Tools and techniques to manage networked applications

Assignment Help Computer Network Security
Reference no: EM132306642

Purpose of the assessment

This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the completion of this assessment students should be able to:

d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage networked applications;

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 8 Lab. Each group will need to capture packets on two networks, at their home network and at MIT network while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end, there will be four trace files, two for each website, two captured on MIT network and two on students' home networks. The websites to access are:

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all four captures using Wireshark that must include:

1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all two networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. Packet Loss

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on two different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all two networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:


Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer.

The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark

3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Attachment:- Networked Application Management.rar

Verified Expert

In this assignment, we have perform analysis using wireshark. There are two type of analysis we have done different type traffic analysis. Here we have write analysis of the throughput and other things.

Reference no: EM132306642

Questions Cloud

Employees understand and embrace change : What are the three primary characteristics of this change model, and what role does this model play in helping an organization's management
Submit a topic on business intelligence : Professor is asking us to submit a topic on Business Intelligence. I don't even know what Business Intelligence really is yet.
Bring in the concepts of social responsibility : Bring in the concepts of social responsibility, integrity and other business ethics practices.
Give an example of a strong manager : Give an example of a strong manager and an organization that you worked with in the past or presently.
Tools and techniques to manage networked applications : MN504 - Networked Application Management - Network Analysis using Wireshark - Analyse performance and deployment issues for networked applications
Provide a precise definition for motivation : 1. Provide a precise definition for motivation. 2. What can a manager do to improve their employees' motivation?
Why is the future of computing in the cloud : Write at least 500 words analyzing a subject you find in the below article. Why is the future of computing in the cloud? Consider the concept of fractional.
Why is analysis so important for your selected reading : Why is analysis so important for your selected reading? How will it help your audience understand the author's goal in a clearer, more captivating way?
What were the partnerships : What were the partnerships (with Unilever, Sephora, Qantas, and Roquette) designed to achieve, and why would they make sense for a company like Solazyme?

Reviews

len2306642

5/15/2019 11:11:29 PM

Grade Mark HD > 80% Excellent Introduction /4 Clear and concise outline is provided, report structure is described properly General Statistics /9 All required aspects are discussed exceptionally well Network Performance /15 All required matters are analysed in detail and exceptionally well, All screen shots are clear and complete Comparison 1 /15 In detail comparison is provided and justification is given exceptionally well Comparison 2 /12 In detail comparison is provided and justification is given exceptionally well Conclusion /3 Logic is clear and easy to follow with strong arguments Reference style /2 Clear styles with excellent source of references.

len2306642

5/15/2019 11:11:20 PM

Comparison 1 Comparison of the throughput and TCP retransmissions of both applications on two networks and discussion of the reasons for the difference. 5 x 3 = 15 Comparison 2 Comparison of the chosen tool with Wireshark in terms of: 1. Ease of access and use 2. GUI 3. Visualisation of traffic 4. Statistics generation The screenshots for both tools should be provided 3 x 4 = 12 Conclusion Complete summary of the report specially the comparison. 3 Reference style Follow IEEE reference style. 2 Total 60

len2306642

5/15/2019 11:11:09 PM

Section to be included in the report Description of the section Marks Introduction Outline of the assignment Overall structure of the report 4 General Statistics For each capture following should be discussed: 1. Time of capture 2. Total number of captured packets 3. IP addresses of client and server 9 Network Performance Screenshots and analysis of the following: 1. Throughput 2. Round Trip Time 3. Packet Loss 5 x 3 = 15

len2306642

5/15/2019 11:10:51 PM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd