Network analysis using wireshark

Assignment Help Computer Network Security
Reference no: EM131597525

Assessment - Network Analysis using Wireshark

Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

a) Apply key architectures and technologies for networked applications

b) Analyse performance and deployment issues for networked applications

c) Choose appropriate industry tools and techniques to manage networked applications.Assignment Description

The aim of the assignment is to develop an analytical understanding of different distributed network conditions. The assignment will provide an opportunity to understand networkmanagement. This exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Each student will need to work on an assigned set of website and capture packets on their home network. The students are assigned the set of websites based on their MIT ID from Table 1. After capturing packets from the websitesthe students are required to submit their reports on the Moodle with screen shots of packet capture and the required graphs.The set of websites include a website of a news channel and a website for live streaming. The students are required to capture packets of images and audio from the news channel website and capture packets from the live stream website while streaming for 10 minutes on their home network.

The students are required to analyse the network performance for the assigned websites:
1. Time Sequence Graph
2. Throughput Graph
3. Load Distribution
4. Identify IP Address and TCP port number client
5. Identify the sequence number for TCP SYN

Table 1: Website Allocation

Sno. Website Assigned Last digit of MIT ID

1 https://www.abc.net.au 0 and 9
https:// iview.abc.net.au

2 https://www.nine.com.au 1 and 8

https://www.9now.com.au/live/channel-9

3 https://www.bbc.co.uk 2 and 7

https://tenplay.com.au/

4 https://www.skynews.com.au 3 and 6
https://7live.com.au/

5 https://www.dw.com 4 and 5
https://www.sbs.com.au/ondemand/programs

Introduction Outline of the report.

Network Performance Analyse the network performance for the assigned website, Time Sequence Graph, Throughput Graph, Load Distribution, Identify IP Address and TCP port number client and Identify the sequence number for TCP SYN.

Appropriateness to findings Relate to MN504 content and compare.

Conclusion Write summary of the report.

Reference style Follow IEEE reference style.

Verified Expert

In this project, main objective is capturing the data from given website by using wireshark application. The packet capturing done by using home network. If packet capturing is completed, after analysing the packets and control the network error. The network performance are analysed by using the captured data. The Wireshark application also determine the throughput, load distribution, window scaling and time sequence graph by using the captured packets. The client IP address and Sequence number are identified.

Reference no: EM131597525

Questions Cloud

Different ways to provide healthcare to the population : The health services to the Indigenous people are often inadequate and more costly both because of remoteness and different ways to provide healthcare.
Draw one graph showing average fixed costs : Using Excel, draw one graph showing average fixed costs, average variable costs, average total costs, marginal revenue, and marginal costs.
Discuss change in healthcare system efficient and effective : What are some of the challenges facing the Australian government in dealing with the delivery of the healthcare system, which is large and complex?
Wrongful termination based on policy violations : Discuss the issue of wrongful termination based on policy violations, especially if policy was not being followed by more than a single employee.
Network analysis using wireshark : Designed to develop deeper analytical understanding of different distributed network conditions - develop an analytical understanding of different distributed network
Discuss about the state child abuse laws : Share some signs that indicate a child, spouse, or elderly person may be abused. In addition, describe what you believe might be considered evidence of abuse.
Assembly and management of customer : Appraise the value of the innovation guidance for the assembly and management of customer experiences provided by Bernd Schmitt's CEM framework.
Analyze and write a report summarizing the given data : Analyze and write a report summarizing this data. Calculate the summary measures of the total gross income for each movie genre.
Everyone is a publisher now on the web : It has been said that 'everyone is a publisher' now on the web? Do you agree or disagree and why?

Reviews

inf1597525

9/12/2017 5:44:48 AM

I was searching for a second tutor who can help in my online assignments. After discussing with my friends this is the place I got. I found a great deal And more like brilliant task and fast conveyance of task. Put it all on the line guys!

inf1597525

9/12/2017 5:32:14 AM

hey can you guys make this assignment? i have done with the payment.. thanks I didn't get the website allocation which is mentioned in Table 1 http://www.skynews.com.au https://7live.com.au/ My no. is 4 because my ID's last digit is 6.

len1597525

8/11/2017 2:28:15 AM

Appropriateness to findings /10 The assessment findings have been mapped to the unit in a very consistent and very clear way. The assessment findings have been mapped to the unit in a very consistent and clear way. The assessment findings have been mapped to the unit in a consistent and clear way. The assessment findings have been mapped to the unit clearly. The assessment findings have not been mapped to the unit. Conclusion /5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1597525

8/11/2017 2:27:54 AM

Network Performance /25 The network performance has been analysed for all the properties mentioned and screenshots have been provided for each property. The network performance has been analysed for all the properties mentioned and screenshots have been provided for most properties. The network performance has been analysed for all the properties mentioned and screenshots have been provided for some properties. The network performance has been analysed for all the properties mentioned. Screenshots missing. The network performance has not been analysed.

len1597525

8/11/2017 2:27:44 AM

Grade Mark HD 40-50 DI 35-44 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic.

len1597525

8/11/2017 2:27:17 AM

Section to be included in the report Description of the section Marks Introduction Outline of the report (in 3-4 sentences). 5 Network Performance Analyse the network performance for the assigned website, Time Sequence Graph, Throughput Graph, Load Distribution, Identify IP Address and TCP port number client and Identify the sequence number for TCP SYN. 5*5 = 25 Appropriateness to findings Relate to MN504 content and compare. 10 Conclusion Write summary of the report. 5 Reference style Follow IEEE reference style. 5 Total 50

len1597525

8/11/2017 2:27:01 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  Ip spoofing

honeypot or a firewall, error handling, Denial-Of-Service, Public Key Infrastructure, WLAN Administrator, WEP Protocol, RSA Algorithm, Network Engineer

  Write an authenticated key establishment protocol

Write an authenticated key establishment protocol for A and B to establish a session key - Write a concrete private handshake by using a zero-knowledge proof technique.

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Discuss the issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  Telecommunications and network security

Topic: TELECOMMUNICATIONS AND NETWORK SECURITY. An evaluation of the pros and cons associated with each of the options presented to the user

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Discussed the physical design step, who is involved

Why should the organization be careful when deciding who as read only access vs. read and update access to data?

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  Benefits of having a computer security

In your report, discuss the benefits of having a computer security incident response team within your enterprise. Also discuss the major steps involved in responding to a system security incident. Support your report with real-life examples.

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd