Introduction to Network Analysis (Second Edition) by gregoria


									                                                                           Introduction to
                                                                         Network Analysis
                                                                           Second Edition

Introduction to Network Analysis (Second Edition)
The revised/updated analysis manual by Laura Chappell. This version dumps the
LANalyzer for Windows screens and functionality and focuses on EtherPeek and Sniffer
Pro throughout. Also in this edition: full-duplex analysis, frame and field offsets, and a
whole bunch of new trace files. Each chapter ends with a test to determine your
comprehension level. The answers can be found in Appendix A.

Recommended Pre-Requisites
None (Great Introductory Material)

Included Course Materials
•   Electronic Version of Book
•   205 pages
•   Trace files

•   Self-paced study

Participants Learn About
•   What is Analysis, Anyway?
•   How Do You Start?
•   Packet Formats and Decodes
•   Identifying Typical Problems
•   Analysis Tools and Exercises

Other Suggested Reading
•   Advanced Network Analysis Techniques

Complete Master Library Information:
Web site:
                                                                                                   Introduction to
                                                                                                 Network Analysis
                                                                                                   Second Edition

Detailed Book Contents

Chapter 1, "What is Analysis, Anyway?"
                                                                Appendix A, "Answers to the Chapter Tests"
Covers the various elements of a network analyzer and
provides instructions on tapping into hubbed, switched,         Provides the answers to all the questions posed at the
or routed networks. In this section, you'll find out how        end of the Chapters.
standalone analyzers differ from distributed analyzers as
well as the differences between software and hardware-
based solutions.
                                                                Appendix B, "The Basics of Data Flows"

                                                                Is a 'must read' for anyone who wants to troubleshoot or
Chapter 2, "How Do You Start?"                                  optimize network communications. It provides the
                                                                foundation of knowledge on how packets are hubbed,
Walks you through the entire process of tapping in,             switched and routed through a network. It covers what
obtaining a network overview (the 'Laying on of Hands'),        these interconnecting devices can and cannot do to the
classifying traffic and trends, identifying hot spots and       packet contents. You should know the materials in
documenting your findings. You'll learn how to read the         Appendix B inside and out.
summary window and detailed packet decodes. I’ll
introduce my favorite analyzers -- EtherPeek and Sniffer
Pro. Finally, this chapter gives you a list of seven analysis
                                                                Appendix C, "Resources and References"
tasks you can do today on your network.
                                                                Lists supplemental materials that can help you with your
                                                                network analysis focus. Many of the materials were
Chapter 3, “Packet Formats and Decodes”                         written by me (there seems to be a shortage of packet-
                                                                level documentation these days).
Takes you into the packet structures and communication
sequences often seen on a network. In this chapter, we’ll       There are additional references and resources online at
look the headers that are built to get packets from the
application through the protocol stack and onto the
network. Specifically, we’ll examine Ethernet and Token
Ring headers. This chapter also provides field offset and
details for IP, TCP and UDP headers. Finally, we’ll follow a
typical communication to see how the data flows.

Chapter 4, "Identifying Typical Problems"

Focuses on the most common errors that occur on
Ethernet, Token Ring, IPX/SPX and TCP/IP networks.
After a brief overview of the communications processes
used by each network type, you are introduced to the
types of problems that you should watch for. Throughout
this chapter, you are provided with extra links to areas
that contain more depth of information… for those of you
who just can't get enough.

Chapter 5, “Analysis Tools and Exercises”

Gives you an idea of the other tools that I use to analyze
communications.     These tools include my beloved
NetScanTools Pro, PacketScrubber to sanitize packets,
ProConvert to convert trace files between various
analyzer versions, EtherPeek for Windows and Sam
Spade. Of course, a good quality blender is also required
to make the perfect Margarita!

To top