25-08-2017, 09:32 PM
NETWORK ANALYZER REPORT
NETWORK ANALYZER REPORT.doc (Size: 3.9 MB / Downloads: 46)
Introduction
Networking is allowing businesses to develop WANs, MANs, and LANs. There are two types of network wired network and wireless network. Network is a rapidly growing segment of the Industry, Homes, Enterprises, University campuses and so on with the potential to provide high-speed high-quality information exchange between portable devices located anywhere in the world. Potential applications enabled by this technology include multimedia Internet-enabled, cell phones, smart homes and appliances, automated highway systems, video teleconferencing and distance learning, and autonomous sensor networks. However, supporting these applications using networking techniques poses a significant technical challenge. The objective of the system is to analyze the wired and wireless network.
Wireless networks grow organically as users buy and install equipment, but they often lack centralized network management. Therefore, management capabilities are key to the long-term survival of these networks. Managing a network, may it be wired or wireless, is a difficult problem. This is because a network is a complex system with many inter-dependent factors that affect its behavior. The factors include networking protocols, traffic flows, hardware, software, different faults, and most importantly the interactions between them. Managing a wireless network is even more difficult due to unreliable physical medium, fluctuating environmental conditions, complicated wireless interference, and limited network resources.
System objective
To analyze the network, we develop an analyzer tool that browse packet data from a from a previously saved capture file. The analyzer tool consists of two modules. First module analyzes the wired packet and second module analyzes the wireless packet. Packet data are stored in the pcap file format. The analyzer tool determines all the protocol statistics of wired and wireless packet. In wired network, this tool determine the destination MAC address, source MAC address, Ethernet type, IP version, type of services ,header length, total length , identification ,flag ,fragment ,time to live ,next protocol ,header checksum, source IP address, destination IP address ,source port ,destination port ,sequence number ,acknowledgment ,window size, checksum of the packet. In the wireless network, this tool analyze the type of frame whether it is control frame or management frame or data frame ,flag(DR status ,more fragment ,retry ,PWR MGT , more data ,protected flag ,ordered flag ),destination address ,source address ,BSS id ,fragment number ,sequence number ,frame check sequence ,time stamp ,beacon interval ,capability information(ESS capability ,IBSS status ,participation capabilities ,privacy ,short preamble ,PBCC , channel agility ,spectrum management ,short slot time ,automatic power save delivery ,DSSS ,delayed block acknowledgement ,immediate block acknowledgment ),current channel in use ,actual data. Using all these parameter our system generates the statistics report.
Business objective
We look at the above goal with respect to IEEE 802.11 wireless networks operating in Basic Service Set Configuration. It is observed in practice as well as experiment that the network seldom achieves anything close to its promised 11Mbps throughput. This may be due to several problems such as poor access Point (AP) placement, inappropriate channel selection, presence of hidden nodes etc. Most of these problems have to do with the details of the 802.11 physical layer such as channel width, carrier sense etc.
Software methodology
We use the incremental model to develop the project because in this project the requirements are changes. First we design the project, implemented it and tested incrementally. Every time new requirement is accepted until the customer satisfies. Perform both development and maintenance. The product is decomposed into number of components, each of which builds separately. Each component is delivered to the client when it is completed. This allows partial utilization of product and avoids a long development time.
Identification. 16 bits
Used to identify the fragments of one datagram from those of another. The originating protocol module of an internet datagram sets the identification field to a value that must be unique for that source-destination pair and protocol for the time the datagram will be active in the internet system. The originating protocol module of a complete datagram clears the MF bit to zero and the Fragment Offset field to zero.
Overview of wireless network
Wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling. Wireless technologies use radio frequency transmissions as the means for transmitting data, whereas wired technologies use cables. Wireless technologies range from complex systems, such as Wireless Local Area Networks (WLAN) and cell phones to simple devices such as wireless headphones, microphones, and other devices that do not process or store information. They also include infrared (IR) devices such as remote controls, some cordless computer keyboards and mice, and wireless hi-fi stereo headsets, all of which require a direct line of sight between the transmitter and the receiver to close the link. A brief overview of wireless networks, devices, standards, and security issues is presented in this section.