

RFC1323 talks about the frequency the 'timestamp clock' should be updated

The receiver algorithm does place some requirements on the frequency of the timestamp clock.

(a) The timestamp clock must not be "too slow".

It must tick at least once for each 2**31 bytes sent. In fact, in order to be useful to the sender for round trip timing, the clock should tick at least once per window's worth of data, and even with the RFC-1072 window extension, 2**31 bytes must be at least two windows.

To make this more quantitative, any clock faster than 1 tick/sec will reject old duplicate segments for link speeds of ~8 Gbps. A 1ms timestamp clock will work at link speeds up to 8 Tbps (8*10**12) bps!

(b) The timestamp clock must not be "too fast".

Its recycling time must be greater than MSL seconds. Since the clock (timestamp) is 32 bits and the worst-case MSL is 255 seconds, the maximum acceptable clock frequency is one tick every 59 ns.

However, it is desirable to establish a much longer recycle period, in order to handle outdated timestamps on idle connections (see Section 4.2.3), and to relax the MSL requirement for preventing sequence number wrap-around. With a 1 ms timestamp clock, the 32-bit timestamp will wrap its sign bit in 24.8 days. Thus, it will reject old duplicates on the same connection if MSL is 24.8 days or less. This appears to be a very safe figure; an MSL of 24.8 days or longer can probably be assumed by the gateway system without requiring precise MSL enforcement by the TTL value in the IP layer.

Based upon these considerations, we choose a timestamp clock frequency in the range 1 ms to 1 sec per tick. This range also matches the requirements of the RTTM mechanism, which does not need much more resolution than the granularity of the retransmit timer, e.g., tens or hundreds of milliseconds.

As you can see all of these systems are within the RFC in their timings, however varied.

It has come to my attention that nmap 2.54beta20 released March 09, 2001 included support for detecting (multiple pass, guess at tick rate) uptimes.

If you want to quickly get the Timestamp value, you can fire up tcpdump, and watch for it. Here is an example of what you may see and how to interpret the data: myhost.12345 > theirhost.22: . 1:1(0) ack 1 win 5840 (DF)

The timestamps are located near the end of the line, where the TCP Options are printed. The first timestamp is sent by 'myhost', the second is what
'theirhost' last sent us (we are expected to return that to them). The numbers are the number of ticks that have accumulated in the 'timestamp clock' and if the OS supports it, can reveal an uptime.

I have included below information obtained by myself and several people running various OSs that let me scan them and compare the actual uptime vs the timestamp returned. I do not have access to all systems to test, however I tried to include as much vendor information on RFC1323 compliance as reasonably possible.

If you are considering disabling timestamping on your system please read RFC1323 for more information (especially if you are on a fast network). Windows Win2k sends the timestamp after the syn/ack handshake is complete (sends 0 TS during the 3-way handshake) 95/98 does not support TS NT 3.5/4 does not support TS 2000 increment every 100ms initial number random

Linux Sends TS on first packet replied to - default always get TS To disable echo 0 >/proc/sys/net/ipv4/tcp_timestamps To enable echo 1 >/proc/sys/net/ipv4/tcp_timestamps Increments 100 ticks/sec 2.0.x does not support TCP Timestamps 2.1.90+ Supports Timestamps 2.2.x Supports Timestamps 2.4.x Supports Timestamps

4.4BSD - OpenBSD BSDi BSD/OS (2.1 & 3.0) FreeBSD (2.1.5) To enable/disable sysctl -w TCPCTL_DO_RFC1323={true,false} Or sysctl -w net.inet.tcp.rfc1323={true,false} 4.4BSD spec is applied, 2 ticks/sec

MacOS (Open Transport) Supports Timestamps

Novell Netware 5 Does not support Timestamps

IRIX 5.3+ Support Timestamps 5.3-6.1 /var/sysgen/master.d/bsd contains the kernel variables after editing you must use /etc/autoconfig and reboot (WTF!) 6.5 edit /var/sysgen/mtune/bsd or use systune (like BSDs sysctl) tickrate 2/sec

HPUX 9.x No (9.05 and 9.07 have patches to support Timestamps) To enable you must poke the kernel variable tcp_dont_tsecho to 0

10.00,01,10,20,30 Support Timestamps 11 Enabled by default

AIX 3.2 & 4.1 Support Timestamps Tunable via the 'no' command

SunOS 4.1.4 No (May be purchased as a Sun Consulting Special)

Solaris To Enable 2.5 No (May be purchased as a Sun Consulting Special) 2.6 may be uptime but rolls over quickly, increments 1000 ticks/second 2.7 tickrate 100/sec (its not exactly uptime there was a 5 minute skew on a 112 day uptime) 8 it is uptime, 100 ticks/second to enable ndd /dev/tcp tcp_tstamp_always 1 If the parameter is set (non-zero), then the TCP timestamp option will always be negotiated during connection initiation. The scale option will always be used if the remote system sent a timestamp option during connection initiation. To use the timestamp, both hosts have to support RFC 1323.

ios (cisco) By default disabled To change [no] ip tcp timestamp I tested only against a Cisco 2524 running 12.0(9) cisco 2524 (68030) processor (revision J) with 14336K/2048K bytes of memory. Updates 1000 ticks/sec resets to 0 at boot

comos (livingston/lucent portmasters) Do not support TS

Netopia Do not support TS

ConvexOS 11.0 Supports Timestamps

CRI Unicos 8.0 Supports Timestamps

(Compaq) Digital Unix 3.2 & 4.0 Does not support Timestamps

Similar Documents

Free Essay

Spanner, Google Data Base

...disasters, by replicating their data within or even across continents. Spanner’s main focus is managing cross-datacenter. Many applications at google have chosen to use Megastore because of its data model and support for synchronous replication despite poor throughput. Applications can specify con-straints to control which datacenters contain which data, how far data is from its users how far replicas are from each other an how many replicas are maintained can also be known. Spanner has two features that are difficult to implement i.e providing externally consistent reads and writes, and globally-consistent reads across the database at a time-stamp. If a transaction t1 commits before another transaction t2 starts, then t1’s commit timestamp is...

Words: 2222 - Pages: 9

Free Essay

Marketing

...Community Specific Temporal Topic Discovery from Social Media Zhiting Hu Chong Wang Junjie Yao Department of Computer Science,Peking University Machine Learning Department Carnegie Mellon University huzhiting@pku.edu.cn chongw@cs.cmu.edu Department of Computer Science,University of California, Santa Barbara arXiv:1312.0860v1 [cs.SI] 3 Dec 2013 Eric Xing Hongzhi Yin jjyao@cs.ucsb.edu Bin Cui Machine Learning Department Carnegie Mellon University Department of Computer Science,Peking University Department of Computer Science,Peking University epxing@cs.cmu.edu bestzhi@pku.edu.cn bin.cui@pku.edu.cn ABSTRACT quick-updated texts, exhibiting rich temporal dynamics. Understanding these dynamics provides important insights into people’s changing online behaviors. Extensive research is devoted to uncover the temporal dynamics of online content [11, 26, 23]. However, most of these existing work only explores global temporal variation, or the overall trends of topics. This ignores an important aspect of social media—the communities. A community is a collection of users with more or/and better interactions amongst its members than the rest of the global network [10]. Communities play a crucial role in social media, and provide the basis for user participation and engagement. Members in the same community typically bear similar content preferences and often communicate on shared topics [21, 20]. Given that the content...

Words: 10413 - Pages: 42

Free Essay

Data Communications Assignment

...Question 8-2: Five equal-size datagrams belonging to the same message leave for the destination one after another. However, they travel through different paths as shown in Table 8.1. We assume that the delay for each switch (including waiting and processing) is 3, 10, 20, 7, and 20 ms respectively. Assuming that the propagation speed is 2 x 10^8 m, find the order the datagrams arrive at the destination and the delay for each. Ignore any other delays in transmission. Answer: The order of datagram arrival: 3, 5, 2, 4, 1 1: (3200) / (2 * 108 m/s) + (3 + 20 + 20) = 59.0 ms 2: (11700) / (2 * 108 m/s) + (3 + 10 + 20) = 91.5 ms 3: (12200) / (2 * 108 m/s) + (3 + 10+ 20 + 20) = 114.0 ms 4: (10200) / (2 * 108 m/s) + (3 + 7 + 20) = 81.0 ms 5: (10700) / (2 * 108 m/s) + (3 + 7 + 20 + 20) = 103.5 ms Question 8-9: Answer the following questions: a. Can a routing table in a datagram network have two entries with the same destination address? Explain. * There cannot be two entries with the same destination address in a datagram network because they are unique, meaning there is no address alike in the routing table. b. Can a switching table in a virtual-circuit network have two entries with the same input port number? With the same output port number? With the same incoming VCls? With the same outgoing VCls? With the same incoming values (port, VCI)? With the same outgoing values (port, VCI)? * In terms of a virtual-circuit network, Virtual Circuit Identifiers (VCI) are local...

Words: 367 - Pages: 2

Premium Essay

Sec450

...routing table above. Routing protocol | Destination Network | Metric | Outbound Interface | | | | | | | | | | | | | #3. Write the CLI command to verify connectivity from the ISP Router to 1. Dallas Server: ------------------------------------------------- 2. Dallas Host: ------------------------------------------------- 3. Chicago Server: ------------------------------------------------- 4. Chicago Host: ------------------------------------------------- Task 3—Deny Upper TCP ports from suspicious hosts to Dallas Server Port scan packets and other malicious activities have been detected by an Instruction Detection System (IDS) deployed in Dallas LAN. They are upper TCP port packets arriving to Dallas Server from the Attack PC. #4. Your task as a network administrator is to configure an ACL in Dallas Router to prevent malicious packets entering Dallas LAN. These packets are from the Attack PC with TCP port numbers greater than 255 can. At the same time, the ACL should allow any other traffic to enter Dallas LAN. Copy below Dallas router’s running-config from page 3, and add the commands needed to create and apply the ACL in the router. #5. Do you use a standard or extended ACL in Dallas router? Why? ------------------------------------------------- ------------------------------------------------- #6. What is the use of wildcard in ACL command? Provide an example....

Words: 329 - Pages: 2

Free Essay

Common Ports

...provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to. Some characteristics of ports are listed below: • Ports allow a single host with a single IP address to run network services. Each port number identifies a distinct service. • Each host can have over 65,000 ports per IP address. • Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN).  ICANN specifies three categories for ports. • Well known ports range from 0 to 1023 and are assigned to common protocols and services. • Registered ports range from 1024 to 49151 and are assigned by ICANN to a specific service. • Dynamic (also called private or high) ports range from 49,152 to 65,535 and can be used by any service on an ad hoc basis. Ports are assigned when a session is established, and released when the session ends. The following table lists the well known ports that correspond to common Internet services. |Port(s) |Service | |20 TCP |File Transfer Protocol (FTP) | |21 TCP | | |22 TCP and UDP |Secure Shell (SSH) | |23 TCP ...

Words: 349 - Pages: 2

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...

Words: 278 - Pages: 2

Free Essay

Week1 Ilab

...Student Name ________________________________ Date 05/09/2013_____________ SEC572 Security Testing iLab Task 1 – Verify Connectivity between Router and Hosts Complete the table below based on the dynamic routes displayed in the routing table: Routing protocol Destination Network Metric Outbound Interface R - RIP 192.168.100.0/24 1 Serial0/0 R- RIP 192.168.200.0/24 1 Serial0/1 • Select the Task 1 commands and output in the Virtual CLI using the mouse. Click on the Copy button. Use V to paste the commands into your Lab Document. ISP_Router con0 is now available Press RETURN to get started. ISP_Router> ISP_Router> ISP_Router> ISP_Router> ISP_Router>enable ISP_Router#show ip interface brief Interface IP Address OK? Method Status FastEthernet0/0 200.100.0.1 YES NVRAM up FastEthernet1/0 200.100.40.1 YES NVRAM up Serial0/0 200.100.10.1 YES NVRAM up Serial0/1 200.100.20.1 YES NVRAM up ISP_Router#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2 * - candidate default Gateway of last resort is not set Displaying routing table from result of FLAN table R 192.168.100.0/24 [120/1] via 00.100.10...

Words: 538 - Pages: 3

Free Essay

Nt1210 Mid-Term Study Guide

...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...

Words: 366 - Pages: 2

Premium Essay

Fireware

...A Firewall is a network security system , it could be software or hardware based , but the ideal firewall configuration will consist of both . It acts as a barrier controlling the flow of data which is either incoming or outgoing On a set of rules . Firewall also controls the access to the resources of a network through a positive control model , this means that the only traffic allowed onto the network must be defined in the firewall policy ; all other traffic is denied . Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four network ports to connect other computers . Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer . Firewall was first established when organizations began moving from "Mainframe Computers" to "Client-Server model" . The ability to control access to the server became a priority , before firewalls showed up in the late 1980s , the only real form of network security was performed by "Access Control List (ACLs)" residing on routers . "ACLs" determined which IP addresses were granted or denied access to the network. Firewalls are used to protect...

Words: 406 - Pages: 2

Free Essay

Ccna Ch 4

...listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6. Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed? session establishment segment retransmit data transfer session disconnect 7. Refer to the exhibit. The initial TCP exchange of...

