Question

In: Computer Science

Will rate answer 1) Assume a user requests a large object from a web server. Assume...

Will rate answer

1) Assume a user requests a large object from a web server. Assume that for the TCP running on the web server: • the MSS is 1,460 bytes (a more precise value for TCP when operating over an Ethernet), • each segment transmitted contains 66 bytes of headers (for TCP and all lower-level protocols), and • flow and congestion control mechanisms do not limit the rate at which the web server transmits data.

a) Derive an expression that gives the size of the largest object that can be returned from the web server such that during the transfer TCP, sequence numbers do not have to be reused? Show how you derived this value. If you need to know additional information that was not given in the problem description simply express that information as a variable in your expression.

b) Assuming the client and server are connected via a 10 Mbps link, for the object size you computed in part (a), how long would it take to transfer the requested object from the web server to the client?

c) How did taking into account the size of TCP headers and lower layer protocol headers effect your calculation in part (a)? In part (b)?

Solutions

Expert Solution

1.Retrieving document from a web server involves the establishment of a TCP connection, the sending of an HTTP request by the client, and the reply from the web server.

We define response time as the time elapsed from the time the client requests a document (GET command) to when the client receives the server's reply.

The measurement tool can make use of Telnet to access the web server. One would Telnet to port 80, after the TCP connection is set up, and then measure the time elapsed from sending the request to receiving a reply.

a)

Fragmentation is sometimes not supported by applications, and is something we should avoid if possible. The best way to avoid fragmentation is to adjust the maximum segment size or TCP MSS so the segment will adjust its size before reaching the data link layer.

Before we look at TCP MSS, it helps to understand the build of the “unit” that’s being sent over the internet.

The common value of MTU in the internet is 1500 bytes.

As you can see in the figure above, the MTU is built from payload (also referred as data) and the TCP and the IP header, 20 bytes each. The total value of the IP and the TCP header is 40 bytes and mandatory for each packet, which leaves us 1460 bytes for our data.

Now, imagine that we are using the GRE protocol in our network, encapsulating the original packet and adding 24 bytes for the GRE header.

The total size of this kind of packet will be 1524 bytes, exceeding the 1500 bytes MTU value. The “data” size in this packet is 1460, but we can and should decrease it in order to make sure the total size will be 1500 bytes or less. And this is where TCP MSS comes into the picture.

TCP MSS, the maximum segment size, is a parameter of the options field of the TCP header that specifies the largest amount of data, specified in bytes, that a computer or communications device can receive in a single TCP segment. It does not include the TCP header or the IP header. This value will dictate the maximum size of the “data” part of the packet. In the following case for the GRE tunnel, we will set the tcp mss value to be 1436 or lower, while the default size is 1460.

b)

1500 - 20 -20 = 1460 bytes

1.5 Mbyte / 1460 byte = 1027.4, therefore 1028 blocks are needed to transfer the file.

Overhead = ((1028 x 1500 - 1.5M)/1.5M) x 100 = 2.8%


Related Solutions

Let N be the number of requests to a web server per day and let N...
Let N be the number of requests to a web server per day and let N Poisson(). Each request comes from a human with probability p or from a spam bot with probability 1 ? p. Assume that the requests are independent of each other. Let X be the number of requests from humans per day and Y be the number of requests from spam bots per day. (a) State the conditional distribution of X given N = n, and...
During 1 30 minute observation, a web server received 2700 requests. The mean response time was...
During 1 30 minute observation, a web server received 2700 requests. The mean response time was 2 seconds. What is the mean number of queries in the system? Give both formula and result. Does your formula depend upon distributional assumptions?
The time T between requests to a web server is exponentially distributed with mean 0.5 seconds....
The time T between requests to a web server is exponentially distributed with mean 0.5 seconds. (a) What is the value of the parameter in this exponential distribution? Give the p.d.f. and c.d.f. of T? [2] (b) Use the c.d.f. of T to find the median request time and interpret it. [3] (c) What is the probability that the request time is between 0.25 and 1.5 seconds? [1]( d) Find the 60th percentile of the request time and interpret it....
Describe the process involving the transmission of a Web page from a Web server to a...
Describe the process involving the transmission of a Web page from a Web server to a user’s computer.
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. (10 marks total) CSE1CPR 2020 Final Exam Page 8 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? iv. Suggest how the website developer or administrator might...
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? i v. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry?   iii. How might this cause harm? iv. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates
From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of...
From the security aspect of client/browser, connecting to a secure web site/server, Mention the importance of web certificates. Mention 4 certificate issuing companies Mention a security incident (or case study) of exploiting web certificates. From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates?
1. A Client-side digital signature can be used to authenticate to a web server through SSL,...
1. A Client-side digital signature can be used to authenticate to a web server through SSL, but confidentiality can still be vulnerable to attack. Identify a type of attack to which the use of SSL is vulnerable and justify your answer. 2. Discuss the benefits of MPLS LSP (multiprotocol label switching label switched path) to support high availability of service with illustration of use for Push, Swap and Pop. 3. The manager wishes to access confidential company data while travelling...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT