Compare appropriate industry tools and techniques

Assignment Help Computer Network Security
Reference no: EM132308137

Purpose of the assessment

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage networked applications;

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 8 Lab. Each group will need to capture packets on two networks, at their home network and at MIT network while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end, there will be four trace files, two for each website, two captured on MIT network and two on students' home networks. The websites to access are:

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all four captures using Wireshark that must include:

1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all two networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. Packet Loss

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on two different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all two networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:

Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer.

The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark

3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Attachment:- Networked Application Management.rar

Verified Expert

In this assignment, we have perform the network analysis.Here we done analysis of the given network traffic. Here ,we have make analysis of throughput, window size and other aspect of the network.

Reference no: EM132308137

Questions Cloud

Current business essay : Current Business Essay - research a current business topic or event (within the past year) of his/her choice, and write a 1,000-word essay on the topic
Designing a computer network diagrams : SBM4104 - IT Infrastructure - Asia Pacific International College - designing a computer network diagrams including geographic and logical diagrams
Develop an analytical understanding of performance : develop an analytical understanding of performance and management of different types of networked applications - demonstrate analytical ability of evaluating
What does prior restraint mean : What different types of speech can you identify that may have different protection under the First Amendment?
Compare appropriate industry tools and techniques : Develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should
Address the memo to home office employees at your company : Pay particular attention to your memo's margins, line spacing, font type and size, and placement of memo parts such as the addressees, subject line.
Does it tell the truth about life and the consequences : Choose one of the works of literature you read for this week, "Song of Roland". Does it tell the truth about life and the consequences of human actions?
What is your most important requirement in each interaction : Think about a service that you currently use, then map out the service encounter sequence for that service.
Develop and organize ideas to support a thesis : Compose in a variety of genres with a focus on expository, analytical, and persuasive writing and make deliberate rhetorical decisions based on audience.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Relationship between it execution and it governance

What is the relationship between IT execution and IT governance - describe how the COBIT framework institutes mechanisms to control IT risk.

  Project on network security

Can you do project on network security any topic it can be practical/ theoretical / or survey. it has to be 8-12 pages long and follow the IEEE journal standard and also need to show or demo or code or whatever the product is.

  Conduct a security analysis baseline

conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points

  Write a research paper about hids or antivirus systems

Write a Research Paper about HIDS or Antivirus Systems. The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems.

  List and explain key objectives of information security

Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..

  Discuss physical security threat that technologies introduce

Imagine the possibility of being able to control the temperature. Discuss some of the other physical security threats that these technologies might introduce.

  The designers of s-aes got the ciphertext

Use the key 1010 0111 0011 1011 to encrypt the plaintext "ok" as expressed in ASCIIas 0110 1111 0110 1011. The designers of S-AES got the ciphertext 0000 0111 00111000. Do you?

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time.

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

  Understanding on network-related issues

CISC650 Computer Networks - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd