• Like
Network Protocol Analyzer
Upcoming SlideShare
Loading in...5
×

Network Protocol Analyzer

  • 1,791 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,791
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
73
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. NETWORK PROTOCOL ANALYSER
    CC-13
    ALIREZA KHAKPOUR -1MS07IS122
    MOHAMMAD ASKARI -1MS04IS096
    SHAHAB SADEGHI -1MS05IS094
    HAMIDREZA HABIBI -1MS07IS126
  • 2. INTRODUCTION
    • A packet sniffer is referred to as a network monitor or network analyzer
    • 3. Using the information captured by the packet sniffer an administrator can identify wrong packets and use the data to specify delay and help maintain efficient network data transmission.
    • 4. it captures all of the packets of data that pass through a given network interface.
    • If placed into promiscuous mode, the packet sniffer is capable of capturing ALL packets traversing the network regardless.
    • 5. By placing a packet sniffer on a network in promiscuous mode, we can capture and analyze all of the network traffic.
    • 6. A packet sniffer can only capture packet information within a given subnet. the packet sniffer needs to be running on a computer that is inside the corporate network as well.
    • 7. Detecting rogue packet sniffers on your network is not an easy task. Its very nature the packet sniffer is passive.
    • 8. There are ways to identify network interfaces on your network that are running in promiscuous mode.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. ACKNOWLEDGEMENT
    WE WOULD LIKE TO THANK ALL RESPECTED FACULTIES .
  • 28. REFERENCES
    http://www.colasoft.com/capsa/
    http://en.wikipedia.org/wiki/Network_analyzer
    http://www.ieee.org/web/standards/home/find.html?WT.mc_id=hpwd_stand
    http://www.javvin.com/index.html