Too many things on ethernet... help

Status
Not open for further replies.
I generally try to put the modem at the demark location, for simplicity, and not liking what I've seen them do running cable.

The challenge around testing the internal run is that the potential problems aren't static. Interference comes from other wires but isn't always present. But if it knocks out your sync and forces a resync, the connection is lost for 2 or 3 minutes.

There are testers, as well as methods for doing with multimeter. But easiest probably is just moving the modem and comparing.
 
Thank you for the explanation; this is something I've never had to deal with myself. It's a surprise, and that's what makes me wonder what applicability the VLAN method has to an ordinary home router supporting a limited number of devices on what I understood to be a single physical LAN? I think I am missing something here; perhaps a post I overlooked.
putting aside the obvious use case of a 'guest wifi' network for guests, there is a rather large segment of surveillance cams and other IOT devices with shoddy (or worse) security practices that you might not trust to be on the same network as your personal files. Cams that dial home to China, for example. Or ones that just don't get firmware updates every time there is a new vuln identified in the common linux stacks they use.
This isn't my field, but from what I've seen so far it doesn't appear that 'guest wi-fi' as seen in ordinary home routers is necessarily exactly a VLAN, which is what I was wondering about. When looking into this yesterday, this is what I ran across:

"ISOLATION WITHOUT VLANS" section


I'm finding some of this quite interesting, and I have a long winter of relative isolation ahead to study various things I've been putting off. :-)
 
The router would route data between these two VLANs as I indicated where I said "a router is a layer 3 device and it's purpose is to route IP packets using an IP address between different VLANs."

I kept it simple for the OP. At a high level subnets and VLANs are analogous.

Whatever your network knowledge may or may not be, can't tell since you seem to need to rely on Wikipedia, it is important to know your audience and shape your response accordingly.

But I've been on these forums a long time and understand some people just want to take every opportunity they can to argue.
 
Last edited:
At a high level subnets and VLANs are analogous.

I kept my response simple for the OP.

Whatever your network knowledge may or may not be it is important to shape responses for the audience which in this case was the OP.

But I've been coming here a long time and understand some people just like to argue for the sake or arguing often to the detriment of helping OP's.
 
Last edited:
Thank you for the explanation; this is something I've never had to deal with myself. It's a surprise, and that's what makes me wonder what applicability the VLAN method has to an ordinary home router supporting a limited number of devices on what I understood to be a single physical LAN? I think I am missing something here; perhaps a post I overlooked.
putting aside the obvious use case of a 'guest wifi' network for guests, there is a rather large segment of surveillance cams and other IOT devices with shoddy (or worse) security practices that you might not trust to be on the same network as your personal files. Cams that dial home to China, for example. Or ones that just don't get firmware updates every time there is a new vuln identified in the common linux stacks they use.
This isn't my field, but from what I've seen so far it doesn't appear that 'guest wi-fi' as seen in ordinary home routers is necessarily exactly a VLAN, which is what I was wondering about. When looking into this yesterday, this is what I ran across:

"ISOLATION WITHOUT VLANS" section

https://www.routersecurity.org/vlan.php

I'm finding some of this quite interesting, and I have a long winter of relative isolation ahead to study various things I've been putting off. :-)
Excellent writeup, thanks for posting.

My colleague Vineet Upendra devised this mnemonic for the 7 network layers:

Pull down Newton's theory, save precious apples.
physical datalink network transport session presentation application
 
Last edited:
Thank you for the explanation; this is something I've never had to deal with myself. It's a surprise, and that's what makes me wonder what applicability the VLAN method has to an ordinary home router supporting a limited number of devices on what I understood to be a single physical LAN? I think I am missing something here; perhaps a post I overlooked.
putting aside the obvious use case of a 'guest wifi' network for guests, there is a rather large segment of surveillance cams and other IOT devices with shoddy (or worse) security practices that you might not trust to be on the same network as your personal files. Cams that dial home to China, for example. Or ones that just don't get firmware updates every time there is a new vuln identified in the common linux stacks they use.
This isn't my field, but from what I've seen so far it doesn't appear that 'guest wi-fi' as seen in ordinary home routers is necessarily exactly a VLAN, which is what I was wondering about. When looking into this yesterday, this is what I ran across:

"ISOLATION WITHOUT VLANS" section

https://www.routersecurity.org/vlan.php

I'm finding some of this quite interesting, and I have a long winter of relative isolation ahead to study various things I've been putting off. :-)
Excellent writeup, thanks for posting.
This has been a surprisingly interesting thread for me; that's the beauty of thread drift; one never knows what will be revealed along the way.
My colleague Vineet Upendra devised this mnemonic for the 7 network layers:

Pull down Newton's theory, save precious apples.
physical datalink network transport session presentation application
A long time ago (pre-Internet at both home and work) I tried to wrap my mind around the entire OSI model well enough to understand it all. I did not succeed. :-) Perhaps it's time to try again, though I haven't had a need to know most of it.

Also, got some more mnemonics for ya:

 
At a high level subnets and VLANs are analogous.

I kept my response simple for the OP.
Including VLANs complicates matters. It does not keep them simple. If we were talking about an enterprise network, then there might be a good chance that an IT department would be using VLANs. We are not talking about such a network.
Whatever your network knowledge may or may not be it is important to shape responses for the audience which in this case was the OP.
Who never mentioned VLANs.
 
Last edited:
I was sharing what I do for my network, I was not making a recommendation to the OP.

I actually mentioned subnets after I gave my suggestion to the OP that they work with their provider to focus on the provider side to identify potential issues after ensuring their modem has stable power.

Here is my specific comment about subnetworks:

"If you have the right Ethernet switches you can set up subnetworks within your network of various security strength. For example I have a network called "No-Trust" where I let IoT devices connect because they have been known to be inherently un-secure."

Then I stated that the OP should do what is best for them:

"I tend to agree with others that having a switch separate from your modem is preferred but you should do what is best for you."

DPReview is definitely a place where many people get to showcase they are deficient in reading skills and comprehension.
 
Last edited:
DPReview is definitely a place where many people get to showcase they are deficient in reading skills and comprehension.
I think remarks like this are uncalled for; disagreements are fine, insults are not.

This thread appears to be going nowhere at this point; I'll lock it.
 
Status
Not open for further replies.

Keyboard shortcuts

Back
Top