Author name: Andrew Walding

My short bio can be viewed here: https://www.evernote.com/l/AKglxPOzlV9E7LHKvPsGzgs-SY3McII8E24

Troubleshooting C15 and MGCP Protocols for VoIP

Let’s start with some simple definitions of these protocols and how they work together. In Voice over IP (VoIP) to PSTN (telephone) network integration, MGCP and C15 can work together as part of a layered signaling architecture that bridges IP-based call control with traditional PSTN switching systems. Here’s how they fit and interact: MGCP (Media

Troubleshooting C15 and MGCP Protocols for VoIP Read More »

Do VPN applications really protect your traffic, and if so, what exactly are they doing to my packets?

Yes, VPN applications do protect your traffic. A VPN is like wearing a costume or a mask because it masks your real identity and location (for the most part anyway), just like a costume or mask hides who you are in real life. That said, someone sold you the mask, so they know who you

Do VPN applications really protect your traffic, and if so, what exactly are they doing to my packets? Read More »

Teaching Kids About Networks/Networking

Teaching kids about networking (the digital kind, not social networking) can actually be a lot of fun if you break it down into simple, relatable concepts and use interactive activities. I have written other articles like teaching kids programming and teaching kids electricity. Here I want to talk about networking. Here’s a step-by-step approach to

Teaching Kids About Networks/Networking Read More »

Capturing Packet Traffic with VLAN Tags on Windows

Capturing network traffic with VLAN tags on a Windows computer can be tricky due to how network adapters and capture software handle VLAN-tagged frames. By default, Windows often strips VLAN tags before passing packets to capture applications like Wireshark. However, there are ways to configure your setup to properly capture VLAN information. 1. Install the

Capturing Packet Traffic with VLAN Tags on Windows Read More »

Implementing AI in Network Automation While Maintaining Human Expertise

As a follow on to my article on whether AI can be used in Networking, this post dives in deeper to a question of will humans still be involved? And if so, how do we upskill that human expertise? To successfully integrate AI into network automation while ensuring human expertise is maintained, organizations and IT

Implementing AI in Network Automation While Maintaining Human Expertise Read More »

An update on QUIC Adoption and traffic levels

Back in 2018 (I think) I was becoming increasingly aware of the QUIC protocol in my and other’s packet captures and I immediately dug in and wrote about it. As of recent data (now Feb 2025), QUIC (Quick UDP Internet Connections) is experiencing significant adoption across the internet. Websites have implemented QUIC, with HTTP/3—built upon

An update on QUIC Adoption and traffic levels Read More »

An Example of AI being used in Network Certification Training

Before I provide the example, let’s be straight up about AI.  Relying on AI for everything is problematic because it diminishes human critical thinking, introduces biases, and creates dependency on automation that may not always be reliable. While AI excels at processing vast amounts of data and automating tasks, it lacks intuition, ethical reasoning, and

An Example of AI being used in Network Certification Training Read More »

Scroll to Top