Successfully reported this slideshow.

Network Protocol Analyzer

2,319 views

Published on

Published in: Education, Technology, Business
  • Be the first to comment

Network Protocol Analyzer

  1. 1. NETWORK PROTOCOL ANALYSER<br />CC-13<br /> ALIREZA KHAKPOUR -1MS07IS122<br /> MOHAMMAD ASKARI -1MS04IS096<br /> SHAHAB SADEGHI -1MS05IS094<br /> HAMIDREZA HABIBI -1MS07IS126<br />
  2. 2. INTRODUCTION<br /><ul><li>A packet sniffer is referred to as a network monitor or network analyzer
  3. 3. Using the information captured by the packet sniffer an administrator can identify wrong packets and use the data to specify delay and help maintain efficient network data transmission.
  4. 4. it captures all of the packets of data that pass through a given network interface.</li></li></ul><li><ul><li>If placed into promiscuous mode, the packet sniffer is capable of capturing ALL packets traversing the network regardless.
  5. 5. By placing a packet sniffer on a network in promiscuous mode, we can capture and analyze all of the network traffic.
  6. 6. A packet sniffer can only capture packet information within a given subnet. the packet sniffer needs to be running on a computer that is inside the corporate network as well.
  7. 7. Detecting rogue packet sniffers on your network is not an easy task. Its very nature the packet sniffer is passive.
  8. 8. There are ways to identify network interfaces on your network that are running in promiscuous mode.</li></li></ul><li>
  9. 9.
  10. 10.
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
  18. 18.
  19. 19.
  20. 20.
  21. 21.
  22. 22.
  23. 23.
  24. 24.
  25. 25.
  26. 26.
  27. 27. ACKNOWLEDGEMENT<br />WE WOULD LIKE TO THANK ALL RESPECTED FACULTIES .<br />
  28. 28. REFERENCES<br />http://www.colasoft.com/capsa/<br />http://en.wikipedia.org/wiki/Network_analyzer<br />http://www.ieee.org/web/standards/home/find.html?WT.mc_id=hpwd_stand<br />http://www.javvin.com/index.html<br />

×