Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Fariza Sabrina November, 2017 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN504 Unit Title Networked Application...

1 answer below »
Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Fariza Sa
ina November, 2017
Assessment Details and Submission Guidelines
Trimester T1 2018
Unit Code MN504
Unit Title Networked Application Management
Assessment
Type
Group Assignment
Assessment
Title
Network Analysis using Wireshark
Purpose of the
assessment
(with ULO
Mapping)
This assignment is designed to develop deeper analytical understanding of
different distributed network conditions. At the completion of this assessment
students should be able to:
d. Analyse performance and deployment issues for networked applications;
e. Compare appropriate industry tools and techniques to manage
networked applications;
Weight 20%
Total Marks 60
Word limit 2000
Due Date XXXXXXXXXX/06/2018 11:55PM (Week 11 Friday)

Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a title
Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2.54 cm margins on all four sides of your page with appropriate
section headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure For further information, please refer to the Academic Integrity
Section in your Unit Description.




http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN504 Networked Application Management Assignment 2 Page 2 of 5

Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Nandini Sidnal March 2018

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of
different types of networked applications. The assignment will provide an opportunity to understand network
performance and management issues of networked applications using state of the art tools. These exercises
provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance,
Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week
7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following
websites. One website is of a news channel and the other one is a website for live streaming. The students are
equired to capture packets of multiple images from the news channel website and capture packets from the
live stream website while streaming for 10 minutes once at MIT in a group and then on their home network
individually. So at the end there will be six trace files, three for each website, two captured on MIT network
and four on students’ home networks.
The websites to access are:
http:
www.news.com.au
http:
iview.abc.net.au

The complete report must be submitted on Moodle within due date. The report has following four main
parts:

Part 1:

The first part of the report should be about general statistics of all six captures using Wireshark that must
include:

1. Time of capture
2. Total number of captured packets
3. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics
from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only
screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to
discuss the quality of service for a particular application. The students are required to analyse the network
performance for the assigned websites considering following aspects:

1. Throughput
2. Round Trip Time
3. TCP retransmissions

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have
packets from other applications and flows as well. Figure 1 on next page shows the throughput graph
generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics
for flows which are from server to client.

MN504 Networked Application Management Assignment 2 Page 3 of 5

Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Nandini Sidnal March 2018

Figure 1: Throughput Graph showing source and destination IP addresses


To see the TCP retransmissions you need to enter the following filter in Wireshark:
tcp.analysis.retransmission

Part 3:


The third part of the report is about comparing the collected Wireshark statistics of the two different
networked applications on three different networks. The throughput graphs and TCP retransmission statistics
for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all
three networks. The differences of the performance to be identified and reasons must be provided for such
differences.


Part 4:


Students need to download, install, use and compare another free network performance measurement tool
from the Internet on their home computer. One possible option is Microsoft Message Analyzer from
https:
www.microsoft.com/en-au/download/details.aspx?id=44226. The tool should be used to analyse the
network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool
should be compared with Wireshark on the basis of following criteria:


1. Ease of access and use: how easy it is to download, install and start using (any changes to be made
to the system etc.) as compared to Wireshark

2. GUI: Compare at least four GUI features of the chosen tool with Wireshark


https:
www.microsoft.com/en-au/download/details.aspx?id=44226
MN504 Networked Application Management Assignment 2 Page 4 of 5

Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Nandini Sidnal March 2018
3. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the
visualisation of the network traffic should be compared with Wireshark.

4. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the
chosen tool and to be compared with the same generated by Wireshark.

The comparison must include screenshots for both tools (your chosen tool and Wireshark) to judge the
validity of the comparison.

Marking criteria:

Section to be included in
the report
Description of the section Marks
Introduction Outline of the assignment
Overall structure of the report

4
General Statistics For each capture following should be discussed:
1. Time of capture
2. Total number of captured packets
3. IP addresses of client and serve
9
Network Performance Screenshots and analysis of the following:
1. Throughput
2. Round Trip Time
3. TCP retransmissions
5 * 3 = 15
Comparison 1 Comparison of the throughput and TCP retransmissions
of both applications on three networks and discussion of
the reasons for the difference.

5 * 3 = 15
Comparison 2 Comparison of the chosen tool with Wireshark in terms
of:
1. Ease of access and use
2. GUI
3. Visualisation of traffic
4. Statistics generation
The screenshots for both tools should be provided

3 * 4 = 12
Conclusion Complete summary of the report specially the
comparison.

3
Reference style Follow IEEE reference style.

2
Total

60
MN504 Networked Application Management Assignment 2 Page 5 of 5

Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Nandini Sidnal March 2018
Marking Ru
ic for Assignment #1: Total Marks 60
Grade
Mark
HD
80%
DI
70-79%
CR
60-69%
P
50-59%
Fail
50%
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction

4
Clear and concise
outline is provided,
eport structure is
described properly
Clear outline is
provided, report
structure is
described.
Some outline is
provided, report
structure is
somewhat
discussed
Some outline is
provided,.
This is no
elevance to the
assignment
topic.
General
Statistics

9
All required aspects
are discussed
exceptionally well
All required
aspects are
discussed
Some aspects are
discussed
Very few aspects
are discussed
Not related
Network
Performance
15
All required matters
are analysed in detail
and exceptionally
well, All screen shots
are clear and
complete
Most of the
equired matters
are analysed in
detail , All screen
shots are clear
and complete
Some required
matters are
analysed in detail
and , Some
screen shots are
clear and
complete
Few of the
equired matters
are analysed
Not related
o
and
incomplete
Comparison 1

15
In detail comparison
is provided and
justification is given
exceptionally well
Some comparison
is provided and
Answered Same Day May 16, 2020 MN504

Solution

Abr Writing answered on May 27 2020
110 Votes
[Document title]
[Document subtitle]
Table of Contents
Introduction    2
Statistics    3
Capture on the MIT network: http:
www.news.com.au/    3
Capture at the MIT Network: https:
iview.abc.net.au/    4
Capture at the Student 1    5
Capture at the Student 2    7
Part 2: Throughput, Round Trip and TCP retransmissions    9
MITLAB (news.com.au)    9
MITLAB (iview.abc.net.au)    11
Student 1 (news.com.au)    13
Student 1 (iview.abc.net.au)    14
Student 2 (news.com.au)    16
Student 2 (iview.abc.net.au)    17
Comparison of Wireshark and the chosen tool    19
Conclusion    20
Introduction
Wireshark is the world’s first network traffic/protocol analyzer. It enables the experts to check what is actually being communicated over the network from your capturing device. It is this reason it is being used by many organizations, NGOs, government agencies and colleges around the world. It is being developed by many networking experts around the world as the continuous updating being done to the project that was started by Gerald Combs 1998.
It is cross platform software that means it can work on Linux, Mac and Windows based systems, the cu
ent evaluation is based on the windows based machine installations. It has the terminal based as well as GUI based interface that can be used by the experts around the world as per their convenience. It has several bundle software such as Pcap, it was called as TShark in its earlier days of development.
Microsoft Message Analyzer is another instrument for catching, showing, and dissecting protocol informing movement, occasions, and other framework or application messages in network investigating and other symptomatic situations. Message Analyzer additionally empowers you to load, total, and dissect information from log and spared follow documents. It is the successor to Microsoft Network Screen 3.4 and is a key part in the Protocol Building Structure (PEF) that was made by Microsoft to enhance protocol outline, improvement, usage testing and check, documentation, and support. With Message Analyzer, you can catch neighborhood and remote movement live or stack chronicled message accumulations from numerous information sources all the while.
Message Analyzer empowers you to show follow, log, and other message information in various information watcher positions, including a default tree-lattice see, intuitive Apparatus Windows, and other selectable graphical view Formats that utilize frameworks, bar component, course of events, and other visualizer segments that give abnormal state information synopses and other conspicuous insights. You additionally have the alternative to design your own particular custom Formats for the Graph watcher. What's more, Message Analyzer cu
ently gives a Profiles highlight, which makes intuitive and incorporated investigation situations that consequently show preset watcher and Format designs when information from particular information document composes is stacked.
Statistics
Capture on the MIT network: http:
www.news.com.au
Time of capture: 2018-05-27 12:42:38
Total number of Packets: 56183
IP address of Client: 192.168.0.194
IP address of Server: 120.138.116.21
Capture at the MIT Network: https:
iview.abc.net.au
Time of Capture: 2018-05-27 12:59:26
Total number of Packets: 149315
IP address of Client: 192.168.0.194
IP address of Server: 103.56.230.170
Capture at the Student 1
http:
www.news.com.au
Time of Capture: 2018-05-27 13:23:26
Total number of Packets: 51794
IP address of Client: 172.20.10.8
IP address of Server:...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here