• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The application well suited for this assignment is Wireshark, it has the features suitable for this assignment and enables me to output the relevant grap

Extracts from this document...

Introduction

Wireshark TCP Lab  

Introduction

This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The application well suited for this assignment is Wireshark, it has the features suitable for this assignment and enables me to output the relevant graphs needed. The graph being used is a Time-Sequence-Graph (Stevens).

Methodology

In order to achieve what is needed I will need to analyse a trace of the TCP segments sent and received in transferring a 150KB file containing the text of Lewis Carrol’s Alice’s Adventures in Wonderland from my computer to a remote server. I will study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; See TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and look at TCP’s receiver-advertised flow control mechanism. I will also output graphs that wireshark will allow me to do so within one of its functions.

Wireshark will obtain a packet trace of the TCP transfer of a file from my computer to a remote server. I will do so by accessing a Web page that will allow me to enter the name of a file stored on my computer which contains the ASCII text of Alice in Wonderland, and then transfer the file to a web server using the HTTP POST method.

...read more.

Middle

Given the difference between when each TCP segment was sent, and when its

acknowledgement was received, what is the RTT value for each of the six

segments? What is the EstimatedRTT value (see page 249 in text) after the

receipt of each ACK? Assume that the value of the EstimatedRTT is equal to

the measured RTT for the first segment, and then is computed using the

EstimatedRTT equation on page 249 for all subsequent segments.

The HTTP POST segment is considered as the first segment. Segments 1 – 6 are No. 4, 5, 7, 8, 10, and 11 in this trace respectively. The ACKs of segments 1 – 6 are No. 6, 9, 12, 14, 15, and 16 in this trace.

image13.png

Segment 1 sequence number: 1

Segment 2 sequence number: 566

Segment 3 sequence number: 2026

Segment 4 sequence number: 3486

Segment 5 sequence number: 4946

Segment 6 sequence number: 6406

Sent time(Seconds)

ACK received time

RTT(Seconds)

Segment 1

0.026477

0.053937

0.02746

Segment 2

0.041737

0.077294

0.035557

Segment 3

0.054026

0.124085

0.070059

Segment 4

0.054690

0.169118

0.11443

Segment 5

0.077405

0.217299

0.13989

Segment 6

0.078157

0.267802

0.18964

Below shows how the RTT is calculated:

ACK received time – Sent time (Seconds) = RTT (Seconds)

Segment 1: 0.053937 - 0.026477 = 0.02746

Segment 2: 0.077294 - 0.041737 = 0.035557

Segment 3: 0.124085 - 0.054026 = 0.070059

Segment 4: 0.169118 - 0.054690 = 0.11443

Segment 5: 0.217299 - 0.077405 = 0.13989

Segment 6: 0.267802 - 0.078157 = 0.18964

EstimatedRTT = 0.875 * EstimatedRTT + 0.125 * SampleRTT

EstimatedRTT after the receipt of the ACK of segment 1:

EstimatedRTT = RTT for Segment 1 = 0.02746 second

EstimatedRTT after the receipt of the ACK of segment 2:

EstimatedRTT = 0.875 * 0.02746 + 0.125 * 0.035557 = 0.0285

EstimatedRTT after the receipt of the ACK of segment 3:

EstimatedRTT = 0.875 * 0.0285 + 0.125 * 0.070059 = 0.0337

EstimatedRTT after the receipt of the ACK of segment 4:

EstimatedRTT = 0.875 * 0.0337+ 0.125 * 0.11443 = 0.0438

EstimatedRTT after the receipt of the ACK of segment 5:

EstimatedRTT = 0.875 * 0.0438 + 0.125 * 0.13989 = 0.0558

EstimatedRTT after the receipt of the ACK of segment 6:

EstimatedRTT = 0.875 * 0.0558 + 0.125 * 0.18964 = 0.0725

...read more.

Conclusion

identify cases where the receiver is ACKing every other received segment (see

Table 3.2 on page 257 in the text).

Seq

Len

ACK 1

566

1460

ACK2

2026

1460

ACK3

3486

1460

ACK4

4946

1460

ACK5

6406

1460

ACK6

7866

1147

ACK7

9013

1460

ACK8

10473

1460

ACK9

11933

1460

ACK10

13393

1460

ACK11

14853

1460

ACK12

16313

892

image18.png

12. What is the throughput (bytes transferred per unit time) for the TCP connection?

Explain how you calculated this value.

The computation of TCP throughput largely depends on the selection of averaging time period. As a common throughput computation, I will select the average time period as the whole connection time. Then, the average throughput for this TCP connection is computed as the ratio between the total amount data and the total transmission time.

  1. The total amount data transmitted can be computed by the difference between the sequence number of the first TCP segment (i.e. 1 byte for No. 4 segment)
  1. The acknowledged sequence number of the last ACK (164091 bytes for No. 202 segment).
  1. Therefore, the total data are 164091 - 1 = 164090 bytes.
  2. The whole transmission time is the difference of the time instant of the first TCP segment (i.e., 0.026477 second for No.4 segment) and the time instant of the last ACK (i.e., 5.455830 second for No. 202 segment).
  1. Therefore, the total transmission time is 5.455830 - 0.026477 = 5.4294 seconds.
  1. Hence, the throughput for the TCP connection is computed as 164090/5.4294 = 30.222 KByte/sec.

TCP congestion control in action

13. Use the Time-Sequence-Graph(Stevens) plotting tool to view the sequence

number versus time plot of segments being sent from the client to the

gaia.cs.umass.edu server.

image10.pngimage07.png

References

  • Kurose, J.F. and Ross, K.W. (2008). Computer Networking: A Top-Down Approach (Pearson Education). ISBN-10: 0321513258; ISBN-13: 978-0321513250

                Tom Forward

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Transmission Control Protocol/Internet Protocol (TCP/IP)

    The next layer is the Internet layer. This layer is where packets are addressed and packaged for routing. In this layer, we can find 3 protocols: * Internet Protocol (IP) - primarily responsible for addressing and routing packets between hosts and networks.

  2. Application of Inferential Statistical Tests in Quality Control.

    * Produce a vertical bar chart, with the height of the bars corresponding to the frequency of each defect. The other prominent diagnostic chart is a cause-and-effect diagram or a fishbone diagram. It is called a cause-and-effect diagram to emphasize the relationship between an effect and a set of possible causes that produce the particular effect.

  1. Software Engineering Assignment (CM200)

    This is the reason that the system couldn't cope with the overflows of communication between the system and the ambulances because it was never tested for the actual type of data required. The first day ever-realistic test was the first day of the launch of the system.

  2. Network operating report - Windows XP Vs Windows NT Server

    information to start applications and load components, such as device drivers and network protocols. The registry contains a variety of different types of data, including the following: * The hardware installed on the computer, including the central processing unit (CPU), bus type, pointing device or mouse, and keyboard.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Thus to make each character of 64 � 128 pixel there is a need of a resizing algorithm which is also designed and tested successfully. 3.2 Design Overview Based on various standards used in different countries, the vehicle license plates are usually different in form, shape and material.

  2. Methods and technology used in Computer Forensics

    of VMware, had claimed that the inclusion of a clone of the Netscape browser was an attempt at "cutting off the air" from their competitors2. While Maritz denied the allegations, subsequent analysis of deleted data uncovered an eMail suggesting the former vice president had in fact made such a statement.

  1. CONTENTS 1 Overview ...

    After sending the header and the blank line, the client transmits the data. The header must have included a Content-Length: field, which permits the server to determine when all the data has been received. HTTP Package Above is the package of the HTTP, Step to the each of the process.

  2. So in order to understand what the main areas where organisation should be aware ...

    starting with word "Netscape" [root@localhost root]# whois "netscape."@whois.crsnic.net [whois.crsnic.net] Whois Server Version 1.3 Domain names in the .com and .net domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information. Aborting search 20 records found .....

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work