What is the purpose of arp protocol

Assignment Help Computer Networking
Reference no: EM131184424

PART A (ARP, TCP, HTTP protocols, and the Case study)

1) ARP Protocol

Capture ARP packets and answer the following questions:

a) Describe the method by which you obtained ARP packets?

b) What is the purpose of ARP protocol? Explain with the help of a diagram.

c) From the captured packets, determine your computers MAC address and the destinations MAC address? Provide the screen shot.

d) Find a suitable command to use on MS-DOS command prompt to determine the contents of your computer's ARP cache. What command did you use? What is the meaning of each column value in the resulting output?

e) What is the approximate time that an entry resides in your PCs ARP cache before its removal?

2) TCP/UDP/IP Protocols

In this exercise, you will need to run an application that uses UDP and an application that uses TCP. Capture the UDP and TCP packets.

a) Select a UDP packet and answer the following:
I. What is the length of the IP header and what value the "Protocol" field has?
II. What is the checksum value in IP header? Is it enabled or disabled?
III. What are the fields in UDP header?

b) Select a TCP packet and display all the TCP exchanges for this TCP packet (TCP stream). Answer the following:
I. What is meant by TCP connection establishment?
II. Provide a screenshot of 3-way handshake in the selected TCP establishment

c) If the checksum validation is disabled in IP, UDP and TCP headers, how would you enable the validation?

3) HTTP Protocol

Use a web browser to connect to any overseas based website to generate HTTP packets. Run Wireshark and capture packets for around 1-2 min. Stop Wireshark and use HTTP in the filter bar to filter only the HTTP packets.
Note - Screen shots are required for sections (b) up to (e).

a) Explain what HTTP protocol is.
b) How would you filter HTTP packets based on request methods, GET and POST?
c) How would you display all the TCP packets (a complete TCP session) that were exchanged between your browser and one of the servers?
d) Use the "Flow Graph" feature to show the exchanges between your browser and one of the servers. You may use the same packets as in (c).
e) Select a complete HTTP/TCP session used in section (c) and provide a through put analysis.
f) Use the Wireshark feature to display all HTTP exported objects.

4) Case study

Performance problems have been observed in your company's internetwork and being the network administrator of your company, your task is to do an analysis and submit a report.

Many employees have made complaints that real time multimedia applications could not be run at peak traffic hours.

The tool available for you is Wireshark.

You are aware that busy communication lines can cause variations of delays and you suspect the TCP retransmissions and duplicate ACKs can be the problem.

Your report should provide the following:

a) Explain the purpose of sequence number and acknowledgement number in TCP header.

b) Why do TCP retransmissions occur in networks?

c) How would you use and setup Wireshark features to analyse the above performance problems?
(Provide screenshots to support your answers)

PART B - Riverbed Simulation Experiments

You are a newly recruited Network Designer for a company that is specialized in network designs and you are asked to demonstrate the performance of the Switch based 10BaseT LAN against that of Hub based 10BaseT LAN.

You will use the Riverbed simulator for the demonstration. Topology of the network is 25 ethernet stations connected to the central device (i.e. Hub or the Switch). Ethernet stations are connected to the centre node with 10BaseT links. And you need to create two scenarios, one for the Hub and the other for the Switch.

Appropriate parameters need to be selected for traffic generation and packet sizes. Simulation statistics should include delay, throughput and collisions.

Your report requires the following:

a) Screenshots of the topology for each scenario

b) Specification of traffic/packet generation parameters selected for simulation

c) Statistics of interest

d) Comparison and analysis of results of two scenarios for each statistical parameter (provide screenshots)

Reference no: EM131184424

Questions Cloud

Determine nature of globalization cultures and labor markets : Determine the nature of globalization, cultures, and labor markets, and assess the impact on human resource management (HRM).
Find the potential at a distance ti on the axis of the disk : Application: Potential due to a charged disk. A thin disk of radius a carries a surface charge density ps = P0. Find the potential at a distance tI, on the axis of the disk (directly above its center) in free space.
Define what normal and abnormal mean : In your own words, define what "normal" and "abnormal" mean. Locate and provide two scientific definitions of abnormal behavior-from the textbook, through online research, from a dictionary, or from any resource in the ITT Tech Virtual Library
Explain the process you would go through to develop web page : Imagine that your company has decided to expand to the Web. You want to reuse some data entry code that has been developed in Windows and place it on the Web. Explain the process you would go through to develop a Web page locally.
What is the purpose of arp protocol : Describe the method by which you obtained ARP packets - What is the purpose of ARP protocol? Explain with the help of a diagram.
Describe two other techniques for validating your document : This week covered validation and the use of validators. Describe at least two other techniques for validating your document that does not involve submitting it through an online validator.
Explain the three-system memory theory : Explain the three-system memory theory. Be sure to fully detail each component and highlight features related to each storage system
What kind of behavior is considered socially unacceptable : What kind of behavior is considered socially unacceptable? What is the main factor that decides whether the behavior is socially acceptable or not
Determine situation that cause a breach of network security : Determine one situation that can cause a breach of network security. Provide two examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd