Network analysis using wireshark

Assignment Help Computer Network Security
Reference no: EM131597525

Assessment - Network Analysis using Wireshark

Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

a) Apply key architectures and technologies for networked applications

b) Analyse performance and deployment issues for networked applications

c) Choose appropriate industry tools and techniques to manage networked applications.Assignment Description

The aim of the assignment is to develop an analytical understanding of different distributed network conditions. The assignment will provide an opportunity to understand networkmanagement. This exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Each student will need to work on an assigned set of website and capture packets on their home network. The students are assigned the set of websites based on their MIT ID from Table 1. After capturing packets from the websitesthe students are required to submit their reports on the Moodle with screen shots of packet capture and the required graphs.The set of websites include a website of a news channel and a website for live streaming. The students are required to capture packets of images and audio from the news channel website and capture packets from the live stream website while streaming for 10 minutes on their home network.

The students are required to analyse the network performance for the assigned websites:
1. Time Sequence Graph
2. Throughput Graph
3. Load Distribution
4. Identify IP Address and TCP port number client
5. Identify the sequence number for TCP SYN

Table 1: Website Allocation

Sno. Website Assigned Last digit of MIT ID

1 https://www.abc.net.au 0 and 9
https:// iview.abc.net.au

2 https://www.nine.com.au 1 and 8

https://www.9now.com.au/live/channel-9

3 https://www.bbc.co.uk 2 and 7

https://tenplay.com.au/

4 https://www.skynews.com.au 3 and 6
https://7live.com.au/

5 https://www.dw.com 4 and 5
https://www.sbs.com.au/ondemand/programs

Introduction Outline of the report.

Network Performance Analyse the network performance for the assigned website, Time Sequence Graph, Throughput Graph, Load Distribution, Identify IP Address and TCP port number client and Identify the sequence number for TCP SYN.

Appropriateness to findings Relate to MN504 content and compare.

Conclusion Write summary of the report.

Reference style Follow IEEE reference style.

Verified Expert

In this project, main objective is capturing the data from given website by using wireshark application. The packet capturing done by using home network. If packet capturing is completed, after analysing the packets and control the network error. The network performance are analysed by using the captured data. The Wireshark application also determine the throughput, load distribution, window scaling and time sequence graph by using the captured packets. The client IP address and Sequence number are identified.

Reference no: EM131597525

Questions Cloud

Different ways to provide healthcare to the population : The health services to the Indigenous people are often inadequate and more costly both because of remoteness and different ways to provide healthcare.
Draw one graph showing average fixed costs : Using Excel, draw one graph showing average fixed costs, average variable costs, average total costs, marginal revenue, and marginal costs.
Discuss change in healthcare system efficient and effective : What are some of the challenges facing the Australian government in dealing with the delivery of the healthcare system, which is large and complex?
Wrongful termination based on policy violations : Discuss the issue of wrongful termination based on policy violations, especially if policy was not being followed by more than a single employee.
Network analysis using wireshark : Designed to develop deeper analytical understanding of different distributed network conditions - develop an analytical understanding of different distributed network
Discuss about the state child abuse laws : Share some signs that indicate a child, spouse, or elderly person may be abused. In addition, describe what you believe might be considered evidence of abuse.
Assembly and management of customer : Appraise the value of the innovation guidance for the assembly and management of customer experiences provided by Bernd Schmitt's CEM framework.
Analyze and write a report summarizing the given data : Analyze and write a report summarizing this data. Calculate the summary measures of the total gross income for each movie genre.
Everyone is a publisher now on the web : It has been said that 'everyone is a publisher' now on the web? Do you agree or disagree and why?

Reviews

inf1597525

9/12/2017 5:44:48 AM

I was searching for a second tutor who can help in my online assignments. After discussing with my friends this is the place I got. I found a great deal And more like brilliant task and fast conveyance of task. Put it all on the line guys!

inf1597525

9/12/2017 5:32:14 AM

hey can you guys make this assignment? i have done with the payment.. thanks I didn't get the website allocation which is mentioned in Table 1 http://www.skynews.com.au https://7live.com.au/ My no. is 4 because my ID's last digit is 6.

len1597525

8/11/2017 2:28:15 AM

Appropriateness to findings /10 The assessment findings have been mapped to the unit in a very consistent and very clear way. The assessment findings have been mapped to the unit in a very consistent and clear way. The assessment findings have been mapped to the unit in a consistent and clear way. The assessment findings have been mapped to the unit clearly. The assessment findings have not been mapped to the unit. Conclusion /5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1597525

8/11/2017 2:27:54 AM

Network Performance /25 The network performance has been analysed for all the properties mentioned and screenshots have been provided for each property. The network performance has been analysed for all the properties mentioned and screenshots have been provided for most properties. The network performance has been analysed for all the properties mentioned and screenshots have been provided for some properties. The network performance has been analysed for all the properties mentioned. Screenshots missing. The network performance has not been analysed.

len1597525

8/11/2017 2:27:44 AM

Grade Mark HD 40-50 DI 35-44 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic.

len1597525

8/11/2017 2:27:17 AM

Section to be included in the report Description of the section Marks Introduction Outline of the report (in 3-4 sentences). 5 Network Performance Analyse the network performance for the assigned website, Time Sequence Graph, Throughput Graph, Load Distribution, Identify IP Address and TCP port number client and Identify the sequence number for TCP SYN. 5*5 = 25 Appropriateness to findings Relate to MN504 content and compare. 10 Conclusion Write summary of the report. 5 Reference style Follow IEEE reference style. 5 Total 50

len1597525

8/11/2017 2:27:01 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd