Author name: Andrew Walding

My short bio can be viewed here: https://www.evernote.com/l/AKglxPOzlV9E7LHKvPsGzgs-SY3McII8E24

PowerShell Commands Used for Network Troubleshooting

Here’s a solid toolbox of Windows PowerShell commands used for network troubleshooting, with quick notes on what each one is good for. I’ll try to group them by task so they are a little easier to remember. 1. Basic Connectivity & “Ping-Style” Tests Test-Connection PowerShell’s ping (ICMP echo) equivalent. Test-NetConnection More advanced tester: port check […]

PowerShell Commands Used for Network Troubleshooting Read More »

CSI-SP-008 – Network Troubleshooting Fundamentals for Technicians – 1D

CellStream, Inc. – Telecom Consulting and Training!  1-Day, Instructor Led, Web Based Delivery or Self Paced, OnlineMinimum: 10 StudentsWeb Based Delivery: Max class size is 30On Site Delivery: Max class size is 20 Click here to go to the Online Class. Course Description: Network Troubleshooting Fundamentals for Technicians is a hands-on technical course that teaches learners

CSI-SP-008 – Network Troubleshooting Fundamentals for Technicians – 1D Read More »

The TLS 1.2 Protocol Ladder

I provide this information for reference when examining TLS in Wireshark. The TLS 1.2 protocol ladder (also called the TLS handshake ladder) describes the step-by-step sequence of message exchanges between a client and server as they negotiate a secure, encrypted connection. Think of it as a “ladder” where each side alternates rungs (messages) upward until

The TLS 1.2 Protocol Ladder Read More »

What is the Adapter for loopback traffic capture in Wireshark?

Using a loopback adapter (also called a local loopback interface) for packet capture in Wireshark allows you to capture traffic that stays within your own computer — for example, packets exchanged between local applications via localhost or 127.0.0.1. Normally, this traffic never reaches a physical network interface, so a loopback capture is needed to see

What is the Adapter for loopback traffic capture in Wireshark? Read More »

Ethernet Taps to Capture Network Traffic

Many technicians and network engineering staff, as well as IT staff, often need to “tap” into the Ethernet to capture and troubleshoot network traffic. A full-duplex tap (also called a network tap) is a hardware device placed inline on an Ethernet link that allows network engineers to capture all traffic traveling in both directions —

Ethernet Taps to Capture Network Traffic Read More »

10 Best Books for Broadband Technicians

I recently received an email requesting my thoughts on the top ten books for broadband technicians to have in their possession or library. Great question. After some thought, here are my top ten (in no particular order) recommended books and handbooks for broadband / fiber / telecom technicians. These cover theory, practice, installation, troubleshooting, standards,

10 Best Books for Broadband Technicians Read More »

MPLS – the Greatest Service Provider Technology of All Time

MPLS (Multiprotocol Label Switching) is often regarded as one of the most elegant service provider networking technologies after TCP/IP itself because it solved several big problems introduced in the late 1990s (and I got to be part of that): For service providers, this was game-changing. Many argue that without MPLS, the explosion of managed VPNs,

MPLS – the Greatest Service Provider Technology of All Time Read More »

Keynote / Presentation / Panel Discussions

With over 30 years of proven expertise in telecommunications and technology—leading my own successful consulting firm since 1998—I bring real-world experience, deep industry insight, and an engaging style to every stage. I have presented at national and international venues on topics ranging from advanced networking and emerging technologies to regulatory trends and practical implementation strategies.

Keynote / Presentation / Panel Discussions Read More »

nmap

Using nmap for Cybersecurity

Knowing how to use nmap is critically important for cybersecurity professionals because it is one of the most powerful and versatile tools for network reconnaissance, security auditing, and vulnerability assessment. Nmap is to cybersecurity what a stethoscope is to a doctor—a diagnostic tool that’s fundamental to identifying issues, assessing risk, and maintaining a secure environment.

Using nmap for Cybersecurity Read More »

Scroll to Top