Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Mid term

ASSIGNMENT 1
TCP/IP
SUBMITTED TO
Dr. Hafiz Gulfam shb
SUBMITTD BY
M Saqlain
ROLL NO

09

BSIT 4TH(MORNING)

Reg No 2018gu1946

GHAZI UNIVERSITY DERA GHAZI KHAN

Abstract:
In this paper we considered and modeled wireless TCP/IP traffic. Definitely,

we focused on the interarrival times of TCP flows and the number of

packages within a flow. We show that the borderline distribution of the flow

interarrival times is piecewise Weibull disseminated. Second and higher

order statistics show that the flow interarrival times are long-range reliant

on and exhibit multifractal mounting. Taking these higher order possessions

into contemplation, we proposed a multinomial canonical waterfall with 3

stages to model the flow interarrival times. Watching at the IP layer, we find

that the number of packets in a flow is heavy-tailed dispersed.

Introduction:
Even though TCP is still the popular protocol in the Internet, with the

increasing request of real-time applications, UDP is gaining admiration.

Allows investigators to measure and analyze physiognomies of both flow

level and packet level traffics which give a key to unnaturally generate and

use the similar traffic for many applications, which is a time-overriding

process otherwise.

The transport layer delivers a mechanism for the argument of data between

end systems. Transmission Control Protocol (TCP) and User Datagram


Protocol (UDP) are two main transport protocols which deliver connection-

oriented and connectionless services individually. TCP ensures reliable and

ordered data delivery while also introducing processing above and

bandwidth boundaries due to congestion and flow control apparatuses.

TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of

protocols self-determining of the physical medium used to transmit data,

but most data transmission for Internet message begins and ends with

Ethernet borders. The Ethernet can use either a bus or star topology.

Proposal idea of TCP/IP:


TCP/IP is important since whole internet runs over it. This is the protocols

using which 2 unlike network Elements communicate with each other.

Without the TCP/IP the data statement and Internet or Inter-Networking

of the devices is not imaginable.

1.Function of TCP/IP:

TCP (Transmission Control Protocol) is a usual that defines how to found

and maintain a network discussion through which application programs can

conversation data. TCP works with the Internet Protocol (IP), which

describes how computers send packets of data to each other.

2.TCP/IP address:
TCP/IP Addressing. TCP/IP contains an Internet addressing scheme

that allows users and applications to classify a specific network or host to

communicate with. ... A unique, official network address is allocated to each

network when it attaches to other Internet networks.

3.Working of TCP/IP:
The Internet works by by means of a protocol called TCP/IP, or

Transmission Control Protocol/Internet Protocol. ... In base

terms, TCP/IP allows one computer to exchange to another computer via

the Internet through assembling packets of data and sending them to right

place.

4.Difference b/w TCP ad IP:


The difference is that TCP is answerable for the data delivery of a

packet and IP is accountable for the logical addressing. In other

words, IP gains the address and TCP guarantees transfer of data to that

address.

Literature Review:
The wireless IP QoS testbed is set-up in the

CAD/CAM workshop of Indian Foundation of Technology Kharagpur, India

as shown in fig. 1. It consists two Access Points (APs), 802.11b/g, and a

number of wireless (Mobiles, Laptops etc.) and wired devices (like


computers) able to contact Internet through Wi-Fi AP, LAN or GPRS

network.

Number Number Max # Of


First 4 Of Max # Of Of Hosts
Class
Bits Prefix Networks Suffix Per
Bits Bits Network
A 0xxx 7 128 24 16,777,216
B 10xx 14 16,384 16 65,536
C 110x 21 2,097,152 8 256
D 1110 Multicast
Reserved for future
E 1111
use.

Netmasks:
Netmasks are used to classify which part of the address is the Network ID

and which portion is the Host ID. This is done by a logical bitwise-AND of

the IP address and the netmask. For class A networks the netmask is always

255.0.0.0; for class B networks it is 255.255.0.0 and for class C networks the

netmask is 255.255.255.0.

Subnet Address:
All hosts are mandatory to support subnet addressing. While the IP address

classes are the agreement, IP addresses are classically submitted to smaller

address sets that do not competition the class system. The suffix bits are

separated into a subnet ID and a host ID. This makes sense for class A and B
networks, since no one attributes as many hosts to these networks as is

allowable.

Future Work :
We are presently in the process of measuring and improving the performance of

the snoop protocol under several conditions. These include wide-area

connections to a mobile host, data transfers from a mobile host, and multicast-

based hand-

offs. We are also working on describing the behavior of TCP connections and the

snoop protocol in the attendance of real-life sources of interfering. In addition to

this, we have happening working on improving the TCP presentation of the

Microecosystem, a metropolitan-area packet relay network. An example of this

is an in-building Waveland network and a campus-wide packet transmit

network, that also spreads inside buildings.

Result:
We have obtainable a protocol to improve the presentation of TCP in networks

with wireless links and mobile hosts. This protocol. works by adjusting the

network-layer software at the base station, and includes no other changes to any

of the fixed hosts in another place in the network. The main idea is the storing of

packets future for the mobile host at the base station and performing local
retransmissions across the wireless link. we have: attained performance

developments of up to 20 times over normal TCP/IP for data transfer from a

secure to a mobile host across a wide variety of bit error rates.

You might also like