skip to main content
10.1145/1007996.1008003acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
Article

Investigating wired and wireless networks using a java-based programmable sniffer

Published:28 June 2004Publication History

ABSTRACT

Teaching students about networking requires laboratory investigation into network data. Such investigation requires examination of both wired and wireless network data. Most available network traffic sniffers are either too expensive or too cryptic to use. To implement network experiments in a classroom setting, we have developed NetSpy: a Java-based network sniffer that allows plug-in Java modules to analyze network data. NetSpy works with both wired and wireless networks. Modules are written by students as part of their experimentation with traffic data. This paper describes the NetSpy system and the way it can be used in a Networking clas.

References

  1. Cota, J.T., Implementicion de un Monitor Analizador Grafico de Reden el Entorno Gnome, Final Report on the Etherape Project, University of Seville, Spain, July 2001.Google ScholarGoogle Scholar
  2. Etherape Software Repository, available online: http://etherape.sourceforge.net.Google ScholarGoogle Scholar
  3. PCAP Public Repository, available online: http://www-nrg.ee.lbl.gov.Google ScholarGoogle Scholar
  4. TCPDUMP Public Repository, available online: http://www.tcpdump.org.Google ScholarGoogle Scholar
  5. The Ethereal Network Analyzer, available online: http://www.zing.org.Google ScholarGoogle Scholar

Index Terms

  1. Investigating wired and wireless networks using a java-based programmable sniffer

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ITiCSE '04: Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education
      June 2004
      296 pages
      ISBN:1581138369
      DOI:10.1145/1007996

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 June 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate552of1,613submissions,34%

      Upcoming Conference

      ITiCSE 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader