Network analysis Using Wireshark 4: Capture FiltersYoram Orzach
• By the end of this lesson, the participant will be able to:
▫ Understand basic capture filters
▫ Perform basic capture filtering
Used to define which packets are going to be captured (be
careful!!!)
What are Capture Filters
• Wireshark uses the libpcap filter language for capture filters
Network analysis Using Wireshark Lesson 3: locating wiresharkYoram Orzach
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issuesYoram Orzach
Network analysis Using Wireshark Lesson 12
By the end of this lesson, the participant will be able to:
▫ Perform bandwidth and throughput tests
▫ Measure applications throughput
▫ Understand the impact of delay and jitter on network applications
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017Yoram Orzach
• By the end of this lesson, the you will be able to:
▫ Understand the main menus and commands of Wireshark
▫ Start capturing data with the Wireshark software
▫ Configure basic parameters with Wireshark
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisYoram Orzach
Network analysis Using Wireshark Lesson
By the end of this lesson, the participant will be able to:
▫ Understand UDP and TCP network behavior
▫ Understand TCP connectivity problems
▫ Understand how to use Wireshark for TCP troubleshooting
Network Analysis Using Wireshark -Chapter 6- basic statistics toolsYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies.
By the end of this lesson, the participant will be able to:
▫ Understand the types of statistics tools available in Wireshark
▫ Perform network monitoring with these tools
Network Analysis Using Wireshark -10- arp and ip analysis Yoram Orzach
• By the end of this lesson, the participant will be able to:
▫ Understand ARP and IP
▫ Isolate and fix basic IP/ARP networking problems Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark 4: Capture FiltersYoram Orzach
• By the end of this lesson, the participant will be able to:
▫ Understand basic capture filters
▫ Perform basic capture filtering
Used to define which packets are going to be captured (be
careful!!!)
What are Capture Filters
• Wireshark uses the libpcap filter language for capture filters
Network analysis Using Wireshark Lesson 3: locating wiresharkYoram Orzach
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issuesYoram Orzach
Network analysis Using Wireshark Lesson 12
By the end of this lesson, the participant will be able to:
▫ Perform bandwidth and throughput tests
▫ Measure applications throughput
▫ Understand the impact of delay and jitter on network applications
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017Yoram Orzach
• By the end of this lesson, the you will be able to:
▫ Understand the main menus and commands of Wireshark
▫ Start capturing data with the Wireshark software
▫ Configure basic parameters with Wireshark
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisYoram Orzach
Network analysis Using Wireshark Lesson
By the end of this lesson, the participant will be able to:
▫ Understand UDP and TCP network behavior
▫ Understand TCP connectivity problems
▫ Understand how to use Wireshark for TCP troubleshooting
Network Analysis Using Wireshark -Chapter 6- basic statistics toolsYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies.
By the end of this lesson, the participant will be able to:
▫ Understand the types of statistics tools available in Wireshark
▫ Perform network monitoring with these tools
Network Analysis Using Wireshark -10- arp and ip analysis Yoram Orzach
• By the end of this lesson, the participant will be able to:
▫ Understand ARP and IP
▫ Isolate and fix basic IP/ARP networking problems Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network Analysis Using Wireshark Chapter 08 the expert systemYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...Yoram Orzach
Network analysis Using Wireshark
By the end of this lesson you will:
• Understand how to approach a network problem
• Understand the difference between GO-NOGO and
performance problems
• Understand the tools that assist us in the network
troubleshooting process
Network Analysis using Wireshark 5: display filtersYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network Analysis Using Wireshark Jan 18- seminar Yoram Orzach
Lesson objective:
By the end of this lesson you will:
Get an approach to network troubleshooting
Understand the wireshark software
understand how to use wireshark for network protocols troubleshooting
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Presented @ ISA Safety & Security Symposium 2012
Aneheim, CA, April 2012
Wireshark is the de facto network packet analysis tool used in the industry today. It is an easily extensible open–source tool that provides a large number of capabilities for users. It’s not just for IT–based protocols either. Many industrial protocols have created packet decoders for Wireshark. This tutorial will provide the user with:
* An introduction to protocol layering
* A basic overview of packet capture and analysis
* A demonstration of how Wireshark can be used for packet capture and analysis
* Examples of some industrial protocol in Wireshark
* An explanation of some more advanced features available in Wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
This chapter introduces the very basics of Wireshark - how to start packet capture, where to locate it in the network and how to configure basic operations. In chapter 3 we will learn how to configure capture and display filters.
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
1. Definition of SSL
2. component of SSL
3. Secure connection establishment process
4. Real SSL packet capture and analysis using Wireshark
5. Digital Certificate, digital signature, digital envelop
Network Analysis Using Wireshark Chapter 08 the expert systemYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...Yoram Orzach
Network analysis Using Wireshark
By the end of this lesson you will:
• Understand how to approach a network problem
• Understand the difference between GO-NOGO and
performance problems
• Understand the tools that assist us in the network
troubleshooting process
Network Analysis using Wireshark 5: display filtersYoram Orzach
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Network Analysis Using Wireshark Jan 18- seminar Yoram Orzach
Lesson objective:
By the end of this lesson you will:
Get an approach to network troubleshooting
Understand the wireshark software
understand how to use wireshark for network protocols troubleshooting
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
Presented @ ISA Safety & Security Symposium 2012
Aneheim, CA, April 2012
Wireshark is the de facto network packet analysis tool used in the industry today. It is an easily extensible open–source tool that provides a large number of capabilities for users. It’s not just for IT–based protocols either. Many industrial protocols have created packet decoders for Wireshark. This tutorial will provide the user with:
* An introduction to protocol layering
* A basic overview of packet capture and analysis
* A demonstration of how Wireshark can be used for packet capture and analysis
* Examples of some industrial protocol in Wireshark
* An explanation of some more advanced features available in Wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
This chapter introduces the very basics of Wireshark - how to start packet capture, where to locate it in the network and how to configure basic operations. In chapter 3 we will learn how to configure capture and display filters.
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
1. Definition of SSL
2. component of SSL
3. Secure connection establishment process
4. Real SSL packet capture and analysis using Wireshark
5. Digital Certificate, digital signature, digital envelop
BEng Final Year Project:
Used Cisco switches and routers to build a network for a company with two geographical sites. In this project, was tasked with identifying the requirements and designing a network architecture based on the 7 OSI Layer model and TCP/IP model for the corporation to share information and resource between two site locations. The following industrial networking protocols were used in designing the network:
- Virtual Local Area Network (VLAN)
- Hot Standby Router Protocol (HSRP)
- Load Balancing with Multi-VLANs HSRP (MHSRP)
- VLAN Trunking Protocol (VTP)
- Spanning Tree Protocol (STP)
- Access Control List (ACL)
- Network Address Translation (NAT)
Enhancing Network Visibility Based On Open Converged Network ApplianceOpen Networking Summit
Dr. Dongheon Lee' and Dr. Junho Suh's presentation from the 2017 Open Networking Summit.
As the mobile traffic carried by cellular networks has been growing rapidly and the networks gets bigger and more complex, network operators have been forced to search for solutions to substantially enhance network visibility. This talk introduces SKT integrated Network Analyzer (TiNA) and Converged Appliance Platform (T-CAP) which help us improving the efficiency of network operation, troubleshooting, and analyzing traffic. TiNA is composed of virtual network packet broker, flow analyzer, high speed packet dump system, connection performance analyzer, and 3D-based network management system. T-CAP is an open architecture of a server-switch type hardware. We will review how to implement those TiNA functions based on open source (e.g., DPDK, Spark Streaming) and T-CAP. Finally, we will also discuss about the use-cases of TiNA and T-CAP for the private cloud & telco network infrastructure.
For more course tutorials visit www.newtonhelp.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks.
There is an ominous rumbling in the internet about 768K day, some even termed it internet doomsday others called it “Y2K” of internet. The fear is justified given the experience of wide spread internet outage during 512K day when internet BGP table size exceeded 512,000 routes. The 512K day caused havoc and many routers simply exhausted of TCAM (Ternary content-addressable memory) size and were unable to process certain routes leaving parts of internet unreachable. The same issue seems possible this year again when internet routes exceeds 768K routes.
This gives an overall idea about wireshark design and how to capture packets using wireshark, tcpdump and tshark. It also covers basics behind measuring network performance and tools to use such as bmon and iperf.
Forward Networks - Networking Field Day 13 presentationForward Networks
On November 17th, 2016, Forward Networks conducted its first public unveiling of its Network Assurance platform at Networking Field Day 13. Visit https://www.forwardnetworks.com/ for more details.
eBrand Promotion Full Service Digital Agency Company ProfileChimaOrjiOkpi
eBrandpromotion.com is Nigeria’s leading Web Design/development and Digital marketing agency. We’ve helped 600+ clients in 24 countries achieve growth revenue of over $160+ Million USD in 12 Years. Whether you’re a Startup or the Unicorn in your industry, we can help your business/organization grow online. Thinking of taking your business online with a professionally designed world-class website or mobile application? At eBrand, we don’t just design beautiful mobile responsive websites/apps, we can guarantee that you will get tangible results or we refund your money…
Office Business Furnishings | Office EquipmentOFWD
OFWD is Edmonton’s Newest and most cost-effective source for Office Furnishings. Conveniently located on 170 street and 114 Avenue in Edmonton’s West End. We take pride in servicing a client base of over 500 corporations throughout the Edmonton and Alberta area. OFWD is in the business of satisfying the home or corporate office environment needs of our clients, from individual pieces of furniture for the home user to the implementation of complete turn-key projects on much larger scales. We supply only quality products from reputable manufacturers. It is our intention to continue to earn the trust of our clients by dealing with honesty and integrity and by providing service and after sales follow-up second to none.
