Home

Telecommunications Consulting Services
Consulting Services from Network Design to Project Management
Check Out our Consulting Services
Internetworking Training Experts
Training and Learning Services focused on the technology that makes the Internet work.
Check Out our Learning Services
Wireshark Experts
Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain.
View Our Wireshark Classes
Are you a Network Scientist?
If you are just getting started in networking or you have been in the industry/technology for years you know there is so much to learn and so much to explore in networking technologies. Explore our vast collection of articles and reading.
Read More
Online Certification Training
Find out about our Network Self Certification Program for Rural Service Providers at the Online School of Network Sciences
Check Out Our Program at our Online School

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ’sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our coursesour course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.
Thanks for visiting! We always welcome comments and suggestions.  You can also join our Discord Server here!

Mapping ABR to TCP Congestion Control and QUIC

Post Views: 31 I described what Adaptive Bit Rate Streaming (ABR) is in my prior article, if you need that background. Also there is an ABR Lab Exercise if you want some hands on learning with ABR that will show you visually some of the items discussed below. Here, I wanted to dive a little

Read More »
What Is Adaptive Bitrate Streaming (ABR)?

Post Views: 95 Adaptive Bitrate Streaming (ABR) is a video delivery method that dynamically adjusts the quality of a stream in real time based on three things: network conditions, device capability, and player performance. Instead of delivering a single fixed-quality, and therefore fixed transfer rate video, ABR continuously selects the most appropriate bitrate to maintain

Read More »
A Synthetic ABR Lab Exercise

Post Views: 90 The following is a step by step lab exercise to examine ABR – Adaptive Bit Rate used in modern video content delivery. I won’t explain ABR here – you can read about ABR and what it is, and how it works here in a recent post. We will analyze a synthetic but

Read More »
What is TCP CUBIC and Why so popular?

Post Views: 175 Most people do not know this, but TCP CUBIC is the dominant congestion control algorithm used in modern TCP/IP networks. It is designed to efficiently utilize high-speed, long-distance links while maintaining fairness across flows with different round-trip times (RTTs). Today, it is the default congestion control algorithm in most Linux systems, and

Read More »
Create your own Wireshark Labs with AI

Post Views: 1,052 I have been teaching Wireshark classes since the early 2000’s, and using it since it was called Ethereal. My usage has primarily focused around troubleshooting network issues that have a packet capture associated with them. My fellow troubleshooters will tell you that this is not always the case. But, if we are

Read More »
Wireshark Ring Buffer Capture Feature

Post Views: 1,000 Check out these great references:  Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy course on Wireless Packet capture Wireshark’s Ring Buffer feature is a capture mechanism feature that automatically rotates packet capture files based on size or time limits, overwriting the oldest files when a defined limit

Read More »
Technology Training at CellStream

Post Views: 14,842 At CellStream, we design and deliver technology training programs specifically aligned to the realities of today’s broadband, telecommunications, and IP-based networking environments. Our focus is not generic IT instruction — it is highly curated, operationally relevant education built for service providers, network engineers, broadband technicians, sales teams, leadership, and customer-facing staff. Our

Read More »
Why don’t you employ the “click” model on your sites?

Post Views: 965 This is a great question recently asked by one of our students/clients when we said our usual introductory comments that “No we won’t spam you”, and “No we don’t use the click model on our sites”.  Now most of you know, we are a small family business, and have been since day

Read More »
Zero-Trust Networking & Converged Security

Post Views: 1,307 The following is a technical SWOT analysis for Network Engineers, Security Engineers, and Senior Technicians. I apologize for the high number of acronyms used below, but hey, this is networking! In networking, Zero-Trust is not a single product or control. It’s an architecture and operating model where no network location (LAN, WAN,

Read More »
Find Articles by Tag
Wireshark (99)Training (94)Cisco (91)CLI (84)Cisco IOS (84)IOS (76)IPv6 (52)Hands On (49)Wi-Fi (44)Security (39)Linux (33)Troubleshooting (32)WLAN (30)IPv4 (30)MS Windows (27)Cybersecurity (25)MS Windows (25)Packet Capture (24)Networking (24)Ethernet (21)CellStream (21)Tools (18)MPLS (18)Self Paced (16)Online (16)Online Course (16)TCP (15)Services (15)Network (13)Broadband (13)BGP (13)Router (12)Service Provider (12)Internet (12)L2 (12)Travel (12)Cheat Sheet (12)QUIC (11)Profile (11)Configuration (10)Free (10)AI (10)QoS (10)Advanced (10)OSPF (10)Consulting (10)Free Training (9)101 (9)Scanning (9)Monitor Mode (9)1-Day (9)Routing (9)L3 (9)Learning (8)RFMON (8)tshark (8)Ubuntu (8)TCP/IP (8)nmap (8)TT&S (7)Top 10 (7)Testing (7)Technicians (7)VoIP (7)Overview (7)SDN (7)Analysis (6)Command Line (6)Tunnel (6)Course (6)Display Filter (6)Bandwidth (6)Voice (6)DNS (6)Switches (5)GNS3 (5)POTS to Pipes (5)Fiber (5)Innovative Systems (5)Speed Test (5)WinFi (5)SIP (5)Skills (5)Traceroute (5)Briefing (5)Certification (5)SWOT (5)Firewall (5)ARP (5)Ping (5)Security Course (4)Instructor Led (4)Windows (4)Online School (4)Telephone (4)TLS (4)POTS (4)FAQ (4)Speed (4)Teaching (4)Kids (4)Automation (4)Google (4)Books (4)Policy (4)netsh (4)Data Center (4)RTP (4)Decryption (4)Monitoring (4)Virtualization (4)Ring Buffer (4)Wireless (4)Artificial Intelligence (4)Ansible (4)EIGRP (4)VLAN (4)Zero-to-Hero (4)Subnetting (4)CBRS (4)VPN (4)ACL (4)VM (4)LAN (4)ICMP (4)MAC (4)ABR (3)NSE (3)Video (3)Microsoft (3)Server (3)DHCP (3)Network Science (3)HTTP (3)Password (3)Reload (3)Command (3)Maintenance (3)nslookup (3)Netstat (3)Remote Desktop (3)TCP CUBIC (3)NAT (3)Service (3)FCC (3)NIST (3)RTCP (3)Toolkit (3)Telecom (3)RIP (3)STP (3)L2VPN (3)MacOS (3)Design (3)HTTPS (3)Privacy (3)Home (3)Map (3)Logging (3)pcap-ng (3)TCP BBR (2)Streaming (2)Strategy (2)PowerShell (2)ChatGPT (2)GMPLS (2)nmap scripting engine (2)Scripting (2)SIP ping (2)Study (2)Reference (2)TCP Reno (2)Computer (2)IP Address (2)Development (2)Review (2)Upgrade (2)Load Balancing (2)Cloud (2)Questions (2)Backup (2)ROMMON (2)Data (2)Routers (2)Interfaces (2)Traditional (2)Technology (2)Employees (2)Operations (2)Order (2)Name Resolution (2)Bypass (2)Protocol (2)History (2)Net Neutrality (2)SSH (2)Switch (2)Bits (2)Capture (2)Adoption Levels (2)CCNP (2)btop (2)htop (2)Repairing (2)MacOS (2)ipconfig (2)RDP (2)TCP New Reno (2)UDP (2)Math (2)Capture Filter (2)Resume (2)Andrew Walding (2)Technician (2)Data Networking (2)Ultimate (2)iptables (2)Wi-Fi Scanner (2)NPAT (2)MPLS L3VPN (2)Customer (2)whois (2)SD-WAN (2)Security Techniques (2)Packet Analysis (2)SDP (2)Wi-Fi 7 (2)tracert (2)Macros (2)VirtualBox (2)Benchmark (2)VXLAN (2)NVMe (2)iSCSI (2)Etherchannel (2)Telecom 101 (2)Web Based (2)CSR (2)Utilities (2)Terminal (2)Wi-Fi 6 (2)Outage (2)Email (2)RFC's (2)Tool (2)Presentation (2)L2 VPN (2)MPLS-TE (2)L3 VPN (2)Blog (2)CPI (2)Addressing (2)Facebook (2)Lab (2)IPsec (2)GitHub (2)pcap (2)VPWS (2)BDP (1)CDN (1)Subnet (1)BPF (1)AdWords (1)Amazon (1)Click Model (1)Zero Trust (1)Competitive (1)Fiber Optics (1)Warnings (1)Traffic Cams (1)OSS (1)Travel Planning (1)Western US (1)169.254.x.x (1)APIPA (1)Link Local (1)Protocol Ladder (1)TLS 1.2 (1)Loopback Interface (1)Tap (1)Network Tap (1)Comprehensive (1)GOAT (1)Panel Discussion (1)Keynote (1)Blue Team (1)Red Team (1)Android (1)Soft Layering (1)Layered Model (1)OSI (1)Layers (1)Scripts (1)zenmap (1)Beacon Frame (1)Subcarrier (1)Channel (1)WlanHelper (1)sipsak (1)Tool Belt (1)CompTIA (1)A+ (1)CCNA (1)Certs (1)Compliance (1)Pitfalls (1)Algorithms (1)Examples (1)Real World (1)Retransmission (1)Flow Control (1)Congestion Control (1)TCP Algorithms (1)TCP Vegas (1)TCP Tahoe (1)Guide (1)Flags (1)Network Engineering (1)Degree (1)Graduation (1)DISM (1)chkdsk (1)sfc (1)Starlink (1)Dual Stack (1)Translation (1)CGNAT (1)Moore (1)Moore's Law (1)Topology (1)ShowNet (1)Web Site (1)Air Traffic (1)Traveler (1)Impolite (1)Food for Thought (1)Cleanup (1)Pre-Fetch (1)Removing (1)Device Drivers (1)Employee (1)Supervisor (1)Manager (1)Personnel (1)Resilient (1)Disaster (1)Signs (1)Internet Era (1)Politicians (1)Impact (1)Save Space (1)Disk Space (1)Public IP (1)Dynamic DNS (1)Remote Control (1)Support (1)Desktop Sharing (1)Clean (1)Autorun (1)Speaking (1)Wisconsin (1)WSTA (1)Computers (1)Subscribers (1)How To's (1)Tech Tips (1)Customer Unhappy (1)Failure to deliver (1)Overcommitment (1)Rejection (1)Ancient (1)Tech Support (1)Keep Trying (1)Failures (1)Edison (1)Letter (1)Complaint (1)Social Media (1)ROI (1)Task Management (1)Deep Dive (1)Unresponsive (1)Transformation (1)Central Office (1)VMware (1)Static IP (1)VM Server (1)ESX (1)Geolocation (1)Competition (1)Car Rental (1)Rental Cars (1)Save Money (1)Network Sciences (1)List (1)Complete (1)Emoticon (1)Legal (1)Illegal (1)Unsecured (1)Law (1)Install (1)User Interface (1)Tech News (1)Travel Light (1)Life Lessons (1)Censored (1)Filter (1)DHCPv6 (1)Explained (1)Dependencies (1)High Tech (1)Sites (1)Blocking (1)Lesser Known (1)Murphy's Law (1)Desktop (1)Sales (1)Hire (1)Instructors (1)Technical (1)802.11ad (1)802.11ac (1)802.11n (1)Speeds (1)Transit (1)Infrastructure (1)tACL (1)iACL (1)Stateful NAT (1)SNAT (1)VRRP (1)Management (1)Username (1)Warm Upgrade (1)Coloring Rules (1)Report (1)connections (1)area (1)local (1)ip command (1)Registration (1)BBS (1)Bulletin Board (1)Addresses (1)2^128 (1)Instructional (1)Filtered (1)Search (1)Sharepoint (1)Mitigation (1)Attack (1)Overflow (1)CAM Table (1)Rates (1)Mileage (1)Phone Book (1)Company (1)Gardar (1)Edinburg (1)Slow Death (1)Upgrade IOS (1)Better (1)Instructor (1)Parenting (1)Universe (1)3D (1)Harvard (1)AAA (1)Hotel Glasses (1)Don't Drink (1)NBAR (1)Software (1)Update (1)Limit (1)Back up (1)Web Server (1)Real Time (1)dd-wrt (1)Gateway (1)House of Representatives (1)Why use us? (1)Remote (1)Rollback (1)Procedure (1)System (1)Client (1)Route Selection (1)Path Selection (1)show version (1)show ver (1)Copying (1)C15 (1)MGCP (1)Settings (1)Computing (1)Airline (1)Best (1)TELNET (1)Activities (1)Restore (1)Conversations (1)Temporary (1)Colors (1)HSRP (1)Details (1)Find (1)IP Mobility (1)modify (1)interrupt (1)console (1)more (1)show diag (1)Timestamps (1)FLASH (1)Partition (1)Policy Based (1)PBR (1)Download Speed (1)HD Movie (1)HD (1)Streamline (1)cRTP (1)OnePK (1)ONE (1)Traffic (1)GodMode (1)GRE (1)Shortcuts (1)Keyboard (1)Smartports (1)Config Register (1)Null Interface (1)Black Hole (1)CAR (1)Supernetting (1)Protected Ports (1)OpenFlow (1)Timeline (1)IoT (1)ACI (1)APIC (1)Center (1)LDP (1)Associations (1)route (1)Packets (1)Environment (1)Utilization (1)Basics (1)Access Control (1)WCCP (1)Learn (1)Flipping the Model (1)IP (1)Virtual Machine (1)Depletion (1)Address (1)ARIN (1)Membership (1)Preview (1)PDF (1)Early Adopter (1)Mini Course (1)Rural (1)TRANSUM (1)SSL (1)Hiring (1)Permission (1)Usage (1)ICMPv6 (1)Quick Start (1)Applications (1)GLBP (1)Checksum (1)Core Dump (1)Stop (1)Internet Exchange (1)India (1)PPP (1)Queuing (1)Quality (1)Datacom (1)Newbie (1)Software Defined Networking (1)LISP (1)re-use (1)Copmputers (1)Old (1)Funding (1)USF (1)Timelines (1)Worldwide (1)Apple (1)Administrative Distance (1)Admin Distance (1)IP ID (1)Front Office (1)Pipes (1)VRF Lite (1)Extended Traceroute (1)Extended Ping (1)Netflow (1)Lines (1)PKI Server (1)Secure Code (1)Web Sites (1)Links (1)Delay (1)Setting (1)Clock (1)Lock (1)Alias (1)Cabling (1)Admin (1)Fix (1)Error (1)Default (1)AToM (1)Performance (1)Tech Tip (1)Docker (1)Netmiko (1)Git (1)Python (1)TR-369 (1)TR-069 (1)Wi-Fi 6E (1)Device Driver (1)PC (1)Basic (1)Interview (1)TDM to IP (1)Broken Phone (1)Great Story (1)Field Service (1)Know-it-All (1)Avian Carriers (1)ADSL (1)Bytes (1)Nibbles (1)Binary (1)Hexadecimal (1)Cans and String (1)Squishy Circuits (1)Electricity (1)Coding (1)Analytics (1)Traffic Volume (1)TikTok (1)ILT (1)tilix (1)neofetch (1)ncdu (1)hollywood (1)Soldering (1)Servicing (1)dig (1)CMD (1)Ideas (1)Gift (1)Tech (1)Conference (1)Field Technicians (1)ifconfig (1)Win-Fi (1)What we use (1)Products (1)Our Go Bag (1)Colasoft (1)Compound TCP (1)Retransmissions (1)Value (1)parsing (1)carving (1)Equation (1)Signal to Noise (1)SNR (1)Automatically Switch (1)tcpdump (1)Courses (1)Switching (1)Telephony (1)Flight Tracker (1)Milky Way (1)Galaxy (1)TE (1)Traffic Engineering (1)Fundamentals (1)2-day (1)Adult Learning (1)Animation (1)Graphics (1)Observations (1)Life (1)Rule (1)5 Monkey (1)Quotes (1)Story (1)Flying (1)5-day (1)L3VPN (1)3-Day (1)Product (1)IPTV (1)Multicast (1)OOO (1)Airlines (1)Billing (1)Brainstorming (1)RFP (1)Architecture (1)Requirements (1)SS7 (1)Code of Ethics (1)Social Responsibility (1)Virus (1)Youtube (1)Vudu (1)Netflix (1)Roku (1)OTT (1)Cutting Cable (1)6to4 (1)Earth Status (1)Tri-band (1)Packet Crafting (1)hping3 (1)Physical Layer (1)ufw (1)CrowdStrike (1)Frame Relay (1)ATM (1)Reverse ARP (1)RARP (1)Gratuitous ARP (1)ARP Announcement (1)ARP Probe (1)gQUIC (1)Sys Admin (1)Net Admin (1)Network Monitoring (1)Trace files (1)Wi-Fi Analyzer (1)Reconnaissance (1)Spoofing (1)Switch Port (1)Assessment (1)Research (1)Wayback Machine (1)Archive (1)NoT (1)Network of Things (1)NIST SP 800-183 (1)ISO/IEC 27008 (1)ISO/IEC (1)ISO (1)CUI (1)NIST SP 800-171 (1)SCRM (1)NIST SP 800-161 (1)Supply Chain (1)Alternatives To (1)Fiber Channel (1)Hackathon (1)Wi-Fi 5 (1)Temporary Addresses (1)News (1)ECMP (1)Parrot (1)Root Cause (1)Links List (1)Spanning Tree (1)dumpcap (1)mergecap (1)Packet Voice (1)NVME-oF (1)CPU (1)Netmask (1)RDMA (1)SCSI (1)SAN (1)MAC Address (1)Discovery (1)Text Strings (1)CERNET2 (1)Cost (1)Disable (1)ND Table (1)ND (1)ISATAP (1)Teredo (1)SYSCTL (1)PMTU (1)SYN Flood (1)Fragmentation (1)Zoom (1)MyRoom (1)Webex (1)pktmon (1)Anonymize (1)Tracewrangler (1)iPerf (1)Packet Diagram (1)Packet Comment (1)Next Hop Self (1)Redaction (1)L4 (1)L1 (1)Hack (1)FBI (1)Humor (1)April Fools (1)Bibliography (1)Bio (1)Quiz (1)Process Explorer (1)Zoomit (1)Airplane (1)Air Quality (1)Fonts (1)Art (1)ASCII (1)China (1)Vision (1)Cable (1)Submarine (1)Macro (1)Powerpoint (1)Content (1)Block (1)Taxonomy (1)Bloom (1)Reading (1)Lessons (1)About (1)Business Case (1)Business Plan (1)Winston (1)Passwords (1)VI/VIM (1)Port Mirror (1)AS # (1)ASN (1)M-BGP (1)Repository (1)Extension Headers (1)useradd (1)AutoQoS (1)netcat (1)Documentation (1)White Paper (1)Twitter (1)
Show More Show Less

We have several articles here that contain and use Amazon links for products we recommend or reference.  When you select products using those links, we receive a small cut without affecting your price, and appreciate you for using our links.  Here are some of those posts:

10 Best Books for Broadband Technicians
The Top Ten Networking Books for Reference
Servicing or Repairing Network Equipment
The Network Products We Use in Our “Go Bag”
A List of USB Wi-Fi Adapters that support Monitor Mode
A Wi-Fi 7 Tri-Band USB Adapter now available on Amazon
IPv6 Books for Reference and Study

 

Scroll to Top