Solved

Trace of operation of rdt3.0

Posted on 2004-10-14
6
1,145 Views
Last Modified: 2013-12-07
Can I get a trace of operation of rdt3.0 when data packets and acknowledgement packets are garbled?
0
Comment
Question by:mmathi
  • 2
  • 2
6 Comments
 
LVL 8

Expert Comment

by:deadite
ID: 12317137
Hey, so no one replied to your Q yet.  I don't know what you mean by RDT3.0.  Also, by trace I assume you  mean traceroute?  Also, the garbled packets, what do you mean by that?  If they are corrupt, there might be a network error.  Perhaps you can try a packet sniffer, ie: ethereal.  If you can provide a bit more detail, I think it will be helpful in getting your question answered.
0
 

Author Comment

by:mmathi
ID: 12319929
The RDT3.0 is Reliable Data Transfer protocol version 3.0 and the trace is something like a graph which has Sender on the left represented by a vertical line and Receiver on the right with another vertical line, showing the status of sender and receiver while sending/receiving packets, SEQ number, ACT number, Timeout scenarios, etc. The garbled means the transitions of sender and receiver at various possible states.
0
 

Author Comment

by:mmathi
ID: 12319941
Sorry for the type...it should be ACK number instead of ACT number
0
 
LVL 8

Accepted Solution

by:
deadite earned 500 total points
ID: 12325767
I think what you want is a packet sniffer.  I would recommend Ethereal (http://www.ethereal.com), which is free and easy.  You put it into promiscuos mode, and then start you're normal traffic.  It will capture all of the packets, and you can sort or filter it by RDT3.0.  Should be able to give you a good analysis of what is going on with your data as it is being sent.
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now