Preview

Behavior of TCP

Powerful Essays
Open Document
Open Document
1860 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Behavior of TCP
Welcome back to the Lab Programme!

In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol’ s Alice’s Adventures in Wonderland) from your computer to a remote server. We’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; we’ll see TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and we’ll look at TCP’s receiver-advertised flow control mechanism. We’ll also briefly consider TCP connection setup and we’ll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.
Before beginning this lab, you’ll probably want to review sections 3.5 and 3.7 in the text. 1
1. Capturing a bulk TCP transfer from your computer to a remote server
Before beginning our exploration of TCP, we’ll need to use Wireshark to obtain a packet trace of the TCP transfer of a file from your computer to a remote server. You’ll do so by accessing a Web page that will allow you to enter the name of a file stored on your computer (which contains the ASCII text of Alice in Wonderland), and then transfer the file to a Web server using the HTTP POST method. We’re using the POST method rather than the GET method as we’d like to transfer a large amount of data from your computer to another computer. Of course, we’ll be running Wireshark during this time to obtain the trace of the TCP segments sent and received from your computer. Do the following:
• Start up your web browser. Go the http://gaia.cs.umass.edu/wireshark-labs/alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this file somewhere on your computer.
• Next go to http://gaia.cs.umass.edu/wireshark-labs/TCP-wireshark-file1.html
• You should see a screen that looks like: • Use the Browse button in this form to enter the name of the file

You May Also Find These Documents Helpful

  • Good Essays

    Nt1110 Unit 3 Assignment

    • 655 Words
    • 3 Pages

    Here, Raspberry Pi will act as a server which will open a socket on a specified port which will wait for the incoming connection from the client machine once the connection is established it will send and receive messages and the connection will termi-nate only when the client side application exits. As mentioned earlier it is similar to a simple chat server where the client ma-chine will send some instructions as messages and the Pi will send acknowledgment or error message as message only. One thing that should be kept in mind here is that in the case of an error the server side code should not terminate. Now from here code can be further divided into five parts i.e.:…

    • 655 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    Before you start this lab, see your instructor for the information needed to complete the following table:…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    What is the history of the TCP/IP model? Why was it created? Use your textbook and Internet research to support your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    TCP/IP network - is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    THE AP EURO DBQ

    • 555 Words
    • 2 Pages

    III. Pre-lab Questions: (You will need to look this information up! Use your textbook and Google/Blackle!)…

    • 555 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    What is the significance of the TCP three-way handshake for applications that utilize TCP as a transport protocol? Which application in your protocol capture uses TCP as a transport protocol?…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Subnetting Lab 7

    • 1327 Words
    • 6 Pages

    Read the lab details listed below, and then answer the questions listed in the lab exercise.…

    • 1327 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lan and Wan

    • 730 Words
    • 3 Pages

    When a message is sent from one computer to another, it travels down the protocol layers of the model, and then up the layers of the stack on the other computer. The application layer is the application software used by the network user. The Transport Layer guarantees that the receiver gets the data exactly as it was sent. It is responsible for delivering messages from a specific process on one computer to the corresponding process on the destination computer, it can also detect…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Socket Programming

    • 4392 Words
    • 18 Pages

    Sockets are a protocol independent method of creating a connection between processes. Sockets can be either connection based or connectionless: Is a connection established before communication or does each packet describe the destination? packet based or streams based: Are there message boundaries or is it one stream? reliable or unreliable. Can messages be lost, duplicated, reordered, or corrupted?…

    • 4392 Words
    • 18 Pages
    Good Essays
  • Satisfactory Essays

    Pper

    • 255 Words
    • 2 Pages

    When a client sends any message to the server, the server records this message in its buffer, echoes the message back to the client together with the client’s IP address and Port number. The server too, broadcasts the same message together with the IP address and the Port number of the sender to all the clients that are currently connected to the…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Communication

    • 6574 Words
    • 27 Pages

    Chapter 1 Chapter 2 PART 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 PART 3 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18…

    • 6574 Words
    • 27 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet Protocols

    • 542 Words
    • 2 Pages

    Internet protocols, or Internet rules, are the standards used to send data from one computer to another. The protocols that expedite data transfer include Internet Protocol Versions Four and Six, Remote Access, Hyper Transfer, File Transfer, Electronic Mail, and Network News Transfer. Communication and information transfer on the Internet is becoming available in constantly increasing speeds. Internet protocols use these increasing speeds by facilitating communication, and information transfer, while benefiting the end user.…

    • 542 Words
    • 2 Pages
    Satisfactory Essays