Compare appropriate industry tools and techniques

Assignment Help Computer Network Security
Reference no: EM132308137

Purpose of the assessment

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage networked applications;

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 8 Lab. Each group will need to capture packets on two networks, at their home network and at MIT network while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end, there will be four trace files, two for each website, two captured on MIT network and two on students' home networks. The websites to access are:

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all four captures using Wireshark that must include:

1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all two networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. Packet Loss

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on two different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all two networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:

Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer.

The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark

3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Attachment:- Networked Application Management.rar

Verified Expert

In this assignment, we have perform the network analysis.Here we done analysis of the given network traffic. Here ,we have make analysis of throughput, window size and other aspect of the network.

Reference no: EM132308137

Questions Cloud

Current business essay : Current Business Essay - research a current business topic or event (within the past year) of his/her choice, and write a 1,000-word essay on the topic
Designing a computer network diagrams : SBM4104 - IT Infrastructure - Asia Pacific International College - designing a computer network diagrams including geographic and logical diagrams
Develop an analytical understanding of performance : develop an analytical understanding of performance and management of different types of networked applications - demonstrate analytical ability of evaluating
What does prior restraint mean : What different types of speech can you identify that may have different protection under the First Amendment?
Compare appropriate industry tools and techniques : Develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should
Address the memo to home office employees at your company : Pay particular attention to your memo's margins, line spacing, font type and size, and placement of memo parts such as the addressees, subject line.
Does it tell the truth about life and the consequences : Choose one of the works of literature you read for this week, "Song of Roland". Does it tell the truth about life and the consequences of human actions?
What is your most important requirement in each interaction : Think about a service that you currently use, then map out the service encounter sequence for that service.
Develop and organize ideas to support a thesis : Compose in a variety of genres with a focus on expository, analytical, and persuasive writing and make deliberate rhetorical decisions based on audience.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd