Protocol analyzer: Difference between revisions
Appearance
Content deleted Content added
m {{compu-network-stub}} |
WP:FEB24 +ref Tags: Mobile edit Mobile web edit Advanced mobile edit |
||
(40 intermediate revisions by 26 users not shown) | |||
Line 1: | Line 1: | ||
{{short description |Tool for analyzing signals and data traffic}} |
|||
A '''protocol analyzer''' is a device (either hardware or software) used to verify that a [[protocol]] on a digital [[network]] is operating correctly, or to extract data about the protocol, possibly including statistics or data. |
|||
{{Use American English |date=February 2024}} |
|||
{{Use mdy dates |date=February 2024}} |
|||
{{More citations needed |date=February 2024}} |
|||
A '''protocol analyzer''' is a tool (hardware or software) used to capture and analyze signals and data traffic over a [[communication channel]]. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard [[communication protocol]] ([[Telecommunications network|networked]] or [[Point-to-point (telecommunications)|point-to-point]]). Each type of [[communication protocol]] has a different tool to collect and analyze signals and data. |
|||
Specific types of protocol analyzers include: |
|||
===Example uses === |
|||
* A protocol analyzer for a [[token ring]] network could detect that the token has been lost or the presence of too many tokens (verifying the protocol). |
|||
* A protocol analyzer could detect that messages are being sent to a [[NIC]], if the NIC did not report receiving the messages then this would localize the failure to the NIC. |
|||
* A protocol analyzer could detect excessive messages being sent by a port, detecting an error in the implementation. |
|||
* A protocol analyzer could collect statistics on the amount of traffic (number of messages) from a process detecting the need for more bandwidth or a better method. |
|||
* A protocol analyzer could be used to extract messages and reassemble into a compete form the traffic from a process, allowing it to be reverse engineered. |
|||
* A [[telecom network protocol analyzer]] |
|||
* A network [[packet analyzer]] such as [[Wireshark]]<ref name="mer22" /> |
|||
* A [[bus analyzer]] |
|||
* An [[IP load tester]] |
|||
==References== |
|||
⚫ | |||
{{reflist |refs= |
|||
<ref name="mer22">{{cite web |title=Using Wireshark for Packet Captures |date=2022-06-08 |website=Cisco |publisher=Meraki |url=https://documentation.meraki.com/General_Administration/Tools_and_Troubleshooting/Using_Wireshark_for_Packet_Captures |access-date=2024-02-11 }}</ref> |
|||
}} |
|||
[[Category:Electronic test equipment]] |
|||
⚫ |
Latest revision as of 12:42, 11 February 2024
This article needs additional citations for verification. (February 2024) |
A protocol analyzer is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Each type of communication protocol has a different tool to collect and analyze signals and data.
Specific types of protocol analyzers include:
- A telecom network protocol analyzer
- A network packet analyzer such as Wireshark[1]
- A bus analyzer
- An IP load tester
References
[edit]- ^ "Using Wireshark for Packet Captures". Cisco. Meraki. June 8, 2022. Retrieved February 11, 2024.