logo

Network Security Using Wireshark

   

Added on  2020-02-24

10 Pages1538 Words72 Views
 | 
 | 
 | 
TCP/IP NETWORKING
Network Security Using Wireshark_1

Table of ContentsTask – 1................................................................................................................................................2Introduction.....................................................................................................................................2Network diagram.............................................................................................................................3IP addressing....................................................................................................................................5Task – 2................................................................................................................................................6Role of Network analyser................................................................................................................6Purpose of Wireshark.....................................................................................................................7Features of wireshark......................................................................................................................8Recommendations............................................................................................................................81
Network Security Using Wireshark_2

Task – 1IntroductionA computer network is the infrastructure and it used to allow more than one computer tocommunication with each other. This process is achieving by providing the collection ofcommunication rule is called as protocols. The Protocols are observed by participating hosts.The collection of network protocol rules are includes the following characteristics of thenetwork such as data transfer speed, access method, cable types and physical topologies. TheNetwork protocols are listed below ("A brief explanation of computer network protocols",2017).ATMToken ringLocal talkEthernetFDDIThe M2M solutions contains the six building. Each building has the various departments.The Building are connected with the network by using router. The M2M solutions proposednetwork infrastructure provide the high efficiency and scalability of the network. It using thenetwork analysers to reduce the troubleshooting problems. The company contains the 1200work stations. These are divided into six building. Six building are Head office, Informationtechnology, Sales office, transport office, finance office and research office. The Proposednetwork infrastructure is will be discussed. It use the network analyser tool that is wiresharkto reduce the trouble shooting issues in the network. The Current company policies does notallow the network analyser tools for the network. But the network Analysers tool provides theeffective network. So the Company management team interested to using the networkanalyser tool. So gives the network analysers proposal for company board. So the staff areanalyse the best network analyser tool and their features, benefits, recommendations and howit support the proposed network infrastructure. These informations are once gathered and thenit provided to company board. The network analyser tools are will be discuss (Callahan, n.d.).2
Network Security Using Wireshark_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents