• Telecommunications Consulting

    Telecommunications Consulting

    Consulting Services from Network Design to Project Management Read More
  • Internetworking Training Experts

    Internetworking Training Experts

    Click on Training and then Courses. Read More
  • Wireshark Experts

    Wireshark Experts

    Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain. Read More
  • Are you a Network Scientist?

    Are you a Network Scientist?

    Online Learning, Instructor Led in person or Web-based delivery. Check out our online school. Read More
  • Online Certification Training

    Online Certification Training

    Find out about our Network Self Certification Program for Rural Service Providers here! Read More
  • IPv6 Experts

    IPv6 Experts

    Along with other Internet regions, ARIN is out of IPv4 Addresses. Are you IPv6 fluent? Are you IPv6 ready? Read More
  • Enabling the IoT with Wireless

    Enabling the IoT with Wireless

    Without wireless, we cannot have the Internet of Things. Read More
  • MPLS Book for iPad and iPhone

    MPLS Book for iPad and iPhone

    Get Mr. Walding's book here! Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Welcome to CellStream, Inc. - Telecom Consulting and Training!

Welcome to our home on the Internet, where we can not only share information, but also interact with each other.

If you are a visitor to the site, there are a number of things to view:

The Articles Menu contains links to our FAQ'sNetworking and Computing Tips, our CellStream Blog, and other fun reading,

The Articles> Public Web Links are where we have listed our favorite TED Talks and many other great links.

The Training menu provides access to our courses, our course calendar, and learning services.

The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.

Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.

The CellStream Team

Let me begin with a little background.  At CellStream, and the Online School of Network Sciences, we have taught hundreds of Wireshark classes for general networking, voice networking, data center networking and wireless networking.  As our students and clients know, we depend heavily of a hands on approach to learning.  For Wireshark classes, this means installing and running Wireshark on the student's local machine (Wireshark is free, and installs on Windows, MAC OSx, and Linux).  We then provide a variety of packet capture files to study how to best use the tool.  Our clients vary from equipment manufacturers to networking companies, like service providers.

Now I can start on my complaint.  I direct my complaint primarily to the service providers and networking companies that either a) restrict their technical staff to not being able to download and install Wireshark - the employee does not have the appropriate Administrative privileges, or b) refuse to use Wireshark because they think it is some kind of hacking tool.  Instead of using this great tool, they often choose to swap equipment or update software until the problem 'goes away'.

A screenshot of Wireshark packet analyzer:  Even a beginner can tell there are issues here!  And all the lights would be green on the modem/router!

Screen Shot 2017 11 14 at 5.22.06 PM

Naturally, there is no black and white here, but allow me to define some clarity.

Let's start with the 'hacker tool' accusation.  Without question, you can use Wireshark to capture someone's traffic/packets that contain a clear case password.  However, leaving that statement as the reason for not trusting the tool actually demonstrates a very poor, limited understanding of how networking in general, and packet capture specifically, actually works.  Wireshark is a protocol analyzer.  Such tools have been necessary (like T1 BERT testers and dozens of other similar tools) since the beginning of digitization!  What makes Wireshark special, and necessary, is that most network problems today are based on data communications that occur in differnet protocols at many different layers.  Anyone trying to solve slow performance or connectivity issues must use a tool like Wireshark to examine these layers, and be proficient in it - not as a last resort, but maybe even as the first step in analyzing the problem.  So let me be more precise: not using this tool is handicapping your staff and company from being able to solve network issues and foster customer satisfaction - and it's free!  Now some further clarity: a) you cannot use Wireshark to bring down a network, b) Wireshark cannot magically unencrypt encrypted traffic, so without the encryption keys, data is safe (with the keys nothing is safe and Wireshark is not the tool to use if you have the keys and you want to do damage), and c) Wireshark does no hacking functions (there are plenty of other tools to do that).  So the next time someone uses the 'hacker tool' excuse, do what I do, forgive them for not understanding, or knowing what they are talking about.  If that is the IT person at your company - they need knowledge and understanding (send them to us!!).

Now let's tackle the restrictions placed on employee laptops.  Again, no black and white.  I understand, just like anyone at SONY will confirm, once a bad peice of software is installed on the corporate network, the result can be catastrophic.  Stopping there is not the answer, however.  For example, the SONY hack and many other came from Email or Web Browsing, not from installation of software from reliable sources.  If you took this more bluntly you would never install anything from Microsoft!!  It is a ridiculous excuse.  But let's get back to Wireshark.  I understand that the issue here is with 'open source'.  Wireshark is open source.  Once again, knowledge and understanding are key.  It would be ignorant to say that anyone can contribute code into the Wireshark repository.  That is simply not the case, and that is simply not the case for most every legitimate open source projects.  Contributions are carefully vetted and considered and tested by such projects and Wireshark is no exception.  Access to their core code is limited to a very special group of people, and further there has never been an issue with the Wireshark code to date.  Does that mean that you can expect this software to be bug free?  Of course not.  What is at steak is a bigger issue, that I have even witnessed.  Due to these unjustified, unlearned assertions and policies, networking professionals can say "I can't use that tool"  or "My company does not approve of it." Thus the policy has become the reason for ignorance, and limited skill building, at a time when networking is getting ever so much more complex such that the understanding and skill set that a tool like Wireshark leverages are critical in today's Internet.  Again, I say that if this is the case in your company, send them to us so we can educate, inform, and change their modality.

Every company should have policies about how to use corporate resources and tools.  In the case of Wireshark, it should be crystal clear how capture files that contain customer traffic are ethically and properly handled.  They can even be anonymized using free tools like Tracewrangler. 

Any network is a forward thinking infrastructure by its nature.  Whether it is roads or fibers, technology rapidly advances to get better, cheaper, and more complex usage models in play as swiftly as possible.  Look at cars, trucks, planes, trains, and shipping. And ofcourse the Internet - that of course being packets.  None of these networks is standing still, least of all the Internet itself.  The Internet of Stuff is expanding and you have to ask yourself, what are the tools you need to mater to understand when something goes wrong?  A packet/protocol analyzer is a must have - and the must have analyzer is Wireshark.

If you want to make a big difference to your networking company, to your customer satisfaction, to your technical employee knowledge, the one thing you can do is start allowing your team to learn and use the tool.  Do it today!

 

Comments powered by CComment

Our Latest Content

  • GeoIP Add In for Wireshark 2.6 and Later

    Teaching a Wireshark class with some cellular company employees, I was asked how to integrate the GeoIP IP Address resolution. 

    Read More
  • How much QUIC Traffic is there?

    We have previously published two articles on Google's QUIC protocol: Is there a lot of QUIC in your Packet Captures?

    Read More
  • My Traceroute in Linux

    Since we published the Linux Networking Commands article in October 2017, I have had several comments that I should have

    Read More
  • Testing/Baselining DNS Server Performance

    As a follow on to our DNS In Depth article, we wanted to provide a reference to a great tool.

    Read More
  • Using Ansible for Network Automation

    Ansible is a tool used to automate Server provisioning and network provisioning.  Ansible is completely free!  You can dive deep

    Read More
  • 1
  • 2
  • 3
  • 4

Our Most Popular Articles

  • What is the 'arp' command, and how can I use it?

    ARP stands for Address Resolution Protocol.  This protocol is used by network nodes to match IP addresses to MAC addresses. 

    Read More
  • Neighbor Discovery (ND) Table in IPv6 Windows, Linux and MAC Machines

    A great question I was asked in class was: "If Neighbor Discovery processes have replaced ARP in ICMPv6, how do

    Read More
  • IPv6 Windows Command Line Examples

    Here are some great Windows command line entries you can make to examine and configure IPv6 (assuming your version of

    Read More
  • How do I reset my "Default" profile in Wireshark?

    This is a commonly asked question that usually results from users learning the can have different profiles after they have

    Read More
  • A List of Network Monitoring Tools for Network and System Administrators

    Monitoring, analyzing, managing, and diagraming a network can often be a huge problem for Network and System Administrators.  They are

    Read More
  • 1
  • 2
  • 3
  • 4

Event Booking Mini Calendar

June   2018
S M T W T F S
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Subscribe to our Newsletter!

Find by Tag

4G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az Ad-Hoc Addressing Analysis Ansible Apple Architecture ARP Assessment AToM Automation Baseline BGP Billing Bloom's Taxonomy Bluehost BPF Briefings Cable Capture Filter CellStream Cellular Central Office Cheat Sheet Chrome Cisco Click Model Cloud CMD Company Policy Computer Consulting Data Center Data Networking Decryption Dependencies DHCPv6 dig Display Filter DNS Documentation Earth Earthquakes Ethernet Ethics Etiquette Evaluation Filter Five Monkey Rule G-MPLS Gauge GeoIP GNS3 Google Hands-On Hiring History Home Network HTTPS ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 India Internet IoT IPv4 IPv6 IRINN IS-IS L2VPN L3VPN LDP LifeNet Linux LLN LoL M-BGP MAC Macro Management Microsoft Milky Way mininet Monitoring MPLS mtr Multicast Murphy Name Resolution Netcat NetMon netsh Networking nmap nslookup Observations OLPC Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Personnel Policy POTS POTS to Pipes PPP Profile Project Management PW3E QoS QUIC Railroad Remote Desktop Requirements Review RIP Routig Routing RPL RSVP Rural Scanning SDN Security Service Provider Small Business SONET Spam Speed SS7 SSL Status Storms Subnetting Support T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone Testing TLS Tools Traceroute Traffic Engineering Training TRANSUM Travel Tunnel Ubuntu Utility Video Virtualization VoIP VRF Wi-Fi Windows Wireless Wireless 5G Wireshark WLAN ZigBee

Twitter Feed

SiteLock