Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

The first part of the report should be about general statistics of all six captures using Wireshark that must include:
1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server.


Part 2:
The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:
1. Throughput
2. Round Trip Time
3. Packet Loss


While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client.

General statistics

The management of a network plays a crucial role in ensuring the smooth and effective functioning of the network components. The activities performed by the network management range from performance management and the performance analysis by the use of specific tools to ensure high standards of the services [8]. The services are supported by a number of operating systems like Microsoft and Linux. The popular graphical user interface used in the analysis is the checker which is an open source packet used mainly with Windows Operating System. It analyses every network protocol stream by monitoring the traffic filter.

General statistics

                Above all the tools used in the analysis of the network, the Wireshark is the globally most commonly used network analyze [9]. It is preferably used to examine the communication protocol analysis and troubleshooting as well. The data of two websites will be used in the analysis using the Wireshark. The preferred websites are the abc net and light website for this project. The data captured will be analyzed, that is, it will be retrieved from source with the ethernet edge connection. The Wireshark software uses the hypertext transfer control protocol and the network server of the selected websites in a laptop for apprehending and analyzing the created packets. The network evaluating by the software will regulate the throughput essential and the sequence graph.

Time of capture

                Below is the screenshot for unlocked Wireshark. The Wireshark proves the life and the offline analysis. It also runs on the multi-platform like Linux, NetBSD, and Windows Operating Systems among other platforms [2]. The Wireshark is one of the most powerful industry displays filters. It is also capable of analyzing Rich VoIP.

                The number sequence in the network and the IP address of the client are identified. The three-way handshake is the preferred TCP which can be relied upon and has to be established. As a result of the HTTP launching the host web server, then this is made possible. When the TCP initiates the three-way handshake through the internet, the establishment of the session is created between the web server and the host laptop [6].

Total number of the captured packets for each protocol

                The source IP address was required for the analysis of the captures. The source IP address for this case that will be used is the MAC and the laptop host. The MAC address for the laptop host stand 00.32.42.5A.ED.8D and 10.1.41.16 whereas the 192.168.111 and 192.168.1.130 are the web server IP addresses.

Time of capture

Total number of lost packets

The two lost packets, particularly from the above fig. 2 are #1137(312) and #1015(741).

The server and the client IP address.

The IP address is 193.148.0.6 and 104.47.226.123 respectively for both the server and the client.

                To keep the track, the packet number is stored in the first frame. There are vital points to note about the website analysis [1]:

  • The analysis of the packet will involve the use of the TCP, UDP and the HTTP protocols.
  • The destination and the originality of the packet will be recorded by the destination and the source IP addresses.
  • The packet size in bytes will be used as the determinant of the length.
  • The application of the data will provide the status of the packet.

The DNS and the laptop IP address are exposed above in frame 12.

Round Trip Time

                The IP address 13.1.50.230 is the Domain Name System of the website abc. This is the noble transfer of packets by the laptop to the web server. The computer and the Google web server three-way handshake are illustrated in the frame 13 below.

The destination and the TCP port number are 443 and 49323 respectively.

                The above information pertaining the network is core to any central functioning of the computer. The security of the confidential information is ensured with this kind of the network. This particular scenario gives the network admin to put into emphasis what to keep confidential and where everything is located. It has been noted that the commonly used networks in home set up are the LAN and WAN [7]. The most suitable use of the LAN is the private networks like the home network. The WAN is widely applied in the areas like institutions. However, both networks can work together, whereby, one has to act as the wireless signal while the other act as the router.

                There are basic elements which consist of these networks which make it possible for the effective functioning regardless of the size or the type of the network. These elements are the interface card, the firewall, and the routers. The minor misconfiguration of any of the element would bring down the network. The network interface card is used for the transfer of the data across the networks. It is used in both the wireless and the cable communication.

