Solved

TCP - TIME_WAIT

Posted on 2006-11-20
4
619 Views
Last Modified: 2010-03-18
Hi,

    After a connection is closed the socket will be in TIME_WAIT state. Can someone please explain me in detail what exactly happens? I went through stevens "2.7 - Please explain the TIME_WAIT state" article and I couldn't understand it.  What all I know is - It is normal for a connection to be in TIME_WAIT state after it has been closed. I want to know why it is required and what happens in that period when it is finally released by the  server....


Thanks,
expertblr
0
Comment
Question by:expertblr
  • 2
  • 2
4 Comments
 
LVL 43

Expert Comment

by:ravenpl
ID: 17985467
After tcp strem is closed it enters TCP_WAIT because
- some packets may arrive that are destined to this connection (original packet was queued on some router, and was retransmitted)
- since it's not totally close, You can't(and it's good from point of TCP view, see first -) spawn identical connection - slot occupied
0
 

Author Comment

by:expertblr
ID: 17986286
Thanks ravenpl..:), is it possible for you to  explain (with example) on this like how the FIN and ACK packets flow during that time....


Thanks again.
0
 
LVL 43

Accepted Solution

by:
ravenpl earned 250 total points
ID: 17986424
0
 

Author Comment

by:expertblr
ID: 17986892
Thanks ravenpl...
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now