![]() ![]() Encapsulation – each layer adds a specific header to the data.However, before the data reach the cable, each single layer of the seven layers of a protocol stack must be passed through. The individual bits of the payload data are translated into corresponding voltage levels, so that these can be transferred to the corresponding cable. The flow of data runs serial, so that the data are sent in bits strung together. The data, or here also data packets, are transferred via a network cable. Additionally, the many functions of the program allow preparing statistics about the data flow and extracting binary contents such as images. With this structure in Wireshark, the collected recordings from the data traffic may be viewed and be broken down by content. The purpose of the tool is to present the data clearly and to organize them so that a simple analysis is possible where people can logically trace the steps. While recording data traffic to a network interface, or after it is terminated, the collected data are made available as individual packets with this program. ![]() The program is not yet available in German. By now Version 1.8.5 is available, which can be used in the operating systems Unix, Linus, Solaris, Mac, and Windows. However, the basis on which both versions are working, are the network analysis products of commercial manufacturers. Ethereal continues to be available on the market despite the fact that this predecessor is no longer being further developed. In 2007, the first version was put on the market, and it is known today under its more common name “Wireshark”, as a free and open source software. Initially, Gerald Combs was employed at Ethereal Software Inc., and the tool was originally also known as Ethereal. This program was created based on the “General Public License” initiative, and under the management of Gerald Combs.
0 Comments
Leave a Reply. |