This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.
The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.
I would like to dedicate this book to my late brother Lalit Jain (Dada Bhai), who was and will always be an inspiration in my life. You always treated me as your son and gave me so much love my whole life. Dada Bhai, I will always miss our conversations, your jokes and smile even during the tough moments, your love, and the bonding we shared. I didn’t even get a chance to hug you and bid you a goodbye. It will always be the biggest regret of my life that I wasn’t there when you needed me the most. I wish I was there to save you. With you gone it feels like I have lost the roof above my head for the rest of my life. I know I have lost a gem of a brother in this life but hopefully we will meet again in the life beyond this one. I just want to let you know that I will always love you and will keep doing my best to reach the heights that you wanted me to. May your soul rest in peace.
Wireshark is one of the most sought out tools among network engineers and network security analysts. Wireshark gives engineers the capability to analyze network traffic by expanding through each section of a header and examining its value. Wireshark not only helps with network traffic analysis; it is also a critical tool when it comes to understanding or learning a network protocol or feature. Performing packet capture and analyzing network traffic can be complex, time-consuming, and tedious tasks. With the help of this book, users will be able to use Wireshark to its full potential and become expert at analyzing network traffic and more efficient at solving complex network problems.
This book helps build a strong foundation for how Layer 2, Layer 3, and Layer 4 traffic behaves and how various routing protocols and overlay protocols function, as well as an understanding of their packet structure. This book is a very useful handbook for troubleshooting engineers who want to analyze traffic to identify issues in the network, such as issues related to packet loss, bursty traffic, and so on. This book will help you get started on the journey of becoming a strong network engineer or a cybersecurity expert.
A special thanks to Aditee Mirashi for encouraging me to work on this project. Aditee, this book would not have been possible without your patience and help. You have helped me during this project in so many ways for which I shall always be thankful. I would also like to thank the technical reviewers, Shyam Sundar Ramaswami and Carsten Thomsen, for their valuable inputs and in-depth verification of the content. Their insightful feedback has made this project a successful one. Last but not least, I would like to thank Apress team for all their hard work and support on this project.
Vinit is a speaker at various networking forums, including Cisco Live events, NANOG, and CHINOG. He has coauthored several Cisco Press books and video courses with Cisco Press. Vinit holds a bachelor of arts degree in mathematics from Delhi University and also holds a master of science in information technology. Apart from CCIE, he also holds multiple certifications in programming, database, and system administration and is also a Certified Ethical Hacker. Vinit can be found on Twitter: @vinugenie.
His goals include guarding domains and predicting the possible threats that might hit the cyberworld by analyzing various scenarios, re-creating attack scenes, and educating the world on various attacks.
3.149.29.71