The tool deliberately ignores an otherwise basic requirement: low intrusion. The target host is flooded with as many packets as it is able to acknowledge.
The intent is to test the stability of the target program under heavy
loads. Some sources of problem were also injected.
Next: State diagram of the target
Previous: Time diagram of the protocol