Questions tagged [network-access]
One of the three layers of network design. The main characteristics of the network access layer is that it provides the access point for devices connecting to the network at a reduced "cost-per-port".
119 questions
2
votes
1
answer
172
views
Why would nmap show a port open on an unused IP address?
I work with NAC in my job, and one thing we're noticing is that every endpoint, regardless of what device type it is, shows up as having 1720/TCP open. When I log into the CLI of our NAC appliance and ...
0
votes
1
answer
82
views
multi-connectivity and splitting of traffic flows
In a 5G or SAGIN-based system, is it feasible for a multi-connectivity-enabled user equipment (UE) to split its traffic and transmit it concurrently over both terrestrial and non-terrestrial networks? ...
-1
votes
1
answer
204
views
frequency channels and wifi
i always hear that when i want to use multiple access points i have to make them use different channels to avoid the interference of the radio waves. supposing that i have a router with built in AP(...
0
votes
1
answer
174
views
How to calculate or specify these terms Throughput, Data rate, Bandwidth? [duplicate]
The term "throughput" clearly refers to the actual data received in a system. For instance, with a bandwidth of 5MHz and a channel capacity (data rate) of 10Mbps, if the received data is ...
1
vote
1
answer
236
views
Cisco catalyst 3750 switch fault
Please I need any help or advice I can get. My switch was working fine all of a sudden the computers connected to the switch stop receiving connections. Upon checking the switch, I discovered all the ...
1
vote
3
answers
462
views
What is meant by Access Network and Edge Router?
I am reading the book 'Computer Networking A Top Down Approach 8th Global Edition' and the book refers in the Chapter 1.2.1 to 'Access Networks' informally as "the network that physically ...
1
vote
1
answer
168
views
Access list and interface vlan
Pleasae I am facing this problem, the ping is always successful from 10.16.13.2 to 192.168.0.3
even if Iam configuring the acl in the 'in indirection'.
show ip access-list
Extended IP access list ...
0
votes
1
answer
154
views
No access to internet via DHCP, but works with manual IPs
My DHCP server was giving out IPs in the range 10.0.0.1/24, but I ran out of usable IPs, so I changed the subnet to 10.0.1/21 to have more available addresses, however I am now having a weird problem:
...
0
votes
1
answer
97
views
Network exposure function in 5G core network [closed]
I want to integrate Network exposure function(NEF) to another core network functions . Is their any one help me how to do that?
1
vote
0
answers
50
views
how do I fight/ protect and gather evidence if my router was copy Mac and my Mac was ported? [closed]
I learned recently that my devices including router had it's Mac address copied multiple times. I believe I'm going through a network hacking that uses the Mac addresses to drown my network services. ...
0
votes
2
answers
79
views
Does sharing laptop Wi-Fi cause network noises or network slow down?
We have network (Wifi network) issues in our organization the network is slow and sometimes the access point throw out some connected users. We contacted ISP and they checked our network configuration ...
1
vote
1
answer
541
views
Why need Ack flag if we already have ack number in TCP
If we have ack number so from there we can trace that how many bytes are received and which byte is need next so then what is the use of Ack flag there?
1
vote
2
answers
2k
views
How is P actually chosen in P-persistent CSMA?
I am struggling to understand how the probability value P is chosen for P-persistent CSMA for any particular station, what's the logic behind this.I have read from Wikipedia .
P-persistent
This ...
0
votes
2
answers
308
views
Cisco ASA access-lists and net config
Here are my config to this network. I found the ASA doesn’t ping through each other. Also, when I type show crypto isakmp SA and IPSec Sa, it doesn’t show anything at all. Could you guys find what’s ...
1
vote
1
answer
131
views
protection method that you need to know exact 3 or more ports to access network
long time ago i found an wiki article for method that protect your network from unwanted access.
method was something like:
attacker need to know 2, 3 or more exact ports which are open to access the ...