Trp. Trp. Master Informatique 1 st year 1 st term. ARes/ComNet Transport layer (7 points) Anonymous ID: stick number HERE

Similar documents
App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (6 points) Anonymous ID: stick number HERE

App. App. Master Informatique 1 st year 1 st term. ARes/ComNet Applications (7 points) Anonymous ID: stick number HERE

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet

ECE4110 Internetwork Programming. Introduction and Overview

Packet Header Formats

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

EE 610 Part 2: Encapsulation and network utilities

I TCP 1/2. Internet TA: Connection-oriented (virtual circuit) Connectionless (datagram) (flow control) (congestion control) TCP Connection-oriented

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Master Informatique ComNet Communication Network. ComNet - Lab n 1. Introduction to the networking testbed

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

TCP /IP Fundamentals Mr. Cantu

Introduction to TCP/IP networking

TSIN02 - Internetworking

CHAPTER-2 IP CONCEPTS

Master Informatique NetArch Network Architecture. NetArch - Lab n 4. Transport Layer (1): TCP and UDP

TSIN02 - Internetworking

The Transport Layer. Part 1

TSIN02 - Internetworking

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

ECE 358 Project 3 Encapsulation and Network Utilities

TSIN02 - Internetworking

Introduction to Network. Topics

Networking Technologies and Applications

Interconnecting Networks with TCP/IP

6. The Transport Layer and protocols

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

! ' ,-. +) +))+, /+*, 2 01/)*,, 01/)*, + 01/+*, ) 054 +) +++++))+, ) 05,-. /,*+), 01/-*+) + 01/.*+)

Internet Control Message Protocol (ICMP)

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Network concepts introduction & wireshark

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

Information Network 1 TCP 1/2

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16

Lecture 18 Overview. Last Lecture. This Lecture. Next Lecture. Internet Protocol (1) Internet Protocol (2)

13. Internet Applications 최양희서울대학교컴퓨터공학부

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CSCI-GA Operating Systems. Networking. Hubertus Franke

Dongsoo S. Kim Electrical and Computer Engineering Indiana U. Purdue U. Indianapolis

CSCI Networking Name:

User Datagram Protocol

The Internetworking Problem. Internetworking. A Translation-based Solution

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Hands-On Ethical Hacking and Network Defense

Sirindhorn International Institute of Technology Thammasat University

CIS 551 / TCOM 401 Computer and Network Security

A Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter.

Transport Over IP. CSCI 690 Michael Hutt New York Institute of Technology

cs144 Midterm Review Fall 2010

IP Services Commands. Network Protocols Command Reference, Part 1 P1R-95

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

TCP/IP Networking. Part 4: Network and Transport Layer Protocols

Paper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015

Your Name: Your student ID number:

Software Engineering 4C03 Answer Key

Network concepts introduction & wireshark. workshop

D Commands. Send document comments to This chapter describes the Cisco NX-OS security commands that begin with D.

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

K2289: Using advanced tcpdump filters

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Review of Important Networking Concepts

Course Contents. The TCP/IP protocol Stack

QUIZ: Longest Matching Prefix

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

TCP = Transmission Control Protocol Connection-oriented protocol Provides a reliable unicast end-to-end byte stream over an unreliable internetwork.

OSI Transport Layer. objectives

Problem Max. Points Act. Points Grader

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

> : S. timestamp > : (0) win <mss 1460,nop,wscale 0,nop,nop, 4 different options used

Access List Commands

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

IP Protocols. ALTTC/Oct

ICS 351: Networking Protocols

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

ECE 461 Internetworking Fall Quiz 1

ITS323: Introduction to Data Communications

network security s642 computer security adam everspaugh

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

ECE 650 Systems Programming & Engineering. Spring 2018

TCP/IP Networking Basics

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

LOGICAL ADDRESSING. Faisal Karim Shaikh.

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Review of Important Networking Concepts TCP/IP

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

Ethernet / TCP-IP - Training Suite Application level protocols

Need For Protocol Architecture

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

Need For Protocol Architecture

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

Answer to the written exam given on TDTS06 Computer networks, October 23,

Network Technology 1 5th - Transport Protocol. Mario Lombardo -

CS 457 Lecture 11 More IP Networking. Fall 2011

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

The Transport Layer Reliable data delivery & flow control in TCP. Transport Layer Protocols & Services Outline

Sirindhorn International Institute of Technology Thammasat University

Access List Commands

Transcription:

Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term App ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. App The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. QUIT 221 2.0.0 Bye 1. What is the application? What is the software used for this application? What is the user doing with this application? What is the protocol used at the application layer? 2. What are the protocol s commands that we can see in this exchange? 1 Applications (6 points) Analyze the following message exchange between a client and a server. The messages have been intercepted at the Application layer. 220 mail.etu5.plateforme.lan ESMTP Postfix (Debian/GNU) EHLO [10.5.1.51] 250-mail.etu5.plateforme.lan 250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN MAIL FROM:<etudiant@mail.etu5.plateforme.lan> 250 2.1.0 Ok RCPT TO:<etudiant@mail.etu5.plateforme.lan> 250 2.1.5 Ok DATA 354 End data with <CR><LF>.<CR><LF> Subject: Test 14-25 From: etudiant on VM3 <etudiant@mail.etu5.plateforme.lan> To: etudiant@mail.etu5.plateforme.lan Content-Type: text/plain Date: Wed, 01 Oct 2014 14:05:38 +0000 Message-ID: <1412172338.30152.1.camel@5vm1.etu5.plateforme.lan> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Content-Transfer-Encoding: 7bit Bonjour de Jussieu 14-25. 3. What is the IP address of the client? What is the DNS name of the mail server? What is the sender s email address? What is the receiver s email address? 4. What are the headers indicating that the email follows the MIME format? What is the purpose of MIME? What is the encoding used to send the message content over the network? What is the header indicating this encoding type? 5. What is the message s subject? What is the message s content? 6. It is possible to connect to the server using Telnet to do the same thing that we have analyzed? Give the command line which allows the user to log on the server to do that. 7. If the user used web mail to send the message, what would be the Application layer protocol used between the client and the server? With this protocol, what would have been the commands used?. 250 2.0.0 Ok: queued as 53088264E6 RSET 250 2.0.0 Ok 1/12 Version X1-2015-en-vA-b 2/12 Version X1-2015-en-vA-b

Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Trp ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Trp The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the frames provided for that purpose. 2 Transport layer (7 points) 6. Two segments have a PUSH bit set (one at the beginning, the other at the end of the trace). What is their role (justify)? Client 8,7 8,9 9,1 9,3 02 01 03 04 Serveur On the basis of the TCP trace given in Appendix 2 (page 9), answer the following questions: 1. What is the server address, the client address (justify)? 9,5 9,7 7. At connection setup, MSS options with value of 1460 are exchanged, but in the trace that follows the maximum size of the payload is 1448 bytes. Why (justify)? 9,9 2. What action by the user will have initiated this trace (justify)? 10,1 10,3 10,5 3. Is the protocol analyser that has captured this trace close to the client or to the server (justify)? 8. What is the average throughput observed over the entire connection (justify)? 10,7 10,9 11,1 4. Four options (other than nop or eol) are exchanged during the connection setup. What is each one for? Explain how each one works. 5. What is the RTT that we can observe at the beginning of the connection (justify)? 9. Complete the following chronogram of exchanges, strictly respecting the provided time scale temps (s) 11,3 3/12 Version X1-2015-en-vA-b 4/12 Version X1-2015-en-vA-b

