Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Management information system feacture
Management information system feacture
Management information system feacture
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Management information system feacture
MANAGEMENT INFORMATION SYSTEMS
OMIS 660 FALL 2015
Instructor – Dr. Yipeng Liu
LAB 1 – TCP: TRANSMISSION CONTROL PROTOCOL
Submitted by: Submission Date: 09-25-2015
Divya Malika Vandana
Z1776136
Divya Reddy Chandupatla
Z1768598
SUMMARY
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
…show more content…
OBJECTIVE The objective of this lab is to set up a network which uses TCP for end – to – end transmission and analyse the size of the congestion window with different scenarios. IMPLEMENTATION • We started with creation of a new project in Riverbed Modeler.
According to the manual, we chose USA from the map list and created a network.
• As shown in the picture below, we added Application config, Profile config, ip32_Cloud and two subnets into the project workspace.
• The next step is to set the names of the devices on the network and edit their attributes.
• For the Application config, the name is set to APPLICATIONS. The attributes are edited as shown in the picture below.
Here, the number of rows of Applicaion definition is set to 1 since we are using a single application i.e. FTP. The name of application is given as FTP_Application. In the description of FTP inter request time, the time taken to transfer the file, is set to constant (3600) and the File size is set to constant (10000000) which is 10MB.
• For the Profile config, the name is set to PROFILES and the attributes are edited as shown in the picture below.
Here, the number of rows for profile config is set to 1 and the name is given as FTP_Profile.
• For the west subnet, one ethernet_server and one ethernet4_slip8_gtwy router are connected with a bidirectional 100 BaseT link. The attributes of the server are shown in the picture
…show more content…
below. • The flavour is set to Tohoe for No_Drop and Drop_NoFast scenarios. For Drop_Fast scenario, the flavor is set to Reno. • For the east subnet node, the Ethernet_wkstn and ethernet4_slip8_gtwy are set similar to the west subnet node. RESULTS 1. NO DROP SCENARIO Let’s consider the No_Drop Scenario. The following image shows the results for No_Drop scenario. It is clearly seen that the congestion window is shooted up because there isn’t any retransmission of packets. The packets are sent at constant time intervals and there isn’t any loss of packets. This is assumed to be an ideal scenario where the Internet works perfectly. However, it isn’t the same in real case. From the graph, it is seen that the sent segment sequence number remains constant for certain period of time and then increases exponentially upto 10 MB (since the file to be downloaded is 10MB) from the starting point because there is no loss of packets resulting in no retransmission. 2. DROP NO FAST SCENARIO In the Drop_NoFast scenario, we see that the packets are discarded. The packet discard ratio is set to 0.5% in the Performance Metrics of the IP Cloud. By analysing the report generated, we could see the congestion window size graph with lot of fluctuations and spikes. This is because the discarded packets are retransmitted only after the time out period is reached. By comparing the graphs for congestion window size and sent segment sequence number, we see that the sent segment sequence number remains flat for corresponding drop in the congestion window and increases exponentially with increase in the congestion window.
3. DROP FAST SCENARIO
For Drop_Fast scenario, we change the flavour of the TCP Properties to Reno for fast recovery and fast retransmit mechanism.
When there is loss of packet, the sender doesn’t wait for the time out and resends the packets immediately using the mechanism of fast recovery and fast retransmit.
Analysing the graph, since there are loss of packets and retransmission, the congestion window size graph fluctuates by increasing and decreasing very frequently.
4. COMPARISION OF THE THREE SCENARIOS
The graph shows comparison of the three scenarios for sent segment sequence number. The green curve represents No_Drop scenario where it shoots up as it is a perfect scenario where there is no loss of packets. Whereas the blue curve which representd Drop_Fast Scenario increases exponentially because there is loss of packets and retransmission takes place.
QUESTIONS 1. Why does the Segment Sequence Number remain unchanged (indicated by a horizontal line in the graphs) with every drop in the congestion window? The segment sequence number is used as a reference number for the segments that are sent from the sender. This in turn gets an acknowledgement from the receiver. Sequence number is increased only if the sender receives an acknowledgement. In case if any segment is lost or discarded, the congestion window size drops accordingly. On the other hand, the receiver doesn’t send any acknowledgement because the lost packet is not resent. This causes the segment sequence number to remain unchanged with every drop in the congestion window. 2. Analyze the graph that compares the Segment Sequence numbers of the three scenarios. Why does the Drop_NoFast scenario have the slowest growth in sequence numbers? Generally, when a packet drop occurs, the window size drops respectively. For the Drop_NoFast scenario, the lost packet is not recovered and retransmitted until the server reaches the timeout window. Therefore, this results in delayed retransmission owing to slow growth in sequence numbers. 3. In the Drop_NoFast scenario, obtain the overlaid graph that compares Sent Segment Sequence Number with Received Segment ACK Number for Server_West. Explain the graph. Hint: - Make sure to assign all values to the Capture mode of the Received Segment ACK Number statistic. We can see that there is a slight difference in the graphs of Sent Segment Sequence Number (Red curve) and Received Segment ACK Number (Blue curve). Initially, the ACK curve is lagging behind a little when compared with Sent Segment Sequence curve because of 0.5% packet ratio resulting in retransmission of the segments. However, there is not much of packet latency (time interval taken for the ACK to be received) between the two curves after a while. 4. Create another scenario as a duplicate of the Drop_Fast scenario. Name the new scenario Q4_Drop_Fast_Buffer. In the new scenario, edit the attributes of the Client_East node and assign 65535 to its Receiver Buffer (bytes) attribute (one of the TCP Parameters). Generate a graph that shows how the Congestion Window Size (bytes) of Server_West gets affected by the increase in the receiver buffer (compare the congestion window size graph from the Drop_Fast scenario with the corresponding graph from the Q4_Drop_Fast_Buffer scenario.) The picture below shows the comparison of the graphs for the congestion window size of Drop_Fast (blue curve) and Q4_Drop_Fast_Buffer scenarios (red curve). Analysing the graph, we can conclude that if the buffer size is more, then the amount of data to be transmitted is fast and complete. However, the buffer value cannot be extreme as it results in over loading and receiver may not able to take all the data at once. So it is required to maintain a optimal buffer value . CONCLUSION Through this lab, we gained practical exposure to the Riverbed Modeler. We got familiar with the Transmission control protocol, why and when TCP uses the additive increase and multiplicative decease mechanisms and how the different algorithms like Tahoe and Reno effect the congestion control mechanisms. We have implemented various scenarios with different parameters, simulated the scenarios and analysed their corresponding graphs. We look forward to gain in depth knowledge of Riverbed Modeler with the upcoming lab projects.
The Unistep IRP Elexol EtherIO 24 Module is a network board that is integrated with features that allow multiple devices over the same network to communicate. This microcontroller was designed to be implemented as an addition to a larger network system; the multiple features and capabilities allow for various industrial and home applications. Ethernet is very common and used in most networks, which makes the IRP a great candidate for networking problems both at home and in the work field.
rapidly chooses how to convey the set of uses and framework servers over different machines in the cloud. Large portions of the conventional parallel applications for the most part utilize an altered number of strings on the other hand procedures characterized as a parameter toward the begin of the application. The choice for the number of strings is frequently chosen by the client in a push to completely use the parallel assets of the framework or to take care of top demand of a specific administration. fos utilizes the duplicated server model which permits extra transforming units to be alterably included amid runtime permitting the framework to attain a finer use for element workloads and lightening the client from such
If the maximum packet lifetime is not large enough a duplicate packet could be sent while the ACK is still in the process of being transmitted back to the original sender. This could cause issues where there are duplicate packets being sent. Additionally, this will cause unnecessary congestion issues if there are extra packets and ACKs being sent.
Filmmakers must often establish information quickly in a film in order to give the audience context for the plot. In this film, the filmmaker establishes information about several of the main characters, including Lina and Don. What information do we as the audience learn about Don and Lina from time code 01:35 to 04:00 of the film? How does the filmmaker give us this information? Discuss at least two different ways that the filmmaker gives the audience information about these characters.
The networks are controlled through use of a router. This router is the only device that sees every message sent by any computer on either of the company's two networks. The router ensures that information doesn't go where it is not needed. This is crucial for keeping large volumes of data from clogging the connections of other departments at MKS.
...a flood of packets. Therefore, the victim node or sometimes the whole network can get easily paralyzed [24].
...ch an attacker resends valid frames that the attacker has intercepted in the middle of forwarding.
3. Copy over the wattcp.cfg file to the disk and change the IP Address, Subnet Mask and Gateway according to network. (A special IP Address should be allocated for the Server PC)
The first end system requires to transmit the packet to the second link = L/R2
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Next, the writer goes over the second type of network architecture - the TCP/IP reference model, the granddaddy of the wide area computer network. This architecture allows the connection of multiple networks seamlessly. The architecture is flexible and capable of running even if some of the subnet hardware is destroyed or non-functional as long as the source and destination machines are functioning. In a similar fashion to the OSI model, the TCP/IP model has layers as well. In this case, we have four layers: the link
Congestion control involves reduced sending of packet data because of avoiding overflow and lack of resources.
The set standards and mechanisms for enabling high quality performance for applications are known as quality of service routing. Its main goal is to provide special service for applications that need it by making sure the required bandwidth is provided, controlling latency and making sure the loss of data is reduced. Some of its useful features are:
People need to know what a word means when they see it. In the appendix are a few terms that will be in this paper as well as several other important ones. After you are familiar with these terms we will proceed to discuss the history of networking. Explanations will be provided on how networking came about and who was the first to experiment with it. Also, some statistics about the Internet and its growth will be discussed. In the 1950s, there was no interaction between the users and their programs while they were running on the computers. No direct communications were involved. Jobs were brought to the machine to be run in a batch. (Jones, 2001, Personal Computers History and Development)
Asynchronous serial transmission is a technique used in serial RS232 communication. The data is framed by a series of control bits known as the start bit, stop bit(s), parity bits and error checking bits. A transmit clock signal is used to clock the data over the transmission line to the receiving end. At the receiver, a clock signal, known as the receive clock, which corresponds to the transmit clock is used to decode the transmitted data back to the original by stripping off the control bits.