Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

Brightglaive

Member
  • Content Count

    70
  • Joined

  • Last visited

Awards


This user doesn't have any awards

About Brightglaive

  • Title
    Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Wireless roaming has ALWAYS been a problem for 802.11 wireless connections. It is still an issue to this day, even in the enterprise. A lot of wireless vendors have implemented their own workarounds to get around this issue. 802.11f interAP protocol and 802.11k and 802.11r are standards meant to ease your roaming woes. Unfortunately, 802,11f was rescinded and interAP communication for seamless roaming is now purely in the hands of each manufacturer. Regrettably, most times your key is simply cached by the client and will only roam after the signal drops to extremely low levels and times out. There are 3 ways you can accomplish wireless roaming by configuring it yourself: 1. Place both APs on the same channel with the same SSID and encryption types and adjust power levels manually to avoid heavy interference 2. Place the APs on separate channels with the same SSID and encryption types 3. Place one AP with the appropriate SSID and encryption and set the second as a repeater/clone of the first AP with the same SSID and encryption None of these are truly ideal but until the IEEE comes up with a standard that everyone must adhere to for wireless roaming the solution remains in the Wireless AP manufacturers hands. That being said, Ubiqiti is reportedly one of the better roaming implementions for consumer/prosumer-grade wireless hardware. They makes this a lot easier by automating the configuration process of it's APs and have (as I understand it) implemented some roaming intelligence in their APs. If you mix-and-match wireless equipment vendors your results may vary. Just my $0.02
  2. On the wireless side of things, older 2.4GHz phones use FHSS(Frequency Hopping Spread Spectrum) or DSSS (Direct Sequence Spread Spectrum). These were also used by early 802.11b wireless adapters and APs. However, there are 2 types of encoding that are used. 802.11b and CDMA (Code Division Multiple Access) All of the phones would tend to use CDMA in order to differentiate between your handset and your neighbors handsets. Unfortunately, The 2.4GHz phones do not recognize digital signals i.e. 802.11b/g/n, have different channel widths and were either analog and would blast the signal out at high power and hop frequencies that may land it right in the middle of your 802.11b/g/n channel at random times or (in the case of digital ) broadcast the signal across the entire 2.4GHz spectrum on wideband frequency channels. This could EASILY knock out any 2.4GHz 802.11 wireless signal, especially with the new methods of compression and encoding in 802.11g/n. If this is an issue with DSL (I assume some form of ADSL since you have voice concurrent on the line) then you would need to place frequency filters on all non-modem lines to avoid interference with the DSL frequency ranges from attached phones/equipment. You may want to consider moving to a 900Mhz or 5.8GHz DSSS cordless phone as the 900MHz operates outside of 802.11 data spectrum and the 5.8GHz only operates in the 5.725 to 5.825GHz (UNII-3) range and does not preclude the use of the lower 802.11a/n frequency bands UNII-1, UNII-2A and UNII-2C ( basically 5.15GHz - 5.35GHz)
  3. USB is portable. So is mini-PCIe (for laptops). Both are great for laptops (esp. for the new Mac but also for PC). If it's a desktop or home PC I'd say stick with a quality PCI-e adapter.
  4. Here's an example screen shot of my PC Network adapter properties-->details page: And a snip of my ipconfig/all If DHCP is enabled AND your IP address is in the 192.168.1.x range AND your default gateway is 192.168.1.1 AND you can't ping or tracert or hit the web interface of your router then I would say reset your router. After you reset the router If it's just the web interface but you can still ping and tracert your router then it may be something in your web browser.
  5. it will be under "Ethernet Adapter Local Area connection" Should say "IPv4 address.............: x.x.x.x" usually just above the subnet mask.
  6. I was amazed to find out that 1080p youtube video rates start at 3Mbps-6Mbps and goes up from there. As you go up in resolution and framerate you can jump up to as much as 51Mbps (2160p60). If you watch a ten minute 1080p Youtube video that's 600 (Seconds) x 6Mbps = 3600Megabits/8 bits per byte = 450Megabytes for *ONE* video. jump up to 60fps on the 1080p and your rate jumps to 4.5Mbps-9Mbps! that's around 680 Megabytes for one ten minute video. If you use a smartphone that can go up to 1440p or 1440p60 then now you range between 6 and 18Mbps. That's over a Gigabyte per 10-minute video. How many ten minute videos can you watch in one day? I know I watch at least 6 to 10 myself (and that's not counting netflix, or hulu, or web surfing, or streaming audio, amazon prime audio and video titles, audible book downloads, playing games etc. ) If you have a large household with multiple smart TVs and Hulu/Netflix/Amazon Prime accounts. And 2 - 4 computers (that's counting Laptops AND desktops), and multiple smartphones connecting to your wireless network.... I could see how you might be able to chew through 1 TiB of data (incidentally you can save a TON of data just by locking your video on your mobile phones youtube app to 360p and by turning off the autoplay for videos on facebook) And for the tech heads....Yes,yes I know...conversion rates and transmission compression...yaddah,yaddah, yaddah...the final amount of data you get is not the same....etc. etc. True...The downloaded size may not be the same, but the data is not measured on your storage now, is it? It's measured at the telco transmitter/ISP-side router or at worst at the ISP "modem" before having all that extra network transmission garbage stripped off by your network card or at the modem when it converts it to ethernet and IP.
  7. What's does IPconfig/all show your current IP and subnet mask as? You still haven't answered that question.
  8. What's does IPconfig/all show your current IP and subnet mask as? if it's 169.254.x.x and 255.255.x.0 then your network card isn't connecting to a switch port or it's not receiving a DHCP address (if you are using DHCP to assign addresses). If it's something else besides 192.168.1.x, or it will only use169.254.x.x for an IP address it's likely there is an issue with DHCP or connection to your switch. I would also check the link and activity LEDs on the network port and on the switchport to verify there is a link there. Link LED should be solid (on both) and activity will blink intermittantly (on both). Also try a different ethernet cable or plug in to a different switchport if you haven't tried that already.
  9. Wifi Analyzer for android Snort A tone generator and detector can be handy if the ethernet NIC and switch don't support break detection GNS router Simulator and IOS images (for testing router configurations) A packet generator (There are a bunch out there) like Ostinato. Ethernet Crimping Tool Screwdriver set Ifixit kit Cordless drill and my 6.5 lb gentle pursuader (aka baby sledge) ok I threw that last one in for laughs
  10. try searching 802.11ac wireless adapter on google or amazon. There are a few adapters in that price range. Are they quality? Check out the reviews (to hash out what may be a diamond in the rough) but remember the old adages, "you get what you pay for" and "buyer beware". A little online research may save you a LOT of wasted time if done right.
  11. Because an IP address doesn't necessarily correspond to a street address in real life. (See Internet Mapping turned a remote farm into a digital Hell) And who knows, The hacker may be hacking from a Starbucks or any one of a hundred "free Wifi" hotspots. He or she could have even spoofed someone's IP Address or logon or bounced it off a hundred different proxies. The most it would do is give you a geographical area to provide to the local law enforcement which, contrary to their portrayal on most TV shows, are not computer saavy enough to even recreate 1/10th of the network forensics required or are tied by those pesky things like "due process", "innocent until proven guilty", and "right to privacy" laws etc. LOL. But seriously, It can be extremely difficult for law enforcement to track and catch a hacker "red-handed". It took the US Department of Justice and the FBI two-and-a-half YEARS to track down Kevin Mitnick. And that was before 802.11 Wi-Fi. With this "free wireless internet" a hacker can be miles away from where he is accessing the internet and then drive away when he's done. Counterhacking a hacker is sometimes the only way to catch them. But if you do that you've upped the ante and the hacker may be out for blood, revenge or to totally pwn you. (Check out the movie: Hackers and then think about this: if it changed from "white knights saving the world" to "lone wolves out to make a buck" how much worse would it have been for Agent Dick Gill if they weren't just screwing around with him and how much worse would the rivalry and ego and even hatred have been between hackers?)
  12. Based on the info you gave....No. The wireless router does not support 802.1Q VLAN trunking or subnet routing on the switch interfaces. While you can configure VLANs on the netgear gs105e, the switch on the router doesn't support the VLAN trunking. Think of the switchports on the router as being part of a unmanaged non-configurable switch connected directly to the router. The switch doesn't support 802.1Q and therefore the router connection to the "dumb" switch is not configured (or configurable even) for VLAN support.
  13. I don't know that anyone is going to be able to teach you Networking Forensics in a forum. There are tools and books out there. Google and Amazon are your friend here. Try using Digital Forensics or Networking forensics books or tools as your search term.
  14. I think we have gone VERY far afield form your original question. Let's recap: Can you use the Time Warner AIO wireless router to route traffic from an 802.11 wireless ethernet network to an internal network? On the most basic level, yes. Can you use the AIO wireless router for routing between VLANs on the internal switch? Well....maybe...if the router and switch support it. Are there security concerns in this network design? There can be, based on the functionality of the AIO wireless router. I apologize for not asking sooner, what is the model of the netgear switch you are using? What is the manufacturer and model of the AIO wireless router that timewarner has provided?
  15. Sorry to burst your bubble but just because a switch is managed and supports VLANs does not make it a Layer 3 switch. Additionally, if you just bridge the wireless to VLAN 1 then all of your wireless clients will be connected to your internal network. In which case I would hope there is some sort of firewalling on the time warner device. Best practices would have you place the wireless in a DMZ and then route the traffic to your internal network. This is the way *MOST* "Wireless Routers" should work. (However some wireless "router"s just bridge the traffic to your wired network thereby bypassing any protection firewalling would provide on the device.) If your wireless is in a DMZ, a malicious user may connect to your wireless but your entire network is not compromised. It also gives the added comfort of having some security in place to recognize and defend against attacks from a malicious wireless user. For simplification sake I'll just call the time warner device a wireless router instead of modem/router/switch/wireless AP/firewall. And I will presume that you have firewalling on the device. Feel free to correct me if I'm wrong. Here are the 4 key questions if that is the case: 1. Look in the setup options of the web interface on the wireless router. Does the wireless router support 802.1Q VLAN trunking? 2. Can you setup sub-interfaces with their own IP address for each VLAN that is trunked to the wireless router? 3. Can you set up your own routing table on the wireless router? 4. If the router creates a DMZ for the wireless, what reason would you need to segment your home network into separate VLANs? I can come up with many scenarios where this would be important and smart for a business to do. However I can't think of one reason to do it on a home network without using some pretty expensive equipment that you likely do not have.
×