Telecommunications Consulting Services
Consulting Services from Network Design to Project Management
Check Out our Consulting Services
Internetworking Training Experts
Training and Learning Services focused on the technology that makes the Internet work.
Check Out our Learning Services
Wireshark Experts
Packet analysis expertise is critical in today's networks, and being able to use the best packet analyzer application is a skill we can help you and your team attain.
View Our Wireshark Classes
Are you a Network Scientist?
If you are just getting started in networking or you have been in the industry/technology for years you know there is so much to learn and so much to explore in networking technologies. Explore our vast collection of articles and reading.
Read More
Online Certification Training
Find out about our Network Self Certification Program for Rural Service Providers at the Online School of Network Sciences
Check Out Our Program at our Online School

Welcome to our home on the Internet, where we can not only share information, but also interact with each other. If you are a visitor to the site, there are a number of things to view: our FAQ’sNetworking and Computing Tips, our CellStream Blog, and other fun reading can all be found in the drop down menus above.  The Training menu provides access to our coursesour course calendar, and learning services.  The Consulting Menu provides information on our consulting services and a place to meet our consulting and teaching team.  Registered CellStream folks and our clients will log in using their private credentials to access projects, calendars and discussions.

Thanks for visiting! We always welcome comments and suggestions.  You can also join our Discord Server here!

Load Balancing in Data Networks

Post Views: 32 Load balancing in data networking is the process of distributing network traffic or workloads across multiple resources—such as servers, links, or devices—to: It’s commonly used in: Here is a structured list of the load balancing algorithms used in data networking, across Layer 4, Layer 7, and routing scenarios: 1. Round Robin 2.

Read More »

Real World Use Cases for Ansible in Networking

Post Views: 67 Ansible is widely used in data networking for automating configuration, management, and compliance across diverse network devices. Here are real-world examples of Ansible use cases in data networking: Automated Configuration Management Network Device Backup Compliance and Audit Checking Zero Touch Provisioning (ZTP) Network OS Upgrade Automation Dynamic Inventory from CMDB or Netbox

Read More »

IPv6 Books for Reference and Study

Post Views: 198 Here are my favorite books on the subject of IPv6 for reference and study. Please support us by selecting these links: Did I miss one? Let me know. Also, if you want to see my top 10 books for general networking – look here. Comments are welcomed below from registered users.  You

Read More »

TCP Algorithms

Post Views: 295 In this post, I want to document the fundamental algorithms built into TCP. Keep in mind that these have changed over time in an attempt to make TCP more effective with faster and larger capacity connections of todays Internet. See our post on TCP “versions” here. TCP uses several key algorithms to

Read More »

Our Comprehensive Wi-Fi Troubleshooting Guide

Post Views: 249 Hi everyone! As many of you who have attended my conference presentations and Wi-Fi classes know, I spend time talking about the correct way of troubleshooting Wi-Fi networks. Power cycling or rebooting is NOT a first step. Here’s why: lets say you are having issues of some kind (slow speed, connectivity issues,

Read More »

Zero to Hero with Wireshark TCP Graphs: A Tutorial

Post Views: 348 In this tutorial I am going to make you a pro at using and leveraging the Wireshark TCP Graphing tools. As many of you who have taken my Wireshark Courses know, I am a big fan of visualizing what is going on in a given packet capture or conversation. My #2 troubleshooting

Read More »
Find Articles by Tag
Wireshark (118)Cisco (82)IOS (76)Training (53)Wi-Fi (52)IPv6 (48)WLAN (42)Security (36)MS Windows (35)Linux (31)IPv4 (29)Ethernet (26)Cybersecurity (24)Troubleshooting (22)MS Windows (21)CellStream (19)Networking (19)Voice (19)Wi-Fi 6 (18)Packet Capture (18)MPLS (15)Services (14)Tools (14)TCP (13)BGP (12)Cheat Sheet (12)TCP/IP (12)Router (12)Network (11)Profile (11)Travel (11)Internet (11)OSPF (10)Configuration (10)QoS (10)ARP (10)Technicians (10)L2 (9)QUIC (9)Routing (9)1-Day (9)VLAN (9)101 (9)L3 (9)Ubuntu (8)Free (8)tshark (8)Consulting (8)STP (8)Advanced (7)TT&S (7)SDN (7)Hands On (6)AI (6)Learning (6)DNS (6)Top 10 (6)Tunnel (6)MAC Address (6)Display Filter (6)Course (6)Traceroute (5)Monitor Mode (5)POTS to Pipes (5)Overview (5)Bandwidth (5)Skills (5)Command Line (5)Service Provider (5)Scanning (5)Switches (5)Innovative Systems (5)LLC (5)RFMON (5)Speed Test (5)Firewall (5)Networking 101 (5)Testing (4)Policy (4)Analysis (4)Certification (4)Telephone (4)GNS3 (4)Teaching (4)Zero-to-Hero (4)EIGRP (4)Subnetting (4)Ping (4)Virtualization (4)ICMP (4)Kids (4)Wireless (4)Monitoring (4)Decryption (4)LAN (4)VM (4)ACL (4)Artificial Intelligence (4)VPN (4)MAC (4)POTS (4)CBRS (4)Fiber (4)Server (3)Password (3)Cisco IOS (3)Toolkit (3)Wi-Fi 7 (3)NIST (3)Data Center (3)FCC (3)Telecom (3)Online Course (3)Reload (3)Design (3)Online School (3)Microsoft (3)Ultimate (3)MacOS (3)Broadband (3)Ansible (3)RIP (3)NVMe (3)iSCSI (3)Telecom 101 (3)L2VPN (3)Service (3)Command (3)netsh (3)Logging (3)Maintenance (3)Books (3)Speed (3)Home (3)Remote Desktop (3)pcap-ng (3)NAT (3)Map (3)Netstat (3)nmap (3)Automation (3)Privacy (3)nslookup (3)Google (3)RDP (2)Upgrade (2)UDP (2)htop (2)Operations (2)Macros (2)btop (2)Load Balancing (2)VirtualBox (2)Benchmark (2)TLS (2)ROMMON (2)Data Networking (2)HTTP (2)Cloud (2)Terminal (2)NPAT (2)VPWS (2)SSH (2)RTP (2)Andrew Walding (2)Resume (2)Study (2)Reference (2)Net Neutrality (2)pcap (2)Repairing (2)tracert (2)History (2)GitHub (2)ipconfig (2)Briefing (2)Backup (2)MacOS (2)Questions (2)Facebook (2)DHCP (2)Technology (2)Traditional (2)Order (2)VXLAN (2)WinFi (2)Utilities (2)Review (2)iptables (2)Network Science (2)FAQ (2)Employees (2)Data (2)Bits (2)RFC's (2)Email (2)Interfaces (2)Outage (2)Routers (2)Bypass (2)HTTPS (2)Development (2)Fundamentals (2)VoIP (2)Tool (2)Wi-Fi Scanner (2)Math (2)SAN (2)Customer (2)Blog (2)Computer (2)Security Techniques (2)Capture (2)CPI (2)RDMA (2)Etherchannel (2)Name Resolution (2)Addressing (2)Switch (2)Adoption Levels (2)whois (2)Presentation (2)IP Address (2)hping3 (1)Roku (1)Physical Layer (1)Cutting Cable (1)ufw (1)Packet Crafting (1)CrowdStrike (1)OTT (1)Tri-band (1)6to4 (1)Earth Status (1)Technician (1)Frame Relay (1)Pitfalls (1)Story (1)Vudu (1)Traffic Engineering (1)TE (1)Galaxy (1)Milky Way (1)Flight Tracker (1)Telephony (1)Switching (1)Courses (1)Capture Filter (1)tcpdump (1)Automatically Switch (1)SNR (1)2-day (1)Signal to Noise (1)carving (1)parsing (1)Value (1)Retransmissions (1)TCP CUBIC (1)TCP New Reno (1)Compound TCP (1)Colasoft (1)Our Go Bag (1)Products (1)What we use (1)Win-Fi (1)Equation (1)Netflix (1)Adult Learning (1)Graphics (1)Youtube (1)Virus (1)Social Responsibility (1)Code of Ethics (1)SS7 (1)Online (1)Requirements (1)Architecture (1)RFP (1)Brainstorming (1)Billing (1)Airlines (1)Animation (1)OOO (1)IPTV (1)Product (1)3-Day (1)L3VPN (1)5-day (1)Flying (1)Quotes (1)5 Monkey (1)Rule (1)Life (1)Observations (1)Multicast (1)MPLS L3VPN (1)Parrot (1)Reverse ARP (1)Art (1)Fonts (1)L3 VPN (1)Air Quality (1)Airplane (1)MPLS-TE (1)L2 VPN (1)Zoomit (1)Process Explorer (1)Quiz (1)Bio (1)Bibliography (1)April Fools (1)Humor (1)ASCII (1)FBI (1)L1 (1)L4 (1)Redaction (1)Next Hop Self (1)Packet Comment (1)Packet Diagram (1)iPerf (1)CSR (1)Tracewrangler (1)Anonymize (1)pktmon (1)Webex (1)MyRoom (1)Zoom (1)Hack (1)Web Based (1)China (1)SWOT (1)White Paper (1)Documentation (1)netcat (1)AutoQoS (1)useradd (1)Extension Headers (1)Repository (1)M-BGP (1)ASN (1)AS # (1)Port Mirror (1)VI/VIM (1)Passwords (1)Winston (1)Vision (1)Business Plan (1)About (1)Lessons (1)Reading (1)IPsec (1)Lab (1)Bloom (1)Taxonomy (1)Block (1)Content (1)Powerpoint (1)Macro (1)Submarine (1)Cable (1)Business Case (1)ATM (1)Fragmentation (1)PMTU (1)Supply Chain (1)NIST SP 800-161 (1)SCRM (1)NIST SP 800-171 (1)CUI (1)ISO (1)ISO/IEC (1)ISO/IEC 27008 (1)NIST SP 800-183 (1)Network of Things (1)NoT (1)Archive (1)Wayback Machine (1)Research (1)Alternatives To (1)Assessment (1)Spoofing (1)Reconnaissance (1)Wi-Fi Analyzer (1)Trace files (1)Network Monitoring (1)Net Admin (1)Sys Admin (1)SD-WAN (1)gQUIC (1)ARP Probe (1)ARP Announcement (1)Gratuitous ARP (1)RARP (1)Switch Port (1)SYN Flood (1)Packet Analysis (1)Hackathon (1)SYSCTL (1)Teredo (1)ISATAP (1)ND (1)ND Table (1)Disable (1)Cost (1)CERNET2 (1)Text Strings (1)Discovery (1)SCSI (1)Netmask (1)CPU (1)NVME-oF (1)Fiber Channel (1)Ring Buffer (1)mergecap (1)dumpcap (1)Spanning Tree (1)Links List (1)Root Cause (1)ECMP (1)News (1)Temporary Addresses (1)Web-based (1)Wi-Fi 5 (1)SIP (1)SDP (1)RTCP (1)Packet Voice (1)ifconfig (1)Analytics (1)Conference (1)Sales (1)Hire (1)Instructors (1)Technical (1)802.11ad (1)802.11ac (1)802.11n (1)Speeds (1)Transit (1)Desktop (1)Infrastructure (1)iACL (1)Stateful NAT (1)SNAT (1)VRRP (1)Management (1)Username (1)Warm Upgrade (1)Coloring Rules (1)tACL (1)Report (1)Windows (1)Lesser Known (1)Complete (1)Emoticon (1)Legal (1)Illegal (1)Unsecured (1)Law (1)Install (1)User Interface (1)Tech News (1)Murphy's Law (1)Travel Light (1)Censored (1)Filter (1)DHCPv6 (1)Explained (1)Dependencies (1)High Tech (1)Sites (1)Blocking (1)Life Lessons (1)List (1)connections (1)local (1)Instructor (1)Parenting (1)Universe (1)3D (1)Harvard (1)AAA (1)Hotel Glasses (1)Don't Drink (1)NBAR (1)Better (1)Software (1)Limit (1)Back up (1)Web Server (1)Real Time (1)dd-wrt (1)Gateway (1)House of Representatives (1)Why use us? (1)Update (1)area (1)Upgrade IOS (1)Edinburg (1)ip command (1)Registration (1)BBS (1)Bulletin Board (1)Addresses (1)2^128 (1)Instructional (1)Filtered (1)Search (1)Slow Death (1)Sharepoint (1)Attack (1)Overflow (1)CAM Table (1)Rates (1)Mileage (1)Phone Book (1)Company (1)Gardar (1)Mitigation (1)Remote (1)Network Sciences (1)Rental Cars (1)Moore's Law (1)Topology (1)ShowNet (1)Web Site (1)Air Traffic (1)Traveler (1)Impolite (1)Food for Thought (1)Video (1)Moore (1)Cleanup (1)Removing (1)Device Drivers (1)Employee (1)Supervisor (1)Manager (1)Personnel (1)Resilient (1)Disaster (1)Pre-Fetch (1)Signs (1)CGNAT (1)Dual Stack (1)Algorithms (1)Examples (1)Real World (1)Retransmission (1)Flow Control (1)Congestion Control (1)TCP Algorithms (1)TCP Vegas (1)TCP Reno (1)Translation (1)TCP Tahoe (1)Flags (1)Network Engineering (1)Degree (1)Graduation (1)DISM (1)chkdsk (1)sfc (1)Starlink (1)Guide (1)Save Money (1)Internet Era (1)Impact (1)Keep Trying (1)Failures (1)Edison (1)Letter (1)Complaint (1)Social Media (1)ROI (1)Task Management (1)Deep Dive (1)Tech Support (1)Unresponsive (1)Central Office (1)VMware (1)Static IP (1)VM Server (1)ESX (1)Geolocation (1)Competition (1)Car Rental (1)Transformation (1)Politicians (1)Ancient (1)Overcommitment (1)Save Space (1)Disk Space (1)Public IP (1)Dynamic DNS (1)Remote Control (1)Support (1)Desktop Sharing (1)Clean (1)Rejection (1)Autorun (1)Wisconsin (1)WSTA (1)Computers (1)Subscribers (1)How To's (1)Tech Tips (1)Customer Unhappy (1)Failure to deliver (1)Speaking (1)Field Technicians (1)Rollback (1)System (1)VRF Lite (1)Extended Traceroute (1)Extended Ping (1)Netflow (1)Lines (1)PKI Server (1)Secure Code (1)Web Sites (1)Links (1)Pipes (1)Delay (1)Clock (1)Lock (1)Alias (1)Cabling (1)Admin (1)Fix (1)Error (1)Default (1)Setting (1)AToM (1)Front Office (1)Admin Distance (1)Internet Exchange (1)India (1)PPP (1)Queuing (1)Quality (1)Datacom (1)Newbie (1)Software Defined Networking (1)Protocol (1)IP ID (1)LISP (1)Copmputers (1)Old (1)Funding (1)USF (1)Timelines (1)Worldwide (1)Apple (1)Administrative Distance (1)re-use (1)Stop (1)Performance (1)Docker (1)Electricity (1)Coding (1)Free Training (1)Traffic Volume (1)TikTok (1)CCNP (1)ILT (1)tilix (1)neofetch (1)Squishy Circuits (1)ncdu (1)btop++ (1)Soldering (1)Servicing (1)dig (1)CMD (1)Ideas (1)Gift (1)Tech (1)hollywood (1)Tech Tip (1)Cans and String (1)Binary (1)Netmiko (1)Git (1)Python (1)TR-369 (1)TR-069 (1)Wi-Fi 6E (1)Device Driver (1)PC (1)Basic (1)Hexadecimal (1)Interview (1)Broken Phone (1)Great Story (1)Field Service (1)Know-it-All (1)Avian Carriers (1)ADSL (1)Bytes (1)Nibbles (1)TDM to IP (1)Procedure (1)Core Dump (1)GLBP (1)interrupt (1)console (1)more (1)show diag (1)Timestamps (1)FLASH (1)Partition (1)Policy Based (1)PBR (1)modify (1)Download Speed (1)HD (1)Streamline (1)cRTP (1)OnePK (1)ONE (1)Traffic (1)GodMode (1)GRE (1)HD Movie (1)Shortcuts (1)IP Mobility (1)Details (1)Client (1)Route Selection (1)Path Selection (1)show version (1)show ver (1)Copying (1)C15 (1)MGCP (1)Settings (1)Find (1)Computing (1)Best (1)TELNET (1)Activities (1)Restore (1)Conversations (1)Temporary (1)Colors (1)HSRP (1)Airline (1)Checksum (1)Keyboard (1)Config Register (1)IP (1)Virtual Machine (1)Depletion (1)Address (1)ARIN (1)Membership (1)Preview (1)PDF (1)Early Adopter (1)Flipping the Model (1)Mini Course (1)TRANSUM (1)SSL (1)Hiring (1)Permission (1)Usage (1)ICMPv6 (1)Quick Start (1)Applications (1)Rural (1)Smartports (1)Learn (1)Access Control (1)Null Interface (1)Black Hole (1)CAR (1)Supernetting (1)Protected Ports (1)OpenFlow (1)Timeline (1)IoT (1)WCCP (1)ACI (1)Center (1)LDP (1)Associations (1)route (1)Packets (1)Environment (1)Utilization (1)Basics (1)APIC (1)Twitter (1)
Show More Show Less
Scroll to Top