Best steel industrial company LLC in UAEalafnanmetals
AL Afnan Steel Industrial Company LLC is a distinguished steel manufacturer and supplier, celebrated for its high-quality products and outstanding customer service. With a diverse portfolio that includes structural steel, and custom fabrications, AL Afnan meets a wide array of industrial demands. We are dedicated to using advanced technologies and sustainable methods to ensure excellence and reliability in every product, serving both local and international markets with efficiency.
Looking for a genuine company for your Spanish Marriage Certificate Attestation? It is an important step to prove the authenticity of a certificate for any purpose in Dubai. Attestation On Time in Dubai is the perfect choice for your Spanish Marriage Certificate Attestation.
Purpose of attesting your Spanish marriage Certificate:
- To apply for family visa
- To enroll your child at school
- Other legal purpose
Why Attestation On Time is your best choice?
- Expert guidance will be provided with complete attestation procedures
- Safety and authenticity are always our top priority and concern
- Fastest service provider in Dubai
- We offer live status updates of your certificates
- We accept certificate from anywhere in the world
Attest your certificates with the help of our attestation experts. Contact us now +971 555514789 /+971 42955338 or share your queries to info@attestationontime.com or visit our website www.attestationontime.com
Forex Copy trading is the mode of trading offering great opportunities to the traders lacking time or in-depth market knowledge, yet willing to use currency trading as a form of investment and to increase their initial funds.
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...RNayak3
Explore how a risk-based approach to Enhanced Due Diligence can deliver effective Anti-Money Laundering (AML) compliance and monitoring in banking and financial services.
Comprehensive Water Damage Restoration Serviceskleenupdisaster
Find out how Disaster Kleenup's professional water damage restoration services can quickly and efficiently restore your property. Find more about our advanced techniques and quick action plans. Visit here: https://iddk.com/disaster-cleanup-services/flood-damage/
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLsecurexukweb
At Securex UK Ltd we are dedicated to providing top-rated security solutions tailored to your specific needs. With a team of highly trained professionals and cutting-edge technology, we prioritize your safety and peace of mind.
Our commitment to excellence extends beyond traditional security measures. We understand the dynamic nature of security challenges, and our personalized approach ensures that every client receives a bespoke protection plan.
Merchants from high-risk industries face significant challenges due to their industry reputation, chargeback, and refund rates. These industries include sectors like gambling, adult entertainment, and CBD products, which often struggle to secure merchant accounts due to increased risks of chargebacks and fraud.
To overcome these difficulties, it is necessary to improve credit scores, reduce chargeback rates, and provide detailed business information to high-risk merchant account providers to enhance credibility.
Regarding security, implementing robust security measures such as secure payment gateways, two-factor authentication, and fraud detection software that utilizes machine learning systems is crucial.
Solar power panels, also known as photovoltaic (PV) panels, convert sunlight into electricity, offering a renewable and sustainable energy solution. Composed of semiconductor materials, typically silicon, these panels absorb photons from sunlight, generating an electric current through the photovoltaic effect. This clean energy source reduces dependence on fossil fuels, mitigates greenhouse gas emissions, and contributes to environmental sustainability.
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier. Come to our Trophy Shop today and check out all our variety of Trophies available. We have the widest range of Trophies in Malaysia. Our team is always ready to greet your needs and discuss with you on your custom Trophy for your event. Rest assured, you will be with the best Trophy Supplier in Malaysia. The official Trophy Malaysia. Thank you for your support.
Optimize your online presence as an interior designer in Delhi with tailored SEO strategies. Elevate visibility on search engines, ensuring your design prowess reaches the right audience. Craft engaging content that resonates with local clientele, incorporating relevant keywords and metadata. Harness the power of local SEO techniques to dominate search results, driving organic traffic and inquiries. Stay ahead in Delhi's competitive market by fine-tuning your digital footprint with effective SEO practices.
Discover How Long Do Aluminum Gutters Last?SteveRiddle8
Many people wonder how long aluminum gutters last. In this ppt, we will cover the lifetime of aluminum gutters, appropriate maintenance procedures, and the advantages of using this material for gutter installation.
DOJO Training Center - Empowering Workforce ExcellenceHimanshu
The document delves into DOJO training, an immersive offline training concept designed to educate both new hires and existing staff. This method follows an organized eight-step process within a simulated work setting. The steps encompass safety protocols, behavioral coaching, product familiarity, production guidelines, and procedural understanding. Trainees acquire skills through hands-on simulations and rehearsal prior to transitioning to actual shop floor duties under supervision. The primary aim is to minimize accidents and defects by ensuring employees undergo comprehensive training, preparing them effectively for their job roles.
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...Summerland Environmental
Welcome to the presentation on Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental. We will explore innovative methods and technologies for eco-friendly waste management.
Bridging the Language Gap The Power of Simultaneous Interpretation in RwandaKasuku Translation Ltd
Rwanda is a nation on the rise, fostering international partnerships and economic growth. With this progress comes a growing need for seamless communication across languages. Simultaneous interpretation emerges as a vital tool in this ever-evolving landscape. When seeking the best simultaneous interpretation in Rwanda, Kasuku Translation stands out as a premier choice.
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...RNayak3
Discover the profound impact of democratizing Generation AI on business transformation. Gain valuable insights into the reality check of AI implementation, strategic planning, and industry disruption. Explore how AI adoption, technology trends, and digital transformation reshape business strategies. Download the Report Now.
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
lesson 7- Network analysis Using Wireshark - advanced statistics tools
1. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 1
Network analysis Using Wireshark
Lesson 7:
Advanced Statistical Tools
2. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 2
• By the end of this lesson, the participant will be able to:
▫ Understand IO Graphs
▫ Understand TCP stream graphs
Lesson Objectives
3. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 3
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:
4. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 4
Creating I/O graphs
Creating TCP graphs
Evaluating service response times
Chapter Content
“In three words I can sum up everything I've
learned about life: it goes on.”
Robert Frost
5. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 5
The "I/O Graphs" window
6. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 6
The "I/O Graphs" window
Drag/Zoom
Time
interval
Time of
Day
Display
filter Y-Axis
Name
Add/Delete
graph
Logarithmic
scale
7. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 7
How to find what it is…
Zoom on peak
8. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 8
All traffic with specific filter (1)
9. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 9
All traffic with specific filter (2)
10. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 10
All traffic with specific filter (3)
11. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 11
Traffic with Specific Connections Filters
12. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 12
What DupACKs Can Cause
13. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 13
What We Measure Line/Port
User
Connection
PC
14. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 14
How to Measure it…
Right-click and
choose a filter
15. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 15
And to the IO Graphs: L3 Statistics
16. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 16
And to the IO Graphs: L3/4 Statistics
Where have all the
packets gone???
17. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 17
And some TCP Analysis (Window-full)…
~50 Window-full
events per second~5 Window-full events
per 0.1 seconds
18. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 18
IO Graphs – Changing the Y-Axis
19. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 19
IO Graphs – Changing the Y-Axis
20. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 20
Create I/O graphs
Create TCP graphs
Evaluate service response times
Chapter Content
“To live is the rarest thing in the world.
Most people exist, that is all.”
Oscar Wilde
21. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 21
TCP Stream Graphs
22. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 22
• There are four types of TCP graphs:
▫ Time-Sequence (Stevens) - TCP sequence numbers versus time
▫ Time-Sequence (tcptrace) - TCP sequence numbers versus time,
ACK values received from the other endpoint and the receive
window advertised from the other endpoint
▫ Round Trip Time – time between packet send and Ack
▫ Throughput – throughput measured by sequence numbers
▫ Window Scaling Graph – receiver window size
TCP Stream Graphs
23. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 23
Sequence Graphs
Click on the stream
(in the direction you
want to check!)
Choose:
Statistics – TCP
Stream Graphs
Choose
graph type Choose graph
direction
Choose stream
number
Zoom/move
24. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 24
Zooming On a stream
What happened
here?
What happened
here?
Change to drags for
choosing event
25. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 25
TcpTrace
Sequence
graph
Free receive
window
26. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 26
TcpTrace (with Focus)
Free receive
window
TCP
Segments
TCP Ack’s
Segment 1 Segment 2
Ack for segments 1+2
27. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 27
Just Another Example
28. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 28
TCP Graphs - Throughput
29. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 29
TCP Graphs - RTT
30. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 30
Create I/O graphs
Create TCP graphs
Evaluate service response times
Chapter Content
“Whenever you find yourself on the side
of the majority, it is time to reform (or
pause and reflect).”
Mark Twain
31. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 31
When applicable, choose Service Response Time from
Statistics menu
How to Evaluate
Use IO Graphs for specific
request/response (for
example DNS)
Use specific web sites, like
https://tools.pingdom.com/
32. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 32
Summary
• In this lesson we talked about:
▫ Wireshark’s IO graphs
▫ Wireshark’s TCP stream graphs
Thanks for your time
Yoram Orzach
yoram@ndi-com.com
33. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 33
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to: