Want to understand Net Neutrality? Like burgers? This will explain…
Want to understand Net Neutrality? Like burgers? This will explain… Read More »
CellStream, Inc. – Telecom Consulting and Training! 2-Day Instructor Led Hands On Lab ClassAvailable in either Web Based delivery or On-Site DeliveryMinimum 10 students – Maximum 20 students Course Description: This course specifically gives you the tools you need to build your own network in your laptop using GNS3.
CSI-HO-027 – Hands On GNS3 – 2 Day Read More »
Check out these additional Routing Resources: Our IP Routing course at Udemy Our Custom Profiles for Wireshark Classes at the Online School This is commonly asked question from our routing courses and routing discussions in other courses. Let’s explain this command in this article. To start, you have to know that OSPF supports different areas.
What is the ‘area range’ command in OSPF? Read More »
Check out these additional Routing Resources: Our IP Routing course at Udemy Our Custom Profiles for Wireshark Classes at the Online School In a recent course on IPv6, one of my students asked what the “network” command did as we were beginning to study the routing commands used in Cisco IOS when configuring OSPF. In
What is the “network” Command in OSPF and BGP? Read More »
If you attend our WLAN Operations course, one of the things we discuss is Active Scanning. Your system uses your saved Wi-Fi networks to actively scan for those networks (probing). There are potential security risks in this, especially with free networks. Most students conclude they should not remember networks in this way. The burning question
Deleting Remembered Wi-Fi Networks in Windows, MacOS, and Linux (Debian) Read More »
Check out these great references as well: Our custom profiles repository for Wireshark Our Udemy course on Wireshark Our Udemy course on Wireless Packet capture Let me begin with a little background. At CellStream, and the Online School of Network Sciences, we have taught hundreds of Wireshark classes for general networking, voice networking, data center
Complaint: Why Don’t You Allow Employees to use Wireshark? Read More »
Sometimes troubleshooting in Wireshark is easy-ish, you find a misbehaving protocol behavior or pattern or even a bad packet, sometimes it is tricky and takes a while to find something, and sometimes it is as clear as mud. Check out these great references as well: Our custom profiles repository for Wireshark Our Udemy course on
Real-life Wireless Wireshark Troubleshooting Example Read More »
The following is a must have reference for Linux systems networking operations. We will be using the two basic commands: ‘ifconfig’, ‘iwconfig’, and ‘ip’. If you are the rtoot or administrator you should have no issues using the commands as shown. If you do not, you may want to use ‘sudo’ in front of the
Linux Networking Commands Read More »
I was recently (this was 2017) asked the question “If I want to get into Networking, what should I learn?” If you want to see the 2025 answer – click here. A great question because Telecommunications or Data Networking is really not a degree program at most universities, at least not at the undergraduate level.
If I want to get into Networking, what should I learn? Read More »
How can you verify your Wi-Fi is on the right channel, who else is interfering? We wish that was easy. And at a normal user level it is. First you need a Wi-Fi scanner. The following is a growing list of Wi-Fi Scanning Utilities for various platforms. Most all are free, at least to
Wi-Fi Scanning Tools List Read More »
In a recent set of email exchanges with a client, we were tackling the challenges of hiring engineers and technical staff. I can summarize the most interesting issues as follows: Deliberately, we have not listed the normal hiring checklist items. The answer to the first question can be summarized in a single word as attitude.
Technology Hiring – Always a Tough Challenge Read More »
You have to think of and understand the Internet’s Domain Name Service -DNS- as a System. The DNS is the system which, in its primary function, converts Internet domain names that you type into URL bars, or hyperlinks that you click on a web page into numeric IPv4 and/or IPv6 addresses. In a sense, the
The DNS System In Depth Read More »
Hi everyone! Being able to decrypt the encrypted contents of packet captures is very important if you want to troubleshoot anything above Layer 4. This is even more important today as the network is evolving to QUIC where everything is encrypted. Check out these great references as well: Our custom profiles repository for Wireshark Our
TLS Decryption in Wireshark Using Key Log Files in Windows, MAC, and Linux Read More »
Check out these great references as well: Our custom profiles repository for Wireshark Our Udemy course on Wireshark Our Udemy course on Wireless Packet capture I am often asked how SSL and TLS can be decrypted in Wireshark captures. I have written a separate article on HTTPS Decryption in Wireshark here. NOTE: Wireshark no longer
Leveraging SSL and TLS Decryption in Wireshark Read More »
Check out these great references as well: Our custom profiles repository for Wireshark Our Udemy course on Wireshark Our Udemy course on Wireless Packet capture If you are a Wireshark power user, you know the importance of complex display filters to narrow searches for very particular items. The challenge can be to recall these filters,
Zero to Hero with Wireshark Display Filter Macros Read More »