Font Size: a A A

Research And Application Of Protocol Analyzer In Intranet Maintenance

Posted on:2008-06-17Degree:MasterType:Thesis
Country:ChinaCandidate:H S PengFull Text:PDF
GTID:2178360242471422Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Protocol Analyzer is networking equipment which can capture the data transmitted in the network and analyze them precisely. The actual use of protocol analyzer is to capture and analyze the network flow in order to find out the existing problems in the network and carry out network examination to find out potential faults. This can help check out the reason, solve the problem as soon as possible to avoid expanding loss when error occurs. Protocol analyzer is the necessary tool for network engineers and network management workers which can implement real-time monitoring and network management.The program of"Ether Peek + PC", it mainly consists of four parts: network transmission environment, net card with complex mode, Ether Peek protocol analyzer software and PC with Windows operating system. The most important part among them is the Ether Peek protocol analyzer software, which application level will directly determine the level of program efficiency. Ether Peek protocol analyzer software contained two parts—data capture and protocol analysis, the former one is the most important and flexible part. Intranet engineer and network manager must know how to set and capture environmental variables so as to get the most concerned data from massive data and analyze its features.There are the following problems that should be solved in the specific process of networking perspective program: the first is the selection of Intranet access point. The access point selection of data capture varies according to different mode like sharing mode or exchanging mode that Intranet transmission has used, particularly in the exchanging mode to make diagnostic monitoring on different network nodes. And the selection of its capturing access point and its methods is the key to achieve the data capture. Secondly is the setting of capturing environmental variables. Due to different requirements, protocol analyzer should select the key data needed from the massive data, which proper environmental variables are needed to set for protocol analyzer. Whether its setting is reasonable or not is crucial to capture the data needed, otherwise, it just likes looking for a needle in a haystack. The third is the analysis of reported data and the extraction of key data. Basically, all the protocol analyzer provides the basic data analysis, but no matter how powerful the protocol analyzer is, it can not fully provide the key data information that the clients are concerned directly. Therefore, the analysis and extraction of data is the key to the final outcomes.The application effect of the protocol analyzer is satisfactory.
Keywords/Search Tags:Ether-peek, data packet capture, data decode, fault diagnosis
PDF Full Text Request
Related items