Network analyzers, Computer Networking

NETWORK ANALYZERS:

A network analyzer also known network monitor or a network sniffer is used to calculate the performance of or debug a network.

It may report statistics such as capacity distribution of frame size, utilization, token circulation time or collision rate.

OPERATION OF NETWORK ANALYZERS:

The main idea behind the function of network analyzer is a device with a network interface that accept all frames, which is known promiscuous mode. Several desktop computers have interface that may be configured for promiscuous type. When combined with software computer can calculate any frame on LAN. In this way the interaction across LAN is have to be private. This device receives and displays frames on the LAN.

Network analyzer may be configured to process and filter frames. It may count frames of specific kind of size. It shows only frames from or to specific device. In general it may be configured to check any value of any field and save only these frames acting the filter specifications.

 

 

Posted Date: 10/27/2012 8:42:28 AM | Location : United States







Related Discussions:- Network analyzers, Assignment Help, Ask Question on Network analyzers, Get Answer, Expert's Help, Network analyzers Discussions

Write discussion on Network analyzers
Your posts are moderated
Related Questions
What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

1. Introduction This document describes the research-based assignment for this module. This assignment consists of two parts: A formal report And a presentatio

Types of VTs There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexi

Q. What are the Routing Techniques? Routing Routing Techniques Static versus Dynamic Routing Routing Table for classful Addressing Routing Table for Cl

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

Q. OSI Network Layer Addressing ISO/IEC and CCITT mutually administer the global network addressing domain. The primary hierarchical decomposition of the address is defined


Can you explain the Authentication Header (AH) Protocol?

What are the advantages of Star Topology? The advantages of star topology are: a. Relatively easy to configure. b. Simple to troubleshoot c. Media faults are automatic

Multiplexing  and De multiplexing Another  critical set of services that are provided by the transport layer is that of application multiplexing and de multiplexing. This featu