Network OUI Squatters and IoT Devices

The American Heritage Dictionary defines a squatter as one who settles on unoccupied land without le...
Read More

The Vulnerable Underbelly of Your Network

What do you really know about the vulnerabilities of your network equipment? An equipment manufactur...
Read More

Total Network Security™

As network engineers, we occasionally empty our favorite adult beverage and discuss "what’s missing ...
Read More

How Do You Find a Cable Fault?

If you had a bad cable causing problems in your network, would you know it? How fast could you find ...
Read More

The Dark Ages of Network Monitoring Need to Come to an End: Networks Should Be Invisible

The history of technology is replete with stories of continuous improvements that aim to make the te...
Read More

Jumbo Frames and VoIP/UC

Getting stuck at a railroad crossing with a super-long freight train can test anyone’s patience. In ...
Read More

Troubleshooting SIP Trunks

Notice: This blog entry has nothing to do with elephants sipping water through trunks. Now that that...
Read More

Do Out-of-Order Packets Affect VoIP?

Some things are never out-of-order. In a busy deli at lunch time, you must take a number and wait yo...
Read More

How Does VoIP Work? Details on the SIP and RTP Protocols

You pick up a handset, dial a number, it rings, and someone answers. How hard can it be? Actually, a...
Read More

Where Does Latency Come From and How Do You Control It?

"Are we there yet?" The age old question evokes images of family vacations that involve long drives ...
Read More

Where Does VoIP Packet Loss Come From? Detecting and Preventing VoIP Packet Loss

Your network infrastructure is very similar to our road infrastructure: Sometimes, your daily commut...
Read More

share this: