SlideShare a Scribd company logo
1 of 15
Sample Network Analysis Report
Report Information
Report created on 12/31/2013 4:37:16 PM.
Analyst Information
Name Sample Analysis Report
E-mail Address info@chappellu.com
Phone Number 408-378-7841
Client Information
Client Name Chappell University
Case Number 03A543
Table of Contents
IP Conversations 3
IP Conversations 4
Bandwidth Over Time 5
Bytes per Second 6
Bits per Second 7
Packets per Second 8
Bandwidth Over Time (2) 9
Bytes per Second 10
Bits per Second 11
Packets per Second 12
TCP Errors Overview 13
TCP Errors Over Time 14
Total TCP Errors
Relative Number of Errors 15
IP Conversations
Conversations among IP hosts
Applied on 12/31/2013 4:04:17 PM.
Total capture window: 11/15 18:03:00.533697 - 18:04:30.533697.
Current selection: 11/15 18:03:00.533697 - 18:04:30.533697 (90 s at 1 sec).
Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng
File Time: 12/31/2013 4:03:25 PM
File Size: 54525KB
Checksum ():
IP Conversations
VIEW NOTES:
IP host conversations. The size of the host is relative to the amount of data it has transmitted. The size of each
connection is relative to how much traffic it has transported between the two endpoints (hosts).
OTHER NOTES:
This trace file contains two conversations. We have two interanl hosts that are downloading a file from a
remote host. In this report we will refer to the local hosts by the last two bytes of their IP addresses - 1.72 and
1.119. We will refer to the remote server as simply "the remote server."
Figure 1 - IP Conversations
Bandwidth Over Time
Total bandwidth over time
Applied on 12/31/2013 4:06:08 PM.
Total capture window: 11/15 18:03:43.415340 - 18:04:30.415340.
Current selection: 11/15 18:03:43.415340 - 18:04:30.415340 (47 s at 1 sec).
Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng
File Time: 12/31/2013 4:03:25 PM
File Size: 54525KB
Checksum ():
Drilldown Sequence:
1. Applied the view "IP Conversations"
2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details:
Selected: 200.236.31.1 - 192.168.1.119
3. Applied the view "Bandwidth Over Time"
Bytes per Second
The number of bytes per second.
Figure 2 - Bytes per Second
Bits per Second
VIEW NOTES:
The number of bits per second. This enables an at-a-glance view of the total bandwidth used as well as a
detailed look in single second precision.
OTHER NOTES:
We applied this "Bandwidth Over Time" view to the traffic to/from 1.119. We can see the throughput reaches
18 Mbps. There are numerous significant drops, however. We will compare this to the throughput graph for
traffic to and from 1.72 next.
[We used the right-click | drilldown method to create this new view.]
Figure 3 - Bits per Second
Packets per Second
The number of packets per second. This view when compared to the bits/bytes view above allows the user to
visually identify when many small packets are generating the traffic or if it is a few larger packets.
Figure 4 - Packets per Second
Bandwidth Over Time (2)
Total bandwidth over time
Applied on 12/31/2013 4:18:00 PM.
Total capture window: 11/15 18:03:00.533697 - 18:04:02.533697.
Current selection: 11/15 18:03:00.533697 - 18:04:02.533697 (62 s at 1 sec).
Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng
File Time: 12/31/2013 4:03:25 PM
File Size: 54525KB
Checksum ():
Drilldown Sequence:
1. Applied the view "IP Conversations"
2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details:
Selected: 200.236.31.1 - 192.168.1.72
3. Applied the view "Bandwidth Over Time (2)"
Bytes per Second
The number of bytes per second.
Figure 5 - Bytes per Second
Bits per Second
VIEW NOTES:
The number of bits per second. This enables an at-a-glance view of the total bandwidth used as well as a
detailed look in single second precision.
OTHER NOTES:
Interestingly the maximum throughput rate is lower in this IP conversation than the IP conversation to/from
1.119. We can see the consistency of this throughput during the file download to 1.72. Next we want to look
further into the 1.119 views to determine if we are dealing with a network issue.
[We used the right-click | drilldown method to create this new view.]
Figure 6 - Bits per Second
Packets per Second
The number of packets per second. This view when compared to the bits/bytes view above allows the user to
visually identify when many small packets are generating the traffic or if it is a few larger packets.
Figure 7 - Packets per Second
TCP Errors Overview
TCP Errors Overview
Applied on 12/31/2013 4:21:18 PM.
Total capture window: 11/15 18:03:43.415340 - 18:04:30.415340.
Current selection: 11/15 18:03:43.415340 - 18:04:30.415340 (47 s at 1 sec).
Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng
File Time: 12/31/2013 4:03:25 PM
File Size: 54525KB
Checksum ():
Drilldown Sequence:
1. Applied the view "IP Conversations"
2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details:
Selected: 200.236.31.1 - 192.168.1.119
3. Applied the view "TCP Errors Overview"
TCP Errors Over Time
VIEW NOTES:
The number of TCP errors per second, charted over time.
OTHER NOTES:
This TCP Errors Overview screams that "packet loss" is the issue. Notice the pattern matches the dips in the
throughput (Bandwidth Over Time) graph. Our 1.119 host is downloading a file and it appears that significant
packet loss occurs during the process. Our host supports Fast Recovery (hence the Duplicate ACKs), but this
cannot overcome the throughput problems caused by packet loss. We will look inside the Duplicate ACKs to see
if the client is at least using SACK (119DupeACKs.pcapng). [We used the right-click | Send to Wireshark from
the Total TCP Errors screen to just grab those packets.]
We also notice that there are only 454 Lost Segment indications, but over 1,000 Retransmissions. This means
that we lost multiple segments in a row - complete outages rather than just single packets being dropped here
and there. This is of concern since 99.99999% of the time packet loss occurs at an infrastructure device. This
trace indicates that likely an infrastructure device is failing fast. We need to find out if it is one of ours and
replace it asap.
NEXT STEP:
We need to capture traffic at the ingress point of our network to determine if the packet loss is occurring
internally or externally. If we see the original packets AND Retransmissions in that trace file then we have a
problem internally... packet loss has not occurred yet. If we only see the Retransmissions, then the problem is
external to our network.
Figure 8 - TCP Errors Over Time
Relative Number of Errors
The relative number of occurrences of the different TCP errors in the period under observation.
Figure 10 - Relative Number of Errors

More Related Content

What's hot

What's hot (20)

basic networking
basic networkingbasic networking
basic networking
 
Wireshark
Wireshark Wireshark
Wireshark
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 08
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking)
 
10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 

Similar to Sample Network Analysis Report based on Wireshark Analysis

IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domainPhu Nguyen
 
Multiple_Vendors_Part-1
Multiple_Vendors_Part-1Multiple_Vendors_Part-1
Multiple_Vendors_Part-1Philip Storey
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 
UDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmUDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmAyesha Tahir
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser NetwrokingShuya Osaki
 
Quick QUIC Technical Update (2017)
Quick QUIC Technical Update (2017)Quick QUIC Technical Update (2017)
Quick QUIC Technical Update (2017)Taisuke Yamada
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 

Similar to Sample Network Analysis Report based on Wireshark Analysis (20)

TCP RemoteFX and IPQ
TCP RemoteFX and IPQTCP RemoteFX and IPQ
TCP RemoteFX and IPQ
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
Multiple_Vendors_Part-1
Multiple_Vendors_Part-1Multiple_Vendors_Part-1
Multiple_Vendors_Part-1
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
Transport layer
Transport layerTransport layer
Transport layer
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
UDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithmUDP and TCP Protocol & Encrytion and its algorithm
UDP and TCP Protocol & Encrytion and its algorithm
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
Feature satip3
Feature satip3Feature satip3
Feature satip3
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 
Quick QUIC Technical Update (2017)
Quick QUIC Technical Update (2017)Quick QUIC Technical Update (2017)
Quick QUIC Technical Update (2017)
 
Feature satip3
Feature satip3Feature satip3
Feature satip3
 
Computer Networking Assignment Help
Computer Networking Assignment HelpComputer Networking Assignment Help
Computer Networking Assignment Help
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 

Recently uploaded

Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
LEAVE RULES of telangana state government employeespdf
LEAVE RULES  of telangana state government employeespdfLEAVE RULES  of telangana state government employeespdf
LEAVE RULES of telangana state government employeespdfchanduneela
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
Call Girls In Le Meridien hotel New Delhi 9873777170
Call Girls In Le Meridien hotel New Delhi 9873777170Call Girls In Le Meridien hotel New Delhi 9873777170
Call Girls In Le Meridien hotel New Delhi 9873777170avaniranaescorts
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 

Recently uploaded (20)

Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
LEAVE RULES of telangana state government employeespdf
LEAVE RULES  of telangana state government employeespdfLEAVE RULES  of telangana state government employeespdf
LEAVE RULES of telangana state government employeespdf
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Call Girls In Le Meridien hotel New Delhi 9873777170
Call Girls In Le Meridien hotel New Delhi 9873777170Call Girls In Le Meridien hotel New Delhi 9873777170
Call Girls In Le Meridien hotel New Delhi 9873777170
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
Model Town (Delhi)  9953330565 Escorts, Call Girls ServicesModel Town (Delhi)  9953330565 Escorts, Call Girls Services
Model Town (Delhi) 9953330565 Escorts, Call Girls Services
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 

Sample Network Analysis Report based on Wireshark Analysis

  • 1. Sample Network Analysis Report Report Information Report created on 12/31/2013 4:37:16 PM. Analyst Information Name Sample Analysis Report E-mail Address info@chappellu.com Phone Number 408-378-7841 Client Information Client Name Chappell University Case Number 03A543
  • 2. Table of Contents IP Conversations 3 IP Conversations 4 Bandwidth Over Time 5 Bytes per Second 6 Bits per Second 7 Packets per Second 8 Bandwidth Over Time (2) 9 Bytes per Second 10 Bits per Second 11 Packets per Second 12 TCP Errors Overview 13 TCP Errors Over Time 14 Total TCP Errors Relative Number of Errors 15
  • 3. IP Conversations Conversations among IP hosts Applied on 12/31/2013 4:04:17 PM. Total capture window: 11/15 18:03:00.533697 - 18:04:30.533697. Current selection: 11/15 18:03:00.533697 - 18:04:30.533697 (90 s at 1 sec). Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng File Time: 12/31/2013 4:03:25 PM File Size: 54525KB Checksum ():
  • 4. IP Conversations VIEW NOTES: IP host conversations. The size of the host is relative to the amount of data it has transmitted. The size of each connection is relative to how much traffic it has transported between the two endpoints (hosts). OTHER NOTES: This trace file contains two conversations. We have two interanl hosts that are downloading a file from a remote host. In this report we will refer to the local hosts by the last two bytes of their IP addresses - 1.72 and 1.119. We will refer to the remote server as simply "the remote server." Figure 1 - IP Conversations
  • 5. Bandwidth Over Time Total bandwidth over time Applied on 12/31/2013 4:06:08 PM. Total capture window: 11/15 18:03:43.415340 - 18:04:30.415340. Current selection: 11/15 18:03:43.415340 - 18:04:30.415340 (47 s at 1 sec). Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng File Time: 12/31/2013 4:03:25 PM File Size: 54525KB Checksum (): Drilldown Sequence: 1. Applied the view "IP Conversations" 2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details: Selected: 200.236.31.1 - 192.168.1.119 3. Applied the view "Bandwidth Over Time"
  • 6. Bytes per Second The number of bytes per second. Figure 2 - Bytes per Second
  • 7. Bits per Second VIEW NOTES: The number of bits per second. This enables an at-a-glance view of the total bandwidth used as well as a detailed look in single second precision. OTHER NOTES: We applied this "Bandwidth Over Time" view to the traffic to/from 1.119. We can see the throughput reaches 18 Mbps. There are numerous significant drops, however. We will compare this to the throughput graph for traffic to and from 1.72 next. [We used the right-click | drilldown method to create this new view.] Figure 3 - Bits per Second
  • 8. Packets per Second The number of packets per second. This view when compared to the bits/bytes view above allows the user to visually identify when many small packets are generating the traffic or if it is a few larger packets. Figure 4 - Packets per Second
  • 9. Bandwidth Over Time (2) Total bandwidth over time Applied on 12/31/2013 4:18:00 PM. Total capture window: 11/15 18:03:00.533697 - 18:04:02.533697. Current selection: 11/15 18:03:00.533697 - 18:04:02.533697 (62 s at 1 sec). Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng File Time: 12/31/2013 4:03:25 PM File Size: 54525KB Checksum (): Drilldown Sequence: 1. Applied the view "IP Conversations" 2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details: Selected: 200.236.31.1 - 192.168.1.72 3. Applied the view "Bandwidth Over Time (2)"
  • 10. Bytes per Second The number of bytes per second. Figure 5 - Bytes per Second
  • 11. Bits per Second VIEW NOTES: The number of bits per second. This enables an at-a-glance view of the total bandwidth used as well as a detailed look in single second precision. OTHER NOTES: Interestingly the maximum throughput rate is lower in this IP conversation than the IP conversation to/from 1.119. We can see the consistency of this throughput during the file download to 1.72. Next we want to look further into the 1.119 views to determine if we are dealing with a network issue. [We used the right-click | drilldown method to create this new view.] Figure 6 - Bits per Second
  • 12. Packets per Second The number of packets per second. This view when compared to the bits/bytes view above allows the user to visually identify when many small packets are generating the traffic or if it is a few larger packets. Figure 7 - Packets per Second
  • 13. TCP Errors Overview TCP Errors Overview Applied on 12/31/2013 4:21:18 PM. Total capture window: 11/15 18:03:43.415340 - 18:04:30.415340. Current selection: 11/15 18:03:43.415340 - 18:04:30.415340 (47 s at 1 sec). Source File: C:UsersLauraDocumentsCustomer ProjectsCase 03A543tr-twohosts.pcapng File Time: 12/31/2013 4:03:25 PM File Size: 54525KB Checksum (): Drilldown Sequence: 1. Applied the view "IP Conversations" 2. Performed a Conversation selection on the "IP Conversations" Conversation Ring. Details: Selected: 200.236.31.1 - 192.168.1.119 3. Applied the view "TCP Errors Overview"
  • 14. TCP Errors Over Time VIEW NOTES: The number of TCP errors per second, charted over time. OTHER NOTES: This TCP Errors Overview screams that "packet loss" is the issue. Notice the pattern matches the dips in the throughput (Bandwidth Over Time) graph. Our 1.119 host is downloading a file and it appears that significant packet loss occurs during the process. Our host supports Fast Recovery (hence the Duplicate ACKs), but this cannot overcome the throughput problems caused by packet loss. We will look inside the Duplicate ACKs to see if the client is at least using SACK (119DupeACKs.pcapng). [We used the right-click | Send to Wireshark from the Total TCP Errors screen to just grab those packets.] We also notice that there are only 454 Lost Segment indications, but over 1,000 Retransmissions. This means that we lost multiple segments in a row - complete outages rather than just single packets being dropped here and there. This is of concern since 99.99999% of the time packet loss occurs at an infrastructure device. This trace indicates that likely an infrastructure device is failing fast. We need to find out if it is one of ours and replace it asap. NEXT STEP: We need to capture traffic at the ingress point of our network to determine if the packet loss is occurring internally or externally. If we see the original packets AND Retransmissions in that trace file then we have a problem internally... packet loss has not occurred yet. If we only see the Retransmissions, then the problem is external to our network. Figure 8 - TCP Errors Over Time
  • 15. Relative Number of Errors The relative number of occurrences of the different TCP errors in the period under observation. Figure 10 - Relative Number of Errors