Measurement on latency and bandwidth , Computer Networking

Measure the performance (both latency and throughput) of  TCP and UDP protocol stack  running on a pair of PCs  or Workstations in the Lab, and compare the results of your software with NLANR's  iperf tool.

To measure round-trip latency, use UDP and TCP to send and receive messages of size 1-byte, 100-bytes, 200-bytes, 300-bytes, ..., and 1000-bytes. Report both the round-trip time for each protocoll.

To measure throughput, use UDP and TCP send messages of size 1KByte, 2KBytes, 4KBytes, 8KBytes, 16KBytes, and 32KBytes in one direction, with a message of the same size echoed back in the reverse direction.

As a second measure of TCP throughput (this does not apply to UDP), measure how long it takes to send 1MByte of data from one PC to another (and a 1-byte application-level ACK in the reverse direction), varying the number of messages and size of each message; e.g., 256 x 4KByte messages, 512 x 2KByte messages, 1024 x 1KByte messages, 2048 x 512-byte messages, and so on. Measure enough combinations to discover TCP's performance limits. Experiment with TCP and with different send/receive buffer sizes.

Turn in a written report (in pdf or ps version)  that describes your experiments, presents your results (this means performance tables and graphs) and the comparison between your results and iperf, and draws any relevant conclusions.  Also turn in source code for any test programs you develop with readme and makefile (optional).

Posted Date: 2/14/2013 6:54:08 AM | Location : United States







Related Discussions:- Measurement on latency and bandwidth , Assignment Help, Ask Question on Measurement on latency and bandwidth , Get Answer, Expert's Help, Measurement on latency and bandwidth Discussions

Write discussion on Measurement on latency and bandwidth
Your posts are moderated
Related Questions
10Base5 Connectors Transceiver - intermediary device as well called a medium attachment unit (MAU) Performs CSMA/CD function may perhaps contain small buffer Atta

What are the drawbacks of wireless devices One drawback is security. Every random delivery man who happens to be in building can listen on network. Another weakness is reliabil

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

How to prevent the data from hackers In order to prevent intruders from entering the house, it is necessary for the house owner to look after the behaviour of internal and exte

What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

Q. Explain TCP-IP Routing Architecture? The TCP/IP routing architecture looks extremely much like the OSI routing architecture. Hosts utilize a discovery protocol to o

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

OSI Model Facts The OSI model classifies and organizes the methods that hosts perform to maintain data for transport across the network. You should be familiar with the OSI m

Gateway A device linked to multiple physical TCP/IP networks capable of routing or delivering IP packets among them. Router It's a layer 3 device that connects 2 diss