Analyse and evaluate network technologies and services

Assignment Help Computer Network Security
Reference no: EM132961563

Networking Technologies Assignment

Objectives
This assessment assesses your ability to demonstrate concepts of networks, protocols, and services including the following criteria:
• Evaluation and analysis of communication protocols including HTTP, HTTPS and TCP/IP
You will be required to learn how to use Wireshark (protocol analyser), procedures to generate traffic, and capture for analysis and evaluation. A presentation tool such as MS Power Point will be required to prepare slides to support the presentation.

Learning Outcomes
On completion of this assignment students should be able to:
• ULO 2: Analyse and evaluate network technologies and services using a layered approach and network standards.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto in Blackboard (see instructions below). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video file correctly following the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option, it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements
Watch this video before submitting your assignment
Provide a video demonstration using Wireshark as per the requirements.
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task. Your video should cover the following tasks:
This task criterion requires students to generate their own traffic for Wireshark (Do not to use the pre-captures available at the Wireshark or Internet websites). Use the lab instructions or search the Internet to find how to generate traffic for each topic.
Task 1 HTTP/HTTPS
Generate and capture your own HTTP and HTTPS traffic and examine the message fields. Explain sequences of messages exchanged between the server and its client for HTTP and HTTPS traffic using Wireshark. Summarise the captured message flow using slides to support your presentation. Contrast both protocols with similarities and differences.

The following shows an example of how to generate HTTP traffic. Note that HTTPS traffic looks different from HTTP and requires security layer to be captured.
a) Clear the browser's cache (click Ctrl+Shift+Delete keys at the same time).
b) Find a site with HTTP. It may not be easy to find as many sites using HTTPS e.g.
c) Open Wireshark and start capturing.
d) Open your browser and access a HTTP site.
e) Stop capturing the packets and close the browser.
f) Find HTTP packets and complete the tasks.

Task 2 TCP/IP Encapsulation
Generate and capture your own TCP/IP traffic and packets and inspect TCP/IP model layers and fields. Analyse and explain encapsulation processes with TCP/IP layers and the header size of each layer and their payload sizes to verify the encapsulation. Summarise the captured message to show header and payload sizes using slides to support your presentation. (Note: Layer 2 also has a trailer)

Attachment:- Technologies Assignment 2.rar

Reference no: EM132961563

Questions Cloud

Calculate the budgeted direct-cost rate per hour : The average budgeted total compensation per professional for 2020 is $97,500. Calculate the 2020 budgeted direct-cost rate per hour of professional labour
How much will you pay for the property : You are considering the purchase of real estate that will provide perpetual income that should average $72,000 per year. How much will you pay for the property
Prepare a statement of cost of goods manufactured : Prepare a statement of cost of goods manufactured and an income statement for Fair Wind Yachts for the year ended December 31
Estimate the expected long-run dividend growth rate : Estimate the expected long-run dividend growth rate if an investor expects to earn the average historic return of 8.2%
Analyse and evaluate network technologies and services : Analyse and evaluate network technologies and services using a layered approach and network standards - Generate and capture your own TCP/IP traffic and packets
Formulate and analyse a network design : Formulate and analyse a network design for small medium enterprise networks - understanding of fundamental networking structure and network design concepts
Estimate purchases for June and July : Parts are purchased at a wholesale price of $20. Lakeside purchased 16,000 parts in May. Estimate purchases (in units) for June and July
Design for small medium enterprise networks : Analyse and evaluate network technologies and services using a layered approach and network standards - design for small medium enterprise networks
Identify the sequence of actions you need to take : Identify the sequence of actions you need to take to start this decision process. Propose a risk profile for each choice

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd