Network Application Management

Verified

Added on  2023/03/17

|24
|1255
|72
AI Summary
The objective of the report is to conduct trace routes of two websites www.lightfm.com.au and iview.abc.net.au, once from the home network and then from the university network by the group of students. This process is recorded using protocol analysers like Wireshark and MMA or Microsoft Message Analyser. After investigating the results and comparing the two protocol analysers the report ends with concluding notes.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK APPLICATION MANAGEMENT
Network Application Management
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORK APPLICATION MANAGEMENT
Summary
The objective of the report is to conduct trace routes of two websites www.lightfm.com.au and
iview.abc.net.au, once from the home network and then from the university network by the group
of students. This process is recorded using protocol analysers like Wireshark and MMA or Microsoft
Message Analyser. After investigating the results and comparing the two protocol analysers the
report ends with concluding notes.
Document Page
2NETWORK APPLICATION MANAGEMENT
Table of Contents
Introduction................................................................................................................................3
Part 1..........................................................................................................................................4
Home network....................................................................................................................4
Traceroute..........................................................................................................................4
Traceroute..........................................................................................................................4
University network.............................................................................................................5
Traceroute..........................................................................................................................5
Traceroute..........................................................................................................................5
Part 2......................................................................................................................................6
Home network....................................................................................................................6
Traceroute..........................................................................................................................6
University Network..........................................................................................................11
Part3.................................................................................................................................17
Microsoft Message Analyser (MMA)..............................................................................21
Conclusion................................................................................................................................22
Bibliography.............................................................................................................................23
Document Page
3NETWORK APPLICATION MANAGEMENT
Introduction
This report concerns conducting trace routes of two websites www.lightfm.com.au and
iview.abc.net.au, once from the home network and then from the university network by the group
of students. This process is recorded using protocol analysers like Wireshark and MMA or Microsoft
Message Analyser. After investigating the results and comparing the two protocol analysers the
report ends with concluding notes.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORK APPLICATION MANAGEMENT
General Statistics
Part 1: Time of Capture number of packets and client server IP
Home network
Traceroute
www.lightfm.com.au
1. Time of capture: 10:36 AM
2. DNS packets: 74
3. ICMP packets: 165
4. SSL packets: 413
5. SSDP packets: 497
6. TCP packets: 3020
7. Lost packets: 0
8. IP address of client: 10.10.30.107
9. IP address of server: 182.156.217.124
Traceroute
iview.abc.net.au
1. Time 10:49AM
2. DNS packets: 74
3. ICMP packets: 133
4. SSL packets: 303
5. SSDP packets: 421
6. TCP packets: 2944
7. Lost packets: 0
8. IP address of client: 10.10.30.107
9. IP address of server: 54.66.253.179
University network
Traceroute
www.lightfm.com.au
Document Page
5NETWORK APPLICATION MANAGEMENT
1. Time 13:00AM
2. DNS packets: 56
3. ICMP packets: 107
4. SSL packets: 132
5. SSDP packets: 214
6. TCP packets: 1128
7. Lost packets: 0
8. IP address of client: 10.10.30.107
9. IP address of server: 182.156.217.124
Traceroute
iview.abc.net.au
1. Time 13:24AM
2. DNS packets: 73
3. ICMP packets: 133
4. SSL packets: 303
5. SSDP packets: 421
6. TCP packets: 2944
7. Lost packets: 0
8. IP address of client: 10.10.30.107
9. IP address of server: 54.66.253.179
Network Analysis
Part 2: Screenshots and analysis
Home network
Traceroute
www.lightfm.com.au
Document Page
6NETWORK APPLICATION MANAGEMENT

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORK APPLICATION MANAGEMENT
Packet No. 3041, protocol TCP, time 173.999372
1. Throughput
2. Round Trip Time
Document Page
8NETWORK APPLICATION MANAGEMENT
3. Packet Loss
Document Page
9NETWORK APPLICATION MANAGEMENT
Traceroute
iview.abc.net.au

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10NETWORK APPLICATION MANAGEMENT
Packet No. 13, protocol TCP, time 1.058328
1. Throughput
2. Roundtrip
Document Page
11NETWORK APPLICATION MANAGEMENT
3. Packet loss
University Network
Traceroute
www.lightfm.com.au
Document Page
12NETWORK APPLICATION MANAGEMENT

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13NETWORK APPLICATION MANAGEMENT
Packet No. 1028, protocol TCP, time 53.028478
1. Throughput
2. Round Trip Time
Document Page
14NETWORK APPLICATION MANAGEMENT
3. Packet Loss
Document Page
15NETWORK APPLICATION MANAGEMENT
Traceroute
iview.abc.net.au

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16NETWORK APPLICATION MANAGEMENT
1. Throughput:
2. Roundtrip time:
Document Page
17NETWORK APPLICATION MANAGEMENT
3. Packet loss
Part3: Comparison of packet capture and visualization network traffic
The group of students are accessing the websites http://www.lightfm.com.au and
http:// iview.abc.net.au, once from the university campus and then from their home network. Since
Document Page
18NETWORK APPLICATION MANAGEMENT
they are using the same devices the device IP addresses remain the same. The source IP addresses
vary depending on the website they try to access.
Comparing throughputs in home network and university network for accessing website
www.lightfm.com.au which involves capturing images and other media.
Access from home

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19NETWORK APPLICATION MANAGEMENT
Access from University
Here, a big difference can be seen between that of home network compared to that
of university.
Document Page
20NETWORK APPLICATION MANAGEMENT
Comparing throughputs in home network and university network for accessing website
iview.abc.net.au which involves live streaming.
Document Page
21NETWORK APPLICATION MANAGEMENT
It is found that for the website iview.abc.net.au, both throughputs from the university and
home networks are found to be similar.
Comparison of packet statistics and between Wireshark and MMA and
differences been the tools.
Microsoft Message Analyser (MMA)
The Microsoft’s equivalent protocol analyser of Wireshark in Microsoft Message Analyser or
MMA. The recording of trace route to the news web site http:// iview.abc.net.au is caputred via
MMA in the following diagram:
This software application provides an easier to use GUI application compared than Wireshark [4] but
at the cost of missing out detailed descriptions, several features. Also the MMA appears to be
bulkier and performs a tad slower than Wireshark.
GUI differences:
1. The record, pause and stop buttons is MMA are easier to figure out.
2. The menubar in Wireshark comes stuffed with buttons for a range of features which make
the experience a bit unforgiving for the beginners.
3. The menu bar in MMA consists of simpler easy to understand buttons for the primary
features that the application offers.
4. Dedicated icons are available in MMA to detect errors in the communication if any.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22NETWORK APPLICATION MANAGEMENT
The visualization of the traffic is of the above recording can be brilliantly represented through
the TCP diagnostics visualization like in the following diagram [2].
Here graphs of multiple communication packets can be represented and compared at the same
time.
Conclusion
This report concerns conducting trace routes of two websites www.lightfm.com.au and
iview.abc.net.au, once from the home network and then from the university network by the group
of students. This process is recorded using protocol analysers like Wireshark and MMA or Microsoft
Message Analyser. Then after investigating the results, the report ends after providing comparison of
two protocol analysers.
Document Page
23NETWORK APPLICATION MANAGEMENT
Bibliography
[1] K.Deokule, P. Modi, D.Mistry, H. Patki, A. Patel, and O. Abuzaghleh, Network Traffic
Measurement and Analysis., 2016.
[2] M. Marchetti, F. Pierazzi, M. Colajanni, and A. Guido, Analysis of high volumes of network traffic
for advanced persistent threat detection. Computer Networks, 109, pp.127-141., 2016.
[3] P. Marchetta, V. Persico, G. Aceto, A. Botta, and A. Pescape, Measuring Networks Using IP
Options. IEEE Network, 31(3), pp.30-36., 2017.
[4] V. Ndatinya, Z. Xiao, V.R. Manepalli, K. Meng, and Y. Xiao, Network forensics analysis using
Wireshark. International Journal of Security and Networks, 10(2), pp.91-106. , 2015.
1 out of 24
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]