Streams of Data Flow in Transmission Control Protocol (TCP) Request-Response Cycle Efficiency

Authors

  • Adamu Abubakar Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  • Zulkefli Muhammed Yusof Department of Computer Science, International Islamic University Malaysia, Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.31436/ijpcc.v10i1.458

Keywords:

Transmission Control Protocol (TCP), Request-Response Cycle, Data Flow, Efficiency, Performance Optimization

Abstract

This study examines the complexities of data transmission in Transmission Control Protocol (TCP) Request-Response cycles, with the goal of improving overall efficiency. The research aims to enhance the efficiency of these cycles by studying the dynamic characteristics of data streams. An experimental analysis was carried out utilising a thorough examination of TCP streams of HTTP request-response cycle, with a focus on the complex interaction between client requests and server responses. This study utilises BlazeMeter and JMeter to analyse the effectiveness of TCP request-response cycles, specifically examining the dynamics of data flow. Significant variances were seen in performance indicators across a range of different settings. Analysis of certain experimental request-response scenarios reveals that consistently high response times leads to a persistent server load as well as resource limitations, which negatively affect the overall user experience. In contrast, certain request-response scenarios demonstrate a greater throughput, suggesting a more efficient data transfer capacity, whilst lower throughput scenarios in the experimental conditions indicate the possible bottlenecks as well as network problems. The analysis encompasses various thread groups, providing insights into error rates, response times, and throughputs. These findings enhance the understanding of the efficiency of the TCP request-response cycle and emphasise the elements that affect the flow of data during transmission sessions. Consequently, the research concludes that the data flow within TCP request-response cycles lacks a discernible pattern that can be utilised for training purposes in the field of Artificial Intelligence

References

N. Muraleedharan, A. Thomas, S. Indu, B.S. Bindhumadhava. A Traffic Monitoring and Policy Enforcement Framework for HTTP. In2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP) 2020 Feb 27 (pp. 81-86). IEEE.

X. Zhou, Z. Zong, Rui T, Zhu J, inventors; ZTE Corp, assignee. Method for selecting policy and charging rules function. United States patent US 8,326,263. 2012 Dec 4.

J. Liang, J.W. Sun. Active Detection of Application Layer Attacks Based on Analysis of HTTP-Session. Advanced Materials Research. 2011 Aug 2;268:1253-8.

N.V Patil, C. Rama Krishna, . Kuma. Distributed frameworks for detecting distributed denial of service attacks: a comprehensive review, challenges and future directions. Concurrency and Computation: Practice and Experience. 2021 May 25;33(10): e6197.

M. Najafimehr, S. Zarifzadeh, S. Mostafavi. DDoS attacks and machine?learning?based detection methods: A survey and taxonomy. Engineering Reports. 2023:e12697.

A.S. Ahmadzai Q. Yazdani, A. Abubakar. Analysis of Business Intelligence Systems Transmission Session. Journal of Science and Technology. 2022 Dec 6;27(1):16-28.

S. Wedman A. Tetmeyer H. Saiedian. An analytical study of web application session management mechanisms and HTTP session hijacking attacks. Information Security Journal: A Global Perspective. 2013 Mar 4;22(2):55-67.

B.C. Nathani, E. Adi. Website vulnerability to session fixation attacks. J. Information Eng. App. II. 2012;7:32-6.

E. Hoxha., I. Tafa., K. Ndoni., I. Tahiraj., A. Muco. Session hijacking vulnerabilities and prevention algorithms in the use of internet. (2022). doi: 10.18844/gjcs.v12i1.7449.

D. Yadav, D. Gupta, D. Singh, D. Kumar, U. Sharma. Vulnerabilities and security of web applications. In2018 4th International Conference on Computing Communication and Automation (ICCCA) 2018 Dec 14 (pp. 1-5).

P. Namitha P. Keerthijith. A Survey on Session Management Vulnerabilities in Web Application. In2018 International Conference on Control, Power, Communication and Computing Technologies (ICCPCCT) 2018 Mar 23 (pp. 528-532). IEEE.

F. Shafique, S. Fatima, F.Y. Khuhawar, Z.A Arain. An Analysis of Multipath TCP Security Vulnerabilities: A Research Study. In2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET) 2022 Dec 19 (pp. 172-177)..

M. Chen, F. Dai, B. Yan, J. Cheng. Encryption Algorithm for TCP Session Hijacking. InArtificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II 6 2020 (pp. 191-202). Springer International Publishing.

Y. Cao, J. Nejati, A. Balasubramanian, A. Gandhi. Econ: Modeling the network to improve application performance. InProceedings of the internet measurement conference 2019 Oct 21 (pp. 365-378).

A. Raje, A. Agrawal, T. Santhosh T, Sachan S, Nayak M, Sinha S, De I, Haq J, Maitra S. The Internet Measurement Network (AIORI-IMN). In2023 4th International Conference on Computing and Communication Systems (I3CS) 2023 Mar 16 (pp. 1-8). IEEE.

M.A. Hoque, A. Rao, S. Tarkoma. Network and application performance measurement challenges on android devices. ACM SIGMETRICS Performance Evaluation Review. 2021 Mar 5;48(3):6-11.

E.M. Dastin-van Rijn, N.R. Provenza, M.T. Harrison D.A. Borton. How do packet losses affect measures of averaged neural signalsƒ. In2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) 2021 Nov 1 (pp. 941-944).

Downloads

Published

2024-01-28

How to Cite

Abubakar, A., & Muhammed Yusof, Z. (2024). Streams of Data Flow in Transmission Control Protocol (TCP) Request-Response Cycle Efficiency. International Journal on Perceptive and Cognitive Computing, 10(1), 79–89. https://doi.org/10.31436/ijpcc.v10i1.458

Most read articles by the same author(s)