Network Analysis Using Wireshark for Networked Application Management
Added on 2023-06-03
36 Pages2887 Words458 Views
Data Science and Big Data
|
|
|
Networked Application Management
(Network Analysis Using Wireshark)
Institution Affiliation
(Network Analysis Using Wireshark)
Institution Affiliation
![Network Analysis Using Wireshark for Networked Application Management_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_1.jpg&w=3840&q=10)
Table of Contents
Introduction.....................................................................................................................................
General statistics..............................................................................................................................
Time of capture............................................................................................................................
Total Number of captured packets..............................................................................................
Packet loss....................................................................................................................................
IP address for the server and the client.......................................................................................
NETWORK PERFORMANCE...............................................................................................................
Throughout...................................................................................................................................
Round Trip Time...........................................................................................................................
COMPARISON 1: Comparison of the throughput and
TCP retransmissions of both applications on three
networks and discussion of the reasons for the
difference.........................................................................................................................................
Comparison 2: Comparison of Message Analyzer tool
with Wireshark.................................................................................................................................
Ease of access and use.................................................................................................................
Graphical User Interface (GUI).....................................................................................................
Introduction.....................................................................................................................................
General statistics..............................................................................................................................
Time of capture............................................................................................................................
Total Number of captured packets..............................................................................................
Packet loss....................................................................................................................................
IP address for the server and the client.......................................................................................
NETWORK PERFORMANCE...............................................................................................................
Throughout...................................................................................................................................
Round Trip Time...........................................................................................................................
COMPARISON 1: Comparison of the throughput and
TCP retransmissions of both applications on three
networks and discussion of the reasons for the
difference.........................................................................................................................................
Comparison 2: Comparison of Message Analyzer tool
with Wireshark.................................................................................................................................
Ease of access and use.................................................................................................................
Graphical User Interface (GUI).....................................................................................................
![Network Analysis Using Wireshark for Networked Application Management_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_2.jpg&w=3840&q=10)
Visualization of traffic..................................................................................................................
Statistical generation...................................................................................................................
Conclusion........................................................................................................................................
References........................................................................................................................................
Statistical generation...................................................................................................................
Conclusion........................................................................................................................................
References........................................................................................................................................
![Network Analysis Using Wireshark for Networked Application Management_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_3.jpg&w=3840&q=10)
Introduction
To ensure effective and continued functioning
of the network, management should be part of the
daily routine. Network management activities include
maintaining the quality of the services provided,
performance management, securing the network and
also analyzing the network to determine its
performance through analysis tools [12]. These
services apply to all the operating systems such as the
Linux, Microsoft System, and MAC among others. The
Graphical User Interface (GUI) is used is used in the
analysis of both the Windows operating systems and
the Linux version [5]. The open source packet checker
is the best-known graphical user interface and is found
in Windows operating systems. This interface is tasked
with the analysis of network protocol for every
captured packet, picking out the TCP stream through
traffic filter monitoring, and also the filter functionality
possession.
To ensure effective and continued functioning
of the network, management should be part of the
daily routine. Network management activities include
maintaining the quality of the services provided,
performance management, securing the network and
also analyzing the network to determine its
performance through analysis tools [12]. These
services apply to all the operating systems such as the
Linux, Microsoft System, and MAC among others. The
Graphical User Interface (GUI) is used is used in the
analysis of both the Windows operating systems and
the Linux version [5]. The open source packet checker
is the best-known graphical user interface and is found
in Windows operating systems. This interface is tasked
with the analysis of network protocol for every
captured packet, picking out the TCP stream through
traffic filter monitoring, and also the filter functionality
possession.
![Network Analysis Using Wireshark for Networked Application Management_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_4.jpg&w=3840&q=10)
General statistics
Various analysis tools such as the Wireshark
and the Message Analyzer are used in analyzing the
network. However, the Wireshark is the world's most
common and preferred source packet analyzing tool
[1]. The analyzer is used in a variety of functions such
as the network and the communication protocol
analysis and troubleshooting. In this project, the data
to be analyzed will be captured from two websites;
http://iview.abc.net.au and
http://www.lightfm.com.au. The Wireshark analyzing
too will be used for the analysis. The data to be
analyzed will be accessed from home with an Ethernet
interface connection. The Wireshark tool will use the
HTTP and the web server of the two websites in the PC
for the capturing and analysis of the generated
packets. Moreover, the software will use the captured
data to determine the sequence graph, windows
scaling, load distribution and the throughput essential
in evaluating network performance.
Various analysis tools such as the Wireshark
and the Message Analyzer are used in analyzing the
network. However, the Wireshark is the world's most
common and preferred source packet analyzing tool
[1]. The analyzer is used in a variety of functions such
as the network and the communication protocol
analysis and troubleshooting. In this project, the data
to be analyzed will be captured from two websites;
http://iview.abc.net.au and
http://www.lightfm.com.au. The Wireshark analyzing
too will be used for the analysis. The data to be
analyzed will be accessed from home with an Ethernet
interface connection. The Wireshark tool will use the
HTTP and the web server of the two websites in the PC
for the capturing and analysis of the generated
packets. Moreover, the software will use the captured
data to determine the sequence graph, windows
scaling, load distribution and the throughput essential
in evaluating network performance.
![Network Analysis Using Wireshark for Networked Application Management_5](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_5.jpg&w=3840&q=10)
Time of capture
Wireshark is composed of various features
including the time capture, time for the first and last
packet and the elapsed time [7]. The screenshot below
shows an opened Wireshark.
Wireshark is composed of various features
including the time capture, time for the first and last
packet and the elapsed time [7]. The screenshot below
shows an opened Wireshark.
![Network Analysis Using Wireshark for Networked Application Management_6](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_6.jpg&w=3840&q=10)
Both the IP address of the client and the
number sequence in the network are identified. To
number sequence in the network are identified. To
![Network Analysis Using Wireshark for Networked Application Management_7](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_7.jpg&w=3840&q=10)
establish a dependable Transmission Control Protocol
(TCP) session, the three-way handshake is most
refereed. This is made possible only when the HTTP
launches on the host web server. The initiation of the
three-way handshake by the Transmission Control
Protocol through the internet leads to the session
establishment between the host PC and the web
server [11]. Several websites within the host computer
may contain different active TCP sessions.
(TCP) session, the three-way handshake is most
refereed. This is made possible only when the HTTP
launches on the host web server. The initiation of the
three-way handshake by the Transmission Control
Protocol through the internet leads to the session
establishment between the host PC and the web
server [11]. Several websites within the host computer
may contain different active TCP sessions.
![Network Analysis Using Wireshark for Networked Application Management_8](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fnetwork-analysis-wireshark-management_page_8.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Network Analysis Using Wiresharklg...
|20
|2983
|459
Network Application Overview and Analysislg...
|18
|2466
|388
Network Performance Analysis using Wiresharklg...
|21
|1687
|212
Network Analysis using Wiresharklg...
|24
|2032
|289
Analyse Network Performancelg...
|16
|1577
|72
Network Performance Analysis (pdf)lg...
|20
|1737
|363