Analyse and evaluate network technologies and services

Assignment Help Computer Network Security
Reference no: EM132961563

Networking Technologies Assignment

Objectives
This assessment assesses your ability to demonstrate concepts of networks, protocols, and services including the following criteria:
• Evaluation and analysis of communication protocols including HTTP, HTTPS and TCP/IP
You will be required to learn how to use Wireshark (protocol analyser), procedures to generate traffic, and capture for analysis and evaluation. A presentation tool such as MS Power Point will be required to prepare slides to support the presentation.

Learning Outcomes
On completion of this assignment students should be able to:
• ULO 2: Analyse and evaluate network technologies and services using a layered approach and network standards.

Preparation
1) This assignment requires students to produce a Panopto video based on task instructions below. This assignment requires video recording equipment such as a notebook equipped with a camera, as well as the software Panopto in Blackboard (see instructions below). If required, you can borrow a laptop from the library.
2) You should be familiar with Panopto in Blackboard for this assignment. It is recommended that you carefully follow the Panopto instructions when submitting your work. It is your responsibility to submit a video file correctly following the instructions. Make sure you select the ‘Panopto Student Video Submission' option as shown below. Otherwise, it will not be successfully submitted.

IMPORTANT: If you submit your video via the wrong option, it may delay the marking of your assessment and/or lead to late penalties. It is the responsibility of students to watch these video instructions and to follow them closely. You can edit your submission multiple times prior to the due date.
3) Practice recording a few times to keep within the time limit, and use the rubric as a guide, as it will be used for grading. Check here to learn how merge videos if necessary. Visit the Panopto for Students intranet site for more resources, and watch the video in the submission folder paying particular attention to the right Mashup tool for submission.

Requirements
Watch this video before submitting your assignment
Provide a video demonstration using Wireshark as per the requirements.
You will need to show footage of yourself completing each task, as well as footage of yourself speaking to the camera about each task. Your video should cover the following tasks:
This task criterion requires students to generate their own traffic for Wireshark (Do not to use the pre-captures available at the Wireshark or Internet websites). Use the lab instructions or search the Internet to find how to generate traffic for each topic.
Task 1 HTTP/HTTPS
Generate and capture your own HTTP and HTTPS traffic and examine the message fields. Explain sequences of messages exchanged between the server and its client for HTTP and HTTPS traffic using Wireshark. Summarise the captured message flow using slides to support your presentation. Contrast both protocols with similarities and differences.

The following shows an example of how to generate HTTP traffic. Note that HTTPS traffic looks different from HTTP and requires security layer to be captured.
a) Clear the browser's cache (click Ctrl+Shift+Delete keys at the same time).
b) Find a site with HTTP. It may not be easy to find as many sites using HTTPS e.g.
c) Open Wireshark and start capturing.
d) Open your browser and access a HTTP site.
e) Stop capturing the packets and close the browser.
f) Find HTTP packets and complete the tasks.

Task 2 TCP/IP Encapsulation
Generate and capture your own TCP/IP traffic and packets and inspect TCP/IP model layers and fields. Analyse and explain encapsulation processes with TCP/IP layers and the header size of each layer and their payload sizes to verify the encapsulation. Summarise the captured message to show header and payload sizes using slides to support your presentation. (Note: Layer 2 also has a trailer)

Attachment:- Technologies Assignment 2.rar

Reference no: EM132961563

Questions Cloud

Calculate the budgeted direct-cost rate per hour : The average budgeted total compensation per professional for 2020 is $97,500. Calculate the 2020 budgeted direct-cost rate per hour of professional labour
How much will you pay for the property : You are considering the purchase of real estate that will provide perpetual income that should average $72,000 per year. How much will you pay for the property
Prepare a statement of cost of goods manufactured : Prepare a statement of cost of goods manufactured and an income statement for Fair Wind Yachts for the year ended December 31
Estimate the expected long-run dividend growth rate : Estimate the expected long-run dividend growth rate if an investor expects to earn the average historic return of 8.2%
Analyse and evaluate network technologies and services : Analyse and evaluate network technologies and services using a layered approach and network standards - Generate and capture your own TCP/IP traffic and packets
Formulate and analyse a network design : Formulate and analyse a network design for small medium enterprise networks - understanding of fundamental networking structure and network design concepts
Estimate purchases for June and July : Parts are purchased at a wholesale price of $20. Lakeside purchased 16,000 parts in May. Estimate purchases (in units) for June and July
Design for small medium enterprise networks : Analyse and evaluate network technologies and services using a layered approach and network standards - design for small medium enterprise networks
Identify the sequence of actions you need to take : Identify the sequence of actions you need to take to start this decision process. Propose a risk profile for each choice

Reviews

Write a Review

Computer Network Security Questions & Answers

  Coaxial cable as a transmission medium

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair wiring emerged as a better and faster medium.

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

  How many comparisons between hash values are needed

How many comparisons between hash values are needed in the worst case - compute in the worst case?

  Research the timeline for kevin mitnicks famous attack

Research the timeline for Kevin Mitnick's famous attack and how he was ultimately caught. Compose a one-page report.

  Scenario where the md5 or sha-1 algorithms

Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use - Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper.

  How modify network''s dns zones or records

modify your network's DNS zones or records

  Draw a message sequence diagram

Draw a message sequence diagram that illustrates all the HTTP messages for the new student user viewing the grades - As the attacker you can learn information

  Analyze the provided memory file for malicious activity

Analyze the provided memory file for malicious activity - What operating system is the computer using? What version - How much RAM is included in the analysis

  CIS114-6 Network Systems and Administration Assignment

CIS114-6 Network Systems and Administration Assignment Help and Solution, Majan University College - University of Bedfordshire - Assessment Writing Service

  ISCS3523 Intrusion Detection and Incident Response

ISCS-3523 Intrusion Detection and Incident Response Assignment Help and Solution, Book Report - Cuckoo's Egg Analysis Homework Help

  Case study - forced decryption ruled unconstitutional

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity.

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd