Analysis of TCP flags in congested network

Masaki Fukushima, Shigeki Goto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    This paper proposes a new simple method for network measurement. It extracts 6-bit control flags of TCP (Transmission Control Protocol) packets. The idea is based on the unique feature of flag ratios which is discovered by our rather exhaustive search for the new indexes of network traffic. By the use of flag ratios, one can tell if the network is really congested. It is much simpler than the conventional network monitoring by a network analyzer. The well-known monitoring method is based on the utilization parameter of a communication circuit which ranges from 0% to 100%. One cannot tell the line is congested even if the factor is 100%. 100% means full utilization and does not give any further information. To calculate the real performance of the network, one should estimate the throughput of effective speed of each user. The estimation needs much calculation. Our new method tries to correlate ratios of TCP control flags and network congestion. The result shows the usefulness of this new method. This paper analyses the reason why the flag ratios show the unique feature.

    Original languageEnglish
    Title of host publication1999 Internet Workshop, IWS 1999
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages151-156
    Number of pages6
    ISBN (Electronic)0780359259, 9780780359253
    DOIs
    Publication statusPublished - 1999 Jan 1
    Event1999 Internet Workshop, IWS 1999 - Suita, Osaka, Japan
    Duration: 1999 Feb 181999 Feb 20

    Other

    Other1999 Internet Workshop, IWS 1999
    Country/TerritoryJapan
    CitySuita, Osaka
    Period99/2/1899/2/20

    ASJC Scopus subject areas

    • Information Systems and Management
    • Hardware and Architecture
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Analysis of TCP flags in congested network'. Together they form a unique fingerprint.

    Cite this