Report on Network Analyzers: Protocols, Tools, and Analysis

Verified

Added on  2020/02/24

|9
|1274
|34
Report
AI Summary
This report provides a comprehensive overview of network analyzers, beginning with an explanation of network communication protocols and the role of network analyzers in enhancing network security and detecting malicious activities. It then delves into an analysis of currently available network analyzer tools, discussing their benefits, associated costs, and ease of usability. The report also provides recommendations for preferred tools, including Wireshark, NAST, and Zenmap. The conclusion highlights the importance of understanding IP addressing, routing, and data flows through the Internet, emphasizing the value of the analysis for selecting appropriate protocols and applications for data transfer. The report aims to assist students in understanding network analyzer tools and their importance.
Document Page
Running head: USE OF NETWORK ANALYZERS
Use of network analyzers
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1USE OF NETWORK ANALYZERS
Executive summary
The report has briefly explained the communication network protocols and the roles of the network
analyzers. Next analyzes the tools of network analyzers available currently.
Document Page
2USE OF NETWORK ANALYZERS
Table of Contents
Introduction:..........................................................................................................................................3
1. Explanation of the network communication protocol and role of network analyzers:......................3
1.1. Network communication protocol:.............................................................................................3
1.2. Role of network analyzers:.........................................................................................................4
2. Analysis of the currently available network analyzer tools:..............................................................5
2.1. Benefits, associated costs, ease of usability:..............................................................................5
2.2. Recommendations about preferred tools:...................................................................................6
Conclusion:............................................................................................................................................7
References:............................................................................................................................................8
Document Page
3USE OF NETWORK ANALYZERS
Introduction:
The network analyzer is the assimilation of the software and hardware. This is installed in
any network or computer for enhancing the safety against the malicious activities (Barford et al.,
2017).
The following report briefly explains the communication network protocols and the roles of
the network analyzers. Then an analysis is done on the tools of network analyzers available
currently.
1. Explanation of the network communication protocol and role of network
analyzers:
1.1. Network communication protocol:
The communication protocol has been defining the rules to send the Protocol Data Units or
PDU (Savin et al., 2014). The PCI or Protocol Control Information has been defining the following.
1. Procedures to transmit and receive the ODUs.
2. Services delivered by protocol layers.
3. PCI format forming the PDU header.
The procedures that have been implemented in the protocols included the following.
Connection management
Selection of service access point
Segmentation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4USE OF NETWORK ANALYZERS
Flow control
Error recovery like the go-back-n procedure and checkpoint procedure.
The documents defining the protocol procedures have been large and concrete. They could
not be translated to the executable programs. The success of the protocol suite has taken place
because of the industrial strength code. These have been available in the reference implementations
distributed freely.
1.2. Role of network analyzers:
The roles are explained below:
They have been delivering the in depth statistics for the recent activities on the networks.
They have been testing the anti-malware programs and the potential vulnerabilities.
They have been detecting the unusual levels of the network traffic and the packet
characteristic.
They have been identifying the packet destinations and sources.
They configured the alarms to define the threats.
Ultimately they have displayed every statistics on the control panel that has been user
friendly (Hu, Hao & Bao, 2014).
For instance, in the given scenario the network analyzer has helped in calculating the shortest
distance on the basis of the travel times. It has allowed the addition of various attributes like the turn
restrictions, speed limits and the demands for making the operations more realistic. It has also helped
in determining the data output and input, kept the information upgraded and rapidly disseminated to
the users. Further it has helped in finding the address matching and route. These are needed to be
quick, effective and reactive to the changes in the outside circumstances.
Document Page
5USE OF NETWORK ANALYZERS
2. Analysis of the currently available network analyzer tools:
The network analysis tools have been enabling to capture data from the continuous network
traffic streams. They convert the raw numbers into tables and charts. This has been quantifying how
the network was used exactly and by whom and for what reason (Ding, 2016).
2.1. Benefits, associated costs, ease of usability:
The benefits:
The tools have been offering the view about what has been occurring. This has not only been
over WAN but also over the LAN at every location. The network analysis pertains to the network
protocols, traffic flows and the individual data packets. Thus they could empower M2M Solutions
responsible for the network to be kept operating during the peak performance.
The associated costs:
There have been various costs that are factored while considering the network analysis
technologies. This included the costs regarding the required analytical tools, creating network for the
individuals for conducting analyses, create the community network required to make the community
resilience.
Document Page
6USE OF NETWORK ANALYZERS
The ease of usability:
The usability tools have helped the usability researchers spending the fraction of the cost for
retrieving the outcome nearer to the conventional testing facility results. These results could be
collected and assesses in the matter of an hour versus days used by it.
2.2. Recommendations about preferred tools:
The required recommendations are:
1. Wireshark:
This analyzer has been featuring the live capture and the offline analysis. This also includes
the standard three-pane packet browser and the multi-platform like the Windows, the Linux, the OS
X and many more.
2. NAST:
Network Analyzer Sniffer Tool or NAST has been a tool that has not been under the
development for quite some time. However, the tool has been quite useful. It does a very great job of
capturing the network traffic.
3. Zenmap:
Zenmap has been the official GUI. This is for the Nmap Security Scanner. The Zenmap is
been available for the Windows, the Linux, the Mac, and the BSD. The Zenmap could be used for
reading the live captures or to save the captures for viewing later.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7USE OF NETWORK ANALYZERS
Conclusion:
The report has helped in analyzing the requirement of IP addressing and routing. It has also
helped in designing the addressing scheme along with going for the proper routing methods. This has
demonstrated how the internetworking devices have been obtaining the network configurations.
Clear understanding of the study would also be useful in understanding of the data flows through the
Internet. Lastly evaluation and assertion could be done effectively from here for the selection of the
protocols and the applications to transfer data through the network.
Document Page
8USE OF NETWORK ANALYZERS
References:
Barford, P. R., Kline, J. T., Nam, S., Plonka, D. J., & Ron, A. (2017). U.S. Patent No. 9,680,693.
Washington, DC: U.S. Patent and Trademark Office.
Comer, D. (2015). Computer networks and internets. Pearson.
Ding, J. (2016). Advances in network management. CRC press.
Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From
concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181-2206.
Savin, A. A. (2013, October). A novel factor verification technique for one-port vector network
analyzer. In Microwave Conference (EuMC), 2013 European(pp. 60-63). IEEE.
Savin, A. A., Guba, V. G., Rumiantsev, A., & Maxson, B. D. (2014, June). Estimation of complex
residual errors of calibrated two-port vector network analyzer. In ARFTG Microwave
Measurement Conference (ARFTG), 2014 83rd (pp. 1-4). IEEE.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]