TCP Tips and Tricks - SLOW APPLICATIONS? // Wireshark TCP/IP Analysis

Sdílet
Vložit
  • čas přidán 11. 06. 2024
  • What TCP symptoms can we look for when troubleshooting slow applications? Let's find out!
    Like/Share/Subscribe for more Wireshark content!
    // WIRESHARK TRAINING - Udemy//
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    // WIRESHARK TRAINING - Pluralsight//
    Check out the free 10-day trial of my hands-on courses on Pluralsight:
    ▶TCP Fundamentals with Wireshark - www.bit.ly/wiresharktcp
    ▶Identify Cyber Attacks with Wireshark - www.bit.ly/wiresharkhunt
    ▶TCP Deep Dive with Wireshark - bit.ly/virtualwireshark
    //LIVE TRAINING COURSE//
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    -------------- Trace File Analysis Services//Private Training ----------------------
    Got packet problems that you need help digging into? Want to schedule a private training for your team?
    www.packetpioneer.com/contact

Komentáře • 156

  • @hangeroo2439
    @hangeroo2439 Před 7 lety +54

    Some people really have a knack for distilling difficult topics and teaching them to people...you are one of these people. I love the way you explain things and how you go into visual details. It really helps those of us whom are a bit thick-headed to "get it" finally. THANK YOU!! Hope you keep doing these videos coming as there are so many videos out there, but yours are really thorough and you make extremely difficult subjects much more mentally attainable...it makes the learning much more enjoyable and less of a challenge.

    • @ChrisGreer
      @ChrisGreer  Před 7 lety +4

      Thank you Hang for the feedback. I'll do my best to keep them coming!

    • @judegary2766
      @judegary2766 Před 2 lety +1

      You prolly dont care at all but does any of you know a method to get back into an instagram account?
      I somehow forgot my login password. I appreciate any help you can give me

    • @zionerick9414
      @zionerick9414 Před 2 lety

      @Jude Gary Instablaster ;)

    • @judegary2766
      @judegary2766 Před 2 lety

      @Zion Erick I really appreciate your reply. I got to the site thru google and im waiting for the hacking stuff now.
      Takes quite some time so I will get back to you later when my account password hopefully is recovered.

    • @judegary2766
      @judegary2766 Před 2 lety

      @Zion Erick it did the trick and I finally got access to my account again. I am so happy:D
      Thank you so much, you saved my ass !

  • @RowanHawkins
    @RowanHawkins Před měsícem

    Finally some one who gets it!
    I used to spend so much time at one place big on finger-pointing trying to get someone to run a trace. They always wanted to claim it wasn't their issue but no one wanted to prove it wasn't their issue because it might prove it actually was their issue.
    People who point fingers don't care about about finding solutions they care about avoiding blame.

  • @tonioyendis4464
    @tonioyendis4464 Před 5 lety +15

    This is absolutely the best TCP analysis I've found on You-Tube! Thank you sir!!!

  • @MrVecheater
    @MrVecheater Před 3 lety +3

    Normally I can't watch such long talks that teach stuff this one kept me hooked

    • @ChrisGreer
      @ChrisGreer  Před 3 lety +1

      Thanks for the comment - glad you enjoyed it!

  • @sarwankumar5339
    @sarwankumar5339 Před 6 lety +1

    Thanks Chris. It was really helpful. Had a great insight into TCP protocol functioning.

  • @thechronic555
    @thechronic555 Před 3 lety +1

    Seriously i cant rave enough about how well you explain this! Thank you!

  • @multechpro7151
    @multechpro7151 Před 7 lety +2

    I love your videos, your explanations are as clear as cristal, hope you make more videos about troublshouting and how to read tracefiles and determine the problem source. Thanks Chris.

  • @JDBoelter
    @JDBoelter Před 5 lety +3

    This helped me understand Wireshark and packet analysis (for TCP, anyway) better than anything else I've read or watched. Many thanks for providing this!

  • @qatesta
    @qatesta Před 7 lety +3

    Chris, You are awesome. Your communication style is superb. thanks for the vids.

  • @edzielinski
    @edzielinski Před 4 lety +4

    Chris - this was a revelation to me and helped me analyze some very puzzling captures. Thanks for the excellent presentation and for making it available. Your presentation and explanations are extremely lucid, clear and vivid.

  • @user-tq9eh5gc8x
    @user-tq9eh5gc8x Před 4 lety +1

    Really Great Lesson. Thank you very much

  • @sreenislg
    @sreenislg Před 6 lety +1

    This is awesome video... Thank you for taking time and presenting us

  • @franciscosencion
    @franciscosencion Před 7 lety +2

    Great video, keep up the good work!

  • @surjeetyadav878
    @surjeetyadav878 Před 6 lety +2

    it's great video to understand the packet and troubleshoot the live network issues.
    Thanks for teaching us :) :)

  • @samirshaikh52
    @samirshaikh52 Před 6 lety +1

    Awesome Video Chris! as always

  • @balaguru84
    @balaguru84 Před 7 lety

    clearly explained, thanks for the session

  • @mailsidney
    @mailsidney Před 5 lety

    thanks Chris. This was a very helpful video.

  • @shaishankar8499
    @shaishankar8499 Před 5 lety +1

    Excellent video and i like to view your videos more!

  • @gregtaane7434
    @gregtaane7434 Před 6 lety

    Outstanding explanation. This will help me no end . Thank you.

  • @AkashDeepSingh-lk7fv
    @AkashDeepSingh-lk7fv Před 6 lety

    Thank you very much for this video.. Really needed this one..!

  • @user-tf9lx9iy1s
    @user-tf9lx9iy1s Před 7 lety +1

    this turorial is very helpful, net work analyze is a very difficult and skillful job. very appreciate

  • @gillianlee8514
    @gillianlee8514 Před 6 lety +1

    excellent video on differentiating network packet drop and application performance. this is often a bone of contention between network and application teams. I took one of my traces from a customer site and used your tutorial to drill down what the issue is.

  • @vineet79
    @vineet79 Před 6 lety

    Amazing info has been shared in this Video.

  • @PaulOfford
    @PaulOfford Před 7 lety

    Great job Chris.

  • @Test9383
    @Test9383 Před 4 lety

    Excellent session.

  • @spyderkoh
    @spyderkoh Před 5 lety

    Awesome video!

  • @srikanthum4979
    @srikanthum4979 Před 5 lety +1

    Awesome! Thanks chris

  • @augustbernard3396
    @augustbernard3396 Před rokem

    So excellent. Thank you!

  • @upelister
    @upelister Před 2 lety

    Thank you, very informative video.

  • @anonMarks
    @anonMarks Před 4 lety

    Thanks man... Good tut.

  • @antikoerper256
    @antikoerper256 Před 4 lety +1

    Great video!

  • @linhandcalvin7109
    @linhandcalvin7109 Před 2 lety

    You explain very well!

  • @feiwoza
    @feiwoza Před 7 lety +1

    Thanks Chris !

  • @priyavratarsenal
    @priyavratarsenal Před 7 lety

    great video!!!
    Priyavrat

  • @ThePumbaadk
    @ThePumbaadk Před 6 lety

    This is great, thanks

  • @ohassairi
    @ohassairi Před 3 lety

    wonderfull video . many thanks

  • @philipg8283
    @philipg8283 Před 3 lety

    Thank you. This was an excellent video!

  • @gofai2003
    @gofai2003 Před 3 lety

    you're doing great job chris

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Thanks for taking the time to give positive feedback. I really appreciate it!

  • @williamwilliam4907
    @williamwilliam4907 Před 3 lety

    Thank you for this very insightful analysis of packet captures!

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Happy to help! Stay close to the channel for more content.

  • @talk2srj
    @talk2srj Před 6 lety +1

    Chris.. I have no word to tell you how much amazing you are ! ;) super excellent tutorial :) Thank you very much :)

  • @metaworldtrendingvideos5262

    I am fan of this guy ❤

  • @RaviKumar-xc4bt
    @RaviKumar-xc4bt Před rokem

    thanks for the great explanation.

  • @OthmanAlikhan
    @OthmanAlikhan Před 2 lety +1

    Thanks for the video =)

  • @emirh.9376
    @emirh.9376 Před 4 lety

    Purchased a Wireshark course on Udemy but it is rather high level. These deep dive videos really compliment that course well. Bravo!

    • @desert_rose7171
      @desert_rose7171 Před rokem

      Hi Emir. Was the wireshark course from udemy worth it and what’s the name of the course?

  • @MultiRam73
    @MultiRam73 Před 5 lety

    Technology stuff explained in pure conversational language, making us understand the concept underneath and retain for long. Thanks much for creating this wealth of information!

  • @rohithreddy1693
    @rohithreddy1693 Před 3 lety +1

    Nice explanation --and learn lot of basic troubleshooting on tcp concept

  • @DeepakSharma-li9cn
    @DeepakSharma-li9cn Před 2 lety +1

    This is best TCP packets analysis. Mind blowing video . It's really helpful for me.

  • @harshakada3374
    @harshakada3374 Před 4 lety +1

    Just Love ur videos. Amazing content TQSM

    • @ChrisGreer
      @ChrisGreer  Před 4 lety +1

      Thanks Harsha! I will keep making them.

  • @DuragFit
    @DuragFit Před rokem

    This video just earned you a new subscriber 🎉

    • @ChrisGreer
      @ChrisGreer  Před rokem

      Great! Welcome to the channel - Kick back, relax, and enjoy the content!

  • @BrunoVernay
    @BrunoVernay Před 3 lety +1

    Great stuff ! You are really a reference. One thing I noticed is that students confuse Wireshark's labels: "TCP Out-Of-Order" or "TCP Retransmission" as TCP properties!
    These labels are only Wireshark best guesses, not something written in the Packet itself.

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Thanks Bruno! I appreciate the comment.

  • @ipadair8841
    @ipadair8841 Před rokem

    Chris this is the best analysis on packet thanks for this

  • @arunrattingal
    @arunrattingal Před 10 měsíci

    Hello Chris - I love to watch and take away from your great video sessions. Question: How we can confirm that, the IP Sec related ports are opened in a remote ISP if we have a host attached to that particular ISP.

  • @sameerkumar2692
    @sameerkumar2692 Před 4 lety

    Amazing 👌

  • @apolina79
    @apolina79 Před rokem

    Chris, funny I am sysadmin and learning a lot from your training, really valuable to also understand when the problems are on our side. i am currently troubleshooting an issue of slowness and retransmission and one thing i noticed is TCP segment len 524 for entries showing that data sent PHS-ACK, is that so small that may be a factor? thanks a lot.

  • @shakibidrisi5338
    @shakibidrisi5338 Před 6 lety

    excellent

  • @soniaketh5784
    @soniaketh5784 Před 6 lety

    nice one

  • @sandroidbada112
    @sandroidbada112 Před 6 lety

    thank you

  • @maheshjadhav1606
    @maheshjadhav1606 Před 3 lety

    Excellent Explaination of the Transport layer stuff and how it works. It is very usefull to finding out the reason why the network is slow and aslo can provide suggetion to the Developer or the Network Engineer to rectify the issue.

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Thanks Mahesh! I appreciate the comment.

  • @NewHOD
    @NewHOD Před 6 lety

    At the 1:00 how can we tell it was a single threaded TCP between Client - Server? Multi-thread would have shown the same Source & Destination IP pairs.
    Would the indicator be based on different ports used?

  • @HuzaifaGujjar
    @HuzaifaGujjar Před 3 lety

    Best TCP analysis.

    • @ChrisGreer
      @ChrisGreer  Před 3 lety +1

      Thanks for the comment Huzaifa!

  • @skr0nytbe389
    @skr0nytbe389 Před 6 lety

    Hey Chris, thanks for the wonderful video.. I liked it. But, I wasn't quite happy with TCP window full conditions explained. I doubt u covered the zero window conditions.. Also on the window update capture, I could see a syn=1 and ack=1 in middle of the flow at a window update. How could this be possible???

  • @looka84
    @looka84 Před 6 lety

    Impressive!

  • @dominiquerossignol2212
    @dominiquerossignol2212 Před 2 lety +1

    Hi Chris, could you supply a valid link to download the trace files ? Regards

  • @sreenislg
    @sreenislg Před 5 lety

    your Videos/other training material has inspired me to take for exam(WCNA) and I have passed it. I saw this video 3 times for now.. to become good with concepts. Thank you for all your efforts in preparing this video..

    • @ChrisGreer
      @ChrisGreer  Před 5 lety

      Awesome! Congrats on passing the WCNA. That is a huge accomplishment and I am honored to have helped at least in a small way. Keep on learning and capturing.

  • @bernafunda
    @bernafunda Před 6 lety

    thanks for the good explanation . I have a question regarding to previous packet has not captured , in that case how I can tell the dropped the packet was sent from the sender or from the server side ? and the one just i received it later it is the retransmit one or the continuation ?

    • @ChrisGreer
      @ChrisGreer  Před 6 lety

      Hello Nanis - Wireshark determines that a packet has been lost by looking at the gap in the sequence numbers. So if you see this warning, it means the previous packet in this direction was lost. So it depends on which direction the traffic is flowing. Also, consider where you are capturing. If you are capturing at the client end, most likely you will see this warning for packets that are coming from the server.
      Another possibility is that the packet was lost by the capture method (overprovisioned SPAN, exceeding the capture potential of the laptop or device doing the capture) so be careful when troubleshooting these warnings as they simply may indicate that the capture device simply missed a packet.

  • @mauriciosiles2795
    @mauriciosiles2795 Před 7 lety

    You rock!!!

  • @patgame
    @patgame Před 4 lety +1

    Your courses should be on something where we could buy just a single course. Plural sight is a overkill :) Great video, the shortcuts especially were so helpful!

    • @ChrisGreer
      @ChrisGreer  Před 4 lety

      Nice feedback Patgame - thank you. You could always just join Pluralsight for a month and watch them all for $29! But who knows, maybe i can get some other projects in the bag too.
      www.bit.ly/wiresharktcp

    • @patgame
      @patgame Před 4 lety

      @@ChrisGreer Thanks, Chris. You make a point on the monthly sub. Do you cover various congestion avoidance algorithms (read, reno/bic/cubic) and so on in your courses? I cannot seem to ascertain from the list of topics on PluSig

    • @ChrisGreer
      @ChrisGreer  Před 4 lety +1

      @@patgame Yes! - I have a new course on Pluralsight that will come out in the next few weeks that covers the congestion control mechanism, and looks into CUBIC vs NewReno. It doesn't do a deep dive into each flavor, but it does cover how each one makes a decision of when to go into congestion avoidance and fast recovery. It is called Mastering TCP Analysis with Wireshark

    • @patgame
      @patgame Před 4 lety

      Chris Greer great stuff. Will definitely sign up then. See you there :)

  • @shion0
    @shion0 Před 5 lety +1

    is a : 0.000408000 seconds response time considered fast

  • @protek7028
    @protek7028 Před 2 lety

    where i can get the pcap files used in this demo ?

  • @joshperez877
    @joshperez877 Před 6 lety +1

    hey! i think i missed it but did you ever explain what a TCP ACK packet represented? or at least point me to the time you started talking about it? thanks!

  • @bevo260578
    @bevo260578 Před 7 lety +1

    supper helpful

    • @sjurpejg
      @sjurpejg Před 5 lety

      Just saw your video, and compared to others out there yours really explained to me how to really use Wire Shark. Thank you.

  • @ksdeals
    @ksdeals Před 5 lety

    Thank you but . My understanding at 25:00 is that Wireshark just captures the packets. If they are tcp packet is for dup or missing ....it all coming from client. Wireshark doesn't make requests to server. It simply captures. The size of your laptop you use for your Wireshark will not make dup or missing packets. Maybe I'm wrong but I'm almost sure about this .

  • @VivekSingh-rr3fr
    @VivekSingh-rr3fr Před 7 lety +1

    Wow :) Beautiful explanation..
    I have a doubt regarding Window Full feature of Wireshark. In your capture, the segment from server in which we see "Window Full", that packet has 1460bytes of data. When the server knows that receiver's buffer is full, why is it sending more data? Or, does Window Full mean that receiver's buffer will be full after this segment?

    • @VivekSingh-rr3fr
      @VivekSingh-rr3fr Před 7 lety

      You said that it's common to see Window Full and then some packet loss. Do you mean to see that server/host will burst traffic up to Window size and 'packets from this burst' may be dropped by network? Can you also confirm that it's not necessary that every time we see Window Full network will drop packets?
      Could you please explain more about this?
      Thank you very much :)

    • @julianaputhota4249
      @julianaputhota4249 Před rokem

      Yes - I have the exact same question. The explanation for Window-Full was a bit unclear in the lecture. He mentioned that Server has sent so much data to Client that the Window Size has become Full. Whose Window Size? Also, why is the Server sending more data when the Window Size limits are clearly mentioned in the TCP Conversation?

  • @subhamthemusicalguy8851
    @subhamthemusicalguy8851 Před 3 lety +1

    Thanks Chris. I have a doubt about TCP OUT of order packets . what is that for?

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Out of orders mean that a packet arrived out of sequence. It can happen because a packet takes a different path than others behind it and it took longer to arrive, or more often, Wireshark can perceive retransmissions as arriving out of order. Great idea for a video!

  • @iMPRE7ed
    @iMPRE7ed Před 5 lety +1

    Hey, i recently (lost the actual icident) had a complaint , and it really happened, on l2 segment one server was scp ing a file from other server. They were connected to same switch !!no hw issues. I saw about a half packets coming as normal, and then the receiver of file (initiated the conn) started getting dupe acks. What happens is transfer stalls at zero, but the receiver working properly, acked all seq in time , but sender's packets were missing,so rcvr sent ack for retrans. Btw, sacks and scaling were off..so i just saw delays from sender of file getting double time delay (every time double until 120 sec). What can that be guys, really curious, not a champ at wireshark yet :( crazy stuff

    • @iMPRE7ed
      @iMPRE7ed Před 5 lety +1

      Only captured on source the receiver which is src, though. Might be just performance rlated on other end. Hard to tell, cuz im network guy, and they say server is green...

  • @bigshawn10
    @bigshawn10 Před 6 lety

    Chris I am starting a job soon and will be using wireshark for first time. Where is the best place to learn for beginners? Books, videos, etc...

    • @ChrisGreer
      @ChrisGreer  Před 6 lety +1

      Hey Shawn - that's great! Welcome to the world of Wireshark. For sure check out the videos here on my channel for tips and tricks. For some more in-depth, personalized training, let me know if you are interested in a class. For books, check out Practical Packet Analysis by Chris Sanders. Awesome read. Hope this helps!

  • @nitinsharma-xt2fy
    @nitinsharma-xt2fy Před 2 lety +1

    can't thank enough

  • @MellexLabs
    @MellexLabs Před 4 lety +1

    Hi Chris. Trying to wrap my head around the TTL part of the video... I have two devices on the same subnet 10.106.63. And the trace is telling me that .48 which is the client has a TTL of 255 but when looking at an ACK of the packet the server part which is .11 its telling me a TTL of 128. Now one device is connected over wifi and the other over a cable... there is a VLAN setup with devices in between that I have no view of... my question is... isn't the client supposed to decrement the 255 value to at least 254 if there is one hop? There is only one set of ports open and I am monitoring on the server side. Thank for your help.

    • @ChrisGreer
      @ChrisGreer  Před 4 lety

      Hello Malcolm - if the two devices are on the same subnet and packets do not need to be routed then the TTL will not be decremented between the two. Traffic in both directions will stay at 255 and 128 respectively. A Wifi access point and an ethernet switch are not routers, generally speaking, so they will not decrement the TTL. Hope this helps!

