Frequently Asked Questions

q and a 2453376 640

Have a question about networking or computing?  Hopefully you can find an answer here!

Frequently asked questions about the CellStream consulting and training services are answered here as well as number of other topics.  If you would like to ask us a question, it is easy to contact us.

We hope you find the content here useful.

Where can I get a degree in Network Engineering?

It’s graduation time. Congrats to all of you graduating!!! It seems that every year around this time someone will ask this great question. In my day, the answer was simple: none! Not anymore. If you’re interested in pursuing a degree in Network Engineering (what I call Network Science) and related technologies, several universities across the […]

Where can I get a degree in Network Engineering? Read More »

What is CGNAT?

Carrier-Grade NAT (CGNAT), also known as Large Scale NAT (LSN), is a network technology used by Internet Service Providers (ISPs) to extend the usability of the limited IPv4 address space by sharing a small pool of public IPv4 addresses among many customers. Why CGNAT Exists How CGNAT Works Technical Characteristics Challenges/Problems with CGNAT Alternatives to

What is CGNAT? Read More »

What maintenance should I run on my computer, if any?

Maintaining the system is always a good idea, and it should be habitual. We break maintenance into three types: a) continual, b) periodic, and c) occasional. We recommend you get into a routine by inserting to-do’s or calendar reminders to run maintenance until you do it automatically. So let’s look at a good maintenance plan:

What maintenance should I run on my computer, if any? Read More »

Do VPN applications really protect your traffic, and if so, what exactly are they doing to my packets?

Yes, VPN applications do protect your traffic. A VPN is like wearing a costume or a mask because it masks your real identity and location, just like a costume or mask hides who you are in real life. Here’s the breakdown of the analogy: VPN vs. Costume Analogy VPN Function Costume Equivalent Hides your IP

Do VPN applications really protect your traffic, and if so, what exactly are they doing to my packets? Read More »

A Simple Capture and Filter Exercise for Wireshark

Someone asked the following “getting started” question on the Wireshark Discord site, and it prompted me to write this FAQ to help newcomers to Wireshark understand how to navigate the initial complexity of packet capture. Hi everyone! I’m new here and just downloaded wireshark for a Computer Comm class. I need to capture traffic sent

A Simple Capture and Filter Exercise for Wireshark Read More »

What ever happened to ATM (Asynchronous Transfer Mode)?

Asynchronous Transfer Mode (ATM) was once seen as a promising Layer 2 networking technology due to its ability to handle a variety of traffic types (voice, video, and data) with high efficiency and quality of service (QoS) performance guarantees. I spent several years working with and then teaching ATM courses to my fellow telecom engineers. 

What ever happened to ATM (Asynchronous Transfer Mode)? Read More »

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top