In this chapter, we looked at how to create a relevant troubleshooting profile and learned how to use the TCP delta time to sort on any time latencies, as well as the IO Graph for better representation of the performance problems. The key to troubleshooting still remains an in-depth understanding of protocols because a tool can only help us sort things out, but it is our job to figure out what to look for.
Wireshark Network Security
By :
Wireshark Network Security
By:
Overview of this book
Table of Contents (14 chapters)
Wireshark Network Security
Credits
About the Author
Acknowledgment
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Wireshark – What, Why, and How?
Tweaking Wireshark
Analyzing Threats to LAN Security
Probing E-mail Communications
Inspecting Malware Traffic
Network Performance Analysis
Index
Customer Reviews