Problem Set 6 Due: Start of Class, October 26

Similar documents
Wireshark Lab: TCP v7.0

Before beginning this lab, you ll probably want to review sections 3.5 and 3.7 in the text. 1

Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018

Lab Assignment 3 for ECE374

Before beginning this lab, you ll probably want to review sections 3.5 and 3.7 in the text.

EE586 Homework and Laboratory #5 Due November 3, 2010

Submit your captured trace file from the TCP lab exercise (Section 1 describes how this can be done).

4. What is the sequence number of the SYNACK segment sent by spinlab.wpi.edu to the client computer in reply to the SYN? Also Seq=0 (relative

Problem Set 7 Due: Start of Class, November 2

Problem Set 9 Due: Start of class, December 4

Computer communication EDA343/DIT420 Lab 1

Wireshark Lab: HTTP SOLUTION

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

CSCD 330 Network Programming

Lecture 08: The Transport Layer (Part 2) The Transport Layer Protocol (TCP) Dr. Anis Koubaa

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12

Laboratory Manual for CENG460 Communications Networks

15-441: Computer Networks Homework 3

CS450 Introduc0on to Networking Lecture 14 TCP. Phu Phung Feb 13, 2015

Chapter 3 Transport Layer

Lecture 12: Transport Layer TCP again

Lecture 5. Transport Layer. Transport Layer 1-1

Chapter III: Transport Layer

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

10 minutes survey (anonymous)

Wireshark Lab: Getting Started

TCP. TCP: Overview. TCP Segment Structure. Maximum Segment Size (MSS) Computer Networks 10/19/2009. CSC 257/457 - Fall

CS457 Transport Protocols. CS 457 Fall 2014

CS 4390 Computer Networks. Pointers to Corresponding Section of Textbook

CSC 401 Data and Computer Communications Networks

Wireshark Lab: Getting Started v7.0

ECE697AA Lecture 3. Today s lecture

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 9

CS 43: Computer Networks. 18: Transmission Control Protocol October 12-29, 2018

Lab Exercise UDP & TCP

CS Lecture 1 Review of Basic Protocols

Chapter 3 Transport Layer

Fall 2012: FCM 708 Bridge Foundation I

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

CSCE 463/612 Networks and Distributed Processing Spring 2017

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Wireshark Lab: Ethernet and ARP v6.01

TCP. 1 Administrivia. Tom Kelliher, CS 325. Apr. 2, Announcements. Assignment. Read From Last Time

Problem Set 10 Due: Start of class December 11

Transport Layer: outline

FINAL May 21, minutes

Reliable Transport I: Concepts and TCP Protocol

Wireshark Lab: Getting Started v6.0

Computer Networking Introduction

TCP (Part 2) Session 10 INST 346 Technologies, Infrastructure and Architecture

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Question 1 (6 points) Compare circuit-switching and packet-switching networks based on the following criteria:

Computer Communication Networks Midterm Review

University of Maryland Baltimore County Department of Information Systems Spring 2015

CSE 4213: Computer Networks II

Wireshark Lab: Getting Started v6.0

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

CSC 4900 Computer Networks: TCP

Review problems (for no credit): Transport and Network Layer

Analysis of Captured Data on a Typical Tcp Connection

Wireshark Lab: Getting Started v7.0

Problem 7. Problem 8. Problem 9

Recap. More TCP. Congestion avoidance. TCP timers. TCP lifeline. Application Presentation Session Transport Network Data Link Physical

Wireshark Lab: HTTP v6.1

EE 122: Transport Protocols. Kevin Lai October 16, 2002

TCP : Fundamentals of Computer Networks Bill Nace

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Chapter 3 Transport Layer

Answers to Sample Questions on Transport Layer

Practice Problems: P22, 23, P24, P25, P26, P27, P28, P29, P30, P32, P44 and P45. Hand-in the following: P27, P28, P32, P37, P44

Suprakash Datta. Office: CSEB 3043 Phone: ext Course page:

Transport Layer: Outline

TDTS06: Computer Networks

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Lab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2

Chapter 3 outline. 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management

Ethereal Lab: Getting Started

Transmission Control Protocol (TCP)

COMP416 Lab (7) IEEE Daoyuan

Lab: 2. Wireshark Getting Started

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

COMP 431 Internet Services & Protocols. Transport Layer Protocols & Services Outline. The Transport Layer Reliable data delivery & flow control in TCP

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

Chapter 3 Transport Layer

32 bits. source port # dest port # sequence number acknowledgement number not used. checksum. Options (variable length)

Project points. CSE422 Computer Networking Spring 2018

CC451 Computer Networks

Foundations of Telematics

Transport Protocols and TCP

CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP

Chapter 3 Transport Layer

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

Problem Set 4 Due: Start of class, October 5

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

PROBLEMSAND EXERCISES

Lecture 8. TCP/IP Transport Layer (2)

Transcription:

CS242 Computer Networks Handout # 12 Randy Shull October 19, 2017 Wellesley College Problem Set 6 Due: Start of Class, October 26 Reading: Kurose & Ross, Sections 3.4, 3.5 Wireshark Lab [11] This exercise set introduces you TCP protocol basics by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol s Alice s Adventures in Wonderland) from your computer to a remote server. Before beginning our exploration of TCP, we ll need to use Wireshark to obtain a packet trace of the TCP transfer of a file from your computer to a remote server. You ll do so by accessing a Web page that will allow you to enter the name of a file stored on your computer (which contains the ASCII text of Alice in Wonderland), and then transfer the file to a Web server using the HTTP POST method (see section 2.2.3 in the text). We re using the POST method rather than the GET method as we would like to transfer a large amount of data from your computer to another computer. Of course, we will be running Wireshark during this time to obtain the trace of the TCP segments sent and received from your computer. Start up your web browser. Go the http://gaia.cs.umass.edu/wiresharklabs/alice.txt and retrieve an ASCII copy of Alice in Wonderland. Store this file somewhere on your computer. Next go to http://gaia.cs.umass.edu/wireshark-labs/tcp-wireshark-file1.html You should see a screen that looks something like Figure 1 Use the Browse button in this form to enter the name of the file (full path name) on your computer containing Alice in Wonderland (or do so manually). Don t yet press the Upload alice.txt file button. Start up Wireshark and begin packet capture. Returning to your browser, press the Upload alice.txt file button to upload the file to the gaia.cs.umass.edu server. Once the file has been uploaded, a short congratulations message will be displayed in your browser window. Stop Wireshark packet capture (and save the resulting capture you will need it in future exercise sets). Your Wireshark window should look similar to the window shown below. 1

Figure 1: Upload page for TCP Wireshark. Filter the packets displayed in the Wireshark window by entering tcp (lowercase, no quotes, and don t forget to press return after entering) into the display filter specification window towards the top of the Wireshark window. What you should see is series of TCP and HTTP messages between your computer and gaia.cs.umass.edu. You should see the initial three-way handshake containing a SYN message. You should also see a bunch of [TCP segment of a reassembled PDU] statements in the Info column of the Wireshark display to indicate that this TCP segment contained data that belonged to an upper layer protocol message (in our case here, HTTP). You should also see TCP ACK segments being returned from gaia.cs.umass.edu to your computer. Exercise 1 [2]: Sources and destinations questions. Answer the following two a [1]: Client address What is the IP address and TCP port num- 2

Figure 2: Wireshark capture of file upload. ber used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, it s probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the details of the selected packet header window. b [1]: Server address What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection? Since this lab is about TCP rather than HTTP, let s change Wireshark s listing of captured packets window so that it shows information about the TCP segments containing the HTTP messages, rather than about the HTTP messages. To have Wireshark do this, select Analyze Enabled Protocols. Then uncheck the HTTP box and select OK. 1 You are now looking at a series 1 Don t forget to recheck this the next time you want to look at HTTP protocol infor- 3

of TCP segments sent between your computer and gaia.cs.umass.edu. Exercise 2 [8]: TCP basics Answer the following questions for the TCP segments: a [2]: SYN segment What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment? b [1]: SYNACK segment What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How did gaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? c [1]: ACK segment What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a POST within its DATA field. d [4]: HTTP POST Consider the TCP segment containing the HTTP POST as the first segment in the TCP connection. What are the sequence numbers of the first six segments in the TCP connection (including the segment containing the HTTP POST)? At what time was each segment sent? When was the ACK for each segment received? Given the difference between when each TCP segment was sent, and when its acknowledgement was received, what is the RTT value for each of the six segments? e [4]: EstimatedRTT What is the EstimatedRTT value (see Section 3.5.3 in text) after the receipt of each ACK? Assume that the value of the EstimatedRTT is equal to the measured RTT for the first segment, and then is computed using the EstimatedRTT equation on page 242 for all subsequent segments. Wireshark has a nice feature that allows you to plot the RTT for each of the TCP segments sent. Select a TCP segment in the listing of captured packets window that is being sent from the client to the gaia.cs.umass.edu server. Then select: Statistics TCP Stream Graph Round Trip Time Graph. mation. 4

f [1]: Message length What is the length of each of the first six TCP segments? Before you close up shop, be sure to save your Wireshark capture. You will need it in the next exercise set. 5

Problems Problem 1 [4]: Correcting protocols Consider our motivation for correcting protocol rtd2.1. Show that the receiver whose FST is given in the following diagram, when operating with the sender shown in Figure 3.11 (in both the fourth and fifth editions of Kurose and Ross), can lead the sender and receiver to enter into a deadlock state, where each is waiting for an event that will not occur. Figure 5.1. An incorrect receiver for protocol rdt 2.1. Problem 2 [4]: Protocols for lossy channels Consider a channel that can lose packets but has a maximum delay that is known. Modify protocol rdt2.1 to include sender timeout and retransmit. Informally argue why your protocol can communicate correctly over this channel. Problem 3 [3]: rdt3.0 Draw the finite state machine for the receiver side of protocol rdt3.0. Problem 4 [4]: rdt3.0 Give a trace of the operation of protocol rdt3.0 when data packets and acknowledgement packets are garbled. Your trace should be similar to that used at the end of the lecture on reliable transfer. Problem 5 [6]: Go-Back-N Protocol Consider the Go-Back-N protocol with a sender window size of 3 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k. Assume that the medium does not reorder messages. Answer the following questions. 6

a [3]: Sender s Window What are the possible sets of sequence numbers inside the senders window at time t? Justify your answer. b [3]: ACK Fields What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time t? Justify your answer. Problem 6 [4]: Go-Back-N and Selective Repeat Consider the Go- Back-N and Selective-Repeat protocols. Suppose the sequence number space is of size k. What is the largest allowable sender window that will avoid the occurrence of problems such as that in Figure 3.27 below for each of these protocols? 7

Problem 7 [12]: Exponential Moving Average Consider the TCP procedure for estimating RTT. Let SampleRTT 1 be the most recent sample RTT, let SampleRTT 2 be the next most recent sample RTT, and so on. a [4]: EstimatedRRT For a given TCP connection, suppose four acknowledgements have been returned with corresponding sample RTTs SampleRTT 4, SampleRTT 3, SampleRTT 2, and SampleRTT 1. Express EstimatedRRT in terms of the four sample RTTs. b [4]: More Generally Generalize your formula for n sample round-trip times. c [4]: Exponential decay For the formula in part (b) above let n approach infinity. Comment on why this averaging procedure is called an exponential moving average. 8