Mn504 Networked Application Management: Network Assessment Answer

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment

Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.

The websites to access are:

http://www.news.com.au

http:// iview.abc.net.au

The complete report must be submitted on Moodle within due date. The report has following four main parts:

Part 1:

The first part of the report should be about general statistics of all six captures using Wireshark that must include:

  1. Time of capture
  2. Total number of captured packets
  3. IP addresses of the client and server

Part 2:

The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:

  1. Throughput
  2. Round Trip Time
  3. TCP retransmissions

While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

Figure 1: Throughput Graph showing source and destination IP addresses

To see the TCP retransmissions you need to enter the following filter in Wireshark:

tcp.analysis.retransmission

Part 3:

The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on three different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all three networks. The differences of the performance to be identified and reasons must be provided for such differences.

Part 4:

Students need to download, install, use and compare another free network performance measurement tool from the Internet on their home computer. One possible option is Microsoft Message Analyzer from https://www.microsoft.com/en-au/download/details.aspx?id=44226. The tool should be used to analyse the network traffic captured while accessing one of the news websites mentioned in Table 1. The chosen tool should be compared with Wireshark on the basis of following criteria:

  1. Ease of access and use: how easy it is to download, install and start using (any changes to be made to the system etc.) as compared to Wireshark
  1. GUI: Compare at least four GUI features of the chosen tool with Wireshark
  1. Visualisation of traffic: After capturing packets by the chosen tool the effectiveness of the visualisation of the network traffic should be compared with Wireshark.
  1. Statistics generation: At least one statistics like throughput, RTT etc. needs to be generated by the chosen tool and to be compared with the same generated by Wireshark.

Answer:

Introduction

The project has prepared for an analysis of the various network with the help of a network packet analyzer similar to wire shark. This wire shark is very useful to capture and analyze the traffic of different networks in the multiple layers as it works as an advanced tool to investigate the internal network as well as protocols of the network. The data of multiple protocols of every networks can be displayed by wire shark because it has a user friendly interface. To analyze the data packets in offline mode, wire shark is very useful because it captures the data packets. The concealed packets of renowned protocols like WEP and WPA can be seen by wire shark because this is one of the united decoded tool. The attributes of each packets like protocol types, destination, transmission time, packets source, and header data are also provided by wire shark. Lightweight Directory Access Protocol is otherwise IETF standard called RFC 4510 (LDAP) characterizes a system representation of a pursuit channel transmitted to a LDAP server. Fundamentally, when a customer needs to find data on a LDAP server, certain naming traditions are polished that take into account the area of certain data inside specific organizers on a server. LDAP works rather correspondingly to the way DNS works, and the level of unpredictability


is generally the same. Windows servers commonly interlace Active Directory with LDAP, and to the extent Windows items are concerned, the level of granularity and prohibitive access to clients is genuinely hearty. In any case, the reason here is opportunity, and a characteristic expansion of that is moderateness. Generally, the uses of these packets are for evaluation of trouble shooting and security of the network gadgets. Wire shark is having three panels which provide the full information of the captured data It can be used to solve the problems in network as well as to analyze the flow of network traffic. Wire shark includes filters, color coding and other characteristics for the analysis of data packets. In this project, three networks have been used to analyze two websites. Every networks has analyzed individually:-

Task – 1

Convention operations are for the most part free of each other. Every operation is prepared as a nuclear activity, leaving the index in a reliable state.

In spite of the fact that servers are required to return reactions at whatever point such reactions are characterized in the convention, there is no necessity for synchronous conduct with respect to either customers or servers.

Solicitations and reactions for different operations for the most part might be traded between a customer and server in any request. On the off chance that required, synchronous conduct might be controlled by customer applications.

  1. Analysing Tool used: WIRESHARK
  • https://www.wireshark.org/
  • Known as “Ethereal” (Wireshark June 7, 2006), which is an open source software and free to use.
  • Multi-platform: x86, x64, Mac OS, Linux
  • Depends on WinPcap (www.winPcap.org)

– A Windows bundle catch library

– Wireshark won't work if WinPcap was not introduced (appropriately)

– WinPcap is incorporated into Wireshark establishment bundle and will be introduced as a matter of course