Master Informatique 1 st year 1 st term Anonymous ID: stick number HERE Master Informatique 1 st year 1 st term Frm ARes/ComNet 2015-2016 Midterm exam : Version A in English Duration: 2h00 Allowed: One handwritten A4 sheet (front and back) Forbidden: All other documents, pocket calculators, mobile phones, etc. Frm The exam consists of 3 sheets recto/verso, including the questions and spaces in which to write your answers. You must hand back only these sheets at the end of the exam. To ensure anonymity, you must not write your name on the exam. Be absolutely sure that the anonymous ID number assigned to you by the exam supervisors appears on each sheet. You must write your answers in the places provided for that purpose. 1. Is the frame above carrying a query or a request message? Give three arguments that justify your choice (from the frame). Type: (a) (b) (c) 2. How many IP addresses appear in the frame above? What is the significance of each address? 3 Multi-protocol analysis (7 points) Decode the following frame. Draw and write directly on it. Carefully delimit each protocol field and provide an accurate interpretation of its value. You may refer to the Appendix 1 (page 7) to help in the analysis. 0000 00 1f f3 fb fe f7 00 00 5e 00 01 54 08 00 45 00...^..T..E. 3. The frame that you have decoded is part of an exchange. If the frame was sent in response to another frame, generate the corresponding query frame. If, on the other hand, the frame was a query frame, generate the corresponding response frame. Just write out the first 70 bytes of the frame, two hexadecimal digits to a box. (If you cannot deduce the value in a box, leave it blank.) 0010 00 94 a4 d9 00 00 3f 11 2e 29 84 e3 4a 02 84 e3...?..)..j... 0020 54 8e 00 35 d1 64 00 80 ed f1 99 68 81 80 00 01 T..5.d...h... Byte num. 0000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0030 00 01 00 02 00 02 07 6c 65 71 75 69 70 65 02 66...lequipe.f 0040 72 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 44 r...d 0050 00 04 a0 5c 6c b2 c0 0c 00 02 00 01 00 00 00 59...\l...Y 0010 0020 0030 0040 0060 00 0e 03 6e 73 33 04 61 74 6f 73 03 6e 65 74 00...ns3.atos.net. 4. The same application layer action that triggered the previous frames will be executed after 10 minutes. Explain what will be the result of this new action? Justify your answer. 0070 c0 0c 00 02 00 01 00 00 00 59 00 06 03 6e 73 34...Y...ns4 0080 c0 3c c0 52 00 01 00 01 00 00 2f eb 00 04 c1 38.<.R.../...8 0090 2e f8 c0 38 00 01 00 01 00 00 2f eb 00 04 a0 5c...8.../...\ 00a0 79 06 y. 5/12 Version X1-2015-en-vA-b 6/12 Version X1-2015-en-vA-b

Don t hand back this sheet! Don t hand back this sheet! Appendix 1 Ethernet Frame Layout without preamble/crc: +--48-bits--+--48-bits--+16b-+- - - - -+ Destination Source Type Data address address +-----------+-----------+----+- - - - -+ A few types: 0x0800 = DoD Internet (IPv4) 0x0806 = ARP 0x86DD = Internet Protocol Version 6 (IPv6) IPv4 Paquet Layout <-4b-> <--8bits---><--------16bits--------> +-----+-----+-----------+-----------------------+ Ver IHL TOS Total Length +-----+-----+-----------+--+--------------------+ Identifier Fl FO +-----------+-----------+--+--------------------+ TTL Protocol Header Checksum +-----------+-----------+-----------------------+ Source Address Destination Address... Options... Data TCP Segment Layout <-4b-> <-6bits-><--------16bits--------> Source Port Destination Port Sequence Number Acknowledgement Number +-----+-------+---------+-----------------------+ THL Flag Windows Size +-----+-------+---------+-----------------------+ Segment Checksum Urgence Pointer... Options... Data THL = TCP header length on 4 bits (32 bits words) Flags on 6 bits (from most significant bit to less) = < URG, ACK, PSH, RST, SYN, FIN > Options = series of options encoded as: 1 byte 00 = end of options (if needed) 1 byte 01 = no operation L bytes with TLV fields (T one byte of type: 2 = negotiate MSS 3 = adaptation of window size 4 = selective acknowledgment 8 = timestamps... L one byte for the total size of the option V the value of the option on L-2 bytes) UDP Datagram Layout A querry: <-----N-Bytes-----><2-Bytes><2-Bytes> +--- - - - - - ---+--------+--------+ Name Type Classe +--- - - - - - ---+--------+--------+ An Answer/AutoritativeNS/AdditionalRecord: <M-Bytes>< 2B. >< 2B. ><4-Bytes>< 2B. ><--D-Bytes---> +-- - --+------+------+--------+------+-- - - - - --+ Name Type Classe T.T.L. Size Data +-- - --+------+------+--------+------+-- - - - - --+ * Name : each domain name is preceded by one byte showing the number of following ASCII characters (if the value is < 63 else the value 0xC0 show a reference to the offset value of the next byte (from the beginning of the message) Ending by 0x00. * A few types: 1 = A (IPv4 Address) 12 = PTR (Name Pointer) 2 = NS (Name Server) 15 = MX (Mail Server) 5 = CNAME (Alias) 28 = AAAA (IPv6 Address) 6 = SOA (Start Of Authority)... * Classe: 1 = Internet * T.T.L.: Cache Validity (seconds) * Size: Data length in Bytes * Data: - Name (Character string as for a query) for NS - Priority (2 bytes) and Name for MX - Address (4 bytes for A, 16 bytes for AAAA)... Ver = IP Version IHL = IP Header Length (32 bits words) TOS = Type of service Total Length of the IP paquet (in bytes) Fl (3 left bits) = fragmentation flags [Reserved Don t Fragment Next Fragment] FO (remaining 13 bits) = Fragment Offset * value to multiply by 8 bytes TTL = Time To Live (hop count) A few protocol fields: 1 = ICMP 33 = DCCP 2 = IGMP 41 = IPv6 Encapsulation 6 = TCP 89 = OSPF 8 = EGP 132 = SCTP 17 = UDP... ICMP Datagram Layout Source Port Destination Port Longueur UDP Datagram Checksum... Data A few ports associated services ftp-data 20/tcp domain 53/udp ftp 21/tcp tftp 69/udp ssh 22/tcp snmp 161/udp telnet 23/tcp snmp-trap 162/udp smtp 25/tcp www 80/tcp... +-----------+-----------+-----------------------+ Type Code Datagram Checksum +-----------+-----------+-----------------------+ Variable... Original Datagram + 8 Bytes A few ICMP types: 0 = Echo response 3 = Destination Unreachable 5 = Redirection 8 = Echo request 11 = Time exceed DNS Messages Layout < 2B.>< 2B.><2B.><2B.><2B.><2B.>< qb.>< ab.>< nb.>< ib.> +-----+-----+----+----+----+----+- - -+ - -+- - -+ - - + Ident Flags NbQu NbAn NbNS NbAR Quer. Ans. AutNS. AddR. +-----+-----+----+----+----+----+- - -+ - -+- - -+ - - + * Ident. = Request Identifier * Flags = DNS parameters (don t explain) * NbQu = Number of Queries * NbAn = Number of Answers * NbNS = Number of Autoritative Name Server * NbAR = Number of Additional Reccords 7/12 Version X1-2015-en-vA-b 8/12 Version X1-2015-en-vA-b

