• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The application well suited for this assignment is Wireshark, it has the features suitable for this assignment and enables me to output the relevant grap

Extracts from this document...

Introduction

Wireshark TCP Lab  

Introduction

This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The application well suited for this assignment is Wireshark, it has the features suitable for this assignment and enables me to output the relevant graphs needed. The graph being used is a Time-Sequence-Graph (Stevens).

Methodology

In order to achieve what is needed I will need to analyse a trace of the TCP segments sent and received in transferring a 150KB file containing the text of Lewis Carrol’s Alice’s Adventures in Wonderland from my computer to a remote server. I will study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; See TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and look at TCP’s receiver-advertised flow control mechanism. I will also output graphs that wireshark will allow me to do so within one of its functions.

Wireshark will obtain a packet trace of the TCP transfer of a file from my computer to a remote server. I will do so by accessing a Web page that will allow me to enter the name of a file stored on my computer which contains the ASCII text of Alice in Wonderland, and then transfer the file to a web server using the HTTP POST method.

...read more.

Middle

Given the difference between when each TCP segment was sent, and when its

acknowledgement was received, what is the RTT value for each of the six

segments? What is the EstimatedRTT value (see page 249 in text) after the

receipt of each ACK? Assume that the value of the EstimatedRTT is equal to

the measured RTT for the first segment, and then is computed using the

EstimatedRTT equation on page 249 for all subsequent segments.

The HTTP POST segment is considered as the first segment. Segments 1 – 6 are No. 4, 5, 7, 8, 10, and 11 in this trace respectively. The ACKs of segments 1 – 6 are No. 6, 9, 12, 14, 15, and 16 in this trace.

image13.png

Segment 1 sequence number: 1

Segment 2 sequence number: 566

Segment 3 sequence number: 2026

Segment 4 sequence number: 3486

Segment 5 sequence number: 4946

Segment 6 sequence number: 6406

Sent time(Seconds)

ACK received time

RTT(Seconds)

Segment 1

0.026477

0.053937

0.02746

Segment 2

0.041737

0.077294

0.035557

Segment 3

0.054026

0.124085

0.070059

Segment 4

0.054690

0.169118

0.11443

Segment 5

0.077405

0.217299

0.13989

Segment 6

0.078157

0.267802

0.18964

Below shows how the RTT is calculated:

ACK received time – Sent time (Seconds) = RTT (Seconds)

Segment 1: 0.053937 - 0.026477 = 0.02746

Segment 2: 0.077294 - 0.041737 = 0.035557

Segment 3: 0.124085 - 0.054026 = 0.070059

Segment 4: 0.169118 - 0.054690 = 0.11443

Segment 5: 0.217299 - 0.077405 = 0.13989

Segment 6: 0.267802 - 0.078157 = 0.18964

EstimatedRTT = 0.875 * EstimatedRTT + 0.125 * SampleRTT

EstimatedRTT after the receipt of the ACK of segment 1:

EstimatedRTT = RTT for Segment 1 = 0.02746 second

EstimatedRTT after the receipt of the ACK of segment 2:

EstimatedRTT = 0.875 * 0.02746 + 0.125 * 0.035557 = 0.0285

EstimatedRTT after the receipt of the ACK of segment 3:

EstimatedRTT = 0.875 * 0.0285 + 0.125 * 0.070059 = 0.0337

EstimatedRTT after the receipt of the ACK of segment 4:

EstimatedRTT = 0.875 * 0.0337+ 0.125 * 0.11443 = 0.0438

EstimatedRTT after the receipt of the ACK of segment 5:

EstimatedRTT = 0.875 * 0.0438 + 0.125 * 0.13989 = 0.0558

EstimatedRTT after the receipt of the ACK of segment 6:

EstimatedRTT = 0.875 * 0.0558 + 0.125 * 0.18964 = 0.0725

...read more.

Conclusion

identify cases where the receiver is ACKing every other received segment (see

Table 3.2 on page 257 in the text).

Seq

Len

ACK 1

566

1460

ACK2

2026

1460

ACK3

3486

1460

ACK4

4946

1460

ACK5

6406

1460

ACK6

7866

1147

ACK7

9013

1460

ACK8

10473

1460

ACK9

11933

1460

ACK10

13393

1460

ACK11

14853

1460

ACK12

16313

892

image18.png

12. What is the throughput (bytes transferred per unit time) for the TCP connection?

Explain how you calculated this value.

The computation of TCP throughput largely depends on the selection of averaging time period. As a common throughput computation, I will select the average time period as the whole connection time. Then, the average throughput for this TCP connection is computed as the ratio between the total amount data and the total transmission time.

  1. The total amount data transmitted can be computed by the difference between the sequence number of the first TCP segment (i.e. 1 byte for No. 4 segment)
  1. The acknowledged sequence number of the last ACK (164091 bytes for No. 202 segment).
  1. Therefore, the total data are 164091 - 1 = 164090 bytes.
  2. The whole transmission time is the difference of the time instant of the first TCP segment (i.e., 0.026477 second for No.4 segment) and the time instant of the last ACK (i.e., 5.455830 second for No. 202 segment).
  1. Therefore, the total transmission time is 5.455830 - 0.026477 = 5.4294 seconds.
  1. Hence, the throughput for the TCP connection is computed as 164090/5.4294 = 30.222 KByte/sec.

TCP congestion control in action

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence

number versus time plot of segments being sent from the client to the

gaia.cs.umass.edu server.

image10.pngimage07.png

References

  • Kurose, J.F. and Ross, K.W. (2008). Computer Networking: A Top-Down Approach (Pearson Education). ISBN-10: 0321513258; ISBN-13: 978-0321513250

                Tom Forward

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Methods and technology used in Computer Forensics

    If you want, Pandora then allows you to narrow the recovery parameters. As I knew the format of the file that I was truying to recover, I was able to narrow the criteria to save time. This returned a 9KB JPEG image.

  2. Transmission Control Protocol/Internet Protocol (TCP/IP)

    Figure 1, TCP/IP model At the base of the model is the network interface layer. This layer is responsible for putting frames on the wire and pulling frames off the wire. I will explain later how this layer works in detail.

  1. Application of Inferential Statistical Tests in Quality Control.

    The diagram is useful to help organize ideas and to identify relationships. It also allows for open ideas from others. This would work well with defining any issues within the manufacturing plant for the smart chips to determine any issue that may arise, the causes and then the downstream impacts

  2. Software Engineering Assignment (CM200)

    This is the reason that the system couldn't cope with the overflows of communication between the system and the ambulances because it was never tested for the actual type of data required. The first day ever-realistic test was the first day of the launch of the system.

  1. Developing a Workflow Application: Clinical Data Management

    for review and approval of a drug compound. For this exercise, the sub processes of Clinical Data Entry and Review will be discussed in the context of implementing the new and improved sub-processes. End to end, the Clinical Data Management (CDM hereafter)

  2. Network operating report - Windows XP Vs Windows NT Server

    If you select more than one language, your computer now supports multiple languages. Regional Options also allow you to configure your computer to use multiple locations or locales. The General tab shows you the current locale setting, and the Input Locale tab allows you to add additional locales.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Thus the horizontal chroma resolution is halved while the full resolution is retained in the vertical direction with respect to luminance. Chapter 3 LICENSE PLATE CHARACTER RECOGNITION ALGORITHMS 3.1 Design Approach There are a number of techniques used to recognize the characters on the license plate.

  2. CONTENTS 1 Overview ...

    After sending the header and the blank line, the client transmits the data. The header must have included a Content-Length: field, which permits the server to determine when all the data has been received. HTTP Package Above is the package of the HTTP, Step to the each of the process.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work