Monday, May 2, 2022

LAB: What happens when you are assigned 2 gateways

 Had a client ask me what would happen if you assigned 2 default gateways to a windows 10 client?

My response was “Doesn’t matter what I think, let's find out”. I asked “Why would you ask?” and he replied that a consultant was over the other day and was telling the team that if you assign 2 default gateways to a windows 10 client, the client will use both in a load balancing/round-robin fashion.

I set up 2 routers and created a DHCP scope assigning 2 default gateways and captured some packets.

I wasn’t surprised when I saw that the client only used one of the 2 gateways.

I think the conversation took longer than the actual test. 😊

The moral of the story is “always pay attention to what technical people claim so you can go away and test it out.



Thursday, April 21, 2022

5Ghz iperf testing

 One of the most difficult topics to tackle is correlating performance with WiFi statistics.

The easiest way to learn or get a grasp of your RF/WiFi environment is to measure its performance.

For example, to surf, download and check your email, run a default iperf test to determine your throughput. For audio calls, video calls, remote desktop, citrix or streaming, you should consider iperf UDP tests to record your jitter and packet loss.

It is important to see if wireless devices stay connected to access points that are not the closest, or have the best signal quality. In other words, do they hang on to their access point when there are better options?

In this video I show you how to start a simple survey using iperf and encourage you to do the same in your environment.



Tuesday, April 19, 2022

Wireshark Conversation Tip

 Many times I do stuff out of habit or reflex and all it takes is for someone to say “what did you do?” to realize that it might be worth sharing.


The other day I was working with a client and we were trying identify and isolate the conversation that generated the most traffic.


The first thing I did, again out of habit, was pull down the Statistics->Conversation report to identify the TCP or UDP conversation. The analyst I was working with has been learning Wireshark as he needed to (like many people) said “that’s cool” then he asked what the difference was between “endpoints” and “conversations”. It was a great session and we found the conversation quickly.


The next thing I did while going through another trace was use the right-click, Conversation->TCP feature which blew his mind. We went through it a few times and he commented on how much of a time saver that tips is.

So here’s a video with the two tips.



Friday, April 15, 2022

The Hidden History of Big Brother in America by Thom Hartmann: A Review

 

Companies like Facebook-Meta and Google are under increasing scrutiny as we have come to realize that our personal information and browsing habits are the highly profitable product that they are selling. In his book “The Hidden History of Big Brother in America”, radio host and best-selling author Thom Hartmann shows us how the consequences of Big Data are far more extensive than we imagined. His thought-provoking expose details the history of “privacy” and the endgame for Government and Big Business, highlighting the urgency of guarding our information.


After a compelling introduction, this short 4-part book moves through the evolution of the meaning of privacy, the use of personal information for social control, the emergence of so-called surveillance capitalism and the unsettling rise and implications of global cyberwar. Somehow the final section – a call to arms to fight the nefarious uses of private information by Big Tech and Governments – seemed a bit impotent compared to the threats that face us.


Our assumed right to privacy is not explicitly guaranteed in the U.S. Constitution; while the Fourth Amendment assures personal freedom and protects against unreasonable searches, it never uses the word “privacy.” At the time of the Founding Fathers, privacy had a completely different meaning, referring to things done in secret. Asking for privacy in those days meant that you needed to use the toilet, hence the name “privies.” We’ve come a long way, both in plumbing and in personal rights.


Social control is generally the goal of privacy violations, which have been used in various forms from Puritan New England, through the US period of slavery, and into modern times to alter behavior. Supreme Court Justice Louis Brandeis wrote a 1928 opinion mentioning “the right to be let alone” which rocked the legal establishment and ignited generations of debate over an individual’s right to privacy. Nearly four decades later, Justice William O. Douglas affirmed this right, citing the Ninth Amendment which says that just because some rights are specifically detailed in the Constitution doesn’t mean others are automatically excluded. The ensuing series of laws created some protections on wiretapping, financial records and other forms of personal information held by the Federal Government. When Edward Snowden revealed the use of secret, illegal court orders to pry information from ISP’s and phone companies, Congress responded with the 2015 USA Freedom Act which banned this type of bulk information gathering.


Now that the Internet of Things is a thing, many of us are embracing the idea of a smart house where conveniences abound. In exchange, we give up information about the size and layout of our homes, our sleeping habits, our daily schedule, and even our conversations. The services which gather and process this information often use it to create scores, which can then be used to screen people for jobs, loans, and apartment rentals. The accuracy of this data, and the algorithms used to derive the scores, are completely secret.


Spying has been around forever, and governments are always using it to get the upper hand on one another. The risk/reward calculus of cybrwar is far better than nuclear war and may very well define the battlefield for the next great international conflict. So many of the systems we depend on – water, electricity, sewer service, communication – are connected to the Internet and are ripe for disruption. Your smartphone can use facial recognition to log you in or sort your pictures, but China – the world leader in this technology – uses it as the foundation for their surveillance state.


So how do we take back control of our privacy? We exchange information with the government to make us feel more secure, and we make a similar deal with Big Tech to make our lives easier. The European Union has the set of laws known as GDPR (General Data Protection Regulations) that seek to limit the amount of data that can be collected and how it is used. In the US, government agencies may have some restrictions on what they can gather from residents without the use of a warrant, but spying on people remains the fundamental business model of Big Tech.


The title “Hidden History....” raises expectations of new information or connections that we haven’t read before, and Hartmann’s book doesn’t disappoint. His biases as a popular progressive radio host are apparent, but the book is well researched, and an extensive list of references support his narrative. Hartmann’s personal experiences with the “Stingray” cell towers that surround the White House, or while visiting East Berlin with his daughter in the late 1980’s, are both revealing and impactful. Using people’s past behavior to sell them stuff, for social control, or as a form of warfare is not a new thing, but the speed and precision with which this can be done has grown frighteningly over the past few decades.


This is something to think about the next time you ask Alexa to order more tissue for the “privy.”


Author Profile - Paul W. Smith - leader, educator, technologist, writer - has a lifelong interest in the countless ways that technology changes the course of our journey through life. In addition to being a regular contributor to NetworkDataPedia, he maintains the website Technology for the Journey and occasionally writes for Blogcritics. Paul has over 40 years of experience in research and advanced development for companies ranging from small startups to industry leaders. His other passion is teaching - he is a former Adjunct Professor of Mechanical Engineering at the Colorado School of Mines. Paul holds a doctorate in Applied Mechanics from the California Institute of Technology, as well as Bachelor’s and Master’s Degrees in Mechanical Engineering from the University of California, Santa Barbara.



Popular post