Wireshark-dev: Re: [Wireshark-dev] Dificulties in dissecting some packets
Date: Wed, 13 Dec 2006 16:51:12 +0100
hi,

  may you format you mail in an other way, please?

Selon taraniteja.vishwanatha@xxxxxxxxx:

>
> Hi ,
>
> I have encountered some problems when dissecting the packets for a
> protocol.I am mentioning 3 different scenarios
>
>
>
> 1.
>
> In the below case , the octet is split into parts and each part viz x ,
> y and z take different values.
>
> I am not able to understand how to go about it.
>
>
>
>                                                             PARAMETER 1
>
>
> 7
>
> 6
>
> 5
>
> 4
>
> 3
>
> 2
>
> 1
>
> 0
>
> octet
>
> X
>
> Y
>
> Z
>
> 3
>
> Number of Digits
>
> 4
>
> Digit 2
>
> Digit 1
>
> 5
>
> Digit 4
>
> Digit 3
>
> 6
>
> Digit 2n
>
> Digit 2n-1
>
> n+4
>
> SUB PARAMETER X
>
> Value
>
> Description
>
> 0
> 1
>
> aaa
> bbb
>
>
>
>                                           SUB PARAMETER Y
>
> Value
>
> Description
>
> 0
> 1
>
> 2
>
> 3
>
> A
> B
>
> C
>
> D
>
>
>
>
>
> 2.
>
> In the parameter mentioned below the value  may come in a range,. How
> can we dissect such values??
>
>
>
>
> PARAMETER 2
>
> Value
>
> Description
>
> 0
> 1-10
> 10-255
>
> Not used
> xxx
> yyy
>
>
>
>
>
>
>
>
>
> 3.
>
> In the following parameter, the value of each bit indicates if the
> assosiated version is currently used or not.
>
>
>
> Value 0 :  not used
>
> Value 1 : used
>
>
> PARAMETER 3
>
> Bit7
>
> Bit6
>
> Bit5
>
> Bit4
>
> Bit3
>
> Bit2
>
> Bit1
>
> Bit0
>
> octet
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Is it possible to include such informations, which depend upon whether a
> bit is set or not ,  in the dissector .
>
>
>
> Regards ,
>
> Tarani
>
>
>
>
> The information contained in this electronic message and any attachments to
> this message are intended for the exclusive use of the addressee(s) and may
> contain proprietary, confidential or privileged information. If you are not
> the intended recipient, you should not disseminate, distribute or copy this
> e-mail. Please notify the sender immediately and destroy all copies of this
> message and any attachments.
>
> WARNING: Computer viruses can be transmitted via email. The recipient should
> check this email and any attachments for the presence of viruses. The company
> accepts no liability for any damage caused by any virus transmitted by this
> email.
>
> www.wipro.com