Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

MN504 Networked Applications Management For Retransmission and Bandwidth

  16 Download     📄   1 Pages / 26 Words

Questions:

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:
a)  Use various technologies and techniques for networked application m anagement, deployment and performance tuning.
b)  Describe important networked application architectures and technologies.
c)  Analyse performance and deployment related issues for networked applications
d) Employ industry relevant tools and techniques for managing networked applications

Answers:

Network Performance

The comparative study of the network is done by considering different options. This network performance estimation supports the user to find the configuration that serves. This network have to develop the performance when the network gives the peak performance.

The evaluation of this performance is done by metrics. There are different matrices to find the performance like throughput, Round trip time, Latency, packet loss, Retransmission and bandwidth of the protocol. The network can be set up for different metrics. The different layers of the network stack is related from the metrics. Under the diverse condition, the quantitative evaluation is done on the metrics by the network [1].

The causes of Network Performance lacks performance, timeouts, bottlenecks, problems of protocol and flooding.


Lacking Performance

The whole network performance is slow for work what has to be done. Thus, wire shark can support to get a concept. Wire shark will manage the problems and detect it.

Timeouts

A user trying to reach the service is specified. It will try the other one to serve the purpose. This is done after the usual timeout. In the next stage, these requests are repeated. Wire shark supports when the search for cause is completed.

Bottlenecks

The whole performance of this network is good but, there is a bottleneck which slows the network. Thus, the wire shark does not match for the analysis of distribution and their tools.

Problems of protocol

The opposed protocol execution will slow down the performance. It contains same problems of the bottlenecks.

Flooding

The planned and unplanned packets can flood the network. Wire shark can support to find the type of the flood and the originator.

Hence, the wire shark might or might not be helpful while tracking the problems for the performance of this cause [2].

To find the network performance of the Protocol, find the throughput, Round trip time, Latency, Packet Loss, Retransmission and Bandwidth of the protocol.

Throughput

The amount of visitors in a network can bring measured throughput, generally in phrases consisting of kb per sec. The throughput has similarities to the variety of lanes on a motorway, whereas latency is similar to its velocity limitation. It deals how a whole lot useful records can be transmitted per unit of time. It is same as the bandwidth, if there is no protocol. However, in maximum sensible cases, the throughput is less than the bandwidth for 2 reasons as follows:

Overhead protocol: Protocols use a few bytes to transmit the protocol information. This reduces the throughput.

Ready time’s protocol: Some protocols might be an additionally pressure for some event. It is also defined as the amount of data being sent and received via unit of time [3].

To find the throughput of the given pcap file, analyze the given file in Wireshark. To find the throughput, click statistics> TCP stream graph> throughput. The following graph shows the throughput of the bit torrent protocols.

Round trip time

The Round Trip time is the time taken by the packet that has dispatched from the client of TCP and is responded through the server. But, it does not. Without a doubt, it represents the TCP payload of the respond packet. For instance, at a maximum time, the HTTP get request is spoke back or otherwise, the empty ACK packet is loaded to decide the Round Trip Time. The essential issue of the RTT is finding the overall performance of the software, while the request is sent from one place to any other. Every time, the packets are travelled, at each aspect until it reaches the very last result. The preliminary RTT is decided by the using 3 way handshake. The base latency of the network connection is decided as it will help to respond the handshakes [4].

To find the round trip time of the protocol click statistics> TCP stream graph> Round trip time. The following screenshot shows the round trip time of the bit torrent protocol.

Latency

It is able to take a long term for a packet to be introduced across the interfere networks. In the dependable protocols where a receiver recognizes the distribution of each portion of the records, it is possible to evaluate this as a round-trip time. It is the required time to vehiculate a package across a network. It might be measured in lots of specific approaches: round trip, one manner, and so forth. It also might be affected by any detail inside the chain that's used to vehiculate the facts: WAN hyperlinks, Workstation, routers, LAN, server and in the end it is able to be restricted, for large networks, with the aid of the rate of light. The connection time of the network latency is a good measure, as these packets are managed in priority by the device and by means of server clients. The effect of those device must commonly be very small [5].

To find the latency of the Bit torrent protocol, click statistics> I/O graph. It will show the IO graph of the protocol.

Latency

It is able to take a long term for a packet to be introduced across the interfere networks. In the dependable protocols where a receiver recognizes the distribution of each portion of the records, it is possible to evaluate this as a round-trip time. It is the required time to vehiculate a package across a network. It might be measured in lots of specific approaches: round trip, one manner, and so forth. It also might be affected by any detail inside the chain that's used to vehiculate the facts: WAN hyperlinks, Workstation, routers, LAN, server and in the end it is able to be restricted, for large networks, with the aid of the rate of light. The connection time of the network latency is a good measure, as these packets are managed in priority by the device and by means of server clients. The effect of those device must commonly be very small [5].

To find the latency of the Bit torrent protocol, click statistics> I/O graph. It will show the IO graph of the protocol.

Protocols

TCP

TCP refers to Transmission Control Protocol. It is a connection oriented and reliable protocol. It provides the reliable transport service between two processes that are executing on End systems. For this operation, the Internet protocol (IP) is used in the network layer. The TCP is also known as the stream oriented protocol. The data streams are exchanged through the transmission by using TCP. In streams each individual bytes of data are saved in the memory buffers of the Application layer. It is more reliable and too complex rather than the other communication protocols. But, it provides the flow controlled service. The data are segmented while transferring the data. Each data segments are called as Protocol Data Units. It provides the best effort service and it is implemented by using several protocol timers that ensures the synchronized and reliable communication service between the end systems.

The strength of the TCP is a scalable client server architecture with more number of protocols. TCP is especially used for internet protocol suite. It is originated at the implementation part of the initial network. It enhances the IP (Internet Protocol). The IP network delivers the error-checked streams and it runs the applications on the host systems by communication. But, maintaining these protocols is a difficult process and set up process is also a complex problem [8].

The Hyper Text Transfer Protocol is widely used on the web services applications. It is an asymmetric request-response client server protocol. An HTTP request is sent from the client browser to the web server [9]. As HTTP receives the information from server, it is also known as pull protocol. Then, the retrieved information is pushed into the client. It is a stateless protocol because, the current request and previous requests are independent of each other. The HTTP supports the virtual hosting concept that is the request information are taken as a TCP/IP packets. The request from client browser is handled more efficiently. The caching process is more efficient than the other protocols. But, the registration process for all the authenticated users is not automated until it asks the user to subscribe.

Aggregate Server Access Protocol (ASAP) is a layer of session protocol which offers an excessive-availability information transfer system, over the Internet Protocol networks. It is utilized by the (rserpool) Reliable server pooling structure for the verbal exchange among pool users and factors, pool elements & registrars and pool users and registrars. Normally, ASAP makes use of a deal with-primarily based model of addressing that, confines an obvious communication on a point from its Internet Protocol addresses. Thus, successfully putting off the binding between the communication on point and its physical Internet Protocol (IP) addresses, which usually constitutes a one factor of loss. The above diagram shows the working of ASAP [11]. ASAP is described to take full strength of the level redundancy of network brought by the Stream Transmission Control Protocol (STCP). The weakness is that, it is complex to maintain.

BitTorrent

BitTorrent protocol is described for transferring the documents. The client connects with each other immediately to request and response portions of the document. So, it is peer-to-peer nature. But, there is an important server (referred to as a tracker), which integrates the action of all such emerges

The tracker’s most effective control is connections, it does not have any knowledge of the part of the files being dispensed, and also a big wide variety of clients can be helpful with fairly few bandwidth of tracker. A new development of BitTorrent is the distributed sloppy hash table (DHT) or without a doubt called tracker of UDP protocol. An UDP primarily is based on emerge tracker protocol. The above diagram shows the working of the BitTorrent. The uTorrent imports some other UDP primarily based micro delivery protocol, called UTP [12].

The strength comes from the network, time saving and from peer-to-peer nature. The weakness is the distribution that has started soon, as it is difficult to prevent. If record receives famous and seeder thinks of preventing the distribution, it is far impossible to prevent until all the clients downloading the torrent. Thus, it does not stays in the creator property [13].

References

[1]V. Ndatinya, Z. Xiao, V. Manepalli, K. Meng and Y. Xiao, "Network forensics analysis using Wireshark", International Journal of Security and Networks, vol. 10, no. 2, p. 91, 2015.

[2]"NetworkTroubleshooting/Overview - The Wireshark Wiki", Wiki.wireshark.org, 2017. [Online]. Available: https://wiki.wireshark.org/NetworkTroubleshooting/Overview. [Accessed: 02- May- 2017].

[3]"Computer Networks Demystified | Bandwidth, Throughput and Delay", Networking.layer-x.com, 2017. [Online]. Available: https://networking.layer-x.com/p040300-1.html. [Accessed: 02- May- 2017].

[4]"Determining TCP Initial Round Trip Time | Packet Foo | Analyzing network packets since 2003", Blog.packet-foo.com, 2017. [Online]. Available: https://blog.packet-foo.com/2014/07/determining-tcp-initial-round-trip-time/. [Accessed: 02- May- 2017].

[5]J. Minarovits, E. Gonczol and T. Valyi-Nagy, Latency strategies of herpesviruses, 1st ed. New York: Springer, 2010.

[6]V. Rajagopalan, "TCP packet drop analysis – Unleash Networks Blog", Unleashnetworks.com, 2017. [Online]. Available: https://www.unleashnetworks.com/?p=437. [Accessed: 02- May- 2017].

[7]"How TCP/IP Works: TCP/IP", Technet.microsoft.com, 2017. [Online]. Available: https://technet.microsoft.com/en-in/library/cc786128(v=ws.10).aspx. [Accessed: 02- May- 2017].

[8]"Advantages And Disadvantages Of Tcp/ip ModelWhat Is Networking | What is Networking", Whatisnetworking.net, 2017. [Online]. Available: https://www.whatisnetworking.net/tag/advantages-and-disadvantages-of-tcpip-model/. [Accessed: 02- May- 2017].

[9]"In Introduction to HTTP Basics", Ntu.edu.sg, 2017. [Online]. Available: https://www.ntu.edu.sg/home/ehchua/programming/webprogramming/HTTP_Basics.html. [Accessed: 02- May- 2017].

[10]"OneSignal/OneSignal-Website-SDK", GitHub, 2017. [Online]. Available: https://github.com/OneSignal/OneSignal-Website-SDK/wiki/HTTP-Disadvantages. [Accessed: 02- May- 2017].

 [11]"What is ASAP Protocol ?", OROSK.COM, 2017. [Online]. Available: https://www.orosk.com/asap-protocol/. [Accessed: 02- May- 2017].

[12]"BitTorrent - The Wireshark Wiki", Wiki.wireshark.org, 2017. [Online]. Available: https://wiki.wireshark.org/BitTorrent. [Accessed: 02- May- 2017].

[13]J. Bhatt, "Torrent : Disadvantages and Controversies - PRsBlog", PRsBlog, 2017. [Online]. Available: https://www.prsblog.com/internet/torrent-disadvantages-and-controversies.html. [Accessed: 02- May- 2017].

Copyright © 2009-2023 UrgentHomework.com, All right reserved.