Skip to main content

Questions tagged [network-access]

One of the three layers of network design. The main characteristics of the network access layer is that it provides the access point for devices connecting to the network at a reduced "cost-per-port".

2 votes
1 answer
172 views

I work with NAC in my job, and one thing we're noticing is that every endpoint, regardless of what device type it is, shows up as having 1720/TCP open. When I log into the CLI of our NAC appliance and ...
BluegillPrime's user avatar
0 votes
1 answer
82 views

In a 5G or SAGIN-based system, is it feasible for a multi-connectivity-enabled user equipment (UE) to split its traffic and transmit it concurrently over both terrestrial and non-terrestrial networks? ...
user7341333's user avatar
-1 votes
1 answer
204 views

i always hear that when i want to use multiple access points i have to make them use different channels to avoid the interference of the radio waves. supposing that i have a router with built in AP(...
winstar345's user avatar
0 votes
1 answer
174 views

The term "throughput" clearly refers to the actual data received in a system. For instance, with a bandwidth of 5MHz and a channel capacity (data rate) of 10Mbps, if the received data is ...
Fatima Ismail's user avatar
1 vote
1 answer
236 views

Please I need any help or advice I can get. My switch was working fine all of a sudden the computers connected to the switch stop receiving connections. Upon checking the switch, I discovered all the ...
mobit noel's user avatar
1 vote
3 answers
462 views

I am reading the book 'Computer Networking A Top Down Approach 8th Global Edition' and the book refers in the Chapter 1.2.1 to 'Access Networks' informally as "the network that physically ...
Sergio Airaldi's user avatar
1 vote
1 answer
168 views

Pleasae I am facing this problem, the ping is always successful from 10.16.13.2 to 192.168.0.3 even if Iam configuring the acl in the 'in indirection'. show ip access-list Extended IP access list ...
Asma B's user avatar
  • 51
0 votes
1 answer
154 views

My DHCP server was giving out IPs in the range 10.0.0.1/24, but I ran out of usable IPs, so I changed the subnet to 10.0.1/21 to have more available addresses, however I am now having a weird problem: ...
Mike's user avatar
  • 133
0 votes
1 answer
97 views

I want to integrate Network exposure function(NEF) to another core network functions . Is their any one help me how to do that?
solomon Fikadie Wassie's user avatar
1 vote
0 answers
50 views

I learned recently that my devices including router had it's Mac address copied multiple times. I believe I'm going through a network hacking that uses the Mac addresses to drown my network services. ...
Konejointune's user avatar
0 votes
2 answers
79 views

We have network (Wifi network) issues in our organization the network is slow and sometimes the access point throw out some connected users. We contacted ISP and they checked our network configuration ...
Asrar Ahmad Ehsan's user avatar
1 vote
1 answer
541 views

If we have ack number so from there we can trace that how many bytes are received and which byte is need next so then what is the use of Ack flag there?
user83095's user avatar
1 vote
2 answers
2k views

I am struggling to understand how the probability value P is chosen for P-persistent CSMA for any particular station, what's the logic behind this.I have read from Wikipedia . P-persistent This ...
S. M.'s user avatar
  • 425
0 votes
2 answers
308 views

Here are my config to this network. I found the ASA doesn’t ping through each other. Also, when I type show crypto isakmp SA and IPSec Sa, it doesn’t show anything at all. Could you guys find what’s ...
David Huang's user avatar
1 vote
1 answer
131 views

long time ago i found an wiki article for method that protect your network from unwanted access. method was something like: attacker need to know 2, 3 or more exact ports which are open to access the ...
Philip Scot's user avatar

15 30 50 per page
1
2 3 4 5
8