Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CW_Specification_CSI_5_PDN_20/21 Read this coursework specification carefully, it tells you how you are going to be assessed, how to submit your coursework on-time and how (and

CW_Specification_CSI_5_PDN_20/21 Read this coursework specification carefully, it tells you how you are going to be assessed, how to submit your coursework on-time and how (and when) youll receive your marks and feedback.
Module Code CSI_5_PDN
Module Title Principles of Data Networks
Lecturer Muhammad Alam
% of Module Mark 60%
Distributed [11/10/2021]
Submission Method Submit online via this Modules Moodle site
Submission Deadline End of week 12 [ Time: 17:00]
Release of Feedback & Marks Feedback and provisional marks will be available in the Gradebook on Moodle 10 days after the submission.
Coursework Aim: The aim of this coursework is to give opportunity to the students to obtain skills in the areas of data networking protocol analysis and networking application performance evaluation using both emulation and simulation tools. Part A: Protocol Analysis using Wireshark The aim of this coursework is to understand the protocol analysis that must be carried out in a network by parsing information from different layers. Coursework Specification Carry out the following tasks:
  • Clear the ARP Cache of your host (https://www.technipages.com/windows-10-flush-arpcache)
  • Open the Wireshark program
  • Start capturing the packets in the Wireshark
  • Open the Web browser, clear the history (cache) of the Web browser. If your studentid is even use the following URL http://www.tesco.com, otherwise type http://www.sainsburys.co.uk
  • After 2 minutes close the Web browser
  • Stop capturing the packets in the Wireshark
Open Wireshark screen and carry out the following actions. Questions: 1. Display all the packets of:
  1. TCP
  2. UDP
  3. HTTP
2. TCP uses a three-way handshake to establish a reliable connection. In the captured data, provide a screenshot that shows the TCP handshake process. Describe the packets exchanged during this process. 3. Apply a filter mechanism for the TCP packet used by HTTP for the communication between the Web browser and the Web Server. Find the following information:
  1. IP address of the sender
  2. IP address of the receiver
  3. Segment size
  4. Port numbers at both sender and receiver,
  5. Sequence Number
  6. ACK No and Window Size from Acknowledgment.
4. The User Datagram Protocol, or UDP, is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. Explain the various fields of a UDP header of the captured data. By default, the checksum is unverified. How can we set the checksum verified for all the UDP packets? Latency is a measurement of how long it takes to transmit a packet from one point to another. Network latency bogs down the network and can create delays. In addition, it can cause the loading of web pages to slow down and can also have a negative effect on voice and video applications as well. Latency can be measured using Round-Trip Time (RTT), which is how long it takes to make a complete round trip from A to B, and then from B to A. Throughput is how much data is sent and received (typically in bits per second) at any given time. In Wireshark, we can measure this as well as goodput, which is useful information that is transmitted. Go to the URL https://www.cloudshark.org/captures/9a5385b43846 and download the clientfast-retrans.pcap file. Once download is completed, open the file in Wireshark and find the following: 5. Display the RTT graph and explain the behaviour of the network. 6. Display the throughput and explain it with respect to time. What are the factors that can affect the network throughput? The IP provides addressing and routing to get data to its final destination. Once the data is at the desired network, the IP address is no longer needed. The reason is that on a LAN, the data link layer uses the MAC address of the destination machine, rather than the IP address. ARP resolves an IP address to a MAC address on a LAN so that the frame can be delivered to the appropriate host. 7. The following figure shows the information of the first 2 ARP packets. Describe in your own words the information displayed in each column.
  1. Apply ARP filter on the captured data and explain the ARP header fields with a figure/screenshot.
  2. ARP spoofing is also known as an ARP cache poison and is used in man-in-the-middle attacks. The attacker will spoof its MAC address so instead of traffic going to the actual host, traffic will go to the host with the spoofed MAC address. The attacker can launch ARP storm by making large number of ARP requests (Denial of Service (DoS attack). Wireshark can be used to monitor or spot the ARP storm attack. How we can setup the ARP in Wireshark to detect ARP storm? Support your answer by appropriate description and screenshot.
  3. The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. How can we capture the FTP operations in Wireshark? Provide the description each step with appropriate screenshot.
Part B: Understanding network components and simulating basic network scenarios. Using the packet tracer, provide step by step description of the following activities.
  1. Create a simple network consisting of two PCs communicating using cross over cable. (See above figure)
  2. Ping PC2 from PC1 and check the connectivity.
A hub is a physical layer networking device which is used to connect multiple devices in a network. They are generally used to connect computers in a LAN. Using the packet tracer, provide step by step description of the following activities.
  1. Create a network consisting of 4 PCs connected with a central hub as shown in figure.
  2. Send a packet from PC6 to PC9.
  3. Describe in your own words the limitations of Hub by simulating the network in the given figure.
A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A network switch is a multiport network bridge that uses MAC addresses to forward data at the data link layer of the OSI model. Using the packet tracer, provide step by step description of the following activities.
  1. Create a network consisting of 4 PCs connected with a central Switch as shown in the figure.
  2. Send a packet from PC10 to PC13.
  3. Describe in your own words the working of switch by simulating the network in the given figure.
Coursework Submission Details:
Type: Report
Word Count: As a guide, each student must aim for [2500-3000 words]. The maximum word limit is [5000 words]. Footnotes and will not count towards word count totals but must only be used for referencing, not for the provision of additional text. The bibliography will not count towards the word total. No penalty will be applied if the total word limit is exceeded.
Standards: Properly addressing the report specification. Use of good English language and grammar. Logical structure to sections. Clear narrative voice in expression of arguments and information. Appropriate use of diagrams. Proper use of citations and presentation of references.
Presentation:
  • Work must be referenced, and a bibliography provided
  • Work must be submitted either as a Word document (.doc/docx) or a PDF
  • Course work must be submitted using Arial font size 11 (or larger if you need to), with a minimum of 1.5 line spacing
  • Your student number must appear at the front of the
coursework. Your name must not be on your
coursework.
Referencing: Harvard Referencing should be used, see your Library
Subject Guide for guides and tips on referencing.
Regulations: Make sure you understand the University Regulations on
expected academic practice and academic misconduct. Note in particular: ? Your work must be your own. Markers will be attentive to both the plausibility of the sources provided as well as the consistency and approach to writing of the work. Simply, if you do the research and reading, and then write it up on your own, giving the reference to sources, you will approach the work in the appropriate way and will cause not give markers reason to question the authenticity of the work. ? All quotations must be credited and properly referenced. Paraphrasing is still regarded as plagiarism if you fail to acknowledge the source for the ideas being expressed. TURNITIN: When you upload your work to the Moodle
site it will be checked by anti-plagiarism software. Learning Outcomes This coursework will fully or partially assess the following learning outcomes for this module. The following Learning Outcomes will be assessed:
  • LO1 (Analyse network protocols, Explain the protocol functions on levels 2-4 of the TCP/IP stack): It will be assessed by using Wireshark to analyse and process the protocols used in different layers from data link up to presentation layer using Wireshark.
  • LO2 (Understanding the basics of networks design): You will know how to design and develop simple networks.
Assessment Criteria and Weighting LSBU marking criteria have been developed to help tutors give you clear and helpful feedback on your work. They will be applied to your work to help you understand what you have accomplished, how any mark given was arrived at, and how you can improve your work in future.
Criteria Feedforward comments
100-80% 79-70% 69-60% 59-50% 49-40% 39-30% 29-0%
15%
  1. Research
Systematic identification and use of academic and relevant resources
Extensive independent relevant research evidenced by quality and quantity used. Ability to draw on own research and that of others. Extensive independent relevant research evidenced by quality and quantity used. Some autonomous research. Wide range of relevant sources identified and used. Very little guidance needed. A range of sources identified and used. Limited guidance needed. Limited research identified and used. Some guidance needed to complete research tasks. Some evidence of research but insufficient amount. Needs support to develop research skills. Little or no research presented. Needs significant support to develop research skills.
35%
  1. Critical Analysis of the Results
Analysis and interpretation of sources and results for both A and B both Part A (1-7) and B (1-5). Structuring of issues/debates.
Very high-quality analysis developed independently. Sustained evaluation and synthesis of results. Use of evidence-based arguments. Thoroughly identifies trends, inconsistency, congruence, and states the implications. Sustained evaluation and synthesis of results. Use of evidence-based arguments. Thoroughly identifies trends, inconsistency, congruence, and states the implications. Evaluation and synthesis of results. Use of evidence- based arguments. Identifies trends, inconsistency, congruence, and states the implications. Evaluation and synthesis of results. Use of evidence-based arguments. Some attempt at evaluation and synthesis of results. Some use of evidence-based arguments. Limited evaluation of results. Limited use of evidence-based arguments Little or no evaluation of results. Very little use of evidence-based arguments.
25%
  1. Testing and Problem- Solving Skills and Experimental Set-up Design and
implementation of the environment for both Part A (1-7) and B (1-5).
Autonomous creation and novel implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. Almost entirely autonomous creation and implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. Mainly autonomous creation and implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. Some autonomy to create and implement. Some adaption made to unforeseen practical and theoretical challenges to achieve identified goals. Exploration of possible solution(s). Use of established approaches to resolve practical and theoretical problems. Limited exploration of possible solution(s) using established approaches to resolve practical and theoretical problems. Little or no exploration of solution(s). Question or problem unresolved.
10%
  1. Standards,
Referencing and Academic Integrity1 Acknowledges and gives credit to the work of others follows the conventions and practices of the discipline including appropriate use of referencing standards for discipline.
Consistent, error free application of relevant referencing conventions with great attention to detail. Consistent, error free application of relevant referencing conventions. Consistent application of relevant referencing conventions with few errors. Application of relevant referencing conventions, with some errors and / or inconsistencies. Generally correct application of relevant referencing conventions, with some errors and / or inconsistencies. Limited application of referencing conventions and / or errors. Very limited or no application of referencing conventions, and/or multiple errors.
15%
  1. Personal and Professional
Development Management of learning through self-direction, planning and reflection
Takes full responsibility for own learning and development through continuous cycles of well- articulated purposeful analysis and planning, supported by extensive evidence Takes full responsibility for own learning and development through continuous cycles of well-articulated purposeful analysis and planning, supported by evidence. Reflection and planning are self-directed, continuous, habitual and evidenced clearly. Strengths have been built on; weaknesses have been mitigated. Evidence that a cycle of reflection and planning has been continuous and productive. Actively works to develop strengths and mitigate weaknesses. Evidence that reflection and planning have led to increased disciplinary engagement and commitment. Developing an awareness of strengths and weaknesses. Weak evidence of reflection and planning for learning but not followed through consistently. Incomplete awareness of personal strengths and weaknesses. Insufficient evidence of reflection or planning for learning and no evidence of awareness of personal strengths and weaknesses.
1 The application of this criterion is independent of the process outlined in the Student Academic Misconduct Procedure How to get help We will discuss this Coursework Specification in class. However, if you have related questions, please contact me [Alam Muhammad, alamm52@lsbu.ac.uk ] as soon as possible. Resources
  • How to use Wireshark,
https://www.wireshark.org/docs/wsug html chunked/ChapterIntroduction.html
  • Packet Tracer
https://www.netacad.com/courses/packet-tracer

Attachments:

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Students also viewed these Programming questions

Question

to find the overall reliability of the whole testing process.

Answered: 1 week ago

Question

=9/Why is the concept of net book value useful?

Answered: 1 week ago