Answered step by step
Verified Expert Solution
Question
1 Approved Answer
CW_Specification_CSI_5_PDN_20/21 Read this coursework specification carefully, it tells you how you are going to be assessed, how to submit your coursework on-time and how (and
CW_Specification_CSI_5_PDN_20/21 Read this coursework specification carefully, it tells you how you are going to be assessed, how to submit your coursework on-time and how (and when) youll receive your marks and feedback.
Coursework Aim: The aim of this coursework is to give opportunity to the students to obtain skills in the areas of data networking protocol analysis and networking application performance evaluation using both emulation and simulation tools. Part A: Protocol Analysis using Wireshark The aim of this coursework is to understand the protocol analysis that must be carried out in a network by parsing information from different layers. Coursework Specification Carry out the following tasks:
site it will be checked by anti-plagiarism software. Learning Outcomes This coursework will fully or partially assess the following learning outcomes for this module. The following Learning Outcomes will be assessed:
1 The application of this criterion is independent of the process outlined in the Student Academic Misconduct Procedure How to get help We will discuss this Coursework Specification in class. However, if you have related questions, please contact me [Alam Muhammad, alamm52@lsbu.ac.uk ] as soon as possible. Resources
Module Code | CSI_5_PDN |
Module Title | Principles of Data Networks |
Lecturer | Muhammad Alam |
% of Module Mark | 60% |
Distributed | [11/10/2021] |
Submission Method | Submit online via this Modules Moodle site |
Submission Deadline | End of week 12 [ Time: 17:00] |
Release of Feedback & Marks | Feedback and provisional marks will be available in the Gradebook on Moodle 10 days after the submission. |
- Clear the ARP Cache of your host (https://www.technipages.com/windows-10-flush-arpcache)
- Open the Wireshark program
- Start capturing the packets in the Wireshark
- Open the Web browser, clear the history (cache) of the Web browser. If your studentid is even use the following URL http://www.tesco.com, otherwise type http://www.sainsburys.co.uk
- After 2 minutes close the Web browser
- Stop capturing the packets in the Wireshark
- TCP
- UDP
- HTTP
- IP address of the sender
- IP address of the receiver
- Segment size
- Port numbers at both sender and receiver,
- Sequence Number
- ACK No and Window Size from Acknowledgment.
- Apply ARP filter on the captured data and explain the ARP header fields with a figure/screenshot.
- ARP spoofing is also known as an ARP cache poison and is used in man-in-the-middle attacks. The attacker will spoof its MAC address so instead of traffic going to the actual host, traffic will go to the host with the spoofed MAC address. The attacker can launch ARP storm by making large number of ARP requests (Denial of Service (DoS attack). Wireshark can be used to monitor or spot the ARP storm attack. How we can setup the ARP in Wireshark to detect ARP storm? Support your answer by appropriate description and screenshot.
- The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. How can we capture the FTP operations in Wireshark? Provide the description each step with appropriate screenshot.
- Create a simple network consisting of two PCs communicating using cross over cable. (See above figure)
- Ping PC2 from PC1 and check the connectivity.
- Create a network consisting of 4 PCs connected with a central hub as shown in figure.
- Send a packet from PC6 to PC9.
- Describe in your own words the limitations of Hub by simulating the network in the given figure.
- Create a network consisting of 4 PCs connected with a central Switch as shown in the figure.
- Send a packet from PC10 to PC13.
- Describe in your own words the working of switch by simulating the network in the given figure.
Type: | Report |
Word Count: | As a guide, each student must aim for [2500-3000 words]. The maximum word limit is [5000 words]. Footnotes and will not count towards word count totals but must only be used for referencing, not for the provision of additional text. The bibliography will not count towards the word total. No penalty will be applied if the total word limit is exceeded. |
Standards: | Properly addressing the report specification. Use of good English language and grammar. Logical structure to sections. Clear narrative voice in expression of arguments and information. Appropriate use of diagrams. Proper use of citations and presentation of references. |
Presentation: |
|
coursework. | |
Referencing: | Harvard Referencing should be used, see your Library |
Subject Guide for guides and tips on referencing. | |
Regulations: | Make sure you understand the University Regulations on |
expected academic practice and academic misconduct. Note in particular: ? Your work must be your own. Markers will be attentive to both the plausibility of the sources provided as well as the consistency and approach to writing of the work. Simply, if you do the research and reading, and then write it up on your own, giving the reference to sources, you will approach the work in the appropriate way and will cause not give markers reason to question the authenticity of the work. ? All quotations must be credited and properly referenced. Paraphrasing is still regarded as plagiarism if you fail to acknowledge the source for the ideas being expressed. TURNITIN: When you upload your work to the Moodle |
- LO1 (Analyse network protocols, Explain the protocol functions on levels 2-4 of the TCP/IP stack): It will be assessed by using Wireshark to analyse and process the protocols used in different layers from data link up to presentation layer using Wireshark.
- LO2 (Understanding the basics of networks design): You will know how to design and develop simple networks.
Criteria | Feedforward comments | |||||||
100-80% | 79-70% | 69-60% | 59-50% | 49-40% | 39-30% | 29-0% | ||
15% |
| Extensive independent relevant research evidenced by quality and quantity used. Ability to draw on own research and that of others. | Extensive independent relevant research evidenced by quality and quantity used. Some autonomous research. | Wide range of relevant sources identified and used. Very little guidance needed. | A range of sources identified and used. Limited guidance needed. | Limited research identified and used. Some guidance needed to complete research tasks. | Some evidence of research but insufficient amount. Needs support to develop research skills. | Little or no research presented. Needs significant support to develop research skills. |
35% |
| Very high-quality analysis developed independently. Sustained evaluation and synthesis of results. Use of evidence-based arguments. Thoroughly identifies trends, inconsistency, congruence, and states the implications. | Sustained evaluation and synthesis of results. Use of evidence-based arguments. Thoroughly identifies trends, inconsistency, congruence, and states the implications. | Evaluation and synthesis of results. Use of evidence- based arguments. Identifies trends, inconsistency, congruence, and states the implications. | Evaluation and synthesis of results. Use of evidence-based arguments. | Some attempt at evaluation and synthesis of results. Some use of evidence-based arguments. | Limited evaluation of results. Limited use of evidence-based arguments | Little or no evaluation of results. Very little use of evidence-based arguments. |
25% |
| Autonomous creation and novel implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. | Almost entirely autonomous creation and implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. | Mainly autonomous creation and implementation. Adapts to unforeseen practical and theoretical challenges to achieve identified goals. | Some autonomy to create and implement. Some adaption made to unforeseen practical and theoretical challenges to achieve identified goals. | Exploration of possible solution(s). Use of established approaches to resolve practical and theoretical problems. | Limited exploration of possible solution(s) using established approaches to resolve practical and theoretical problems. | Little or no exploration of solution(s). Question or problem unresolved. |
10% |
| Consistent, error free application of relevant referencing conventions with great attention to detail. | Consistent, error free application of relevant referencing conventions. | Consistent application of relevant referencing conventions with few errors. | Application of relevant referencing conventions, with some errors and / or inconsistencies. | Generally correct application of relevant referencing conventions, with some errors and / or inconsistencies. | Limited application of referencing conventions and / or errors. | Very limited or no application of referencing conventions, and/or multiple errors. |
15% |
| Takes full responsibility for own learning and development through continuous cycles of well- articulated purposeful analysis and planning, supported by extensive evidence | Takes full responsibility for own learning and development through continuous cycles of well-articulated purposeful analysis and planning, supported by evidence. | Reflection and planning are self-directed, continuous, habitual and evidenced clearly. Strengths have been built on; weaknesses have been mitigated. | Evidence that a cycle of reflection and planning has been continuous and productive. Actively works to develop strengths and mitigate weaknesses. | Evidence that reflection and planning have led to increased disciplinary engagement and commitment. Developing an awareness of strengths and weaknesses. | Weak evidence of reflection and planning for learning but not followed through consistently. Incomplete awareness of personal strengths and weaknesses. | Insufficient evidence of reflection or planning for learning and no evidence of awareness of personal strengths and weaknesses. |
- How to use Wireshark,
- Packet Tracer
Attachments:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started