This website uses cookies to ensure you have the best experience. Learn more

Network Analysis

599 words - 2 pages

In order to determine the flow and types of packets on the network, a packets sniffer program ‘Wireshark’ was used to capture the packets. Wireshark was used to capture 30 minutes of network activity in two different intervals, morning and afternoon.
The partial output from the Wireshark capture, from both sessions is shown in figure 4.4; from analysis of the packet sniffer program it can be deduced that the network traffic usage is mainly TCP connections, such as web browsing, file transfer and mail services.
It can also be noted that there is a significant amount of the broadcast packets like ARP, NBNS and UDP, as shown in figure 4.6 a partial segment of the Wireshark output and due to these packets the switches should experience a vast number of broadcasts, which in general degrades the entire network performance.
The graph as depicted in figure 4.7 represents the amount of packets that where captured for a given time period, which show there is a significant amount of broadcast in the network.
4.2.3 NETWORK STATISTICS
In order to get some real time statistics, capturing the packets alone was not enough to give clear indication on the actual network statistics, as packet sniffer captures and displays packets transmitted from one source to the destination.
OptiView Protocol Expert was used to capture and produce the network statistics which provide a graphical result of the network usage, such as top ten hosts, top applications. It should be taken in to account that the version of OptiView Protocol Expert is an educational version, which has limitations, that’s is it can only record 250 entries, this software was provided by the university, this limitations may lead to some features to be restricted.
The statistics are categorised into three groups namely, Protocol Distribution, Application Layer Host Table and Network Layer Host Table.

...

Find Another Essay On Network Analysis

Movie Analysis: The Social Network

1627 words - 7 pages One of the most popular social networking websites today is none other than Facebook. People use Facebook in order to stay connected with their friends, family and the people around them, to discover what’s going in the world, in addition to share and express what matters to them. The Social Network is a film on how Facebook was created. There was a series of events, character development, relationships and a series of different emotions that

Analysis of Lori Andrews´ Book I Know Who You Are and I Saw What You Did: Soical Network and the Death of Privacy

2619 words - 11 pages their profits because every time advertisements are clicked on by a user they make a certain amount of money). These reasons are in part why Ms. Andrews has smartly called upon our policymakers to draft a Social Network Constitution. Rules need to be implemented to make Facebook follow the same set of rules as we citizens do. In a following portion of Ms. Andrews’s literary analysis of the evolving and complex Social Network universe she uses a

Case Analysis of "Star Alliance (A): A Global Network"

2486 words - 10 pages expanded international network and business lounge access in airports worldwide.One of the major reasons for the airlines getting into alliances was the Gulf War in 1991-1992, where airlines in general saw slump in air traffic and sales. The other one was the economic recession that hit not only Europe, but also the world. People had less money, therefore flew less and seats in the airplanes were empty. The industry recovered very quickly, though

The Rhetorical Analysis of “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?”

946 words - 4 pages The article “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” is written by Dana L. Fleming and appears in the winter 2008 issue of the New England Journal of Higher Education. Fleming’s objective with this article is to show college students the dangers of social networking sites, and at the same time she is advising parents on the social networking world. In this article she is giving us a

Network Management

1528 words - 6 pages alone can probably stop most malicious activities on a network. SBD is like an antivirus package and looks for virus signatures within packets been sent over a network. SABD (statistical anomaly-based detection) monitors are creates an idea of normal activity on a network and then alerts the network manager if not normal activity is happening within the network. SPAD (stateful protocol analysis detection) is used to monitor and observe a

network configeration

2000 words - 8 pages STATE OFFICE OF EDUCATIONNETWORK DESIGN PROPOSAL TABLE OF CONTENTS I. FEASIBILITY STUDY II. NETWORK NEEDS ANAYLSIS III. HIGH-LEVEL NETWORK DESIGN IV. DETAILED DESIGN DOCUMENTATION V. COST-BENEFIT ANALYSIS FEASIBILITY STUDYSituation in which the Project Exists: This proposal is for a data communication network to serve the public education system. The legislature recently approved funding sufficient to pay for the development of this

Network Security

2198 words - 9 pages . Firewalls are constantly being improved and updated with the latest technology. The decision of who gets in and who must stay out. For the future, there holds the promise of fingerprint analysis. Authorized individuals trying to get access into the network, must first pass the fingerprint test. An unmatched or unknown fingerprint into the system will equate to access denied. Encoding schemes will only grow more popular as confidential

Network Design

5316 words - 21 pages back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com “the first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental

Network security

2852 words - 11 pages manual operations into computerised systems and relay on them. In fact, organisations then considered that “….many potential hazards such as fraud, errors, lost data, breaches of privacy and the disastrous events that can occur in a data communication” (Fitzgerald, 1984, pp620). The above consideration statement was considered about fifteen years ago but still holds valid reasons. Computer and network address three

Computer Network Management

1391 words - 6 pages localization, fault correction, testing, and trouble administration. Performance management provides preventative maintenance, capacity planning, and statistical analysis. Security management controls all network security information, to provide prevention, detection, containment and recovery, and security Administration. Accounting management collects the information about the clients’ usage of the services to keep track of billing. Tariffs, pricing

Network Security Sensors

922 words - 4 pages There are numerous network security devices and tools available intended to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. This will be an analysis of the features and benefits for various Intrusion Detection/Prevention Systems (IDPS) and other network traffic monitoring tools in regards to defending high value targets against attacks from

Similar Essays

Network Development Analysis

901 words - 4 pages Network Development Analysis The scenario Information technology and enterprise networks have become the core of many organizations. Critical business functions often depend on a fully functioning IT infrastructure: no network means no ability to generate revenue. To this end, an organization's growth and evolution should be reflected in the growth and evolution of its network That having been said, a west coast furniture retailer (Alpha

Trends In Social Network Analysis

822 words - 3 pages , antisocial, or socially marginal. This center-periphery notion, for example, has been used to study small-group performance, the diffusion of innovations, support mobilization, community elites, voting behavior, and the role of social support in enhancing mental and physical well-being.Recently, there have been important methodological and theoretical developments in the area of social network analysis that complement some of the more classical

Communication Networks: Communication Structure Of Social Network Analysis (Sna)

2096 words - 8 pages This explication is a guided compilation of key components and conceptual frameworks exploring the communication structure for Social Network Analysis (SNA). The theory of social networks is important to the interdisciplinary study of communication as it provides a roadmap from which to understand why and how creating and advancing organizational connectivity within business, medical, and social environments is beneficial. Within this

Huffman Trucking Network Analysis

1320 words - 5 pages Huffman Trucking PAGE \* MERGEFORMAT 1 Running head: HUFFMAN TRUCKING NETWORK ANALYSISHuffman Trucking Network AnalysisUniversity Of PhoenixMarch 1, 2009Huffman Trucking Network AnalysisHuffman Trucking was founded by K. Huffman in 1963. The Company has hubs located in Los Angeles, California, Bayonne, New Jersey, and St. Louis, Missouri with its central facility located in Cleveland, Ohio. "Huffman's primary customers include the U.S