Rating:  Summary: Making sense of protocols Review: How many times have you used a network protocol analyzer and wished you knew more? The Expert system didn't solve 100% of the problems? This is the first book I've found which takes a sensible, systamatic approach to decoding protocols from the bottom up. It does not go into every protocol in existence, but covers general rules of how to use a protocol analyzer properly. It is essential reading if you are just starting out or have been consulting for years, and is equally applicable if you have a low-end analyzer like Microsoft NetMon or a high-end analyzer such as Sniffer PRO from NAI. In fact I gained more knowledge from one book than I did from a several thousand dollar course. Excellent stuff!
Rating:  Summary: Casts new light on network traffic; great for IDS operators Review: I am an ex-Air Force officer with 2+ years of hands-on intrusion detection experience, and I rate books on how well they deliver technical content to front-line operators. Scott's book is absolutely first-rate, written in a clear, friendly style that keeps the reader's attention. Backing up the technical content, the book offers plenty of history and answers to the "why?" questions asked when learning network protocols. For example, why do various Ethernet frame formats exist (Ethernet/DIX/Ethernet II vs. IEEE 802.3 w/LLC Header vs. IEEE 802.3 w/LLC SNAP extension)? Short answer -- blame IBM! Long answer -- read pages 82-86.The logically arranged material makes Scott's book a powerful learning tool. After introducing protocol analysis in chapter 1, he devotes a full chapter to each of the seven layers of the OSI model. (No, he doesn't skip the session and presentation layers!) By taking a layered approach, Scott compares same-layer protocols and makes each understandable in context (i.e., DNS vs. NetBIOS vs. Netware SAP, all at layer 5 -- somewhat controversially; DNS at layer 5?) Chapter 9 finishes with advice on measuring latency and throughput. I learned something new about protocols at each layer, even after reading many authoritative TCP/IP volumes. For example, Scott's explanation of NetBIOS as a session protocol and Server Message Block (SMB) as an application protocol finally made it clear how these standards interact on Windows networks. The text is backed up by numerous screen captures of protocol decodes, adding to the learning value. ....The few typos or mistakenly omitted material do not detract from the book's overall message. If you've read Richard Stevens, Eric Hall, etc., and you think you've run out of resources for understanding network traffic, give Scott's book a try. You'll be informed and pleasantly surprised!
Rating:  Summary: Casts new light on network traffic; great for IDS operators Review: I am an ex-Air Force officer with 2+ years of hands-on intrusion detection experience, and I rate books on how well they deliver technical content to front-line operators. Scott's book is absolutely first-rate, written in a clear, friendly style that keeps the reader's attention. Backing up the technical content, the book offers plenty of history and answers to the "why?" questions asked when learning network protocols. For example, why do various Ethernet frame formats exist (Ethernet/DIX/Ethernet II vs. IEEE 802.3 w/LLC Header vs. IEEE 802.3 w/LLC SNAP extension)? Short answer -- blame IBM! Long answer -- read pages 82-86. The logically arranged material makes Scott's book a powerful learning tool. After introducing protocol analysis in chapter 1, he devotes a full chapter to each of the seven layers of the OSI model. (No, he doesn't skip the session and presentation layers!) By taking a layered approach, Scott compares same-layer protocols and makes each understandable in context (i.e., DNS vs. NetBIOS vs. Netware SAP, all at layer 5 -- somewhat controversially; DNS at layer 5?) Chapter 9 finishes with advice on measuring latency and throughput. I learned something new about protocols at each layer, even after reading many authoritative TCP/IP volumes. For example, Scott's explanation of NetBIOS as a session protocol and Server Message Block (SMB) as an application protocol finally made it clear how these standards interact on Windows networks. The text is backed up by numerous screen captures of protocol decodes, adding to the learning value. ....The few typos or mistakenly omitted material do not detract from the book's overall message. If you've read Richard Stevens, Eric Hall, etc., and you think you've run out of resources for understanding network traffic, give Scott's book a try. You'll be informed and pleasantly surprised!
Rating:  Summary: Been there done that! Review: I just finished a course by the Author..... He really knowshis stuff! The book is a must have for any analyst! It walks you allthe way up the protocol stack and gives you real world examples. Thebook is also loaded with tips and problem solving ideas. END
Rating:  Summary: Been there done that! Review: I just finished a course by the Author..... He really knowshis stuff! The book is a must have for any analyst! It walks you allthe way up the protocol stack and gives you real world examples. Thebook is also loaded with tips and problem solving ideas. END
Rating:  Summary: Must-Have Network Analysis Tips Review: I've read numerous texts on Analysis and Troubleshooting Networks and this was the best. Taking years of experience and training and creating an outline for use in the field is what the Author's done. Having studied everything from the 802.3 standard itself to analysis handbooks by vendors and other authors, I found this to be concise and direct in application and use in the field. Being the Lead Analyst in a company with over 150 nations globally, this text will be valuable to our teams and is being disseminated as a field handbook for troubleshooting. It's a thorough review of protocols from physical through application layers over the majority of topologies extant in today's corporate infrastructures. My Thanks to the Author and those responsible for it's publication.
Rating:  Summary: Must-Have Network Analysis Tips Review: I've read numerous texts on Analysis and Troubleshooting Networks and this was the best. Taking years of experience and training and creating an outline for use in the field is what the Author's done. Having studied everything from the 802.3 standard itself to analysis handbooks by vendors and other authors, I found this to be concise and direct in application and use in the field. Being the Lead Analyst in a company with over 150 nations globally, this text will be valuable to our teams and is being disseminated as a field handbook for troubleshooting. It's a thorough review of protocols from physical through application layers over the majority of topologies extant in today's corporate infrastructures. My Thanks to the Author and those responsible for it's publication.
Rating:  Summary: Don't let it's tiny size fool ya!! Review: Impressive! Mr. Haugdahl's explanation of the various OSI layers is killer enough. Got too deep on certain topics; but then again, you wouldn't want someone preaching complete network analysis to skimp on details now, would you? Great reads on the use of NA's Sniffer and MS' Network Monitor tools, as well as full illustrated details on the DOs and DON'Ts of network design. Awesome book!!!
Rating:  Summary: Lighting the tunnel Review: Scott doesn't just provide a light at the end of the tunnel, making you trudge through other details to make complete sense of a topic... he lights the whole tunnel, from the Physical Layer up through the Application Layer. Network Analysis can be very frustrating to learn, but with the help of a complete reference that provides a logical look at troubleshooting with different tools, even a novice can learn the ins and outs of network analysis. Well done!
Rating:  Summary: One of my best investments... ever! Review: Scott Haugdahl' style of writing mixed with the depth of the material covered, and his attention to detail, makes it one of the best texts I've ever read (including other titles from Addison Wesley, McGraw Hill, Cisco Press, M&T, O'Reilly, Prentice Hall, MTP, et al). Network Analysis and Troubleshooting has been a mind meld for me, filling "the gaps" that so many texts leave out while reinforcing existing knowledge. It is definitely 'a top shelfer' for my reference library! ...Thanks Scott!
|