[ad_1]
A network tap is a device used to monitor activity on a section of a computer network line. It requires physical access to the network and can be used for legitimate or illegal purposes. Network administrators use taps to monitor user activity, while unauthorized use can lead to network interruption and legal consequences.
A network tap is a piece of hardware that allows monitoring of a computer network line. The tap is a physical device placed in a network environment that allows a user to monitor activity on a portion of the network. Installing one of these devices generally requires an outage or redirection of network service as lines are scrambled to make room for the device. While there are many legitimate reasons to use a net tap, there are also several illegal or unethical uses.
The vast majority of computer networks, including the Internet, consist mainly of devices connected to each other by wires. A network tap allows a person to monitor activity on a section of wire by physically inserting a tap device into the line. This term is similar to a phone tap, where a third party is able to listen to phone calls using a tap device.
In most cases, a network outlet consists of three ports. Two of the ports connect to the network cable being tapped: these are called ports A and B. One is an output for a monitoring device such as a computer or storage drive. Network ports usually require actual terminated cables. This is one of the biggest limitations when using a network tap.
Since ports A and B require a cable with a finite end, the places where the faucet can enter the system are very limited. Typically, a person can unplug a network cable from a hardware device such as a router or switch, plug it into the faucet, and run a new piece of cable into the hardware device. This means that the capper must have direct physical access to the intercepted network. If the tap is to be located remotely, the tapper must cut the cord and plug the ends before the device can be used.
In both cases, the network is temporarily disconnected while the faucet is placed. If the touch is unauthorized, this interruption could alert the network owner that a person is intruding on their network. Even if the interrupt is lost, the system can register the existence of a new passive hop on the network.
Network administrators often use network taps to monitor user activity and make sure the network is working as it should. This use of a network tap is within the rights of the network owner and is not an invasion of privacy, regardless of the information observed. On the other hand, some taps are made to steal personal information or learn passwords and login information for the intercepted system. This use is against the law in almost all cases.