
tools.sniffer..README.txt.swp Maven / Gradle / Ivy
b0VIM 6.2 %l ? | M. Ranganathan RANGA c:\home\eclipse\workspace\jain-sip\src\tools\sniffer\README.txt 3210#"! U tp ? D ad ' K D ? ? s / ? ? ? ? a ` ?
?
?
?
j
5
? ? ? ? ? ? e G - , ? ? ? ? h ?
?
?
?
?
?
f
e
V
U
C
? ? ? i + * ? ? ? ? ? E ? ? ? ? M L K J ---------------------------------------------------------------------- M. Ranganathan . of Colorado, Boulder. Minor modifications to the code were made by Protocols, taught by Professor Douglas C. Sicker, Ph.D. at the University This code was completed as part of a class project in TLEN 5843 Singaling This code was contributed by Tim Bardzil . Acknowledgement: ---------------------------------------------------------------------- The sniffertrace to visualize is in a file called pingtel.txt see the make target "test" in this directory. For an example of how to invoke the visualizer tool, ../../ tools.sniffer.SniffFileParser sniffertrace ../../../lib/antlr/antlrall.jar;../../../lib/xerces/xerces.jar: \ java -classpath \ Under windows: ../../ tools.sniffer.SniffFileParser sniffertrace ../../../lib/antlr/antlrall.jar:../../../lib/xerces/xerces.jar: \ java -classpath \ Under Unix: 2. To visualize the sniffer trace: the instructions above ( the file is referred to as sniffertrace below ). 1. Capture SIP Messages using an ethereal sniffer into a file by following Now you can visualize the trace as a call flow: ---------------------------------------------------------------------- tethereal port 5060 -V used to capture SIP messages: Ethereal also comes with a command line version (tethereal) that may be 10) Your done 9) Click "OK" c) "Expand all levels" b) "Print detail" a) "Plain Text" 9) Make sure the following are selected: 8) Under "File:" type the file name for this capture 7) Go to File->Print 6) Capture packets, press "Stop" when finished 5) Click "OK" 4) Under "Filter:" type "port 5060" 3) Go to Capture->Start 2) Launch Ethereal (winpcap.polito.it) 1) Download and install Ethereal (www.ethereal.com) and WinPcap To Capture traces using the ethereal sniffer: ---------------------------------------------------------------------- and make sense of. and separates calls by callId, thus making the trace easier to read trace as a call flow. The call flow matches requests and responses by the trace viewer and then invokes the trace viewer to display the A utility that converts Ethereal Frames into a format that can be used
© 2015 - 2025 Weber Informatics LLC | Privacy Policy