TCP half-open

TCP half-open

A TCP connection is referred to as "half-open" when the station at one end of that TCP connection has crashed, or has otherwise removed the socket without formally notifying the other end of the TCP connection.

Due to the stateless nature of the Transmission Control Protocol, it is possible that if the application controlling the still-existing end of the connection is not expecting a response, then that socket may persist indefinitely in the state known as TCP half-open.

Note: A common misconception throughout the Internet is that the term TCP half-open applies to a partially-completed TCP handshake state. A better term for this unsynchronized kind of socket state is an embryonic state.

See also

* Transmission Control Protocol
* Embryonic connection

External links

* [http://www.ietf.org/rfc/rfc0793.txt Transmission Control Protocol DARPA Internet Program Protocol Specification]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Open source — This article is about the production and development model. For its application to software, see Open source software. For the form of intelligence collection management, see Open source intelligence. For other uses, see Open source… …   Wikipedia

  • Полуоткрытое TCP/IP-соединение — (англ. half open connection) TCP соединение, в котором состояния двух его участников становятся несинхронизированными вследствие сбоев или преднамеренных действий одного из участников. Первоначально термин относился к нарушению синхронизации …   Википедия

  • Полуоткрытое TCP/IP соединение — (англ. half open connection) Первоначально термин относился к нарушению синхронизации уже установленного соединения (см. ). Но затем более распространённым стало применение термина полуоткрытое TCP/IP соединение к случаю нарушения нормальной… …   Википедия

  • Список портов TCP и UDP — Эта статья содержит незавершённый перевод с английского языка. Вы можете помочь проекту, переведя её до конца. В данной статье приведён список портов TCP и UDP, ко …   Википедия

  • Port scanner — A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it.To portscan a host is to scan for listening… …   Wikipedia

  • Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to …   Wikipedia

  • AppleTalk — is a proprietary suite of protocols developed by Apple Inc. for networking computers. It was included in the original Macintosh released in 1984, but is now unsupported as of the release of Mac OS X v10.6 in 2009[1] in favor of TCP/IP networking …   Wikipedia

  • SYN flood — A SYN flood is a form of denial of service attack in which an attacker sends a succession of SYN requests to a target s system [RFC 4987 TCP SYN Flooding Attacks and Common Mitigations] .When a client attempts to start a TCP connection to a… …   Wikipedia

  • Communications protocol — For other senses of this word, see Protocol. A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications. A protocol may have a formal… …   Wikipedia

  • Embryonic connection — An embryonic connection refers to a TCP connection which is in the process of being established.The TCP protocol has a three state system for opening a connection. First, the originating endpoint (A) sends a SYN packet to the destination (B). A… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”