pcap_to_ts
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pcap_to_ts [2016/12/14 21:42] – walkeradmin | pcap_to_ts [2023/03/09 22:35] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== PCAP to TS ====== | ====== PCAP to TS ====== | ||
+ | <color orange> | ||
+ | ---- | ||
+ | \\ | ||
+ | Sometimes it is useful to capture the video streams we are generating (or someone else is generating) that are present on the network. Using a Dektec is useful here, however we don't always have the opportunity to use an analyser. | ||
+ | \\ | ||
+ | \\ | ||
+ | For example, if you want to capture the input or the output of the MFEL, you cannot use a Dektec if the unit is remote. But you can use a tool preinstalled on the MFEL called <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | tcpdump creates the same <color red> | ||
+ | \\ | ||
+ | \\ | ||
---- | ---- | ||
+ | |||
+ | ==== Using tcpdump to create .pcap files ==== | ||
\\ | \\ | ||
+ | tcpdump is a tool to capture IP Packets at a command line level, its similar to the PCAP used by Wireshark (Wireshark is just a GUI to control PCAP). I say just a GUI, its rather good and saying it is ' | ||
\\ | \\ | ||
- | <color red>This page is incomplete</ | ||
\\ | \\ | ||
+ | On the MFEL, we can use tcpdump to capture either the <color red>IP Input</ | ||
\\ | \\ | ||
- | Sometimes it is useful to capture the video streams we are generating (or someone else is generating) that are present on the network. Using a Dektec is useful here, however we don't always have the opportunity to use an analyser. | ||
\\ | \\ | ||
+ | To capture an IP Output (ensure you have started your service) use the following example. The following example is for eth2, where a multicast exists on 239.0.12.1 port 1234. | ||
\\ | \\ | ||
- | For example, if you want to capture the input or the output of the MFEL, you cannot use a Dektec if the unit is remote. But you can use a tool preinstalled on the MFEL called <color red> | ||
\\ | \\ | ||
+ | The format for tcpdump is - tcpdump -i < | ||
+ | tcpdump -i eth2 -B 64000 dst host 239.0.12.1 and port 1234 and multicast -w / | ||
+ | |||
+ | | ||
+ | Example: | ||
+ | tcpdump -i eth2 -B 64000 dst host 239.0.100.1 and port 1234 and multicast -w / | ||
+ | |||
+ | |||
+ | if the syntax is correct, the tcpdump will start: | ||
+ | tcpdump: listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes | ||
\\ | \\ | ||
- | tcpdump creates | + | running |
\\ | \\ | ||
\\ | \\ | ||
+ | Pressing <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | < | ||
+ | 119658 packets captured | ||
+ | 119663 packets received by filter | ||
+ | 0 packets dropped by kernel | ||
+ | </ | ||
+ | \\ | ||
+ | The capture is a <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | |||
+ | ---- | ||
+ | ==== Convert .pcap to .ts ==== | ||
+ | <color red>This is done on your computer, not on the MFEL</ | ||
+ | \\ | ||
+ | \\ | ||
+ | Having created a .pcap file means we have all of the information we need to replay and analyse any captured stream. However before we access the stream we need to extract the Transport Stream from the .pcap file and save it as a .ts. | ||
+ | \\ | ||
+ | \\ | ||
+ | There is a tool available called <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | Download the extractor file here {{ : | ||
+ | \\ | ||
+ | \\ | ||
+ | Before we extract the TS data, we need to know what the <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | To use the extractor, use the following syntax: | ||
+ | \\ | ||
+ | extractor source_file.pcap output.ts multicast port | ||
+ | \\ | ||
+ | If I have a source file called <color red> | ||
+ | \\ | ||
+ | \\ | ||
+ | extractor mfel.pcap mfel.ts 239.0.12.1 1234 | ||
+ | | ||
+ | If successful then you will see an output | ||
+ | |||
+ | SkyStream Networks sniffer-to-MPEG Extractor Utility | ||
+ | Built May 5 2005 11:29:37 | ||
+ | | ||
+ | File had 119658 packets, 119658 extracted | ||
+ | \\ | ||
+ | The number of packets will change of course, but you should now have an extracted TS file. | ||
+ | \\ | ||
+ | \\ | ||
+ | <color red> When using tcpdump, after capture you will get a packet count, when using extractor the packet count should be around the same, if not then the extract did not do the entire file.</ | ||
+ | \\ | ||
+ | ---- | ||
+ | ==== And Finally... ==== | ||
+ | See the FFMPEG section where you can convert .ts files to .mpg files (great for converting captures for replay on TVs via USB).[[ffmpeg|FFMPEG]] | ||
pcap_to_ts.txt · Last modified: 2023/03/09 22:35 by 127.0.0.1