Assignment title: Information
MN503 Overview of Internetworking
Assignment 1, T1 2016
Assignment 1: Individual Assignment – Submission in MS Word format with Video file.
Submission Due: Sunday 1st May'16 23:55 hrs (Week 6) in the specified folder on Moodle.
Total Marks = 150 (15% of total assessment)
Purpose of the assessment:
The purpose of this assignment is to allow the students to perform minor research and
critical thinking on topics of UDP, TCP and DNS protocols experimentally by using Wireshark
in Part A and Riverbed based network simulation in Part B. Hands-on practical experience
will facilitate the students to increase the understanding of these protocols and the concept
of network simulations. You need to fully answer Part A and Part B sections.
Description of the assessment:
Go to http://www.wireshark.org/download.html and download and install the Wireshark binary for your
own computer. In the labs you have already used Wireshark so far.
Case Study – Part A
As a Network Analyst for DataTech corporation that specialises in data analysis you want to
evaluate your companies key networks. DataTech wants you to evaluate UDP, TCP, and DNS
protocols on your network. Various types of data transfer such as voice, video or data could
occur on your network. You need to use suitable applications so as to satisfy the need for
capturing packets of each of the above stated protocols.
As you need to generate a report for the higher management which comprises of technical
as well as non-technical personnel so you need to ensure that your report is clear, cohesive
and contains relevant screenshots with suitable annotations to explain your answers.
Furthermore, you need to generate a 2 min (video with audio) clip to briefly explain any of
the experiments that you perform to answer any one of the questions for UDP or TCP or
DNS protocol listed below. The video clip must briefly capture your face, your audio
explanation and the experiment being conducted on the computer monitor (screen).
First answer ALL the following critical thinking questions listed below. Then perform the
experiments using Wireshark for UDP, TCP and DNS and answer ALL the questions listed in
Parts 1 to 3.
Critical Thinking Questions:
1) What is the purpose of a Network Interface card (NIC). On what layer of the OSI model is
it based. Why?
2) Does a computer need to use both MAC address and an IP address? Justify your answer.
Download and install the Wireshark software:
MN503 Overview of Internetworking P a g e | 2 of 5
3) Does reliable transfer of data imply no errors in data transmission? Justify your answer.
4) Can the Wireshark protocol analyser be used to generate packets for different protocol
types? Justify your answer.
5) List the different purposes for which a protocol analyser such as a Wireshark can be
used.
PART 1 – UDP Protocol
Use an application that generates UDP packets. Run Wireshark and capture packets for
around 1-2 min. Stop Wireshark and use UDP in the filter bar to list only the UDP packets.
Whenever possible, when answering a question below, you should place a screenshot of the
packet within the trace that you used to answer the question asked. Annotate the
screenshot to explain your answer.
1) What application have you used to generate the UDP packets? Select one UDP packet
from your trace. From this packet, determine how many fields there are in the UDP
header. Name these fields.
2) From the capture determine the data rate of the UDP packets? Explain what you need to
do in Wireshark to obtain this automatically?
3) The value in the Length field is the length of what? Verify your claim with your captured
UDP packet.
4) What field in the UDP packet identifies the application in the end host?
5) Is the purpose of checksum field in a UDP packet to offer reliability? Justify your answer.
6) Would you use UDP for the reliable transportation of real-time or non-real time traffic?
Justify your answer.
PART 2 – TCP
Generate TCP packets by using a suitable application. Capture the generated TCP packets by
using Wireshark. Answer the following questions.
1) What is the purpose of TCP protocol? How does it differ from UDP protocol?
2) For a captured TCP packet, what is the IP address and TCP port number used by the
client (source) computer and the destination computer. Annotate this on a screen shot.
3) What is the purpose of TCP port number? How it is used?
4) Why do ICMP (ping) packets do not have a TCP port number? Justify your answer.
MN503 Overview of Internetworking P a g e | 3 of 5
5) From the TCP capture, what is the sequence number of the TCP SYN segment that is
used to initiate the TCP connection between the client computer and the destination?
How is TCP SYN segment found? Annotate it on the screen shot.
6) From the TCP capture, calculate the Round trip time (RTT) for sending a TCP segment.
How is the RTT obtained?
Part 3 – DNS Protocol
1) Explain briefly what DNS protocol is? What is the IP address of your local DNS server?
Provide a screenshot to indicate your answer on it.
2) How would you flush your local DNS server? Use a web browser to visit any website and
capture and filter the DNS packets on Wireshark. What are the ports used in the DNS
message? Provide a screenshot to support your answer.
MN503 Overview of Internetworking P a g e | 4 of 5
PART B- Riverbed Modeler based Simulation Experiments
DataTech Consulting wants you to create a 10base-T hub star based Ethernet in the
Riverbed Modeler using Rapid Configuration. You can use Ethernet_wkstn as the periphery
node model i.e. as the hosts/Ethernet stations, and 10base T link model to connect hosts to
the hub. Use interarrival time between packets to be exponentially distributed with a mean
of 0.03 sec. First have 10 ethernet node stations connected to it.
Evaluate the performance of the 10base-T Ethernet in terms of throughput vs delay for
packet sizes of constant distribution for each of the following two packet sizes: 512 bytes,
and 1500 bytes. Make sure you apply the same traffic distribution to each of the
hosts/Ethernet stations. Then repeat the same for 20, 30, 40, 50, 60, and 70 stations.
Use graphs wherever required in the questions below:
(i) In your opinion what is the purpose of network simulation? What are the different
simulation tools available (max up to 4) and state their advantages and disadvantages.
(ii) Capture the graph of throughput vs delay for one of the two packet sizes and
explain the nature (shape) of the throughput vs delay graph as the load on the
Ethernet is increased. What is the load in this case? Put the final graph in the report.
(iii) From the graph of throughput vs delay for 1500 bytes packet size and stations
ranging from 10 up to 70 in increments of 10 how would you determine the optimal
number of Ethernet stations that could be supported on the 10base T Ethernet hub? Put
the final graph in the report.
(iv) What is the nature of the data traffic generated in the above Ethernet network.
Justify your answer.
(v) What are the sources of the delay in the throughput vs delay graph? State and briefly
explain each of them.
Submission guidelines:
Your assignment should be completed according to the General Guidelines for Presentation
of Academic Work.
1. successful completion of required tasks
• clear understanding of the answers provided.
• attempt all questions.
• required technologies or equipment
• comparison with others (if applicable)
• configuration (if applicable)
• troubleshooting (if applicable)
2. quality of figures/tables
• clear and well organised screeshots/drawings/table
• meaningful names
• Referencing
MN503 Overview of Internetworking P a g e | 5 of 5
3. accompanying documentation including
• a front page - indicating your name and student ID.
• Summary with a statement of what has been completed
• Acknowledgement of the names of all people (including other students
and people outside of the university) who have assisted you.
• table of contents and page numbers
• Conclusion
• Appendix (if applicable)
4. Referencing
• list of references used (IEEE style)
5. The assignment must be submitted online in MS Word format in the specified
folder on Moodle by the due date and time.
Extensions: Requests for an extension, accompanied by supporting documentation, must
be received by the student in writing before 3 working days from the due date else penalties
may apply for late submission without an approved extension. Special consideration form is
available in MIT reception.
Penalties: Academic misconduct such as cheating and plagiarism may incur penalties
ranging from a reduced result to program exclusion.
Marking criteria (MN503): Marks are allocated as follows:
Section to be included in
the report
Description of the section Marks
Content- Part A Correctness and understanding of the answers 19
Questions x
4 marks =
76
Video clip (max 2 min duration) 4 Marks
Part B Correctness and understanding of the answers 5 X 10 = 50
Marks
Diagrams (Screenshots) Content supported by Figures , Tables, Charts etc. 10 Marks
Documentation front page, formatting, page numbering, table of
contents
5 Marks
Reference Material referenced in this research work 5 Marks
Reference style Use IEEE referencing style only
Poor writing Inadequate structure, careless presentation, poor
referencing technique or not using at all
-5
MN503 Overview of Internetworking P a g e | 6 of 5
Plagiarism Type of plagiarism
- Copy from other student
- Copy from internet source/textbook
- Copy from other sources
-150
Total 150 Marks
Marking Rubrics
Description of the
section
Excellent Good Unsatisfactory
Content relevant answers with
Understanding
Limited relevant
answers with
average
understanding
Poor
answrers/Lack of
understanding
Diagrams Sufficient diagrams
are included to
support the content
Diagrams limited No diagrams
included
Documentation Comply to the
submission guidelines
Comply partially to
the submission
guidelines
Submission
guidelines not
followed
Reference Relevant resources
are included
Included resources
are limited
No references
included
Reference - Computer Networks, A Top-down Approach, 6
th
ed., J.F. Kurose and K.W. Ross, AddisonWesley/Pearson, 2012