Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


  • Content Count

  • Joined

  • Last visited

Everything posted by Brightglaive

  1. Wireless roaming has ALWAYS been a problem for 802.11 wireless connections. It is still an issue to this day, even in the enterprise. A lot of wireless vendors have implemented their own workarounds to get around this issue. 802.11f interAP protocol and 802.11k and 802.11r are standards meant to ease your roaming woes. Unfortunately, 802,11f was rescinded and interAP communication for seamless roaming is now purely in the hands of each manufacturer. Regrettably, most times your key is simply cached by the client and will only roam after the signal drops to extremely low levels and times out. There are 3 ways you can accomplish wireless roaming by configuring it yourself: 1. Place both APs on the same channel with the same SSID and encryption types and adjust power levels manually to avoid heavy interference 2. Place the APs on separate channels with the same SSID and encryption types 3. Place one AP with the appropriate SSID and encryption and set the second as a repeater/clone of the first AP with the same SSID and encryption None of these are truly ideal but until the IEEE comes up with a standard that everyone must adhere to for wireless roaming the solution remains in the Wireless AP manufacturers hands. That being said, Ubiqiti is reportedly one of the better roaming implementions for consumer/prosumer-grade wireless hardware. They makes this a lot easier by automating the configuration process of it's APs and have (as I understand it) implemented some roaming intelligence in their APs. If you mix-and-match wireless equipment vendors your results may vary. Just my $0.02
  2. On the wireless side of things, older 2.4GHz phones use FHSS(Frequency Hopping Spread Spectrum) or DSSS (Direct Sequence Spread Spectrum). These were also used by early 802.11b wireless adapters and APs. However, there are 2 types of encoding that are used. 802.11b and CDMA (Code Division Multiple Access) All of the phones would tend to use CDMA in order to differentiate between your handset and your neighbors handsets. Unfortunately, The 2.4GHz phones do not recognize digital signals i.e. 802.11b/g/n, have different channel widths and were either analog and would blast the signal out at high power and hop frequencies that may land it right in the middle of your 802.11b/g/n channel at random times or (in the case of digital ) broadcast the signal across the entire 2.4GHz spectrum on wideband frequency channels. This could EASILY knock out any 2.4GHz 802.11 wireless signal, especially with the new methods of compression and encoding in 802.11g/n. If this is an issue with DSL (I assume some form of ADSL since you have voice concurrent on the line) then you would need to place frequency filters on all non-modem lines to avoid interference with the DSL frequency ranges from attached phones/equipment. You may want to consider moving to a 900Mhz or 5.8GHz DSSS cordless phone as the 900MHz operates outside of 802.11 data spectrum and the 5.8GHz only operates in the 5.725 to 5.825GHz (UNII-3) range and does not preclude the use of the lower 802.11a/n frequency bands UNII-1, UNII-2A and UNII-2C ( basically 5.15GHz - 5.35GHz)
  3. USB is portable. So is mini-PCIe (for laptops). Both are great for laptops (esp. for the new Mac but also for PC). If it's a desktop or home PC I'd say stick with a quality PCI-e adapter.
  4. Here's an example screen shot of my PC Network adapter properties-->details page: And a snip of my ipconfig/all If DHCP is enabled AND your IP address is in the 192.168.1.x range AND your default gateway is AND you can't ping or tracert or hit the web interface of your router then I would say reset your router. After you reset the router If it's just the web interface but you can still ping and tracert your router then it may be something in your web browser.
  5. it will be under "Ethernet Adapter Local Area connection" Should say "IPv4 address.............: x.x.x.x" usually just above the subnet mask.
  6. I was amazed to find out that 1080p youtube video rates start at 3Mbps-6Mbps and goes up from there. As you go up in resolution and framerate you can jump up to as much as 51Mbps (2160p60). If you watch a ten minute 1080p Youtube video that's 600 (Seconds) x 6Mbps = 3600Megabits/8 bits per byte = 450Megabytes for *ONE* video. jump up to 60fps on the 1080p and your rate jumps to 4.5Mbps-9Mbps! that's around 680 Megabytes for one ten minute video. If you use a smartphone that can go up to 1440p or 1440p60 then now you range between 6 and 18Mbps. That's over a Gigabyte per 10-minute video. How many ten minute videos can you watch in one day? I know I watch at least 6 to 10 myself (and that's not counting netflix, or hulu, or web surfing, or streaming audio, amazon prime audio and video titles, audible book downloads, playing games etc. ) If you have a large household with multiple smart TVs and Hulu/Netflix/Amazon Prime accounts. And 2 - 4 computers (that's counting Laptops AND desktops), and multiple smartphones connecting to your wireless network.... I could see how you might be able to chew through 1 TiB of data (incidentally you can save a TON of data just by locking your video on your mobile phones youtube app to 360p and by turning off the autoplay for videos on facebook) And for the tech heads....Yes,yes I know...conversion rates and transmission compression...yaddah,yaddah, yaddah...the final amount of data you get is not the same....etc. etc. True...The downloaded size may not be the same, but the data is not measured on your storage now, is it? It's measured at the telco transmitter/ISP-side router or at worst at the ISP "modem" before having all that extra network transmission garbage stripped off by your network card or at the modem when it converts it to ethernet and IP.
  7. What's does IPconfig/all show your current IP and subnet mask as? You still haven't answered that question.
  8. What's does IPconfig/all show your current IP and subnet mask as? if it's 169.254.x.x and 255.255.x.0 then your network card isn't connecting to a switch port or it's not receiving a DHCP address (if you are using DHCP to assign addresses). If it's something else besides 192.168.1.x, or it will only use169.254.x.x for an IP address it's likely there is an issue with DHCP or connection to your switch. I would also check the link and activity LEDs on the network port and on the switchport to verify there is a link there. Link LED should be solid (on both) and activity will blink intermittantly (on both). Also try a different ethernet cable or plug in to a different switchport if you haven't tried that already.
  9. Wifi Analyzer for android Snort A tone generator and detector can be handy if the ethernet NIC and switch don't support break detection GNS router Simulator and IOS images (for testing router configurations) A packet generator (There are a bunch out there) like Ostinato. Ethernet Crimping Tool Screwdriver set Ifixit kit Cordless drill and my 6.5 lb gentle pursuader (aka baby sledge) ok I threw that last one in for laughs
  10. try searching 802.11ac wireless adapter on google or amazon. There are a few adapters in that price range. Are they quality? Check out the reviews (to hash out what may be a diamond in the rough) but remember the old adages, "you get what you pay for" and "buyer beware". A little online research may save you a LOT of wasted time if done right.
  11. Because an IP address doesn't necessarily correspond to a street address in real life. (See Internet Mapping turned a remote farm into a digital Hell) And who knows, The hacker may be hacking from a Starbucks or any one of a hundred "free Wifi" hotspots. He or she could have even spoofed someone's IP Address or logon or bounced it off a hundred different proxies. The most it would do is give you a geographical area to provide to the local law enforcement which, contrary to their portrayal on most TV shows, are not computer saavy enough to even recreate 1/10th of the network forensics required or are tied by those pesky things like "due process", "innocent until proven guilty", and "right to privacy" laws etc. LOL. But seriously, It can be extremely difficult for law enforcement to track and catch a hacker "red-handed". It took the US Department of Justice and the FBI two-and-a-half YEARS to track down Kevin Mitnick. And that was before 802.11 Wi-Fi. With this "free wireless internet" a hacker can be miles away from where he is accessing the internet and then drive away when he's done. Counterhacking a hacker is sometimes the only way to catch them. But if you do that you've upped the ante and the hacker may be out for blood, revenge or to totally pwn you. (Check out the movie: Hackers and then think about this: if it changed from "white knights saving the world" to "lone wolves out to make a buck" how much worse would it have been for Agent Dick Gill if they weren't just screwing around with him and how much worse would the rivalry and ego and even hatred have been between hackers?)
  12. Based on the info you gave....No. The wireless router does not support 802.1Q VLAN trunking or subnet routing on the switch interfaces. While you can configure VLANs on the netgear gs105e, the switch on the router doesn't support the VLAN trunking. Think of the switchports on the router as being part of a unmanaged non-configurable switch connected directly to the router. The switch doesn't support 802.1Q and therefore the router connection to the "dumb" switch is not configured (or configurable even) for VLAN support.
  13. I don't know that anyone is going to be able to teach you Networking Forensics in a forum. There are tools and books out there. Google and Amazon are your friend here. Try using Digital Forensics or Networking forensics books or tools as your search term.
  14. I think we have gone VERY far afield form your original question. Let's recap: Can you use the Time Warner AIO wireless router to route traffic from an 802.11 wireless ethernet network to an internal network? On the most basic level, yes. Can you use the AIO wireless router for routing between VLANs on the internal switch? Well....maybe...if the router and switch support it. Are there security concerns in this network design? There can be, based on the functionality of the AIO wireless router. I apologize for not asking sooner, what is the model of the netgear switch you are using? What is the manufacturer and model of the AIO wireless router that timewarner has provided?
  15. Sorry to burst your bubble but just because a switch is managed and supports VLANs does not make it a Layer 3 switch. Additionally, if you just bridge the wireless to VLAN 1 then all of your wireless clients will be connected to your internal network. In which case I would hope there is some sort of firewalling on the time warner device. Best practices would have you place the wireless in a DMZ and then route the traffic to your internal network. This is the way *MOST* "Wireless Routers" should work. (However some wireless "router"s just bridge the traffic to your wired network thereby bypassing any protection firewalling would provide on the device.) If your wireless is in a DMZ, a malicious user may connect to your wireless but your entire network is not compromised. It also gives the added comfort of having some security in place to recognize and defend against attacks from a malicious wireless user. For simplification sake I'll just call the time warner device a wireless router instead of modem/router/switch/wireless AP/firewall. And I will presume that you have firewalling on the device. Feel free to correct me if I'm wrong. Here are the 4 key questions if that is the case: 1. Look in the setup options of the web interface on the wireless router. Does the wireless router support 802.1Q VLAN trunking? 2. Can you setup sub-interfaces with their own IP address for each VLAN that is trunked to the wireless router? 3. Can you set up your own routing table on the wireless router? 4. If the router creates a DMZ for the wireless, what reason would you need to segment your home network into separate VLANs? I can come up with many scenarios where this would be important and smart for a business to do. However I can't think of one reason to do it on a home network without using some pretty expensive equipment that you likely do not have.
  16. I didn't place any formatting in my post. However, just to be safe I copied the text into notepad and then reposted back as an edit
  17. Linus @LinusTech, or Luke @Slick, or Jon I think TPM would be a great subject for an "As Fast As Possible" episode or two. There seems to be a lot of confusion as to what TPM is and what TPM headers on motherboards are for. Questions I might seek to answer would include: What is TPM and what is it for? What do I need to support it? How does a TPM module interact with the BIOS, OS, encrypted file systems, EFS SSDs or hard drives, WGA (windows genuine advantage or whatever the activation method is called) etc? What problems can they cause? What concerns are there about TPM? (yes, I saw it mentioned in a WAN show document). What will your login experience be if you use it in Windows? Are there problems with TPM? I have researched it and have a general understanding but some of the specifics are not laid out and it's a little murky on the web. Just my $0.02
  18. LAwLz has it perfectly correct. I want to explain a little more about 802.1Q trunks. A Trunk can carry traffic from multiple VLANs as LAwLz explained. This is most important when you want to route from one VLAN to another. For example: an accountant wants to send an e-mail from his computer on the accounting VLAN to a Marketing manager on a computer in the Marketing VLAN. Without a router or layer 3 switch the traffic would never reach the marketing VLAN. Originally you had to have a physical port on the router connected to a switch port that was assigned to the Accounting VLAN and another different physical port on the router connected to a switchport that was assigned to the Marketing VLAN. 802.1Q VLAN trunking allows both the traffic from the marketing VLAN and the traffic from the accounting VLAN to travel across the SAME physical cable from the switch to the router. You then set up sub-interfaces on the router port that correspond to the VLANs and IP addresses of the accounting and marketing VLANs. The idea is the same as the separate physical ports but allows you to use ONE port on the router connected to ONE port on the switch. Additionally if you connect a trunk port on a switch (switch1) to a trunk port on another switch (switch2) [non layer-3 switches specifically] , you can extend a vlan from switch1 to switch2. This comes into play where you need the same VLANs in different buildings or on different floors or you have run out of available switchports on an existing switch. Now if you have 24 ports of 10/100 on the marketing VLAN and 24 10/100 ports on the accounting VLAN. At full duplex that's 4800 Mbits/sec of traffic potentially per VLAN. Or 9600Mbits/sec potentially going up one trunk port. If the trunk port speed is only 100Mbits/sec (200 Mbps full duplex) you are oversubscribed by 48-to-1 and SERIOUSLY congested. This is why trunk ports are normally higher speed ports like 1-Gbps or 10-Gbps ports.
