Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
I am working on a fleet management system that track a fleet fo ambulance using tracking device "Teltonika FMXXXX".
The system should finally operate almost 1400 ambulance, recording their history (Position, speed, ...) and online tracking.
I need to do a stress test on the server. I need to ensure that the 1400 devices will operate probably and the server can handle them.
I need to know how to simulate 1400 devices that send there data packet through TCP protocol?
The only way to do this is to write a basic teltonika GSM-GPS module emulation program that connects to your server and send some fake location etc as many times as you want.
In order to do that you have to read your FM-xxxxx device protocol and see how teltonika's protocol works.
Usually those kind of device protocols are proprietary and you have to ask the ventor (teltonika) to provide you more info about the protocol, in order to implement the whole communication scenario.
you can take a look at this pdf Teltonika FM Protocol
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
I can't believe no one ever did this, but I'm searching for days now and haven't found anything.
I have just bought a Raspberry Pi 4 and would like to use it as a wifi access point (for information, I will probably install Gentoo with hostapd in it).
I would like this access point to be in “passive” mode, only listening to new devices and not emitting beacon when there is no station connected to it. I looked at hostapd configuration file, but I could not find anything suitable.
I wonder if I can, by order of preference:
find a configuration option to manage this automatically;
be able to automatically capture connection/disconnection events and switch beacon on/off using a bit of shell scripting;
if nothing else is available, modify a driver or an application to add this no beacon idle mode.
Have someone ever heard of a way to do this?
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I want to monitor bittorent traffic in my LAN. I used wireshark for that. But I couldn't able to find packets by using wireshark. But can monitor with UDP port number
we can use colasoft packet analyzer. It helps to monitor P2P traffic. Since Skype uses p2p.
Visit http://www.colasoft.com/.
Yeah, I agree. One of Colasoft Capsa 7.8's new features is VOIP analysis.
Below is what I found on their site.
"Capsa 7.8 provides a VoIP analysis module to capture and analyze VoIP calls and graphically display VoIP analysis results, which helps IT staff baseline and troubleshoot VoIP-based networks.
A VoIP view is provided to list all VoIP calls as well as their related statistics and has a lower pane for analyzing voice and video control flows and media flows as well as their jitter, loss, MOS, etc., to visualize analysis data and assess voice and video quality."
source: http://www.colasoft.com/capsa/whatsnew.php
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
I use an Linux Server for nat device.
Currently it looks like [PC1,2,3]--[Linux]--[Internet]
There is no issue at all , but I'm curious about , when I open a service (ex: FTP WWW ) on my PC1 , did my [Linux] also opened a port service on it ?
I did trace code for the
CONFIG_NF_CONNTRACK_FTP
CONFIG_NF_NAT_FTP
but I cant find related code about port open.
Thanks for your read.
There are various techniques used the make a router/firewall automatically forward ports to its clients. For example there are some protocols like: IGD, NAT-PMP et similia.
But those protocol need to be implemented both on router and on client. So automatic port-mapping won't work out of the box in many cases.
The lines in kernel config you are referring to CONFIG_NF_CONNTRACK_FTP CONFIG_NF_NAT_FTP are used for another reason: due to the fact that FTP protocol use two different tcp streams for comunication (one of which does not have to be "listened" by the server) your firewall needs extra "effort" to track the connection and act accordingly.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
I was wondering about the following: if I access another Computer over a video stream, (maybe like remote desktop), could the NSA read the websites and texts from that stream, even though only video is transmitted?
thanks!
Remote Desktop, as in RDP does not stream video. Unlike other remote desktop software, RDP actually uses kernel level access which is why RDP is so much smoother than a lot of the software that uses images.
RDP is vulnerable to man-in-the-middle attacks, but this is pretty unlikely to happen to you unless you are a highly valuable target. You can use SSL to prevent this sort of thing.
Regardless of all of that, your question seems to be about image-based remote desktop. You are, I think, correct in your assumption that the images are difficult to read vs. just intercepting plain text/html/etc. If the transmission was intercepted, they could "play it back" if it was not encrypted, and see what happened. The thing is, even the transmission between you and the remote host are secure - what about the transmission between the host and the internet? It is likely that whatever you are doing can be traced to the host, and then to you.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 3 years ago.
Improve this question
I m new to the computer networking.
I came across two terms FIREWALL and packet sniffer.
To me the operation wise both appears to be same.Please clarify
Firewall
A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not
Sniffer
A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network
By the way you can also check wikipedia...