  • It is one of the highly used open source stream of traffic analysing tool.
  1. Strengths of LDAP
  • TCP/IP is utilized as a part of LDAP - DAP utilizes OSI as the vehicle/system layers
  • Some lessening in usefulness - dark, copy and seldom utilized elements (an ITU specialty) in X.519 were unobtrusively and liberally dropped.
  • Substitution of a portion of the ASN.1 (X.519) with a content representation in (LDAP URLs and pursuit channels). For this point alone the IETF causes our undying appreciation. Unfortunately, much ASN.1 documentation still remains.
  1. Weaknesses of LDAP

There are two issues that may happen:

  1. Incorrect unmoving session observing:

The library that deals with the TCP sessions for the LDAP Server and the Kerberos Key Distribution Centre (KDC) utilizes a searching string to screen for sessions that are idle, and separates these sessions on the off chance that they are sit still too long. The rummaging string runs like clockwork to get out these sessions.

The KDC registry passage New Connection Timeout controls the unmoving time, utilizing a default of 10 seconds. Be that as it may, taking into account the usage of the rummaging, the successful interim is 0-30 seconds. Along these lines recently made sessions might be detached promptly by the server sporadically.

  1. Erroneous customer port security:

The KDC likewise has an implicit assurance against solicitation circles, and squares customer ports 88 and 464. Be that as it may, the execution has a bug in the byte requesting, so ports 22528 and 53249 are successfully blocked. Contingent upon the working framework form of the customer and the permitted vaporous TCP ports, you might possibly experience this issue.

Determination of the server IP address, capture time, client and total packets of every three individual networks are shown below:

Network - 1

Capture Time

Total number of captured Packets

Client and Server IP addresses

  • Client IP address - 192.168.43.143
  • Server IP address - 192.168.43.255

 

Network - 2

Capture Time

Total number of captured Packets

Client and Server IP addresses

  • Client IP address - 192.168.1.15
  • Server IP address - 23.207.140.119

Network - 3

Capture Time

Total number of captured Packets

Client and Server IP addresses

  • Client IP address - 192.168.1.15
  • Server IP address - 192.168.1.15

Task – 2

Determination of the round trip time, TCP re-transmission and throughput for the three networks individually are shown below:

Network - 1

Throughput

Essentially the diagram how well the receiver can deal with the got information.

A 'level line' implies the recipient did not conform it's window size, thus it had no issue at all to handle the approaching bytes sufficiently quick. a "wavering" chart (like a saw tooth) implies: The recipient advertised a littler window size, as it was not ready to handle the approaching movement sufficiently quick, thus the cradle got topped off. By bringing down the window size, it educates the sender regarding that actuality. The sender could conceivably make a move all things considered. Assuredly it is astute to send less information on the double. Nonetheless, you'll frequently see no response at all in genuine situations. It relies on upon the OS and applications being used

Round Trip Time

Figure demonstrates the association start process between the server and the client. Once the association is built up, the information outlines begin to stream. The vital points of interest of a casing are appeared in the stream diagram. We can see, for case, the season of transmission, the extent of the casing, the succession number of the casing and the TCP ports utilized for the association

TCP retransmissions

Network - 2

Throughput

Round Trip Time

Round-trip time (RTT), additionally called round-trip delay, is the time required for a sign heartbeat or bundle to go from a particular source to a particular destination and back once more. In this connection, the source is the PC starting the sign and the destination is a remote PC or framework that gets the sign and retransmits it.

TCP retransmissions

The above figure shows the hierarchy of protocols as utilised in the network. Each protocol sends number of packets over the network. Ethernet IPv4 and TCP send the most packets across the network at 100% with 12 packets each. Whereas, LDAP sends only 41.7 packets over the link and consumes 85.7% of bytes with the 724k bits/s.

Network - 3

Throughput

Round Trip Time

TCP retransmissions

Task - 3

According to the analysis among three individual networks, it has proved that network 3 is having highest, round time tripping and throughput for round tripping and through putting providing the essential traffic in network. It also gives the high performance from the other networks..

Task - 4

Analysis between Microsoft Message Analyzer for through putting message of Microsoft Wire Shark

Access and uses

It is possible to download the wire shark source code of from its official website. To download wire shark, following conditions are must have to available: these are - minimum 128 MB RAM, processor with speed of 400 MHZ, NIC supported promiscuous mode. Hard disk should have at least free space of 75 mb. Win Pcap is also needed. The downloaded followed by extracted archive file name name version should end with -tar-jxvf. Here the command of extracting is dis-similar from the Analyzer for Microsoft Message.

