You are on page 1of 16

http://www.citlindia.com/VARSITY/liveproj ectdetails.

html
ETHERNET BASED EMBEDDED SYSTEM DESIGN FOR INDUSTRIAL CONTROL AND MONITORING APPLICATIONS. DESIGN & APPLICATION OF EMBEDDED SYSTEM BASED ON ARM 7 PROCESSOR IN TELE MEDICINE F ETHERNET DATA ACQUISITION & CONTROL SYSTEM. USING ARM 7 CONTROLLERS. BIO MEDICAL NETWORK TRANSACTIONS SECURED COMMUNICATION IMPLEMENTATION OF INDUSTRIAL ETHERNET COMMUNICATION BASED ON EMBEDDED SYSTEM ON ARM9 PROCESSOR .

For networking the entire company or campus

The network of the future Cloud Computing, Internet of Services and Advanced Software Engineering Internet-connected objects Trustworthy ICT Networked Media and Search Systems Socio-economic considerations for the Future Internet Application domains for the Future Internet

Future Internet Research and Experimentation (FIRE)

Future scope

Wireshark
From Wikipedia, the free encyclopedia Wireshark

Wireshark GUI Developer(s) Stable release Preview release Written in Type License Website The Wireshark team 1.6.4[1] / November 18, 2011; 2 days ago 1.7.0[2] / November 8, 2011; 12 days ago C Packet analyzer GNU General Public License www.wireshark.org

Operating system Cross-platform

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues. Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets; it runs on various Unix-like operating systems including Linux, Mac OS X, BSD, and Solaris, and on Microsoft Windows. There is also a terminalbased (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.

Contents

1 Functionality 2 History 3 Features 4 Security 5 Notes 6 References 7 External links

[edit] Functionality
Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options. Wireshark allows the user to put the network interfaces that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic. However, when capturing with a packet analyzer in promiscuous mode on a port on a network switch, not all of the traffic traveling through the switch will necessarily be sent to the port on which the capture is being done, so capturing in promiscuous mode will not necessarily be sufficient to see all traffic on the network. Port mirroring or various network taps extend capture to any point on net; simple passive taps are extremely resistant to malware tampering. On Linux, BSD, and Mac OS X, with libpcap 1.0.0 or later, Wireshark 1.4 and later can also put Wi-Fi adapters into monitor mode.

[edit] History
In the late 1990s, Gerald Combs, a computer science graduate of the University of MissouriKansas City, was working for a small ISP. The commercial protocol analysis products at the time were priced around $1500[3] and did not run on the company's primary platforms (Solaris and Linux), so Gerald began writing Ethereal and released the first version around 1998.[4] The Ethereal trademark is owned by Network Integration Services. In May 2006, Combs accepted a job with CACE Technologies. Combs still held copyright on most of Ethereal's source code (and the rest was re-distributable under the GNU GPL), so he used the contents of the Ethereal Subversion repository as the basis for the Wireshark repository. However, he did not own the Ethereal trademark, so he changed the name to Wireshark.[5] In 2010 Riverbed Technology purchased CACE[6] and took over as the primary sponsor of Wireshark. Ethereal development has ceased, and an Ethereal security advisory recommended switching to Wireshark.[7] Wireshark has won several industry awards over the years,[8] including eWeek,[9] InfoWorld,[10][11] and PC Magazine.[12] It is also the top-rated packet sniffer in the Insecure.Org network security tools survey[13] and was the SourceForge Project of the Month in August 2010.[14] Combs continues to maintain the overall code of Wireshark and issue releases of new versions of the software. The product website lists over 500 additional contributing authors.

[edit] Features
Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Wireshark uses pcap to capture packets, so it can only capture the packets on the types of networks that pcap supports.

Data can be captured "from the wire" from a live network connection or read from a file that recorded already-captured packets. Live data can be read from a number of types of network, including Ethernet, IEEE 802.11, PPP, and loopback. Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, TShark. Captured files can be programmatically edited or converted via command-line switches to the "editcap" program. Data display can be refined using a display filter. Plug-ins can be created for dissecting new protocols. VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding, the media flow can even be played. Raw USB traffic can be captured with Wireshark.[15]This feature is currently available only under Linux.

Wireshark's native network trace file format is the libpcap format supported by libpcap and WinPcap, so it can exchange files of captured network traces with other applications using the same format, including tcpdump and CA NetMaster. It can also read captures from other network analyzers, such as snoop, Network General's Sniffer, and Microsoft Network Monitor.

[edit] Security
Capturing raw network traffic from an interface requires elevated privileges on some platforms. For this reason, older versions of Ethereal/Wireshark and tethereal/TShark often ran with superuser privileges. Taking into account the huge number of protocol dissectors that are called when traffic is captured, this can pose a serious security risk given the possibility of a bug in a dissector. Due to the rather large number of vulnerabilities in the past (of which many have allowed remote code execution) and developers' doubts for better future development, OpenBSD removed Ethereal from its ports tree prior to OpenBSD 3.6.[16] Elevated privileges are not needed for all of the operations. For example, an alternative is to run tcpdump, or the dumpcap utility that comes with Wireshark, with superuser privileges to capture packets into a file, and later analyze the packets by running Wireshark with restricted privileges. To make near real time analysis, each captured file may be merged by mergecap into growing file processed by Wireshark. On wireless networks, it is possible to use the Aircrack wireless security tools to capture IEEE 802.11 frames and read the resulting dump files with Wireshark. As of Wireshark 0.99.7, Wireshark and TShark run dumpcap to do traffic capture. On platforms where special privileges are needed to capture traffic, only dumpcap needs to be set up to run with those special privileges: neither Wireshark nor TShark need to run with special privileges, and neither of them should be run with special privileges

1.1. What is Wireshark?

Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what's going on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on inside an electric cable (but at a higher level, of course). In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed. Wireshark is perhaps one of the best open source packet analyzers available today.
1.1.1. Some intended purposes

Here are some examples people use Wireshark for:


network administrators use it to troubleshoot network problems network security engineers use it to examine security problems developers use it to debug protocol implementations people use it to learn network protocol internals

Beside these examples, Wireshark can be helpful in many other situations too.
1.1.2. Features

The following are some of the many features Wireshark provides:


Available for UNIX and Windows. Capture live packet data from a network interface. Display packets with very detailed protocol information. Open and Save packet data captured. Import and Export packet data from and to a lot of other capture programs. Filter packets on many criteria. Search for packets on many criteria. Colorize packet display based on filters. Create various statistics. ... and a lot more!

However, to really appreciate its power, you have to start using it. Figure 1.1, Wireshark captures packets and allows you to examine their content. shows Wireshark having captured some packets and waiting for you to examine them. Figure 1.1. Wireshark captures packets and allows you to examine their content.

1.1.3. Live capture from many different network media

Wireshark can capture traffic from many different network media types - and despite its name - including wireless LAN as well. Which media types are supported, depends on many things like the operating system you are using. An overview of the supported media types can be found at: http://wiki.wireshark.org/CaptureSetup/NetworkMedia.
1.1.4. Import files from many other capture programs

Wireshark can open packets captured from a large number of other capture programs. For a list of input formats see Section 5.2.2, Input File Formats.

1.1.5. Export files for many other capture programs

Wireshark can save packets captured in a large number of formats of other capture programs. For a list of output formats see Section 5.3.2, Output File Formats.
1.1.6. Many protocol decoders

There are protocol decoders (or dissectors, as they are known in Wireshark) for a great many protocols: see Appendix B, Protocols and Protocol Fields.
1.1.7. Open Source Software

Wireshark is an open source software project, and is released under the GNU General Public License (GPL). You can freely use Wireshark on any number of computers you like, without worrying about license keys or fees or such. In addition, all source code is freely available under the GPL. Because of that, it is very easy for people to add new protocols to Wireshark, either as plugins, or built into the source, and they often do!
1.1.8. What Wireshark is not

Here are some things Wireshark does not provide:

Wireshark isn't an intrusion detection system. It will not warn you when someone does strange things on your network that he/she isn't allowed to do. However, if strange things happen, Wireshark might help you figure out what is really going on. Wireshark will not manipulate things on the network, it will only "measure" things from it. Wireshark doesn't send packets on the network or do other active things (except for name resolutions, but even that can be disabled).

Dnw tool
Install Linux on mini2440 board

The steps install: Format NAND Flash -> install boot loader vboot -> install Linux kernel -> install root file system. Done. Step 1: Format NAND Flash On Hyper Terminal, press 'x' key, then 'f' key. Step 2: Install boot loader On Hyper Terminal, press 'v' key.

Then on DNW tool, choose USB Port> Transmit/Restore, choose vboot.bin on directory of images\linux on CD.(This transmitting file is very fast)

Step 3: Install Linux kernel On Hyper Terminal, press 'k' key. Then on DNW tool, choose USB Port> Transmit/Restore, choose zImage_T35 on directory of images\linux on CD.(This transmitting file takes about 5 seconds)

Step 4: Install root file system On Hyper Terminal, press 'y' key. Then on DNW tool, choose USB Port> Transmit/Restore, choose root_qtopia-128M.img on directory of images\linux on CD.(This transmitting file takes about 1 minute). ---------------------------------------------------------------------------------------------Okay, now you go to Hyper Terminal and press 'b' to start linux on mini2440 board. If every thing is right, it should be started as you saw. After booting by Hyper Terminal, you can switch S2 into NAND side and press reset button to start Linux again.

