Tag: networking

Demystifying Serial Tunneling

In this article, we’ll explain Serial Tunneling and how this powerful capability uses Ethernet to connect two or more separated serial end-points. We’ll also introduce

Read More »
MOD5441X SOM

NetBurner Product Spotlight: MOD5441x Family

The MOD5441X family of Single and Dual Ethernet Core Modules provide an incredible amount of capability, versatility, and reliability in a small form-factor and price. The MOD5441X allows you to add Ethernet connectivity to an existing device and even use it as your device’s embedded core processor.

Read More »

Live Packet Sniffing With an Embedded Module

Now Streaming!

SniPCAP is improved and now streaming!

As it was mentioned in the first article, SniPCAP had a lot of room to improve on. The following lists the basic functionalities of SniPCAP:

  • audit information
  • monitor bandwidth usage
  • diagnose problems or bottlenecks in the network
  • discover devices on the network
  • detect network intrusion through packet analysis
  • convert network traffic into a user readable format
  • log traffic

The previous version of SniPCAP was only a minimum product that temporarily captured a small amount of data; increased scalability and better usability was a necessity (more details on the first part of this project could be found here). This article shows the development of a more scalable product on the NetBurner Module.

Read More »

Packet Sniffing with an Embedded Module

Use of a packet sniffer in government agencies has always been a controversial topic. You might ask, “what is packet sniffing and what can it do?” A packet sniffer is a software or hardware tool that can intercept and log traffic on an Ethernet network.

Read More »
network config

Modifying Network Configuration Settings at Run Time

Most applications at boot will get a DHCP or static IP address and not dynamically change between them. Once network configuration settings have been assigned, typically they remain until the device is reset. But sometimes the network configuration settings need to be configured and modified at run time. This article describes several ways to manipulate the network configuration at run time.

Read More »