What is the best resource for understanding computer network protocols?

  • Thread starter Thread starter brushman
  • Start date Start date
AI Thread Summary
The discussion revolves around the challenges of creating a bot for the Facebook game Cafe World by programming a client that mimics outgoing messages to the game's server. The user is utilizing Wireshark to analyze incoming and outgoing packets but is struggling to understand the data presented in the packet details, which include categories like Ethernet II, Internet Protocol, User Datagram Protocol, and Hypertext Transfer Protocol. To gain a better understanding of these packets and their meanings, it is recommended to read a computer networking book that covers the fundamentals of Ethernet frames, IP, UDP, and HTTP. This foundational knowledge will help in deciphering the packet information and advancing the project.
brushman
Messages
112
Reaction score
1
So I'm working on this project that's way over my head. At this point I'm just messing around because it's pretty hopeless. None the less, I'm still fiddling.

Basically I'm trying to create a "bot" that plays cafe world (facebook game), by programing a client that mimics outgoing messages to the cafe world server. To do this I'm using Wireshark to measure incoming and outgoing packets.

...but I have no idea how to read these packets. I don't know what anything means, or how I should go about learning how to figure out what these packets mean.

When I click on a packet it gives me tons of information in categories like "Frame 10", "Ethernet II", "Internet Protocol", "User Datagram Protocol", "Hypertext Transfer Protocol", etc.

What is all this stuff and where can I learn about it?
 
Technology news on Phys.org
Read a computer network book. It goes over the details of ethernet frames, what IP is, what UDP is,what HTTP is...
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top