• Telecommunications Consulting

    Telecommunications Consulting

    Consulting Services from Network Design to Project Management Read More
  • Internetworking Training Experts

    Internetworking Training Experts

    Click on Training and then Courses. Read More
  • Wireshark Experts

    Wireshark Experts

    Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain. Read More
  • Are you a Network Scientist?

    Are you a Network Scientist?

    Online Learning, Instructor Led in person or Web-based delivery. Check out our online school. Read More
  • Online Certification Training

    Online Certification Training

    Find out about our Network Self Certification Program for Rural Service Providers here! Read More
  • IPv6 Experts

    IPv6 Experts

    Along with other Internet regions, ARIN is out of IPv4 Addresses. Are you IPv6 fluent? Are you IPv6 ready? Read More
  • Enabling the IoT with Wireless

    Enabling the IoT with Wireless

    Without wireless, we cannot have the Internet of Things. Read More
  • MPLS Book for iPad and iPhone

    MPLS Book for iPad and iPhone

    Get Mr. Walding's book here! Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Welcome to CellStream, Inc. - Telecom Consulting and Training!

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ'sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our courses, our course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.

Let me begin with a little background.  At CellStream, and the Online School of Network Sciences, we have taught hundreds of Wireshark classes for general networking, voice networking, data center networking and wireless networking.  As our students and clients know, we depend heavily of a hands on approach to learning.  For Wireshark classes, this means installing and running Wireshark on the student's local machine (Wireshark is free, and installs on Windows, MAC OSx, and Linux).  We then provide a variety of packet capture files to study how to best use the tool.  Our clients vary from equipment manufacturers to networking companies, like service providers.

Now I can start on my complaint.  I direct my complaint primarily to the service providers and networking companies that either a) restrict their technical staff to not being able to download and install Wireshark - the employee does not have the appropriate Administrative privileges, or b) refuse to use Wireshark because they think it is some kind of hacking tool.  Instead of using this great tool, they often choose to swap equipment or update software until the problem 'goes away'.

A screenshot of Wireshark packet analyzer:  Even a beginner can tell there are issues here!  And all the lights would be green on the modem/router!

Screen Shot 2017 11 14 at 5.22.06 PM

Naturally, there is no black and white here, but allow me to define some clarity.

Let's start with the 'hacker tool' accusation.  Without question, you can use Wireshark to capture someone's traffic/packets that contain a clear case password.  However, leaving that statement as the reason for not trusting the tool actually demonstrates a very poor, limited understanding of how networking in general, and packet capture specifically, actually works.  Wireshark is a protocol analyzer.  Such tools have been necessary (like T1 BERT testers and dozens of other similar tools) since the beginning of digitization!  What makes Wireshark special, and necessary, is that most network problems today are based on data communications that occur in differnet protocols at many different layers.  Anyone trying to solve slow performance or connectivity issues must use a tool like Wireshark to examine these layers, and be proficient in it - not as a last resort, but maybe even as the first step in analyzing the problem.  So let me be more precise: not using this tool is handicapping your staff and company from being able to solve network issues and foster customer satisfaction - and it's free!  Now some further clarity: a) you cannot use Wireshark to bring down a network, b) Wireshark cannot magically unencrypt encrypted traffic, so without the encryption keys, data is safe (with the keys nothing is safe and Wireshark is not the tool to use if you have the keys and you want to do damage), and c) Wireshark does no hacking functions (there are plenty of other tools to do that).  So the next time someone uses the 'hacker tool' excuse, do what I do, forgive them for not understanding, or knowing what they are talking about.  If that is the IT person at your company - they need knowledge and understanding (send them to us!!).

Now let's tackle the restrictions placed on employee laptops.  Again, no black and white.  I understand, just like anyone at SONY will confirm, once a bad peice of software is installed on the corporate network, the result can be catastrophic.  Stopping there is not the answer, however.  For example, the SONY hack and many other came from Email or Web Browsing, not from installation of software from reliable sources.  If you took this more bluntly you would never install anything from Microsoft!!  It is a ridiculous excuse.  But let's get back to Wireshark.  I understand that the issue here is with 'open source'.  Wireshark is open source.  Once again, knowledge and understanding are key.  It would be ignorant to say that anyone can contribute code into the Wireshark repository.  That is simply not the case, and that is simply not the case for most every legitimate open source projects.  Contributions are carefully vetted and considered and tested by such projects and Wireshark is no exception.  Access to their core code is limited to a very special group of people, and further there has never been an issue with the Wireshark code to date.  Does that mean that you can expect this software to be bug free?  Of course not.  What is at steak is a bigger issue, that I have even witnessed.  Due to these unjustified, unlearned assertions and policies, networking professionals can say "I can't use that tool"  or "My company does not approve of it." Thus the policy has become the reason for ignorance, and limited skill building, at a time when networking is getting ever so much more complex such that the understanding and skill set that a tool like Wireshark leverages are critical in today's Internet.  Again, I say that if this is the case in your company, send them to us so we can educate, inform, and change their modality.

Every company should have policies about how to use corporate resources and tools.  In the case of Wireshark, it should be crystal clear how capture files that contain customer traffic are ethically and properly handled.  They can even be anonymized using free tools like Tracewrangler. 

Any network is a forward thinking infrastructure by its nature.  Whether it is roads or fibers, technology rapidly advances to get better, cheaper, and more complex usage models in play as swiftly as possible.  Look at cars, trucks, planes, trains, and shipping. And ofcourse the Internet - that of course being packets.  None of these networks is standing still, least of all the Internet itself.  The Internet of Stuff is expanding and you have to ask yourself, what are the tools you need to mater to understand when something goes wrong?  A packet/protocol analyzer is a must have - and the must have analyzer is Wireshark.

If you want to make a big difference to your networking company, to your customer satisfaction, to your technical employee knowledge, the one thing you can do is start allowing your team to learn and use the tool.  Do it today!

 

Comments powered by CComment

Our Latest Content

  • IPv4/IPv6 Path MTU Discovery Demystified

    A major change in the behavior of IP networks between IPv4 and IPv6 is that in IPv6 networks, all hosts

    Read More
  • Creating Delay to a Subnet Tech Tip

    I received a question on how to create a delay to a subnet using GNS3. Below is my answer:

    Read More
  • GNS3 in Linux - Tech Tip - Docker Error

    I recently watched a YouTube video where one of the GNS3 creators was talking about GNS3 and how it runs. 

    Read More
  • The Linux 'ip' Command in Networking

    One way to examine your network configuration in Linux is to use the "ip" command.  I have attached a cheat

    Read More
  • Detecting ECMP in Linux using Paris and Dublin Traceroute

    Traceroute Comparison Capture pcapng for Wireshark Equal-Cost Multi-Path (ECMP) is a forwarding mechanism for routing packets along multiple paths of

    Read More
  • 1
  • 2
  • 3
  • 4

Our Most Popular Articles

  • What is the 'arp' command, and how can I use it?

    Let's answer the question.  If you want more details than what we have provided below, check out our chapter on

    Read More
  • Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines

    A great question I was asked in class was: "If Neighbor Discovery processes have replaced ARP in ICMPv6, how do

    Read More
  • IPv6 Windows Command Line Examples

    Here are some great Windows command line entries you can make to examine and configure IPv6 (assuming your version of

    Read More
  • How do I reset my "Default" profile in Wireshark?

    This is a commonly asked question that usually results from users learning the can have different profiles after they have

    Read More
  • A List of Network Monitoring Tools for Network and System Administrators

    Monitoring, analyzing, managing, and diagraming a network can often be a huge problem for Network and System Administrators.  They are

    Read More
  • 1
  • 2
  • 3
  • 4

Event Booking Mini Calendar

December   2018
S M T W T F S
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

Subscribe to our Newsletter!

Find by Tag

4G Networks 5G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az Ad-Hoc Addressing Analysis Ansible Architecture ARP Assessment AToM Automation Baseline BGP Bloom's Taxonomy Cable cat CellStream Cellular Central Office Cheat Sheet Chrome Cisco Cloud CMD Company Policy Computer Consulting Data Center Data Networking Dependencies DHCPv6 DNS Docker Documentation Dublin-Traceroute dumpcap Earth Earthquakes ECMP Ethernet Ethics Etiquette Evaluation Field Operations Fragmentation G-MPLS Gauge GeoIP GNS3 Google GQUIC Hands-On History Home Network ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 India Internet IoT IPv4 IPv6 IRINN IS-IS L2VPN L3VPN LDP LifeNet Linux LLN LoL M-BGP MAC Macro Microsoft Milky Way mininet Monitoring MPLS mtr MTU Multicast Murphy Name Resolution Netcat NetMon netsh Networking nmap NSE Observations OLPC Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Paris-Traceroute Parrot PIM PMTU Policy POTS POTS to Pipes PPP Profile Project Management PW3E QoS QUIC Railroad Remote Desktop Requirements Resume Review RIP Routing RPL RSVP Rural SDN Security Service Provider Small Business SONET Speed SSL Status Storms Subnetting SYSCTL T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone Testing Tools Traceroute Traffic Engineering Training Travel Tunnel Ubuntu Utility Video Virtualbox Virtualization VoIP VRF VXLAN Wi-Fi Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Windows Wireless Wireless 5G Wireshark WLAN Writing Zenmap ZigBee

Twitter Feed