andrenotgiant 7 years ago

This is (good) SEO linkbait. Someone at Verizon got $10k to spend getting it created by saying it will boost organic search traffic to Verizon. Right now (during link-building phase) they keep the page completely separate from rest of site. Later, (after most links are created) they'll change it. Not sure whether the goal is just to generally build authority to VerizonInternet, or to get this URL ranking for wifi keywords. (Seems more likely the former.)

  • vxNsr 7 years ago

    Would it be accurate to assume this is gonna be used as ammo in the net neutrality debate of the next few weeks?

  • srtjstjsj 7 years ago

    Are you saying they'll change the content later, and won't lose seojuice for that?

  • ejo3 7 years ago

    That page probably cost a lot more than 10K.

    • moondev 7 years ago

      Absolutely. They did a great job too

      • bigbugbag 7 years ago

        Browser could not initialize WebGL For more info visit blend4web.com/doc/en/problems_and_solutions.html#problems-upon-startup

        Maybe they could have done a good job instead of a great job and this page would actually work.

        Not mention the font size issues and overlapping text, luckily they provide images at the bottom that do not have the problem.

        When you have to provide images at the bottom as a workaround, it usually means you know there are issues with the page and the job is not that great.

        Then again, as pointed in other comments here some of the technical information is incorrect or just plain wrong.

mrb 7 years ago

As hatsunearu said, the radio modulation described is grossly incorrect. WiFi never uses 8-PSK (encoding 3 bits per symbol). 802.11n and 11ac encode 1/2/4/6/8 bits using a BPSK/QPSK/16-QAM/64-QAM/256-QAM symbol (256-QAM is for 11ac only). The modulation scheme is negotiated based on signal quality. Here is a quick reference: http://mcsindex.com/ (MCS = modulation coding scheme) On Linux you can find the MCS negotiated with "iw dev wlan0 link | grep -i mcs"

14 channels are defined in the 2.4GHz band. For example channel 6 is centered on 2437 MHz. Each channel is 20MHz wide and divided in 52 "data" subcarriers, each occupying a different frequency and spaced out by 312.5 kHz (52 × 312.5 kHz is less than 20 MHz because there are "control" subcarriers and additional spacing.) So 52 different symbols can be sent in parallel at the same time, which is what we call OFDM https://en.wikipedia.org/wiki/Orthogonal_frequency-division_... (basically, I'm simplifying!)

Remember this is for just 1 channel. So with 14 channels each composed of 52 subcarriers, we could have 728 symbols transmitted at the same time. If they are 256-QAM symbols that's basically 728 × 8 = 5824 bits being transmitted at the same time in the air. And they will all be received and demodulated independently. This high level of parallelism of OFDM is how WiFi can achieve very high throughput.

Then, with wide channels of 40 MHz, which basically aggregate two 20 MHz channels, we get a few more data subcarriers because we don't need as many control subcarriers so a few of them become used as data subcarriers. Hence a 40 MHz channel will have not 52 × 2 = 104 but actually 108 data subcarriers. And 802.11ac defines 80 MHz and 160 MHz channels with respectively 234 and 468 data subcarriers.

Let's calculate the maximum usable throughput of a single 802.11ac 160 MHz channel using 256-QAM modulation... It sends 468 symbols at the same time on 468 data subcarriers. Each symbol encodes 8 bits and takes in the best case 3.6us to be transmitted: 3.2us for the actual symbol + a short guard interval of 0.4us (the GI is normally 0.8us but can be a short GI of 0.4us if negotiated). The raw physical bitrate is:

1/3.6e-6 × 468 × 8 = 1.04 Gbit/s

However there is a mandatory error correction which is 5/6 in the best case so the actual usable bandwidth is:

1.04 × 5/6 = 866.67 Mbit/s

princekolt 7 years ago

"How Wi-Fi Works" --> 503 Service Unavailable

Seems about right.

  • Kenji 7 years ago

    Hahaha, I was about to post just that. Made me laugh. Reminds me of my time at university... during breaks and boring lectures, WiFi was impossible to use because of the load. You could probably measure how boring a lecture is by recording WiFi latency and stability parameters.

  • microwavecamera 7 years ago

    Verizon is trying to give you the authentic experience of how your WiFi works when you're on their network.

  • dzhiurgis 7 years ago

    I've got that once it requested WebGL access and I've clicked "Never for this site". Refreshed and worked fine.

sshanky 7 years ago

This is beautiful, but probably still too complex for most of their customers. I wonder what their motive in putting this together was, as it must have been very expensive.

  • crispyambulance 7 years ago

    Yeah, it is beautiful.

    Unlike their overcomplicated phone plans and billing statements which are deliberately obscure and their customer service which they run like a 2-bit boiler room operation.

    • lhuser123 7 years ago

      Specially obscure. Which is like scamming, because most people won't try to understand it.

  • joe5150 7 years ago

    it was nearly too complex for my pc! I had hardware acceleration disabled in Chrome and it completely pegged my CPU out. the animations barely worked until I re-enabled it, but then the page ran out of memory. I ended up having to look at it on my phone.

    I'm not convinced the manipulable 3D modem rendered in-browser in realtime really added a lot of value for me, but it's pretty cool I guess.

  • Rjevski 7 years ago

    Maybe the fact that as an internet provider it's their duty to explain how what they're selling works? Granted, "internet" doesn't mean Wi-Fi however their equipment includes a wireless access point so it's fair for them to provide documentation about how that works.

    • gist 7 years ago

      > it's their duty

      Not at all. No more than a car manufacturer has a 'duty' to explain how a car or a car engine works.

      • serf 7 years ago

        >No more than a car manufacturer has a 'duty' to explain how a car or a car engine works.

        It is their duty (car mfgs) in the sense that they need the customer to attribute value to their newest technology offerings.

        Honda made damn sure that consumers knew what 'VTEC' was when it was new. Toyota made sure to throw 'Hybrid Synergy Drive' around all day; along with an on-dash animation of the flow of electrons. We're all hearing all about how Teslas' auto-pilot works.

        I don't know if it's a duty unless you consider it as a duty to their shareholders to generate value or profit wherever possible.

        • alsetmusic 7 years ago

          VTEC and Synergy Drive are marketing terms, not established aspects of modern technology that consumers already know they want to purchase.

          • Neliquat 7 years ago

            Vtec refers to a specific implementation of variable cam tech, not just marketing. Many people bought the vtec version of their honda for real performance and economy reasons. Hell, I installed one in my car that orihinally had the exact same displacement single cam motor. But I get your point.

        • rexpop 7 years ago

          > they need the customer to attribute value

          Yeah, and it's my duty to eat?

      • emmelaich 7 years ago

        Not legal duty but moral duty.

        And car manufacturers do explain - via handbooks and manuals and other instruction.

jonathanbull 7 years ago
  • dotancohen 7 years ago

    These guys should do a followup "How Load Balancing Works".

  • gruez 7 years ago

    google cache doesn't do the page justice. most of the value is in its visualizations.

bdcravens 7 years ago

Speaking of how wifi works, I learned something interesting about wifi and Verizon's partner in many things, Comcast: Last night I notified my home Internet acting funny, and learned that the admin interface for my Comcast router had username "admin", password "password". SMH.

  • rayiner 7 years ago

    I mean, I just got a 10-gig router,[1] and the stock username/password was "ubnt"/"ubnt." It's always the installer's job to set up a new username/password.

    [1] https://community.ubnt.com/t5/EdgeMAX-Stories/EdgeRouter-Inf...

    • fest 7 years ago

      ER-XG is quite far from home WiFi router though :)

      UBNT's new-ish home router series (AmpliFi) doesn't have default username/password- it needs to be set-up before using. I do think it's possible to have an open-network default configuration, but the LCD will nag you to set-up the device, and the first step of the setup is choosing a password (both for management and WiFi).

      Disclaimer: I work at UBNT.

    • jstimpfle 7 years ago

      Why not generate a long password and print it on the backside? My DSL provider can do it (for my DSL router)

      • kalleboo 7 years ago

        All the WiFi routers I've bought in recent memory do that for the network connection password, but not for the admin page.

        My NEC router had no default password and required you to make one up yourself on initial setup.

      • suprfnk 7 years ago

        People might be less inclined to change it. And they should change it, because some firm knowing your password isn't safe either.

        • cbhl 7 years ago

          It's worth noting that all the ISPs that encourage you to change your password have a separate maintenance account ("backdoor") with its own password.

    • plandis 7 years ago

      I think the difference here is that someone buying Ubiquiti is knowingly getting a slightly more in depth initial setup.

      Your grandma is getting a Comcast router and probably doesn't know it can be logged into and configured or how to do it.

