Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Network Analysis using Wireshark 2 Cookbook
  • Toc
  • feedback
Network Analysis using Wireshark 2 Cookbook

Network Analysis using Wireshark 2 Cookbook

By : Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss
4.3 (6)
close
Network Analysis using Wireshark 2 Cookbook

Network Analysis using Wireshark 2 Cookbook

4.3 (6)
By: Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss

Overview of this book

This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you’ve learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you’ll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.
Table of Contents (20 chapters)
close

Introduction

One of the important things that you can use Wireshark for is application analysis and troubleshooting. When an application slows down, it can be because of the LAN (quite uncommon in a wired LAN), the WAN service (common due to insufficient bandwidth or high delay), or slow servers or clients (we will see this in the Database traffic and common problems section). It can also be due to slow or problematic applications.

The purpose of this chapter is to get into the details of how applications work, and provide some guidelines and recipes for isolating and solving these problems. In the first recipe, we will learn how to find out and categorize applications that work over our network. Then, we will go through various types of applications, see how they work, how the network influences their behavior, and what can go wrong.

In this chapter, we will learn how to use...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete