09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

All hosts can see <strong>the</strong> traffic that passes across a shared media<br />

segment. Normally, <strong>the</strong>y only look at <strong>the</strong> packets addressed <strong>to</strong> <strong>the</strong>m.<br />

It is possible <strong>to</strong> have your computer operate in promiscuous mode by<br />

using a packet sniffer application. A packet sniffer allows you <strong>to</strong><br />

examine and capture <strong>network</strong> traffic that passes across <strong>the</strong><br />

transmission medium. If you have a shared-media <strong>network</strong>, a packet<br />

sniffer is an indispensable <strong>to</strong>ol for diagnosing <strong>network</strong> problems. It<br />

can also be used illegally <strong>to</strong> capture information that travels across<br />

<strong>the</strong> <strong>network</strong>, such as passwords and credit card numbers.<br />

A variety of sniffer applications are available for <strong>the</strong> Windows platform.<br />

One of <strong>the</strong> more popular applications is a package originally called<br />

NetXRay. It is currently sold by Network Associates under <strong>the</strong> name<br />

Sniffer Pro. On <strong>the</strong> Macin<strong>to</strong>sh platform, your best bet is E<strong>the</strong>rPeek, by<br />

<strong>the</strong> AG Group.<br />

A number of hardware-based dedicated packet sniffers exist on <strong>the</strong><br />

market. The Distributed and Expert sniffer product line by Network<br />

General (now also Network Associates) is perhaps <strong>the</strong> most popular<br />

among <strong>the</strong> dedicated packet sniffer products. O<strong>the</strong>r hardware-based<br />

manufacturers include Fluke and Hewlett Packard.<br />

Although packet sniffers are very useful, and in some cases essential,<br />

<strong>the</strong>y can be complicated <strong>to</strong> operate and are expensive. So before<br />

running out and spending a large sum of money on a dedicated sniffer,<br />

first check out <strong>the</strong> PC-based software <strong>to</strong>ols. This way, you can<br />

familiarize yourself with what you can actually do with a packet sniffer<br />

before making a large commitment of time and money. These <strong>to</strong>ols<br />

have nice GUI front ends and come with some good packet collection<br />

and analysis <strong>to</strong>ols out of <strong>the</strong> box. In most cases, software-based<br />

sniffers will meet your needs.<br />

One of <strong>the</strong> essential requirements of a transparent bridge is <strong>to</strong> deliver<br />

packets between <strong>the</strong> connected segments completely unaltered. In<br />

o<strong>the</strong>r words, this type of bridge is passive, and it operates undetected<br />

by <strong>the</strong> o<strong>the</strong>r connected end-stations on both segments. Because <strong>the</strong><br />

bridge, like all <strong>the</strong> o<strong>the</strong>r stations on <strong>the</strong> <strong>network</strong> segment, has <strong>to</strong> wait<br />

until <strong>the</strong> wire is available for it <strong>to</strong> forward any packet, it has a memory<br />

buffer that s<strong>to</strong>res <strong>the</strong> packets it needs <strong>to</strong> forward. To ensure that no<br />

packet data is lost, <strong>the</strong> bridge actually copies every packet sent on <strong>the</strong><br />

wire in<strong>to</strong> its s<strong>to</strong>rage buffer. This process is known as filtering. After<br />

<strong>the</strong> packet is in <strong>the</strong> buffer, its destination address is checked against<br />

<strong>the</strong> bridge's SAT. If <strong>the</strong> packet's destination address is on <strong>the</strong> same

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!