edoardoColi
edoardocoli 1 year ago
parent c7675d1620
commit 55a4056580

@ -44,13 +44,20 @@ By leveraging the capabilities of Bash and TShark, the MAC Packet Analyzer scrip
Below we find some execution references:
<img src=https://github.com/edoardoColi/5G_Sandbox/blob/edoardoColi/images/MACshuffle/analyze_file.png width="105%" height="105%">
*Expected output for analyzing a capture file passed to the program in differents ways.*
<img src=https://github.com/edoardoColi/5G_Sandbox/blob/edoardoColi/images/MACshuffle/unicity_bounded_test.png width="105%" height="105%">
*Expected output for performing the same analysis as before but with combination of unicity flag and n flag to bound the number of packets analyzed.*
<img src=https://github.com/edoardoColi/5G_Sandbox/blob/edoardoColi/images/MACshuffle/versose_test.png width="105%" height="105%">
*Expected output for running the analysis using the verbose flag. More details are shown regarding the counts.*
<img src=https://github.com/edoardoColi/5G_Sandbox/blob/edoardoColi/images/MACshuffle/verbose_unicity_test.png width="105%" height="105%">
*Expected output for running the same analysis but accounting for duplicates.*
To perform a stream data analysis in a certain interface we can use the following command (in this case it's necessary to have tcpdump).
```
sudo tcpdump -i <interface> -U -w .MACprobe.tmp | ./MACshuffle.sh -p

Loading…
Cancel
Save