Preview

The Internals of Libpcap: a Case Study

Powerful Essays
Open Document
Open Document
4407 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Internals of Libpcap: a Case Study
THE INTERNALS OF LIBPCAP: A CASE STUDY
BY: VIVEK GUPTA,
STUDENT, MS(IT), DA-IICT, GANDHINAGAR. PHONE: +919426330172 EMAIL: VIVEK_GUPTA@DA-IICT.ORG

KEYWORDS:

1. BSD: Berkeley Software Design.
2. TCP: Transmission Control Protocol
3. IP: Internet Protocol.
4. BPF: BSD Packet Filter.
5. DLPI: Data Link Provider Interface.
6. libpcap: Packet Capture Library.
7. JNI: Java Native Interface.
8. NIT: Network Interface Tap.
9. CSPF: CMU/Stanford Packet filter.

INTRODUCTION:

Packet capture is a fundamental mechanism in network management. It is used to support a wide range of network operational tasks, such as fault detection, protocol analysis, and security assessment. Libpcap is one of the most common and basic libraries available for the purpose of packet capture. Inspite of the fact that the library has existed for a considerably long time there is no document which explains the underlying concept about the working of this library. In this paper, I would be presenting the system level working of libpcap, i.e., concept as well as coding. The paper is intended to providing the reader with concepts, which will enhance his or her understanding about the packet capture library. The reader should be able to design and code library of the similar kind. This working is explained with reference to a network-monitoring tool. I have tried to explain the core concept as well as its application within the library in the paper.

Packet Capture in simple words means "to grab packets". In order to grab packets we need to access the primary facility provided by the operating system so that there is access to packets in their raw form. To make a network monitoring application we need to capture all the packets over the network. The packet capture library allows us to intercept any packet that is seen by the network interface. We need to put the interface on that network into a "promiscuous" mode, so that we can capture all packets on



References: [10]. Maurice .J. Bach , "Design and implementation of the UNIX operating system", pp 91, 323. 1996.

You May Also Find These Documents Helpful

  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Do you want to permit remote access to your monitor or access your monitor only at the console?…

    • 95 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Section I: Watch the video on the iLab page about Wireshark and answer the questions below.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    The RMON standard was developed in order to resolve issues that other management protocols were not able to handle it properly and can be supported by hardware monitoring devices (known as "probes") or through software or some kind of combination. “For example, any vendor LAN switches includes software in each switch that can trap information as traffic flows through and record it in its MIB. A software agent can gather the information for presentation to the network administrator with a graphical user interface. A number of vendors provide products with various kinds of RMON support.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    1. A network device is usually built in to the computer. A peripheral device is a device connected to the computer…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    6. Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to distinguish how many of each…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 2.6.2: Using Wireshark

    • 2260 Words
    • 10 Pages

    Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.…

    • 2260 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The first step that needed to be taken in order to start this project was the download of the program Wireshark. In order to download Wireshark all I had to do was access the Wireshark website which was located at http://www.wireshark.org/download.html. Once that the program was loaded I was able to run a session and capture network traffic. When you first run a capture you have to choose which interface you are using. For this situation, I am running off of a wireless access card so I had to choose the “wireless” interface.…

    • 967 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Protocol Visualization with Packet Tracer Learning Objectives: 1. 2. 3. Explore Packet Tracer Real-Time Mode and Simulation Mode Explore logical workspace To become familiar with building topologies in Packet Tracer…

    • 1500 Words
    • 6 Pages
    Powerful Essays

Related Topics