Words: 973 - Pages: 4

Premium Essay

Analysis2 Questions Ip Networking

...Chapter 6 Answer the following review questions. 1. PC1 is using TCP and has a window size of 4000. PC1 sends four segments to PC2 with 1000 bytes of data each, with sequence numbers 2000, 3000, 4000, and 5000. PC1 does not receive an acknowledgment within its current timeout value for this connection. What should PC1 do next? a. Increase its window to 5000 or more segments b. Send the next segment, with sequence number 6000 c. Resend the segment whose sequence number was 5000 d. Resend all four previously sent segments 2. Which of the following are not features of a protocol that is considered to match OSI Layer 4? e. Error recovery f. Flow control g. Segmenting of application data h. Conversion from binary to ASCII 3. Which of the following header fields identify which TCP/IP application gets data received by the computer? i. Ethernet Type j. SNAP Protocol Type k. IP Protocol Field l. TCP Port Number m. UDP Port Number n. Application ID 4. Which of the following are not typical functions of TCP? o. Windowing p. Error recovery q. Multiplexing using port numbers r. Routing s. Encryption t. Ordered data transfer 5. Which of the following functions is performed by both TCP and UDP? u. Windowing v. Error recovery w. Multiplexing using port numbers x. Routing y. Encryption ...

Words: 797 - Pages: 4

Premium Essay

Nt1210

...layer protocols that can be met by the TCP/IP network layer protocol? C 2. Which of the following answers list a need of application layer protocols that can be met by the TCP/IP transport layer protocol?(choose three answers.) A,B,E 3. Which of the following answers lists a service provided by an application layer protocol to the application? A 4. A user opens email client software on her tablet computer after connecting to the Internet. The user successfully downloads her latest email. Another student happens by and starts spouting off about how the first student has been using. Email,POP3,IP,TCP,HTTP,802.11 and other acronyms all just to check email. The first student just stares at this second student, but it does cause the first student to wonder. Which of the following answers accurately describes where some of these features are implemented on the tablet? D 5. A user of a tablet computer goes to a coffee chop and connects to the internet through a wireless LAN. The user then connects to the web server somewhere far away in the internet. Which of the following statements are true about the messages that flow from the tablet’s web browser towards the web server? (Choose two answers.)B,C 6. Which of the following answers accurately describe the size of the TCP,UDP, and IP headers, assuming that the headers include no additional optional field?(Choose three answers.)A,B,C 7. When thinking about the messages that flow inside a TCP/IP network, you can think about the header...

Words: 1059 - Pages: 5

Premium Essay

Pt1420 Unit 10

...Timothy Knox 8/21/2015 Dr. North Unit 10 10.1.1 TCP can connect two hosts with the capability to retransmit dropped packets, maintain ordering, and check for errors. A TCP connection is established with a three-way handshake in which a connection is established and acknowledged. What are the three messages that form this handshake sequence? Why is this important for establishing the connection? Use your textbook and Internet research to compose your answer. The messages that are used to form the handshake are SYN, SYN-ACK, and ACK. They are important because it allows for both ends to initiate and communicate using different TCP sockets at once. 10.1.2 By establishing a TCP connection, you allow one host to verify expected communication to and from the connected host. This provides two important features: windowing/sequencing and error checking/recovery. Windowing and sequencing are used to determine whether messages have been seen and are delivered in the correct order to the recipient. Error checking makes sure that all the packets are delivered as expected, providing reliability. Why are reliability and sequencing important in message delivery? Give an example of when each would be necessary. Its important because it allows for the organization of multiple messages so that the right message is sent in its proper order. Sequencing is the other important part because it makes sure things are in order and also that they are received in the right time frame and...

Words: 530 - Pages: 3

Free Essay

Bull Shit

...Skip to main content Chrome: developer DEVTOOLS MULTI-DEVICE PLATFORM Learn Basics Use Tools Inspecting & Tweaking Debugging JavaScript Device Mode & Mobile Emulation Remote Debugging on Android Saving Changes with Workspaces Performance & Profiling Reference Contents Requirements Setting up your Android device Discovering devices in Chrome Debugging remote browser tabs Debugging WebViews Live screencasting Port forwarding Virtual host mapping Troubleshooting Additional information Remote Debugging on Android with Chrome The way your web content behaves on mobile can be dramatically different from the desktop experience. Remote debugging with Chrome DevTools lets you debug live content on your Android device from your development machine. Debugging Chrome for Android using the Chrome Developer Tools Remote debugging on Android supports: Debugging websites in browser tabs. Debugging WebViews in native Android apps. Screencasting live to your development machine from your Android device. Accessing your development server on Android using port forwarding and virtual host mapping. Requirements To begin remote debugging, you need: Chrome 32 or later installed on your development machine. A USB cable to connect your Android device. For browser debugging: Android 4.0+ and Chrome for Android. For app debugging: Android 4.4+ and a WebView configured for debugging. Note: Remote debugging requires your version of desktop Chrome to be newer...

Words: 2425 - Pages: 10

Premium Essay

Analysis of Wireless Protocols

...Analysis of Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction...

Words: 285 - Pages: 2