Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ’s, Networking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above. The Training menu provides access to our courses, our course calendar, and learning services. The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team. Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.
Thanks for visiting! We always welcome comments and suggestions. You can also join our Discord Server here!

Mapping ABR to TCP Congestion Control and QUIC
Post Views: 31 I described what Adaptive Bit Rate Streaming (ABR) is in my prior article, if you need that background. Also there is an ABR Lab Exercise if you want some hands on learning with ABR that will show you visually some of the items discussed below. Here, I wanted to dive a little

What Is Adaptive Bitrate Streaming (ABR)?
Post Views: 95 Adaptive Bitrate Streaming (ABR) is a video delivery method that dynamically adjusts the quality of a stream in real time based on three things: network conditions, device capability, and player performance. Instead of delivering a single fixed-quality, and therefore fixed transfer rate video, ABR continuously selects the most appropriate bitrate to maintain
A Synthetic ABR Lab Exercise
Post Views: 90 The following is a step by step lab exercise to examine ABR – Adaptive Bit Rate used in modern video content delivery. I won’t explain ABR here – you can read about ABR and what it is, and how it works here in a recent post. We will analyze a synthetic but

What is TCP CUBIC and Why so popular?
Post Views: 175 Most people do not know this, but TCP CUBIC is the dominant congestion control algorithm used in modern TCP/IP networks. It is designed to efficiently utilize high-speed, long-distance links while maintaining fairness across flows with different round-trip times (RTTs). Today, it is the default congestion control algorithm in most Linux systems, and

Create your own Wireshark Labs with AI
Post Views: 1,052 I have been teaching Wireshark classes since the early 2000’s, and using it since it was called Ethereal. My usage has primarily focused around troubleshooting network issues that have a packet capture associated with them. My fellow troubleshooters will tell you that this is not always the case. But, if we are
Combining Wireshark Ring Buffers with Capture Filters for Performance
Post Views: 617 Check out these great references as well: Our custom profiles repository for Wireshark Our Udemy course on Wireshark Our Udemy course on Wireless Packet capture In our previous post I showed you how to use Wireshark’s Ring Buffer feature. I think we can all agree how great that feature is. In this
Wireshark Ring Buffer Capture Feature
Post Views: 1,000 Check out these great references: Our custom profiles repository for Wireshark Our Udemy course on Wireshark Our Udemy course on Wireless Packet capture Wireshark’s Ring Buffer feature is a capture mechanism feature that automatically rotates packet capture files based on size or time limits, overwriting the oldest files when a defined limit

Technology Training at CellStream
Post Views: 14,842 At CellStream, we design and deliver technology training programs specifically aligned to the realities of today’s broadband, telecommunications, and IP-based networking environments. Our focus is not generic IT instruction — it is highly curated, operationally relevant education built for service providers, network engineers, broadband technicians, sales teams, leadership, and customer-facing staff. Our

Why don’t you employ the “click” model on your sites?
Post Views: 965 This is a great question recently asked by one of our students/clients when we said our usual introductory comments that “No we won’t spam you”, and “No we don’t use the click model on our sites”. Now most of you know, we are a small family business, and have been since day

Zero-Trust Networking & Converged Security
Post Views: 1,307 The following is a technical SWOT analysis for Network Engineers, Security Engineers, and Senior Technicians. I apologize for the high number of acronyms used below, but hey, this is networking! In networking, Zero-Trust is not a single product or control. It’s an architecture and operating model where no network location (LAN, WAN,
Did you learn something?
Did I save you time?
Want to receive free updates on our content? Can you contribute to support us?
❤️ Join our Patreon
Content Categories
Find Articles by Tag
We have several articles here that contain and use Amazon links for products we recommend or reference. When you select products using those links, we receive a small cut without affecting your price, and appreciate you for using our links. Here are some of those posts:
10 Best Books for Broadband Technicians
The Top Ten Networking Books for Reference
Servicing or Repairing Network Equipment
The Network Products We Use in Our “Go Bag”
A List of USB Wi-Fi Adapters that support Monitor Mode
A Wi-Fi 7 Tri-Band USB Adapter now available on Amazon
IPv6 Books for Reference and Study