Install Linux into mini2440 board Connect the board with the computer.

After receiving the board from manufacturer, it has already Linux OS on target board. However, we should know how to install it for the case the OS is ruin. I used laptop that installed WindowXP to connect with the mini2440 board.

Step1: Connect comport from mini2440 board to laptop. Because the laptop does not have comport, we use com-usb adapter. So we should install driver for com-usb adpter. My adapter has a form like this, and its driver is here http://www.mediafire.com/?1r4461tbig0445r

After installed driver and pluged it into laptop, it should show the information about com-usb adapter in Device Manager as in above picture.

Step2: connect usb port from mini2440 to computer (using a white usb cord).

Step3: connect power and switch S2 into NOR side. Switch power on.

Install the tool on WindowXP

After switched power on, the WindowXP will ask for driver usb, go to the directory of CD (that is shipped with the board) Windows_platform_tool\usb_download_driver, click on FriendlyARM USB Download Driver Setup_20090421.exe to install driver for usb connection.

Go to Windows_platform_tool\dnw (on CD), click on dnw.exe, the dnw tool will open. If the usb connection is right, it should show [USB:OK] as in follow picture.

Next, click on Start> Programs> Accessories> Communications> Hyper Terminal, then follow this:

Note that, COM1 is used because the usb-com adapter is on COM1 (it could be checked on Device Manager) After those steps, now you press reset button on mini2440 board, it should show the menu like this on super terminal

If you have done, you should save this hyper terminal for next time using. Okay, everything is ready for installing Linux into mini2440.

Install Linux on mini2440 board

The steps install: Format NAND Flash -> install boot loader vboot -> install Linux kernel -> install root file system. Done.

Step 1: Format NAND Flash On Hyper Terminal, press 'x' key, then 'f' key.

Step 2: Install boot loader On Hyper Terminal, press 'v' key. Then on DNW tool, choose USB Port> Transmit/Restore, choose vboot.bin on directory of images\linux on CD.(This transmitting file is very fast)

Step 3: Install Linux kernel On Hyper Terminal, press 'k' key. Then on DNW tool, choose USB Port> Transmit/Restore, choose zImage_T35 on directory of images\linux on CD.(This transmitting file takes about 5 seconds)

Step 4: Install root file system

On Hyper Terminal, press 'y' key. Then on DNW tool, choose USB Port> Transmit/Restore, choose root_qtopia-128M.img on directory of images\linux on CD.(This transmitting file takes about 1 minute).

----------------------------------------------------------------------------------------------

Okay, now you go to Hyper Terminal and press 'b' to start linux on mini2440 board. If every thing is right, it should be started as you saw. After booting by Hyper Terminal, you can switch S2 into NAND side and press reset button to start Linux again. Posted by phucxu at 8:50 AM Email ThisBlogThis!Share to TwitterShare to Facebook 25 comments:

nikhil said...

How to port zImage from fedora (instead of windows) to mini2440 board.Thanks in advance..
May 27, 2011 3:07 AM

phucxu said...

Hi nikhil. To install for mini2440 in Linux environment (e.g. Ubuntu, Fedora), you need tool called s3c2410_boot_usb. You could download it through given link, it also contain vboot, kernel and file system that I install successful for mini2440 by using Ubuntu. Link here: http://www.mediafire.com/?b0v2g6bkdhycuve ---------------------------step1: toggle switch into NOR section, connect usb, COM-port to computer. Open 2 terminal, the first connect to "minicom", the second open the folder you've downloaded above. ---------------------------step2: erase NAND flash by [x] and [f] option ---------------------------step3: on first terminal, choose [v] to port boot loader on second terminal, type command: ./s3c2410_boot_usb vboot.bin wait... until upload finish, it will complain there is no error. ---------------------------step4: on first terminal, choose [k] to port kernel on second terminal, type command: ./s3c2410_boot_usb zImage2 wait... until upload finish. ---------------------------step5: on first terminal, choose [y] to port file system. on second terminal, type command: ./s3c2410_boot_usb root_qtopia-128M-T35.img wait...again...^^ ---------------------------Okay, now turn switch into NAND section, reset the board. The system will run then. I did it successful by this way. Good luck

You might also like