    • hppycffee 7 years ago

      ISP's like spectrum discourage dispatching techs and opt for customer setup. And every model they give you has an 'admin/admin' or 'admin/password' setup.

  • mnm2 7 years ago

    ... which is "okay", since you can only access it (the admin web console) from within your wlan/lan (and not the internet) and ofc you can/should change it during setup

    • bdcravens 7 years ago

      Most people (esp non-HNers) don't, they just let Comcast set it up. To make matters worse, they set the SSID to my last name, and the password was my address. Maybe that's one-off, but if standard, seems problematic.

      • fancy_pantser 7 years ago

        I can confirm that two different ISPs have done this with my initial WiFi setup over the last few years. AT&T made it the initials of everyone staying in that house with the password set to their 800 number for service calls. Time Warner made it one person's first name and the password was his cell number.

        On the other hand, a Midcontinent Communications (aka Midco) tech told me the password I wanted to use wasn't secure enough and brainstormed with me for a couple minutes on good SSIDs and passwords while he showed me the web admin interface on my laptop. I was very pleased with his visit and called the local office afterwards to pass along kudos!

      • fastball 7 years ago

        I haven't seen a telecom-provided wireless setup in forever that didn't have the default password be fairly long and random, printed on a sticker on the back of the router.

        Seems fairly secure to me.

        • bdcravens 7 years ago

          When I had AT&T it was definitely a more secure setup.

    • mandeepj 7 years ago

      > ... which is "okay"

      Nope. Anyone within range of your wifi router can connect to it and most possibly the first username and password that they will try is admin\admin or admin\password

      • jwfxpr 7 years ago

        The parent posts here are talking about the admin interface to the router, not the wireless password. While it's technically true that anyone within range can connect, they can't authenticate without the wireless password, and so cannot access the admin interface.

  • greedo 7 years ago

    My ISP just set me up with gigE fiber. The installer was a bit clueless, didn't really want to provide me with the gateway IP for the router. Then I looked at the wifi settings; a 2.4Ghz and 5 Ghz setup, both with SSIDs that included the provider's name as a prefix. The password was a 9 digit password, all numerical...

    I called the support line and got through quickly to an admin who could change the password and SSID for me (unless you pay for a public IP, the mgmt interface is locked down). I mentioned that having such a short, all numerical password would mean that any access point they set up would be trivial to crack. Just wardrive looking for similarly named access points, and you'd be able to jump on their connection in just a few minutes. He didn't seem to care, which is too bad.

  • joshumax 7 years ago

    If you want to hear something else scary, I dumped the firmware on my modem a little while back and started exploring it:

    https://twitter.com/joshumax/status/860712276717748225

    • willstrafach 7 years ago

      Did you need to do anything special to get shell access?

      • joshumax 7 years ago

        Just the basics.

        Plugged in my 'scope and started probing some debug headers that looked a lot like they'd be for UART, check if one is Tx and is sending out data, figure out the baud rate, hook up Rx, Tx, and GND on my UART dongle to the correct headers, and modify the bootsting in Cisco preboot to spawn a serial console which landed me into busybox as root :)

        • voltagex_ 7 years ago

          > Just the basics.

          Followed by the use of >=$100 of hardware and some not-beginner skills. Snark aside, I highly recommend anyone remotely interested in what is going on in your modem/router to have a go at this. You don't need the scope if you're okay with trial and error and it's pretty hard to break anything as long as you don't connect the 3.3/5V line to start with.

          • aerioux 7 years ago

            I think he means people-who-work-with-routers basics :)

        • willstrafach 7 years ago

          Nice, I would have assumed there would be additional security for production units honestly.

  • JustSomeNobody 7 years ago

    Why can't it be "admin", "<random string of x number of nums chars etc>". Could even print it in the bottom of the device.

  • peterwwillis 7 years ago

    It's bad practice to assume things are set up properly by someone else. This applies to more than just computers, fwiw.

deepsun 7 years ago

Does anyone know, if I'm on a WPA2-PSK wi-fi, do other devices that are also on the same network can "sniff" my traffic. For unprotected networks it's obvious, but what about protected?

  • detaro 7 years ago

    Yes, if you know the PSK (=password) and can capture the initial handshake (which is easy, since you can just force-disconnect a client so it has to do a new one) you can decrypt it. (If I remember correctly, Wireshark has this built in, so you can try it for yourself if you are curious)

    • voltagex_ 7 years ago

      I'm assuming you mean a malicious device can force a deauth on another client (or more usually, all other clients) and then capture the packets as they reconnect. If so, is there a way to detect this? Is there any way to protect against this? I'm assuming client isolation makes it more difficult.

      • detaro 7 years ago

        Apparently since I last looked into it, "Protected Management Frames" from 802.11w are a bit better supported (in non-professional APs), which solve this issue by not allowing "anonymous" deauthentication. (requires support on both clients and AP though)

        You of course can monitor for deauthentication packets, but unless you know when/if your AP is sending them during normal operation you can't make sure that an individual occurrence is an attack or not. If someone floods them, it's easier to tell of course.

        If you want to protect individual traffic in a network you have to share access/are worried about passwords getting lost, the best solution is to go to WPA2 Enterprise with per-device credentials. On CCC-run hacker events they even use it for the "open" WLAN, and just accept any username and password.

      • mort96 7 years ago

        Well, the easiest way to protect against it is making sure an attacker doesn't know your wifi password.

        • deepsun 7 years ago

          Of course, but I'm working in a big office with office-private wi-fi with one password. And who knows what viruses my colleagues have.

          Also, I have a pretty special audience of hackers here, so I wouldn't be surprised if someone actually tries it.

          Same goes for various events and conferences.

  • GrayShade 7 years ago

    As far as I know, they can [1]. Once you're connected to the network you can sniff out everything from clients that connect after you.

    The standard response to this is that you're safe since the eavesdropper needs to know the shared key. You can look into setting up WPA2-Enterprise if you're worried about that. FreeRADIUS doesn't seem particularly hard to configure.

    [1] https://superuser.com/a/156969

  • ryan-c 7 years ago

    Yes, other devices on the same network (using WPA2-PSK) can sniff your traffic. It's possible to prevent this with WPA2-Enterprise.

  • Magnets 7 years ago

    Each client uses a different session encryption key but that is negotiated using the shared PSK.

  • m-j-fox 7 years ago

    It wouldn't be a good system if they could. You have to worry more about wired Ethernet which can also be encrypted but rarely is.

pier25 7 years ago

I had to disable the ad blocker to get the nice web gl graphics.

From a front end perspective I think this it's awesome. No so sure about the content though.

hatsunearu 7 years ago

the radio stuff is pretty wrong; one glaring one is that PSK is pretty much not used anymore, it's all OFDM.

  • rayiner 7 years ago

    OFDM is orthogonal to PSK (hah). PSK is a modulation--a way of representing bits on a carrier wave. Another type of modulation is QAM. OFDM is a way of combining multiple sub-carriers (each modulated with PSK or QAM) into one signal in order to deal with multi-path distortion: https://www.csie.ntu.edu.tw/~hsinmu/courses/_media/wn_11fall....

    • mrb 7 years ago

      Still, hatsunearu is correct. The page is grossly wrong, absolutely no modern WiFi modulation technique uses 8-PSK. Have a look at http://mcsindex.com/ 11a/11n/11ac all use BPSK, QPSK, 16-QAM, 64-QAM, and (for 11ac only) 256-QAM.

      • m-j-fox 7 years ago

        I know. And not a word on forward-error correction, trellis codes, automatic gain control, beam steering or MU-MIMO. Is this for babies? They don't even touch on low-noise amplifiers. Much less DAC and ADC performance. Where's the link a primer on FFT?

    • tankenmate 7 years ago

      Some systems even combine PSK and ASK (like QAM) but asymmetrically (called APSK), obviously though you start getting into diminishing returns; noise limiting the gains. Of course you are limited by Shannon's law. But depending on the transmission medium lower energy signals can be more resistant to noise, so you can use either probabilistic or dynamic symbol selection to reduce the effect noise has on the signal and hence increase the available error free bandwidth (error free symbol rate)[0].

      [0] https://en.wikipedia.org/wiki/Constellation_shaping ; check the references and external links for more in depth explanations.

nvahalik 7 years ago

Can someone explain the natural resonance of walls of talked about with regards to 5Ghz?

Piccollo 7 years ago

Why did CSS stop working

srtjstjsj 7 years ago

website crashes chrome on windows after a few seconds.

Yizahi 7 years ago

In my experience it doesn't. My every attempt at improving this shit ends up in laying more wires everywhere.

anilakar 7 years ago

Stopped reading at "Wi-Fi antennas send information". Antennas don't send anything, they just match the impedance of the feedline into that of the medium.