Thursday, April 21, 2022

5Ghz iperf testing

 One of the most difficult topics to tackle is correlating performance with WiFi statistics.

The easiest way to learn or get a grasp of your RF/WiFi environment is to measure its performance.

For example, to surf, download and check your email, run a default iperf test to determine your throughput. For audio calls, video calls, remote desktop, citrix or streaming, you should consider iperf UDP tests to record your jitter and packet loss.

It is important to see if wireless devices stay connected to access points that are not the closest, or have the best signal quality. In other words, do they hang on to their access point when there are better options?

In this video I show you how to start a simple survey using iperf and encourage you to do the same in your environment.



Tuesday, April 19, 2022

Wireshark Conversation Tip

 Many times I do stuff out of habit or reflex and all it takes is for someone to say “what did you do?” to realize that it might be worth sharing.


The other day I was working with a client and we were trying identify and isolate the conversation that generated the most traffic.


The first thing I did, again out of habit, was pull down the Statistics->Conversation report to identify the TCP or UDP conversation. The analyst I was working with has been learning Wireshark as he needed to (like many people) said “that’s cool” then he asked what the difference was between “endpoints” and “conversations”. It was a great session and we found the conversation quickly.


The next thing I did while going through another trace was use the right-click, Conversation->TCP feature which blew his mind. We went through it a few times and he commented on how much of a time saver that tips is.

So here’s a video with the two tips.



Friday, April 15, 2022

The Hidden History of Big Brother in America by Thom Hartmann: A Review

 

Companies like Facebook-Meta and Google are under increasing scrutiny as we have come to realize that our personal information and browsing habits are the highly profitable product that they are selling. In his book “The Hidden History of Big Brother in America”, radio host and best-selling author Thom Hartmann shows us how the consequences of Big Data are far more extensive than we imagined. His thought-provoking expose details the history of “privacy” and the endgame for Government and Big Business, highlighting the urgency of guarding our information.


After a compelling introduction, this short 4-part book moves through the evolution of the meaning of privacy, the use of personal information for social control, the emergence of so-called surveillance capitalism and the unsettling rise and implications of global cyberwar. Somehow the final section – a call to arms to fight the nefarious uses of private information by Big Tech and Governments – seemed a bit impotent compared to the threats that face us.


Our assumed right to privacy is not explicitly guaranteed in the U.S. Constitution; while the Fourth Amendment assures personal freedom and protects against unreasonable searches, it never uses the word “privacy.” At the time of the Founding Fathers, privacy had a completely different meaning, referring to things done in secret. Asking for privacy in those days meant that you needed to use the toilet, hence the name “privies.” We’ve come a long way, both in plumbing and in personal rights.


Social control is generally the goal of privacy violations, which have been used in various forms from Puritan New England, through the US period of slavery, and into modern times to alter behavior. Supreme Court Justice Louis Brandeis wrote a 1928 opinion mentioning “the right to be let alone” which rocked the legal establishment and ignited generations of debate over an individual’s right to privacy. Nearly four decades later, Justice William O. Douglas affirmed this right, citing the Ninth Amendment which says that just because some rights are specifically detailed in the Constitution doesn’t mean others are automatically excluded. The ensuing series of laws created some protections on wiretapping, financial records and other forms of personal information held by the Federal Government. When Edward Snowden revealed the use of secret, illegal court orders to pry information from ISP’s and phone companies, Congress responded with the 2015 USA Freedom Act which banned this type of bulk information gathering.


Now that the Internet of Things is a thing, many of us are embracing the idea of a smart house where conveniences abound. In exchange, we give up information about the size and layout of our homes, our sleeping habits, our daily schedule, and even our conversations. The services which gather and process this information often use it to create scores, which can then be used to screen people for jobs, loans, and apartment rentals. The accuracy of this data, and the algorithms used to derive the scores, are completely secret.


Spying has been around forever, and governments are always using it to get the upper hand on one another. The risk/reward calculus of cybrwar is far better than nuclear war and may very well define the battlefield for the next great international conflict. So many of the systems we depend on – water, electricity, sewer service, communication – are connected to the Internet and are ripe for disruption. Your smartphone can use facial recognition to log you in or sort your pictures, but China – the world leader in this technology – uses it as the foundation for their surveillance state.


So how do we take back control of our privacy? We exchange information with the government to make us feel more secure, and we make a similar deal with Big Tech to make our lives easier. The European Union has the set of laws known as GDPR (General Data Protection Regulations) that seek to limit the amount of data that can be collected and how it is used. In the US, government agencies may have some restrictions on what they can gather from residents without the use of a warrant, but spying on people remains the fundamental business model of Big Tech.


The title “Hidden History....” raises expectations of new information or connections that we haven’t read before, and Hartmann’s book doesn’t disappoint. His biases as a popular progressive radio host are apparent, but the book is well researched, and an extensive list of references support his narrative. Hartmann’s personal experiences with the “Stingray” cell towers that surround the White House, or while visiting East Berlin with his daughter in the late 1980’s, are both revealing and impactful. Using people’s past behavior to sell them stuff, for social control, or as a form of warfare is not a new thing, but the speed and precision with which this can be done has grown frighteningly over the past few decades.


This is something to think about the next time you ask Alexa to order more tissue for the “privy.”


Author Profile - Paul W. Smith - leader, educator, technologist, writer - has a lifelong interest in the countless ways that technology changes the course of our journey through life. In addition to being a regular contributor to NetworkDataPedia, he maintains the website Technology for the Journey and occasionally writes for Blogcritics. Paul has over 40 years of experience in research and advanced development for companies ranging from small startups to industry leaders. His other passion is teaching - he is a former Adjunct Professor of Mechanical Engineering at the Colorado School of Mines. Paul holds a doctorate in Applied Mechanics from the California Institute of Technology, as well as Bachelor’s and Master’s Degrees in Mechanical Engineering from the University of California, Santa Barbara.



Monday, April 11, 2022

"Get Off Your Butt and Go for A Walk!"

 One of the key points I occasionally make when teaching, presenting or writing, is that sometimes you need to stop looking at your red light/green light monitoring system, stop pinging, and please stop rebooting equipment! Nothing replaces getting out there and physically looking at the problem.


In my 30+ years of troubleshooting, I can not tell you how many times the problem looked obvious when I physically got out there to investigate the problem. I've seen a ladder leaned up against a breaker, cables pressed up against power buttons, equipment hanging in a bag that was powered on causing the bag to melt around it, excess cabling wrapped around an arc welder, cables pinched in doors, cables spliced and wrapped in electrical tape, trust me, the list goes on.


In this case, some wireless equipment had a poor signal and the technicians were rebooting it, checking for noise, etc. I then found out that the signal went out of wack after a wind storm, so I climbed up (why I'm huffing and puffing a bit) and sure enough the bolts on the bracket that stabilizes the tower had come loose.


Before you comment that "sometimes its not possible to go out everywhere", i simply counter that argument with "use your tech" use Zoom, facetime, or ask someone there to take photos/videos. Trust me, its better than nothing.



Popular post