GUI

The Graphical User Interface (GUI) of Wire shark is very easily operated and gives easy access. There is difference between Wire Shark and Microsoft Message Analyzer. After applied of multiple analysis and process on Microsoft Message Analyzer, it has been monitored.The default view of Microsoft Message Analyzer is different from Wire Shark has found during the comparison.

Visualization of traffic

The Wire Shark is having multiple sections. These are the user interface section by which some packets are used which is captured by wire shark. The packets can be selected from a list of packet array. Once a packet selection is done, the information can be taken from the details of packet details array. Protocols that are informative are provided by the array. Packet shows the protocol fields which can be selected. Packets can be easily captured from the star window by wire shark users. Every available interface are shown by capture option of the window in the network.

Statistics generation

The Microsoft Message analyzer provides the capability to test and create documentation in future. Wire shark has a noise which can never hide. One of a Microsoft technical analyzer is Microsoft Message Analyzer. The design of Microsoft Message Analyzer has been done such a way it can detect issues and resolve the problem in network. It contains a multiple tools which are for accountability and perforate the system which is secure and increases the attacks towards the network.

Bibliography

[1] A. Singh, Wireshark Starter. 2013.

[2] P. T. Files, “Wireshark Network Analysis The Official Wireshark Network Analyst Study Guide,” Analysis, 2010.

[3] V. Ndatinya, Z. Xiao, V. R. Manepalli, K. Meng, and Y. Xiao, “Network forensics analysis using Wireshark,” Int. J. Secur. Networks, 2015.

[4] R. Shimonski, The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic. 2013.

[5] R. Shimonski, “Chapter 9. Deep Analysis,” Wireshark F. Guid., 2013.

[6] R. Shimonski and R. Shimonski, “Chapter 1 – About Wireshark,” in The Wireshark Field Guide, 2013.

[7] M. Kadafi and K. Khusnawi, “Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer,” Creat. Inf. Technol. J., 2015.

[8] S. Gupta and R. Mamtora, “Intrusion Detection System Using Wireshark,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., 2012.

[9] M. Tsoukalos, “Wireshark: Analyse traffic,” Linux Format, 2016.

[10] M. Kadafi and K. Khusnawi, “Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer,” Creat. Inf. Technol. J., 2015.

[11] M. Chiu, K. Yang, R. Meyer, and T. Kidder, “Analysis of a Man-in-the-Middle Experiment with Wireshark,” 2011 Int. Conf. Secur. Manag., 2011.

[12] M. Tsoukalos, “Wireshark: Analyse traffic,” Linux Format, 2016.

[13] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE Trans. Pattern Anal. Mach. Intell., 2017.

[14] M. Khan, E. S. Alshomrani, and S. Qamar, “Investigation of DHCP Packets using Wireshark,” Int. J. Comput. Appl., 2013.

[15] V. Harun Sahin, I. Ozcelik, M. Balta, and M. Iskefiyeli, “Topology discovery of PROFINET networks using Wireshark,” in 2013 International Conference on Electronics, Computer and Computation, ICECCO 2013, 2013.

[16] R. Das and G. Tuna, “Packet tracing and analysis of network cameras with Wireshark,” in 2017 5th International Symposium on Digital Forensic and Security, ISDFS 2017, 2017.

[17] H. Sadeghi, F. Khazaei, L. Yari, and S. Sheidaei, “EFFECT OF SEED OSMOPRIMING ON SEED GERMINATION BEHAVIOR AND VIGOR OF SOYBEAN ( Glycine max L .),” Network, 2011.



Buy Mn504 Networked Application Management: Network Assessment Answers Online

Talk to our expert to get the help with Mn504 Networked Application Management: Network Assessment Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now

The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at www.assignmenthippo.com are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for Mn504 Networked Application Management: Network Assessment Answer Assignment Help Online

Want to order fresh copy of the Sample Mn504 Networked Application Management: Network Assessment Answers? online or do you need the old solutions for Sample Mn504 Networked Application Management: Network Assessment Answer, contact our customer support or talk to us to get the answers of it.

Assignment Help Australia
Want latest solution of this assignment

Want to order fresh copy of the Mn504 Networked Application Management: Network Assessment Answers? online or do you need the old solutions for Sample Mn504 Networked Application Management: Network Assessment Answer, contact our customer support or talk to us to get the answers of it.