Most Popular
1500 questions
34
votes
3 answers
Why are IPv4 addresses 32-bit?
Many moons ago, when I was just a wee bairn commencing my career, I had a job interview for a low-level developer role. Having at that time just learned how CIDR was implemented, I was keen to show off my knowledge.
Sadly, that tactic didn't work…

eggyal
- 465
- 1
- 4
- 7
34
votes
8 answers
How can I stop an intruder plugging into an Ethernet wall socket getting access to the network?
Is MAC address filtering the most suitable option to prevent someone connecting their own device to the network by plugging into Ethernet wall sockets? What if they unplug a device and clone its MAC?

Qgenerator
- 451
- 1
- 4
- 3
33
votes
5 answers
Better Enterprise Multihoming
I would like to get some opinions regarding ways in which I can improve a BGP dual-provider, dual-router design. Each provider supplies a /24 public subnet. I will refer to the routers, circuits, subnets, HSRP groups and providers as A and B,…

Dennis Olvany
- 2,435
- 1
- 17
- 34
33
votes
2 answers
Is multicast on the public internet possible? And if yes: How?
Is it possible to use multicast on the public internet? If yes: How? Are special IP addresses required and where do you get them from?

Matthias Merkel
- 607
- 2
- 7
- 11
33
votes
1 answer
Using SNMP to retrieve the ARP and mac-address tables from a switch
I would like to get ARP tables from a switch to a syslog-ng server that has been set up on Ubuntu Server 12.04 LTS. I have read about SNMP and I know the server will act as a manager and the switch as an agent. I have details as to where the MIB is…

sosytee
- 685
- 1
- 7
- 12
32
votes
5 answers
Why do we still use Ethernet?
There's no doubt the vast majority of Ethernet frames are transporting IP packets. I know there are various other protocols that can be transported over Ethernet as well, but those can be transported over IP as well.
With modern Ethernet networks…

rfb
- 329
- 3
- 3
32
votes
9 answers
Why use SSH and VPN in combination?
My employer requires me to first log on to a VPN, and only then I can SSH into the servers. But, given the security of SSH, is a VPN overkill?
What is the use of a VPN in terms of security if I am already using SSH?

JavaDeveloper
- 893
- 2
- 12
- 14
31
votes
8 answers
Why does DHCP use UDP and not TCP?
DHCP uses UDP as its transport protocol. DHCP messages that a client sends to a server are sent to well-known port 67 (UDP—Bootstrap Protocol and DHCP). DHCP Messages that a server sends to a client are sent to port 68, so can DHCP use TCP ?

guidev
- 563
- 1
- 6
- 15
31
votes
4 answers
Exactly when is PMTUD performed? (Path MTU discovery)
In discussions that have spurred from other questions on this site, I've realised that I don't have a solid understanding of when Path MTU Discovery (PMTUD) is performed.
I know what it does -- discover the lowest MTU on a path from Client to…

Eddie
- 15,026
- 6
- 44
- 84
31
votes
8 answers
What are the downsides of OpenVPN?
I have been seeing so many people always wrestling with IPSec, and many other secure VPN technologies.
I, for one, have always simply used OpenVPN, with beautiful and simple and versatile results. I've used it on DD-WRT routers, big servers and…

user1056
- 413
- 1
- 4
- 5
30
votes
5 answers
Are CoS and QoS ever interchangeable?
The terms CoS & QoS are often used interchangably, particularly in the SP space when providing "Class of Service profiles" etc as part of Product sets. I'm looking to re-affirm my understanding that CoS is just one way in which traffic can be…

MattE
- 2,087
- 4
- 24
- 34
30
votes
4 answers
How does a switch learn a switch table?
Say the switch table is empty. If computer A sends a frame destined to computer B, the switch will broadcast asking who has the MAC address of B. What if C suddenly sends a frame to A? What is the mechanism so the switch doesn't mistakenly think…

Celeritas
- 835
- 4
- 11
- 18
29
votes
7 answers
Why isn't UDP with reliability (implemented at Application layer) a substitute of TCP?
TCP provides reliability at transport layer while UDP does not. So, UDP is fast.
But, a protocol at application layer can implement reliable mechanism while using UDP.
In this sense, why isn't UDP with reliability (implemented on Application layer)…

mallea
- 519
- 4
- 8
29
votes
1 answer
What are the benefits and cons of IGMP snooping?
Our new router is asking if we want IGMP snooping enabled. Not being familiar with this, I looked to the internet and got the following wiki description:
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network…

HorusKol
- 393
- 1
- 3
- 6
29
votes
2 answers
What is the meaning of the CRC counter on a cisco device?
If the CRC counter of an interface is high, normally it's a bad sign, but why?
If the count is high, what does this mean technically?
What can cause this counter to go up?
On which layer in the OSI model will this counter react?

Bulki
- 2,383
- 7
- 25
- 44