Network analyzers, Computer Networking


A network analyzer also known network monitor or a network sniffer is used to calculate the performance of or debug a network.

It may report statistics such as capacity distribution of frame size, utilization, token circulation time or collision rate.


The main idea behind the function of network analyzer is a device with a network interface that accept all frames, which is known promiscuous mode. Several desktop computers have interface that may be configured for promiscuous type. When combined with software computer can calculate any frame on LAN. In this way the interaction across LAN is have to be private. This device receives and displays frames on the LAN.

Network analyzer may be configured to process and filter frames. It may count frames of specific kind of size. It shows only frames from or to specific device. In general it may be configured to check any value of any field and save only these frames acting the filter specifications.



Posted Date: 10/27/2012 8:42:28 AM | Location : United States

Related Discussions:- Network analyzers, Assignment Help, Ask Question on Network analyzers, Get Answer, Expert's Help, Network analyzers Discussions

Write discussion on Network analyzers
Your posts are moderated
Related Questions
#questi Scenario: Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you sen

Floating Point Representation in Memory 1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this rep

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

how can I establish a home net work by using cables and wieless

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b)  Configure memory

There are two logical addressing :- a) Datalink is physical (hardware) addressing. b) Network is logical (software) addressing.

Q. Show the Class D and Class E Addresses? Class D and Class E Addresses Class D - reserved for multicast addresses Multicasting - transmission method which allo