Finally, after a great deal of effort and hard work, you have obtained
the results you were trying to get for such a long time. You may be
so busy (and tired) that you don’t even realize that you have indeed
achieved a certain measure of success. Perhaps it will take a fewmore
months before you can present your work at a conference or submit it
to a scientific journal.
SharpPcap c#抓包實現時時獲取網卡信息
SharpPcap tutorial: a step by step guide to using SharpPcap
The text of this tutorial is taken directly from WinPcap's official tutorial but is modified to show the C# use of the SharpPcap library. All examples can be downloaded together with SharpPcap source code from SharpPcap 's homepage. The WinPcap library must be installed before attempting to run any of these examples, so please download and install the latest version from WinPcap's download page.
SharpPcap was written and tested using .NET v1.1 and Windows 2000/XP. I have no idea about other .NET and Windows versions. If you do try it, please report your results.
The following topics are covered in this tutorial:
Obtaining the device list
Obtaining advanced information about installed devices
Opening an adapter and capturing packets
Capturing packets without the event handler
Filtering the traffic
Interpreting the packets
Handling offline dump files
Sending Packets
Gathering Statistics on the network traffic
1. Obtaining the device list
At the time of writing, and to an extent never seen before, there is an expectation that
almost any information or service that is available through communication systems in
the office or home will be available wherever the user happens to be. This is placing
incredible demands on wireless communications and has been the driver for the gen-
esis and deployment of three generations of cellular systems in the space of 20 years.
During the 400 days and nights before we finalized this book on January 1, 2012,
we saw the sunset decorated by the raindrop, and were accompanied by the flowers
blooming to withering. All those past memories are engraved on our hearts and will
last eternally, cementing the most profound friendship in the world.
At the macroscopic level of system layout, the most important issue is path loss. In the
older mobile radio systems that are limited by receiver noise, path loss determines SNR and
the maximum coverage area. In cellular systems, where the limiting factor is cochannel
interference, path loss determines the degree to which transmitters in different cells interfere
with each other, and therefore the minimum separation before channels can be reused.
The insinuation of telecommunications into the daily fabric of our lives has been
arguably the most important and surprising development of the last 25 years. before
this revolution, telephone service and its place in our lives had been largely stable
for more than a generation. The growth was, so to speak, lateral, as the global reach
of telecommunications extended and more people got telephone service. The
distinction between oversea and domestic calls blurred with the advances in
switching and transmission, undersea cable, and communication satellites. Traffic
on the network remained overwhelmingly voice, largely in analog format with
facsimile (Fax) beginning to make inroads.
before delving into the details of orthogonal frequency division multiplexing (OFDM), relevant
background material must be presented first. The purpose of this chapter is to provide the necessary
building blocks for the development of OFDM principles. Included in this chapter are reviews of stochastic
and random process, discrete-time signals and systems, and the Discrete Fourier Transform (DFT). Tooled
with the necessary mathematical foundation, we proceed with an overview of digital communication
systems and OFDM communication systems. We conclude the chapter with summaries of the OFDM
wireless LAN standards currently in existence and a high-level comparison of single carrier systems versus
OFDM.
before I can present design concepts or tactical wireless communications and network
challenges, I feel the need to mention the challenges of writing for a field where some
information is not available for public domain and cannot be included in this book’s context.
Another challenge is the use of military jargon and the extensive number of abbreviations
(and abbreviations of abbreviations!) in the field. Engineering books are naturally dry, and I
have attempted to make it light by presenting the concepts in layman’s terms before diving
into the technical details. I am structuring this book in such a way as to make it useful for
a specialized graduate course in tactical communications and networking, or as a reference
book in the field.
As a student I did my best to avoid text books – a strange statement for a Professor to make and one that
I should clarify before you put this book down; I did my best to avoid text books that did not help me.
A few years ago I stood before an audience at a customer’s facility
explaining the merits of micromachining technology. The small
conference room was packed, and all ears were attentive. Everyone was
eager to learn about thismysteriousbuzzword, “MEMS.”Although many
in the audience were nodding in a sign of comprehension, the glazed
lookson their facesbetrayed them. Thisexperience isnot unique, but one
that isrepeated frequently in auditoriumsaround the world.