Byte-Sized Lesson: Troubleshooting Study

Publish date:
Social count:

During the last two years, the primary purpose of this series of Byte-Sized Lessons was to assist the AV industry in understanding TCP/IP technology. We’ve discussed and examined protocols, addressing, standards, and how IP is used. This article will present a case study and give you the opportunity to apply what these lessons have shown.


Abigail works for XYZ Company as a video technician. She installs cameras, encoders, decoders, digital signage, DVRs, and similar AV devices. Recently, the company consolidated two offices and she inherited a camera from the one that was closed. She would like to redeploy it in her network. She knows the office that closed used the subnet address and she is confident that the password shared by all the company cameras is the same. She can use the Ethernet/web interface to the camera but must know the current IP address that has been assigned to it. Unfortunately, the technician who knows the address left the company when the office closed. How can she get the address? I suggest you pause to think about a possible method and then read further.


Some people would quickly respond, “Do a factory reset and start over.” However, there is a disadvantage to that method. Even if it can be done, after the reset, all firmware upgrades will need to be reinstalled, which could be time consuming.

Most IT technicians would immediately think of using the free software utility Wireshark. With it, you can see and record all packets on a network. By connecting it to the camera, you can analyze how it attempts to join the network.

With Wireshark, you can see and record all packets on a network.

With Wireshark, you can see and record all packets on a network.

Turning now to the camera: when it boots, it will follow a procedure much as any network-attached computing device would. Let’s say the camera is configured with the address One of the first things the camera will likely do when it is powered on is to determine if that address is already in use. So, it will send an ARP (address resolution protocol) packet as a broadcast, which asks, “Does anyone have the address Tell my mac address about it.” If Abigail has Wireshark connected to the camera and running, she’ll see this exchange.

Suppose the camera doesn’t usually check for duplicated addresses. It is still very likely that it will attempt to connect to its local router (gateway). If the camera is configured in the typical manner, its router will be Again, when the camera is powered on, Abigail can use Wireshark to see the ARP packet asking, “Who has the address Tell” With the IP address and the password, she can now reconfigure the camera for her own network.

This process is simple and should take no more than five minutes. If you are responsible for device support and maintenance, Wireshark is an excellent tool to have installed on you PC.

Phil Hippenstel, PhD, is a regular columnist with AV Technology. He teaches information systems at Penn State Harrisburg.


Byte-Sized Lesson in AV/IP: IGMP Snooping promo image

Byte-Sized Lesson in AV/IP: IGMP Snooping

The VLAN tag also makes reference to a list of mac addresses or physical ports on the switches. However, a router makes its relaying decision based on a list of network addresses. This is where the problem with multicasting becomes evident.