Tools and techniques to manage networked applications

Assignment Help Computer Network Security
Reference no: EM132306642

Purpose of the assessment

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage networked applications;

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 8 Lab. Each group will need to capture packets on two networks, at their home network and at MIT network while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end, there will be four trace files, two for each website, two captured on MIT network and two on students' home networks. The websites to access are:

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all four captures using Wireshark that must include:

1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all two networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. Packet Loss

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on two different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all two networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:


Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer.

The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark

3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Attachment:- Networked Application Management.rar

Verified Expert

In this assignment, we have perform analysis using wireshark. There are two type of analysis we have done different type traffic analysis. Here we have write analysis of the throughput and other things.

Reference no: EM132306642

Questions Cloud

Employees understand and embrace change : What are the three primary characteristics of this change model, and what role does this model play in helping an organization's management
Submit a topic on business intelligence : Professor is asking us to submit a topic on Business Intelligence. I don't even know what Business Intelligence really is yet.
Bring in the concepts of social responsibility : Bring in the concepts of social responsibility, integrity and other business ethics practices.
Give an example of a strong manager : Give an example of a strong manager and an organization that you worked with in the past or presently.
Tools and techniques to manage networked applications : MN504 - Networked Application Management - Network Analysis using Wireshark - Analyse performance and deployment issues for networked applications
Provide a precise definition for motivation : 1. Provide a precise definition for motivation. 2. What can a manager do to improve their employees' motivation?
Why is the future of computing in the cloud : Write at least 500 words analyzing a subject you find in the below article. Why is the future of computing in the cloud? Consider the concept of fractional.
Why is analysis so important for your selected reading : Why is analysis so important for your selected reading? How will it help your audience understand the author's goal in a clearer, more captivating way?
What were the partnerships : What were the partnerships (with Unilever, Sephora, Qantas, and Roquette) designed to achieve, and why would they make sense for a company like Solazyme?

Reviews

len2306642

5/15/2019 11:11:29 PM

Grade Mark HD > 80% Excellent Introduction /4 Clear and concise outline is provided, report structure is described properly General Statistics /9 All required aspects are discussed exceptionally well Network Performance /15 All required matters are analysed in detail and exceptionally well, All screen shots are clear and complete Comparison 1 /15 In detail comparison is provided and justification is given exceptionally well Comparison 2 /12 In detail comparison is provided and justification is given exceptionally well Conclusion /3 Logic is clear and easy to follow with strong arguments Reference style /2 Clear styles with excellent source of references.

len2306642

5/15/2019 11:11:20 PM

Comparison 1 Comparison of the throughput and TCP retransmissions of both applications on two networks and discussion of the reasons for the difference. 5 x 3 = 15 Comparison 2 Comparison of the chosen tool with Wireshark in terms of: 1. Ease of access and use 2. GUI 3. Visualisation of traffic 4. Statistics generation The screenshots for both tools should be provided 3 x 4 = 12 Conclusion Complete summary of the report specially the comparison. 3 Reference style Follow IEEE reference style. 2 Total 60

len2306642

5/15/2019 11:11:09 PM

Section to be included in the report Description of the section Marks Introduction Outline of the assignment Overall structure of the report 4 General Statistics For each capture following should be discussed: 1. Time of capture 2. Total number of captured packets 3. IP addresses of client and server 9 Network Performance Screenshots and analysis of the following: 1. Throughput 2. Round Trip Time 3. Packet Loss 5 x 3 = 15

len2306642

5/15/2019 11:10:51 PM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  Prepare a paper on new approaches in cryptography

Prepare a paper on new approaches in cryptography - Cryptography of the Modern Era - This a 6-pages research paper, cite your sources and use apa citation

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  Define SIMD and MIMD

Define SIMD and MIMD. What is Ethernet? What does the acronym LAN stand for? Compare and contrast these languages in terms of their history and their purpose.

  Write a paper about mobile security

Write a paper about mobile security. FIRST: Search using the library search or google scholar for a peer reviewed article using statistical analysis for a topic about mobile security that show some data and details.

  Describe two of advantages associated with using types cable

Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.

  Illustrate interface that organizational users will utilize

Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

  Network security fundamentals

The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for..

  Benefits company can attain from implementing web services

Write a 1-2-page paper describing what benefits a company can attain from implementing web services.

  Prepare a report that address various system irregularities

In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities. Identify and describe each attack listed.

  Conclude the main reasons why the attack on target occurred

Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly.

  How are encryption and authentication related

Discuss at least two different encryption methods and corresponding encryption keys. How are encryption and authentication related? Be sure to provide examples of how encryption is used in your organization.

  Information security standards for an organization

Every organization must consider the mandatory and recommended practices when creating its information security program and/or security policies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd