Compare appropriate industry tools and techniques

Assignment Help Computer Network Security
Reference no: EM132308137

Purpose of the assessment

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage networked applications;

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 8 Lab. Each group will need to capture packets on two networks, at their home network and at MIT network while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end, there will be four trace files, two for each website, two captured on MIT network and two on students' home networks. The websites to access are:

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all four captures using Wireshark that must include:

1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all two networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. Packet Loss

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on two different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all two networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:

Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer.

The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark

3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Attachment:- Networked Application Management.rar

Verified Expert

In this assignment, we have perform the network analysis.Here we done analysis of the given network traffic. Here ,we have make analysis of throughput, window size and other aspect of the network.

Reference no: EM132308137

Questions Cloud

Current business essay : Current Business Essay - research a current business topic or event (within the past year) of his/her choice, and write a 1,000-word essay on the topic
Designing a computer network diagrams : SBM4104 - IT Infrastructure - Asia Pacific International College - designing a computer network diagrams including geographic and logical diagrams
Develop an analytical understanding of performance : develop an analytical understanding of performance and management of different types of networked applications - demonstrate analytical ability of evaluating
What does prior restraint mean : What different types of speech can you identify that may have different protection under the First Amendment?
Compare appropriate industry tools and techniques : Develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should
Address the memo to home office employees at your company : Pay particular attention to your memo's margins, line spacing, font type and size, and placement of memo parts such as the addressees, subject line.
Does it tell the truth about life and the consequences : Choose one of the works of literature you read for this week, "Song of Roland". Does it tell the truth about life and the consequences of human actions?
What is your most important requirement in each interaction : Think about a service that you currently use, then map out the service encounter sequence for that service.
Develop and organize ideas to support a thesis : Compose in a variety of genres with a focus on expository, analytical, and persuasive writing and make deliberate rhetorical decisions based on audience.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Challenges and emerging trends

Insights on best practices, challenges and emerging trends. It will be a power point presantation.

  Describe the best example in the movie of each element

Watch the movie Eye in the Sky and Provide each element example description in a separate sub-item - ISTAR element analysis

  Describe routing attacks

Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics. Can you explain what are routing attacks and show the main characteristics of this attacks.

  Identify suitable products that could used to resolve issues

Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues.

  Will they become cult heroes or viewed as dangerous criminal

Will they become cult heroes or be viewed as dangerous criminals? Will continuing to increase prosecution of these individuals help or hurt the situation?

  Describe concisely and clearly your protocol a and b

Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.

  Importance of reading changed from earlier eras

What does literature offer an individual How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?

  Information security

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters.

  Explain advantages of business continuity planning

Write a 3-5 page report focusing on the advantages and disadvantages of Business Continuity Planning in a financial organization under the Incident Command System.

  Detail the particular malware and exploited vulnerability

Provide a prescriptive series of steps you would utilize to deal with and mitigate the attack.

  How to build a secure network for an organization

Research the resources that are available to you that you need to provide accurate recommendations for the resource manager.

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd