Program that uses the socket interface to send messages

Assignment Help Basic Computer Science
Reference no: EM131045924

Write a test program that uses the socket interface to send messages between a pair of Unix workstations connected by some LAN (e.g., Ethernet, ATM, or FDDI). Use this test program to perform the following experiments.

(a) Measure the round-trip latency of TCP and UDP for different message sizes (e.g., 1 byte, 100 bytes, 200 bytes, ... , 1000 bytes).

(b) Measure the throughput of TCP and UDP for 1-KB, 2-KB, 3-KB, ... , 32-KB messages. Plot the measured throughput as a function of message size.

(c) Measure the throughput of TCP by sending 1 MB of data from one host to another. Do this in a loop that sends a message of some size, for example, 1024 iterations of a loop that sends 1-KB messages. Repeat the experiment with different message sizes and plot the results.

Reference no: EM131045924

Questions Cloud

Give the sizes and offsets of the sequence of fragments : Give the sizes and offsets of the sequence of fragments delivered to the network layer at the destination host. Assume all IP headers are 20 bytes.
Address market failure such as monopoly power : What has been the governmental efforts to address market failure such as monopoly power, externalities and public goods?
Question regarding the opportunity cost of attending : Instead of attending class, you could have either flipped hamburgers for $8 an hour or waited tables for $5 an hour. Given this information, the opportunity cost of attending each class session is:
Could a packet with all 0s or all 1s be a legal ipv4 packet : Could a packet with all 0s or all 1s be a legal IPv4 packet? Will the Internet checksum catch that error? Why or why not?
Program that uses the socket interface to send messages : Measure the throughput of TCP by sending 1 MB of data from one host to another. Do this in a loop that sends a message of some size, for example, 1024 iterations of a loop that sends 1-KB messages. Repeat the experiment with different message size..
Country imposes a tariff on a good : Suppose a large country imposes a tariff on a good. Which of the following statements isfalse?
Calculate the change in the money supply : If the value of full employment output (Q) or real transactions (T) in the economy above is $451 billion, calculate the change in the money supply (M) needed by the Fed to bring this economy to full employment output if V=2.5 during the economic b..
Discards all received data still unread in buffers : Sketch a scenario involving the above in which data sent by (not to!) the closing host is lost. You may assume that the remote host, upon receiving an RST, discards all received data still unread in buffers.
Write down the maximization problem : (a) Write down the maximization problem for this individual. (b) Solve the maximization problem and nd current consumption, future consumption and savings (or assets).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  News article regarding denial of service attack

Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.Summarize the article using at least 500 words.The key to this assignment is to demonstrate your understanding of th..

  The reflexive closure of r has how many elements

For this question let:A = {a, b, c, d} and R is a subset of A * A where, R = {(a, a), (b,b), (c, c), (a, b), (b, c), (c, d), (d, c)} a) The reflexive closure of R has how many elements? b) The symmetric closure of R has how many elements? c) The tran..

  Explain the roles of computer forensics expert

Explain the roles of computer forensics expert and computer security expert. You should include the following: Which specific positions (job titles) are in demand within business organizations?

  Define implementing streaming media within the organization

What are two site examples that have images or multimedia that are used effectively on the site? Why do you think they work well on the site? Include the URLs of the sites in your response for others to view your selections.

  What do you mean by c++ access specifiers

What do you mean by C++ access specifiers ?

  Role of financial managers within an organization

Describe the forms of business organizations and the role of financial managers within an organization.

  Explain the pros and cons of thick or thin client char.

Explain the pros and cons of thick or thin client characteristics.

  Please take a position on this: pro or con

Please take a position on this: pro or con.  Establish your thread with your position.  You must give real live examples to back up your position.  Make sure you participate in other student threads with reasoned responses and/or counter arguments.  ..

  The sequence of fibonacci numbers is defined by f0

PROBLEM 1. The sequence of Fibonacci numbers is defined by f0 = 0, f1 = 1, and fn = fn-1 + fn-2, for n > 1.

  Elements corresponding to the inorder sequence

Suppose that you are given two sequences of elements corresponding to the inorder sequence and the preorder sequence. Prove that it is possible to reconstruct a unique binary tree .

  The current directory is c

Assume that the current directory is C: and a file named MESSAGE.BAT is located in C:Util directory. Which one of the following commands would be effective?

  Explain radio frequency identification technology

Write discussion of radio frequency identification (RFID) technology and Information Technology Infrastructure Library (ITIL) standards.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd