Book Image

Network Analysis using Wireshark 2 Cookbook - Second Edition

By : Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss
Book Image

Network Analysis using Wireshark 2 Cookbook - Second Edition

By: Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss

Overview of this book

This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you’ve learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you’ll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.
Table of Contents (20 chapters)

Introduction

In this chapter, we will primarily focus on layer 3 of the OSI reference model and learn how to analyze the layer 3 protocols (IPv4/IPv6) operations, as well as unicast and multicast traffic flow analysis. We will also look at the Address Resolution Protocol (ARP)/ND, dynamic and stateless IPv6 address configuration, and more. We will discuss the basic issues that you might face while troubleshooting these protocols.

We will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for unicast and multicast traffic using Wireshark.

While there are variously structured troubleshooting approaches available, the bottom-up troubleshooting approach is the most efficient and effective approach. It starts from the bottom layer (physical) of the OSI reference model. When there is an end-to-end connectivity failure between end points, this approach starts inspecting...