The confidential information is kept on one end. It is up to the computers connected to the networks to ensure that the data is not compromised by employing some security programs. For the strong networks, the cat5 cable is used, and also another reason for using the cable is that it is standardized for the network connection. The optic fiber is used in long-distance connections like over the seas. The use of a firewall facilitates the separation between the network and its components.

Total number of captured packets for each protocol

Translocation of TCP PC 182.148.1.130 which is the host PC IP address.

                The frame 17 and the frame 13 signifies the reaction succeeding to the DNS solution and the DNS solution respectively.

                The laptop's and the web server three-technique grasp are revealed in the frame 16. The IP address 10.1.50.230 and the DNS of the abc site make the website in the laptop to send the package.

Transmitted sections in the suggestion file

                The HTTP port which is source value 80 represents the destination while the random port valued 49523 represents the source. The relative frequency for this network analysis is null with no standard set [3].

Comparison 1: Contrast of the throughput and Transfer Control Protocol retransmissions on three networks.

                The transmission mechanisms and the linking alignment property of the Transfer Control Protocol are quite different. The TCP is assumed more appropriately, but in the real sense, it causes delay when it comes to the packet transmission [11]. The UDP is the most appropriate option other than the TCP because it can transmit a stream of real-time voice.

                Additionally, the reliable transfer is required when it comes to transmission of the packet from basis to terminus in multicast communication. Subsequently, the TCP is not premeditated for the execution of the multicast torrent of transfer services, since it is challenging to transfer the packet. Due to its dependable packet transfer reliability, the TCP is preferred in most cases.

                This diagram illustrates the linking initiation procedure of the network connection between the client and the web server.

                The above diagram shows some details concerning the frame such as the number of the edges and the frame order among others. According to the diagram, the session starts at zero. However, the zero value becomes the time offset when the packets start wrapping. The total time taken during the session is referred to as the end of the session. The cutoff and the communication of the time assortment is represented by the vertical dashed line and the green view.

Comparison 2: Evaluation of Message Analyzer and the Wireshark

Ease of access and use

                Less technology is required in downloading and installation of both the Message Analyzer and the Wireshark. However, the Massage Analyzer has fewer features as compared to the Wireshark which has more features hence more complex [4]. In most cases, the Wireshark analysis is faced with great time challenges which can be overcome by use of the Massage Analyzer. This is so because the Massage Analyzer is quite autonomous. The automation aspect makes the use of the Massage Analyzer to be a save timing one. Thus, an additional advantage as compared to the Wireshark. The Massage Analyzer is more likely to install its features in an environment whereby the Microsoft products are trusted more over the third party.

Total number of lost packets

Graphical User Interface (GUI)

                The Wireshark and the Massage Analyzer have greatly enabled the automation for introducing and sending unlike types of payloads and logs. Wireshark does not permit the automation as compared to the Massage Analyzer which can evaluate data from logs and offer dissimilar view set-ups of the outlined files [12]. The Massage Analyzer has more enabled GUI features to ensure well-functioning of the software.

Visualization of traffic

                The similarity between the Massage Analyzer and the Wireshark is that they both capture and display the live traffic. The two software makes it possible for the network admin to view the traffic without directly watching the data [10].

                The significant similarity between the Massage Analyzer and Wireshark is that they both have the variation in the transfer of the packets in bits per second. The different variations in the throughput are as a result of the time experiences check.

Conclusion

                The network communication protocol is the great application of the Wireshark tools on the network. Putting up the controller and the monitoring in the network provides the enhanced back up as well. However, in most cases, the Wireshark analysis is faced with great time challenges which can be overcome by use of the Massage Analyzer. This is so because the Massage Analyzer is quite autonomous. The automation aspect makes the use of the Massage Analyzer to be a save timing one. Thus, an additional advantage as compared to the Wireshark.

The Massage Analyzer is more likely to install its features in an environment whereby the Microsoft products are trusted more over the third party.  By the use of the message analyzer, it gives the options of loading the archived messages collected from many data sources concurrently or the option of capturing remote and the local traffic live. The Massage analyzer allows going deep in the packet within the products hence in the analysis of the network, I would prefer the Message Analyzer over the Wireshark analyzing software.