    • @MellexLabs
      @MellexLabs Před 4 lety

      @@ChrisGreer Yes this helps tremendously. So with with network equipment not behaving as routers in the general sense, it also implies that windowing will not be modified between the 2 devices and that window size is purely between the endpoints?

  • @deepakjha81
    @deepakjha81 Před 4 lety

    When a network capture is analyzed using Wireshark, 39% of the total traffic is RST packets. What could be the reason?
    The connection is trying to connect to a TCP port and the port is not open
    The connection is trying to connect to a UDP port and the port is not open
    The 3 way handshake is unsuccessful and there are multiple retransmissions and failures
    The TCP port at the source is a wrong port
    Please give me answer in above 4 option

  • @shashireddy1879
    @shashireddy1879 Před 6 lety

    I have some issues running which is having a slowness while accessing the citrix application not able to figure out where the problem is, could you please help

    • @ChrisGreer
      @ChrisGreer  Před 6 lety

      Sure - I'd be happy to. Please send me a contact request through www.packetpioneer.com/contact
      Thanks!

  • @caloye86
    @caloye86 Před 2 lety

    Hi Chris, Just one question. If we increase the bandwidth of a dedicate link, the Windows Size initial negotiation could increase?

    • @ChrisGreer
      @ChrisGreer  Před 2 lety

      Not necessarily. The window size is set by the operating system kernel, or by the application using that kernel. So it is independent of the network. Increasing the bandwidth may cause the TCP stack to dynamically increase the window size over time as more data moves, however that would be determined by the OS.

    • @caloye86
      @caloye86 Před 2 lety

      @@ChrisGreer I have an issue that after I change the network layer from IP MPLS network to a WDM OTN network using the same servers and with the same link capacity. The windows scaling increase drastically, having transfer rates from 4 MB/s up to 90 MB/s. This is why my question. The only difference is the iRTT time. With a 20ms difference between the two network layers. WDM OTN shows the best performance. I'm trying to find how to explain or justify this behavior. What else would you consider to check?

  • @jarbystark
    @jarbystark Před 2 lety

    hey Chris, i have a strange packet behavior that repeats again and again. An app sends some data to my client , then retransmission of this packet goes for some reason and then my client ack. after this i get an unusual several seconds delay (between client ack and sending start) and client start sending data to server. This situation repeats again and again. What problem should i look for? You told about such situations on server side but what is it when delay is on client side ? By the way your courses on PluralS are great, enjoying every of it, thank you! )

    • @ChrisGreer
      @ChrisGreer  Před 2 lety

      Hey! Can you share the pcap? If so… pop it over to me… packetpioneer@gmail.com

    • @jarbystark
      @jarbystark Před 2 lety

      @@ChrisGreer thank you very much ) sure ill send it

  • @ajtheguy
    @ajtheguy Před 6 lety

    More often the Reps on the other end says 'The system is slow today' not necessarily blaming the network.

  • @tommurphy2332
    @tommurphy2332 Před rokem

    In this video the details of creating a button for "Slow HTTP" has a mistake: if we enter "http.time > 1", it creates an error condition for an inappropriate argument and my Wireshark panel goes out of control. I had to go to the process manager and kill the Wireshark process. After doing that and restarting Wireshark, I needed to correct the button filter to read: "http.time > 1.0" because http.time is a floating point number and not an integer which the first filter spec was looking for. That's my two cents.

    • @ChrisGreer
      @ChrisGreer  Před rokem

      Hmm interesting. Literally never seen that one. What version of WS are you running?

  • @VulcanOnWheels
    @VulcanOnWheels Před 5 lety

    37:03 Please try to avoid pauses like this. For a moment I thought that my computer had frozen.
    I realize that this is an old video, but I would like to comment on how well I could read things. There were times when I could not read a line in the top pane because the colors of the background and the text clashed.

  • @hamzahabdulhadi5218
    @hamzahabdulhadi5218 Před 3 lety

    where can I find the PCAP file for this tutorial ?

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      Hello Hamzeh, here is a link to one of them -
      www.cloudshark.org/captures/b28b2cfec7ea
      I do share the trace file for several of my videos but I didn't do so for all the traces on this one. Thanks!

  • @88ba14
    @88ba14 Před 4 měsíci

    @chris please provide these captures please

    • @ChrisGreer
      @ChrisGreer  Před 4 měsíci +1

      I don’t provide the pcaps on this one. Some of them are long gone…

    • @88ba14
      @88ba14 Před 4 měsíci

      Not clear about previous segment not captured

  • @SantoshSharma
    @SantoshSharma Před 5 lety

    Hi,
    Could you please suggest how to identify unicast storm. Not able to find any video

    • @ChrisGreer
      @ChrisGreer  Před 5 lety +1

      DRSInfocom Online firewall training sure, that is a great idea for a video. I will be in my studio soon recording some new content!

    • @SantoshSharma
      @SantoshSharma Před 5 lety

      @@ChrisGreer thanks a lot Chris. The way you teach is awesome. That's the reason for request. 😊

  • @sleekthegeek6669
    @sleekthegeek6669 Před 2 lety

    I worked at two call centers and I can tell you factually that they *do not* want you to admit that anything is wrong with their systems or computers it's the "other network/s" they're trying to connect to that is slow. They basically wanted us to say "Our network our servers our computers are fine It's the other end that is slow"

    • @sleekthegeek6669
      @sleekthegeek6669 Před 2 lety

      And depending on your coach they'll have an excuse for everything
      credit cards taking too long? must be a lot of people buying right now. Man Mastercard servers are busy today.

    • @ChrisGreer
      @ChrisGreer  Před 2 lety +1

      @@sleekthegeek6669 Wow really? I guess it doesn't surprise me. Thanks for the comment.

  • @nicktucker3437
    @nicktucker3437 Před 9 měsíci

    blaming the network has been a thing since the 90s. The vendor blame game is popular, too.

  • @janetoss
    @janetoss Před rokem

    See 19:00-23:30
    B 29:15

  • @jimmatrix7244
    @jimmatrix7244 Před 4 lety

    System Administrations get bashed by management and users when the problem lies with developers and network administrator.

  • @RussellTeapot
    @RussellTeapot Před 3 lety

    8:48 I heard "..it will show us Tupacs" .... I was quite confused

    • @ChrisGreer
      @ChrisGreer  Před 3 lety

      :-) Funny!

    • @RussellTeapot
      @RussellTeapot Před 3 lety

      @@ChrisGreer By the way, excellent video! I'm not an IT professional, only an enthusiast learning the ropes about how network communications work: so I don't troubleshoot often (my peak performance is turning off and back on the router), but seeing the different pieces "in action" with software like Wireshark helps to grasp the theoretical concepts.
      Aside from general tips about Wireshark (like conversation filters, buttons and others), I found that considering the layers stack from the perspective of the transport layer is very insightful and something I never thought about: either I focus on the lower part (physical, link, network) or the upper part (application, since session and presentation for me are still a mistery).
      I still have to digest the video, but it seems I have learned a valuable lession: since the transport layer is "in the middle", it points to the direction to follow when trying to understand what went bad.
      Thanks for the upload, I'm really glad I resisted the first "ugh! 1 hour of technical explanations on topics I barely understand? No thanks" impression , you are a great teacher!

  • @hassanalghamdi6047
    @hassanalghamdi6047 Před 9 měsíci +1

    I'm here to proof that it is not network issue its application team issue 😁

  • @lifeislikedie9667
    @lifeislikedie9667 Před 5 lety

    I need the app can somebody help me

    • @roihan9099
      @roihan9099 Před 4 lety

      u mean the wireshark software?

  • @EricFisher.TheVillages

    They use the term in a less pedantic more general way, that's all.

  • @frankm.6881
    @frankm.6881 Před rokem

    Not going to the main topic. .