  19. No FAP videos for Linus at the moment. He's still recovering. Luke will have to do it. Sorry for the double entendre. It was low hanging fruit or.. like shooting fish in a barrel. In all seriousness, I hope Linus is feeling better and will return to Fast As possible videos soon.
  20. Very true. Perhaps a video demonstrating it on one of LMGs new Razer Laptops or an ASUS laptop? I forgot to mention: How does it interact with a Skylake or Kaby Lake processor? How does the built in Encryption/Decryption on skylake/kaby lake interact with it? Does it interact with it at all? What are the alternatives?
  21. Linus @LinusTech, or Luke @Slick, or Jon I think TPM would be a great subject for an "As Fast As Possible" episode or two. There seems to be a lot of confusion as to what TPM is and what TPM headers on motherboards are for. Questions I might seek to answer would include: What is TPM and what is it for? What do I need to support it? How does a TPM module interact with the BIOS, OS, encrypted file systems, EFS SSDs or hard drives, WGA (windows genuine advantage or whatever the activation method is called) etc? What problems can they cause? What concerns are there about TPM? (yes, I saw it mentioned in a WAN show document). What will your login experience be if you use it in Windows? Are there problems with TPM? I have researched it and have a general understanding but some of the specifics are not laid out and it's a little murky on the web. Just my $0.02
  22. I'm making 3 major presumptions from your statement The Time Warner box is a router/modem/firewall/access point or router/modem/access point. you mean to provide 802.11 wireless ethernet to these phones for internet access. The netgear switch is not a Layer 3 IP switch that supports inter-vlan routing If that is all true then the answer is a resounding yes. HOWEVER, if you wish to send IP traffic from the phones and route to other VLANs on your wired nework (e.g. for some internal application that is only accessible on your wired network) then it depends on the setup. Most ISPs will lock down their router/modem to not be configurable by the enduser. They do this for one or several of the following reasons: The settings are not to be shared with the end user to avoid abuse or exposure. The router is CHEAP/SIMPLE such as an ethernet-to-cable bridge. The ISP wishes to avoid costly IT intervention because, let's face it, people are usually ignorant and will screw up anything they can mess with to figure out how it works. On more advanced modem/router/AP/Switch devices they provide very rudimentary access as a courtesy for the more advanced users (They still don't trust you not to muck it up though) Business grade devices cost big money Routers that provide inter-vlan routing or subnet-to-subnet routing on internal interfaces generally cost more, the functionality is not included on "All-in-one" devices, and for a simple internet connection via fiber/cable/DSL they are not likely to be provided as a "gimmie" by the ISP for non-business accounts. To route between VLANs (using VLAN trunking) you would need a router or layer 3 switch that supports VLAN trunking (if you are using 802.1Q vlan trunking connection from your netgear switch) or multiple physical ports, one to each subnet (if you are not using 802.1Q vlan trunking). If only one network address range is supported on the TW router(usually 192.168.0.x or 192.168.1.x) you could use this separate internal router or layer 3 switch for inter-VLAN routing for the wired network. Otherwise you would also need to perform NAT translations to the inside network address range to and from each VLAN (as is the case on a standalone firewall device). Here is your topology with the extra device: Phones | | TW modem/router/AP ----VLAN aware router/L3 switch----Netgear SW---wired hosts The topology becomes simpler if: A. the Netgear SW is a Layer3 switch OR B. if the TW modem/router/AP supports intervlan routing, switched virtual interfaces, firewalling and many-to-one or many-to-many NAT or PAT. In the case of possibility A: if the Netgear switch supports intervlan routing/layer3 switching then you simply set up the routing from VLAN-to-VLAN, assuming the wireless is bridged to it's internal network address range by the TW device (most all-in-one router/ap/switch/modem devices do this.) If the case is possibility B (though highly unlikely for a consumer grade device that is provided by the service): If the features are part of your timewarner device you would configure your wireless connection as switched virtual interface in a DMZ for firewalling, configure VLAN trunking on the port connecting to your netgear switch, configure NAT or PAT from your various VLAN address ranges (and any DHCP address range pools if the modem/router/ap/firewall/switch is also your DHCP server), and lastly the routing table for inter-VLAN routing. in the case of A. or B. your topology goes to: phones | | TW wireless AIO device----netgear L3 switch---hosts OR phones | | TW wireless AIO device----netgear switch---hosts
  23. You can use a fish tape to pull cables under carpet or up or down through walls or floors. Bringing ethernet up to an attic or down to a basement/crawlspace will generally allow you to run ethernet to whichever wall you might like except possibly for exterior walls where a short outdoor run would probably work. If the house has areas with no carpet or is all hardwood floors then powerline adapters allow you to send ethernet through the 120/240 volt power receptacle plugs. Powerline also would not require additional tools to use. Pulling cable will take longer and be more hassle to retrofit than powerline and will require finishing touches like wall plates and possibly some drywall or lathe & plaster repair. Additional tools to install hard cabling which you might need would be a power drill, fish tape, cable terminator/crimper, short drill bits, caulk gun and caulking, spackle and spackling knife, and probably some LONG drill bits (about 12-18") to punch through doubled floor plate 2x4s (when coming up from below) or doubled ceiling plate 2x4s (when coming down from above) or through exterior wall sheathing like stucco, brick, or siding and the sheathing and support beams that may be there. In summary: TL;DNR/Short Answer: Use powerline adapters or use a fish tape to pull cables under carpet Long answer: You can use a fish tape to pull cables under carpet or up or down through walls or floors and finish the presentation to make the ethernet ports on the wall look as if they were always there. A tasteful and finished look can be accomplished with the right tools, materials, time, effort and $$.
  24. Dendryganarren, jj9987 and ARikozuM are correct. As long as you DON't mix 568A with 568B (In otherwords use 568A on both ends or 568B on both ends), you will get a straight through cable. Although that means less and less as most switches sold today implement auto-MDIx which negates the crossover vs. straight-through cable argument. 568A is mostly used because the punchdown can be used for residential telephony or data. (It complies with USOC - Universal Service Order Codes and is required for federal government contracts) . Allegedly 568B does give a minor improvement, due to a very small amount less of crosstalk for data. The wiring scheme was mostly used in commercial installations primarily by AT&T for the Merlin Bell Phone systems (if you remember or were born that far back) and in some cases continues to be used out of pure corporate inertia.
  25. It's actually on the diagram. Just pay attention to the "b" side. Looking at it here are the pins on the left side 1 2 5 4 Pins on the right side are 7 8 3 6 Applying TI 568B to it Jack Wiring Pin # T568B 1 White/Orange 2 Orange 3 White/Green 4 Blue 5 White/Blue 6 Green 7 White/Brown 8 Brown pins on the left side: 1 White orange 2 Orange 5 White Blue 4 Blue Pins on the right side: 7 White Brown 8 Brown 3 White Green 6 Green Which match the colors on the "B" Side of the sticker on the jack.