Discuss about the Essential Skills for Network Analysis.
The main purpose of creating this report includes the comparison between the three websites which is to be done in the task one whereas in task two the load distribution has been analyzed along with the throughput, time sequence, flow graph and the windows scaling graph as well. The wireshark packet capture has been enabled on the websites which are visited in order to analyze the performance of the website along with finding the distribution of the load. After this the port numbers as well as the synchronizing messages are also analyzed in order to find out the flow of the data traffic inside the network. Besides this various kinds of filters are used in order to analyze the transmission of the data. The sending and receiving of the data packets is generally done by the IP addresses and the source ports. The data packets are analyzed in order to measure the performance of the network. After the analysis is completed a general overview of the load on the server is is provided along with the response time that is required for getting the acknowledgement. Network administrators can use this wireshark for the purpose of analyzing the performance of the network. Along with this the security problems as well as the other problems can also be analyzed associated with learning about the various kind of protocols. The contents of the packets captured from the network is examined and different media and interface can be used for the capturing of the live data packets from the network management.
In this section the major task is to investigate the website and analyze the http and the tcp packet. The major three websites which have been analyzed in order to generate the load distribution, throughput, time sequence, flow graph and the windows scaling graph. The three websites have been listed below:
Analysis of the website https://www.onlinenewspapers.com/australi.htm
The load distribution is generally used for the purpose of analyzing the load from the http packet that is captured for the network. The analysis of the load distribution has been done by analyzing the response time of the server along with the load on the server which is given as percentage.
The figure which has been shown above is associated with depicting the throughput graph generated from the packet captured for https://www.onlinenewspapers.com/australi.htm. The graph is created based on the segment length and the time.
After the throughput graph time sequence graph has been generated for the https://www.onlinenewspapers.com/australi.htm in order to analyze the sequence number with respect to the time. The TCP packet are used for the generation of the time sequence graph.
The flow graph is created in order to analyse the flow of the data packets between the client and the server and it is also associate with showing the hops that are used for sending the message to the destination address.
The windows scaling graph is created for the website https://www.onlinenewspapers.com/australi.htm in order to analyze the size of the windows which is generally is used by the data packet which is to be sent over the network.
The load which is present on the server has been analyzed and this has been done by taking help from the load distribution options which is fetched from the statistic option present in the wireshark. The load distribution is analyzed which is generally based upon the http packets captured for https://www.cbsinteractive.com.au.
The throughput graph has been created and from the graph it is possible to analyze the fact that the that the throughput is not stable and the reason lying behind this might be the unstable transfer of files or network connectivity problem management.
This is generally used for the purpose of analyzing the sequence number of the tcp packets which generally ranges from 0 to 700000 for a time duration of 0.6 second.
It is possible to analyze the flow of the data packets in order to identify the flow of the data traffic in the network and all the flow has been associated with demonstrating the analysis of the packet which is captured from https://www.cbsinteractive.com.au.
The windows scaling graph has created for the https://www.cbsinteractive.com.au. In order to analyze the size of the windows which is generally used by the data packet in order to get sent over the network. Here windows size ranges from 44000 to 46800 for a time span of 0.6 seconds.
The url https://www.newspapers.com.au/ is used for the analysis of the load on the server and tcp display filter is used for the analysis of the load.
The through put of the server has been analyzed for the website https://www.newspapers.com.au/ and the graph is associated with showing the average response time of the server.
The flow graph is generally used for the purpose of analyzing the packet which is captured from he webiste https://www.newspapers.com.au/ the analysis of the flow of the information between the server and the client node.
The windows scaling graph is created for https://www.newspapers.com.au/ for the analysis of the windows size that is used by the data packet to be sent over the network. Here windows size ranges from 30750 to 31650 for a time span of 0.6 seconds.
Followed by task one is the task two which has been associated with making an investigation regarding the An investigation is made on the https://www.abc.net.au/radio/listen-online website for analysing the audio delivery from the website. The packet is captured for more than five minutes and for the analysis of the performance the throughput graph is generated from wireshark. The time sequence graph is also generated for the analysis of the performance of the website.
The throughput graph is created in order to make the graph form where it can be analyzed and can help I reaching to the conslusion that the throughput is not stable and the reason can be unstable transfer of files or network connectivity problem. The average throughput kb per second is displayed in the right hand size for analysis of the utilization of the network.
It is used for the analysis of the sequence number of the tcp packets and it ranges from 0 to 900 for a time duration of 0.6 second.
The report discussed above helps in concluding to the fact that along with analysing the network performance flow of the data traffic in the network can be analysed.Besides this the live packet from the network is also captured using the network analysis tool i.e. Wireshark and different packet filtering options can be added for the verification of the network protocol used for the sending and receiving the data packets in thee network. Different statistics can be created from the wireshark for the analysis of the throughput and the load in the network. The wireshark is supported in most of the operating system and it is a free source software that can be used for the analysis of the network performance. It can be used for generating of different graphs from the network and troubleshoot the network problems and increase the efficiency off the network. It can be used for the purpose of analyzing the network vulnerability and identification of the weakness of the network.
- Chappell, L. Wireshark 101: Essential Skills for Network Analysis-Wireshark Solution Series. Laura Chappell University., 2017.
- Sanders, C. Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press., 2017.
- Ndatinya, V., Xiao, Z., Manepalli, V.R., Meng, K. and Xiao, Y. Network forensics analysis using Wireshark. International Journal of Security and Networks, 10(2), pp.91-106., 2015.
- Walnycky, D., Baggili, I., Marrington, A., Moore, J. and Breitinger, F. Network and device forensic analysis of android social-messaging applications. Digital Investigation, 14, pp.S77-S84., 2015.
- Messier, R. Packet Capture and Analysis. Network Forensics, pp.81-112., 2017.
- Cappers, B.C. and van Wijk, J.J. Semantic Network Traffic Analysis using Deep Packet Inspection and Visual Analytics., 2017.
- Quadrio, G., Bujari, A., Palazzi, C.E., Ronzani, D., Maggiorini, D. and Ripamonti, L.A. Network analysis of the steam in-home streaming game system: poster. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (pp. 475-476). ACM., 2016, October.