References 

[1] Bolla, Raffaele, R. Bruschi, A. Carrega, and F. Davoli, "Green networking with packet processing engines: Modeling and optimization." IEEE/ACM Transactions on Networking (TON), vol. 22, no. 7, 2014, pp.110-123.

[2] Desai, Padmashree, M. Vijayalakshmi, and M. Raikar. "Encourage research thinking in network domain using traffic analysis tool." Journal of Engineering Education Transformations, vol.30, no. 3, 2017, pp.123-129.

[3] Grimm, Volker, G. Polhill, and J. Touza, "Documenting social simulation models: The ODD protocol as a standard." In Simulating Social Complexity, vol. 32, 2017, pp. 349-365.

[4] Kumar, Atul, and R. Nair, "Using Component Interaction Model and Network Traces for Root-cause Analysis." In ModSym+ SAAAS@ ISEC, vol.3, 2016, pp. 23-26.

[5] Liu, Juan, Wei Chen, and Khaled B. Letaief. "Delay Optimal Scheduling for ARQ-Aided Power Constrained Packet Transmission Over Multi-State Fading Channels." IEEE Transactions on Wireless Communications, vol.31, 2017, pp.124-129

[6] Lopez, Jessica, Y. Sun, B. Blair, and M. Mukhtar, "TCP three-way handshake: linking developmental processes with plant immunity," Trends in plant science, vol. 20, no. 4, 2015, pp.  238-245.

[7] Mehta, Schultz, A. Phillip, B. Peabody, N. Ash, Y. Aung, and T. Martin, "Applications and integrated firewall design in an adaptive private network (apn)”, Journal of Communication Technology, vol. 10, 2017, pp.331-344.

[8] Mijumbi, Rashid, J. Serrat, J. Gorricho, S. Latré, M. Charalambides, and D. Lopez, "Management and orchestration challenges in network functions virtualization," IEEE Communications Magazine, Vol. 8, no. 1, 2016, pp. 98-105.

[9] Saxena, Praful, and S. Sharma, "Analysis of Network Traffic by Using Packet Sniffing Tool: Wireshark," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 3, no. 6, 2017, pp. 804-808.

[10] S. Douskos, Stelios, E. Lahtinen, F. Long, and M. Rinard, "Automatic error elimination by horizontal code transfer across multiple applications." In ACM SIGPLAN Notices, vol. 50, no. 6, 2015, pp. 43-54.

[11] Tan, Cheng, and H. Zhang, "Necessary and sufficient stabilizing conditions for networked control systems with simultaneous transmission delay and packet dropout." IEEE Transactions on Automatic Control, vol. 62, no. 8, 2017, pp. 4011-4016.

[12] Xie, Yuan, D. Richardson, A. Mandal, C. Jones, J. Hering, and K.  Mahaffey, "Mobile communication device display of visual progress bar with graphical user interface. “Innovations in Technology, vol. 50, no. 5, 2014, pp. 1061-1066.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Network Performance Analysis Using Wireshark. Retrieved from https://myassignmenthelp.com/free-samples/mn504-networked-application-management/graphical-user.html.

"Network Performance Analysis Using Wireshark." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mn504-networked-application-management/graphical-user.html.

My Assignment Help (2021) Network Performance Analysis Using Wireshark [Online]. Available from: https://myassignmenthelp.com/free-samples/mn504-networked-application-management/graphical-user.html
[Accessed 25 April 2024].

My Assignment Help. 'Network Performance Analysis Using Wireshark' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/mn504-networked-application-management/graphical-user.html> accessed 25 April 2024.

My Assignment Help. Network Performance Analysis Using Wireshark [Internet]. My Assignment Help. 2021 [cited 25 April 2024]. Available from: https://myassignmenthelp.com/free-samples/mn504-networked-application-management/graphical-user.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close