Don t hand back this sheet! Don t hand back this sheet! Appendix 2 01 08.701077 10.1.1.1:2000 > 20.20.20.2:80 S 0(0) win 65535 <mss 1460,nop,wscale 3,nop,nop,timestamp 373 0,sackOK,eol> 02 09.075550 20.20.20.2:80 > 10.1.1.1:2000 S 0(0) ack 0 win 5792 <mss 1460,sackOK,timestamp 6552 373,nop, wscale 7> 03 09.075614 10.1.1.1:2000 > 20.20.20.2:80. ack 1 win 65535 <nop,nop,timestamp 376 6552> 04 09.075732 10.1.1.1:2000 > 20.20.20.2:80 P 1(586) ack 1 win 65535 <nop,nop,timestamp 376 6552> 05 09.449701 20.20.20.2:80 > 10.1.1.1:2000. ack 587 win 55 <nop,nop,timestamp 6926 376> 06 09.487598 20.20.20.2:80 > 10.1.1.1:2000. 1(1448) ack 587 win 55 <nop,nop,timestamp 6953 376> 07 09.487605 20.20.20.2:80 > 10.1.1.1:2000. 1449(1448) ack 587 win 55 <nop,nop,timestamp 6953 376> 08 09.487610 20.20.20.2:80 > 10.1.1.1:2000. 2897(1448) ack 587 win 55 <nop,nop,timestamp 6953 376> 09 09.487730 10.1.1.1:2000 > 20.20.20.2:80. ack 2897 win 65341 <nop,nop,timestamp 380 6953> 10 09.487842 10.1.1.1:2000 > 20.20.20.2:80. ack 4345 win 65535 <nop,nop,timestamp 380 6953> 11 09.870727 20.20.20.2:80 > 10.1.1.1:2000. 4345(1448) ack 587 win 55 <nop,nop,timestamp 7336 380> 12 09.870734 20.20.20.2:80 > 10.1.1.1:2000. 5793(1448) ack 587 win 55 <nop,nop,timestamp 7336 380> 13 09.870739 20.20.20.2:80 > 10.1.1.1:2000. 7241(1448) ack 587 win 55 <nop,nop,timestamp 7336 380> 14 09.870746 20.20.20.2:80 > 10.1.1.1:2000. 8689(1448) ack 587 win 55 <nop,nop,timestamp 7338 380> 15 09.870751 20.20.20.2:80 > 10.1.1.1:2000. 10137(1448) ack 587 win 55 <nop,nop,timestamp 7338 380> 16 09.870889 10.1.1.1:2000 > 20.20.20.2:80. ack 5793 win 65522 <nop,nop,timestamp 384 7336> 17 09.870957 10.1.1.1:2000 > 20.20.20.2:80. ack 8689 win 65160 <nop,nop,timestamp 384 7336> 18 09.871096 10.1.1.1:2000 > 20.20.20.2:80. ack 11585 win 65535 <nop,nop,timestamp 384 7338> 19 10.247564 20.20.20.2:80 > 10.1.1.1:2000. 11585(1448) ack 587 win 55 <nop,nop,timestamp 7721 384> 20 10.258562 20.20.20.2:80 > 10.1.1.1:2000. 13033(1448) ack 587 win 55 <nop,nop,timestamp 7721 384> 21 10.258566 20.20.20.2:80 > 10.1.1.1:2000. 14481(1448) ack 587 win 55 <nop,nop,timestamp 7721 384> 22 10.258569 20.20.20.2:80 > 10.1.1.1:2000. 15929(1448) ack 587 win 55 <nop,nop,timestamp 7721 384> 23 10.258573 20.20.20.2:80 > 10.1.1.1:2000. 17377(1448) ack 587 win 55 <nop,nop,timestamp 7721 384> 24 10.258578 20.20.20.2:80 > 10.1.1.1:2000. 18825(1448) ack 587 win 55 <nop,nop,timestamp 7722 384> 25 10.258582 20.20.20.2:80 > 10.1.1.1:2000. 20273(1448) ack 587 win 55 <nop,nop,timestamp 7722 384> 26 10.258586 20.20.20.2:80 > 10.1.1.1:2000. 21721(1448) ack 587 win 55 <nop,nop,timestamp 7722 384> 27 10.258648 10.1.1.1:2000 > 20.20.20.2:80. ack 21721 win 64617 <nop,nop,timestamp 388 7721> 28 10.258681 10.1.1.1:2000 > 20.20.20.2:80. ack 23169 win 64948 <nop,nop,timestamp 388 7722> 29 10.529728 20.20.20.2:80 > 10.1.1.1:2000. 23169(1448) ack 587 win 55 <nop,nop,timestamp 7953 388> 30 10.529879 10.1.1.1:2000 > 20.20.20.2:80. ack 24617 win 65522 <nop,nop,timestamp 390 7953> 31 10.800725 20.20.20.2:80 > 10.1.1.1:2000. 24617(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 32 10.800728 20.20.20.2:80 > 10.1.1.1:2000. 26065(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 33 10.800731 20.20.20.2:80 > 10.1.1.1:2000. 27513(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 34 10.800735 20.20.20.2:80 > 10.1.1.1:2000. 28961(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 35 10.800738 20.20.20.2:80 > 10.1.1.1:2000. 30409(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 36 10.800741 20.20.20.2:80 > 10.1.1.1:2000. 31857(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 37 10.800744 20.20.20.2:80 > 10.1.1.1:2000. 33305(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 38 10.800749 20.20.20.2:80 > 10.1.1.1:2000. 34753(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 39 10.800752 20.20.20.2:80 > 10.1.1.1:2000. 36201(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 40 10.800755 20.20.20.2:80 > 10.1.1.1:2000. 37649(1448) ack 587 win 55 <nop,nop,timestamp 8193 393> 41 10.800841 10.1.1.1:2000 > 20.20.20.2:80. ack 27513 win 65341 <nop,nop,timestamp 395 8193> 42 10.800876 10.1.1.1:2000 > 20.20.20.2:80. ack 30409 win 64979 <nop,nop,timestamp 395 8193> 43 10.800899 10.1.1.1:2000 > 20.20.20.2:80. ack 33305 win 65129 <nop,nop,timestamp 395 8193> 44 10.800952 10.1.1.1:2000 > 20.20.20.2:80. ack 39097 win 64917 <nop,nop,timestamp 395 8193> 45 11.119758 20.20.20.2:80 > 10.1.1.1:2000. 39097(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 46 11.119764 20.20.20.2:80 > 10.1.1.1:2000. 40545(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 47 11.119769 20.20.20.2:80 > 10.1.1.1:2000. 41993(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 48 11.119776 20.20.20.2:80 > 10.1.1.1:2000. 43441(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 49 11.119781 20.20.20.2:80 > 10.1.1.1:2000. 44889(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 50 11.119788 20.20.20.2:80 > 10.1.1.1:2000. 46337(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 51 11.119793 20.20.20.2:80 > 10.1.1.1:2000. 47785(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 52 11.119799 20.20.20.2:80 > 10.1.1.1:2000. 49233(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 53 11.119805 20.20.20.2:80 > 10.1.1.1:2000. 50681(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 54 11.119810 20.20.20.2:80 > 10.1.1.1:2000. 52129(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 55 11.119956 10.1.1.1:2000 > 20.20.20.2:80. ack 46337 win 64798 <nop,nop,timestamp 397 8408> 56 11.120042 10.1.1.1:2000 > 20.20.20.2:80. ack 52129 win 64586 <nop,nop,timestamp 397 8408> 57 11.124704 20.20.20.2:80 > 10.1.1.1:2000. 53577(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 58 11.124711 20.20.20.2:80 > 10.1.1.1:2000. 55025(1448) ack 587 win 55 <nop,nop,timestamp 8408 395> 59 11.124716 20.20.20.2:80 > 10.1.1.1:2000 FP 56473(893) ack 587 win 55 <nop,nop,timestamp 8408 395> 60 11.124832 10.1.1.1:2000 > 20.20.20.2:80. ack 57367 win 65229 <nop,nop,timestamp 397 8408> 61 11.126764 10.1.1.1:2000 > 20.20.20.2:80 F 587(0) ack 57367 win 65535 <nop,nop,timestamp 397 8408> 62 11.398554 20.20.20.2:80 > 10.1.1.1:2000. ack 588 win 55 <nop,nop,timestamp 8775 397> 9/12 Version X1-2015-en-vA-b 10/12 Version X1-2015-en-vA-b

Don t hand back this sheet! Don t hand back this sheet! 11/12 Version X1-2015-en-vA-b 12/12 Version X1-2015-en-vA-b